/prebuilts/go/linux-x86/src/crypto/x509/ |
root_bsd.go | 9 // Possible certificate files; stop after finding one.
|
root_solaris.go | 7 // Possible certificate files; stop after finding one.
|
root_unix.go | 14 // Possible directories with certificate files; stop after successfully 21 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 22 import java.security.cert.Certificate; 28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>. 30 * @param certificate 33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 45 import java.security.cert.Certificate; 67 "-----BEGIN CERTIFICATE-----\n" 85 + "-----END CERTIFICATE-----\n"; 88 "-----BEGIN CERTIFICATE-----\r\n" 106 + "-----END CERTIFICATE-----\r\n"; 108 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n" 130 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n" 134 "-----BEGIN CERTIFICATE-----\n" 169 + "-----END CERTIFICATE-----"; 190 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid)) 290 Certificate certificate = cf.generateCertificate(certStream); local 521 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder [all...] |
SubjectAlternativeNameTest.java | 21 import java.security.cert.Certificate; 53 Certificate root = new TestKeyStore.Builder() 66 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { 67 byte[] encoded = certificate.getEncoded();
|
/development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |
/device/linaro/bootloader/edk2/BaseTools/Source/C/Include/Common/ |
UefiMultiPhase.h | 82 @param dwLength The length of the entire certificate,
90 @param wCertificateType The certificate type. See
92 certificate types. The UEFI
94 certificate type values from 0x0EF0
97 @param bCertificate The actual certificate. The format of
98 the certificate depends on
137 @param CertData This is the certificate data. The format of
142 @param Information The WIN_CERTIFICATE_UEFI_GUID certificate
145 without requiring a new certificate type.
148 size of the certificate less the fixed [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptTsNull.c | 27 @param[in] TsaCert Pointer to a trusted/root TSA certificate encoded in DER, which
28 is used for TSA certificate chain verification.
29 @param[in] CertSize Size of the trusted certificate in bytes.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
Holder.java | 14 * For an v2 attribute certificate this is: 20 * -- the holder's Public Key Certificate 30 * For an v1 attribute certificate this is: 35 * -- associated with a Public Key Certificate 73 * Constructor for a holder for an V1 attribute certificate. 94 * Constructor for a holder for an V2 attribute certificate. 135 * Constructs a holder from a IssuerSerial for a V1 or V2 certificate. 138 * @param version The version of the attribute certificate. 149 * @return The version of the attribute certificate. 171 * @param version The version of the attribute certificate. [all...] |
/external/libmtp/logs/ |
mtp-detect-philips-hdd1630_17.txt | 59 0xd102: Device Certificate 212 Device Certificate: 213 <DEVCERT version="1.0"><CERTIFICATE 216 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbg==</PUBLICKEY><KEYDATA>/MVcBaRhfnQtcg5PdNT/1gi4ldE=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>vJq0MP4vNqqz2va7X9cVJ5RHlGWEUGv+uaYXKlR95v2RoQHBqSAbDg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>OsXzV9+S6QPcaWrYUg+sdyNGbGs=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.75</SECURITYVERSION><CERTIFICATE 217 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbgIEZkt0I+gaMIFOO/X9qhavGtcu6qagfgvD3pGQOV/4kTqGaLPyhUAdLZYm</CERTIFICATE></FALLBACK><CERTIFICATE 248 </LIMITS><PUBLICKEY>Z3qaAjhCqOB1esbbg4/nbJeQJG9j0muW3uUMpVjhx9PMjgoPwMllOQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>kROhCPVXSrV6kWuObwqLBzkjSHqKPyNYf0LLwJ7/p48OSHKhUa7wIw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 249 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>431</AUTH_ID><PUBLICKEY>cKc3BWl4UETOcysM5vgzRIHY5l7Ukk0CajoL6evzhUtNVTCERxvcgA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>RQzUsdEClPGWTNiHmu2V0FLW2HASfdGSj2M3NuL1iTK0Ncub4UWlAA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT [all...] |
mtp-detect-phillips-hdd1630_17.txt | 59 0xd102: Device Certificate 212 Device Certificate: 213 <DEVCERT version="1.0"><CERTIFICATE 216 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbg==</PUBLICKEY><KEYDATA>/MVcBaRhfnQtcg5PdNT/1gi4ldE=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>vJq0MP4vNqqz2va7X9cVJ5RHlGWEUGv+uaYXKlR95v2RoQHBqSAbDg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>OsXzV9+S6QPcaWrYUg+sdyNGbGs=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.75</SECURITYVERSION><CERTIFICATE 217 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbgIEZkt0I+gaMIFOO/X9qhavGtcu6qagfgvD3pGQOV/4kTqGaLPyhUAdLZYm</CERTIFICATE></FALLBACK><CERTIFICATE 248 </LIMITS><PUBLICKEY>Z3qaAjhCqOB1esbbg4/nbJeQJG9j0muW3uUMpVjhx9PMjgoPwMllOQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>kROhCPVXSrV6kWuObwqLBzkjSHqKPyNYf0LLwJ7/p48OSHKhUa7wIw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 249 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>431</AUTH_ID><PUBLICKEY>cKc3BWl4UETOcysM5vgzRIHY5l7Ukk0CajoL6evzhUtNVTCERxvcgA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>RQzUsdEClPGWTNiHmu2V0FLW2HASfdGSj2M3NuL1iTK0Ncub4UWlAA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT [all...] |
mtp-detect-samsung-yp-t9.txt | 61 0xd102: Device Certificate 164 Device Certificate: 165 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID 169 XBA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>nZrrzPrtSob0+7BSXjdTlRBUJwU=</SYMSIGNATURE></CERTIFICATE><FAL 170 LBACK><SECURITYVERSION>2.4.105.105</SECURITYVERSION><CERTIFICATE 172 LNQ1cl236PXPnGhBweRO</CERTIFICATE></FALLBACK><CERTIFICATE 179 OV3F4q2xlvMfFBZtW/YaNhE/9IBGpQpxDJG4cljg81O1sxP/KhA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE 182 2kAjf3LecPk0UOgCjPmQrGsKUfmyRBTRujDP3/LQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT [all...] |
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
PackageValidator.java | 47 * Map allowed callers' certificate keys to the expected caller information. 68 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 72 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 75 validCertificates.put(certificate, infos); 78 + info.packageName + " release=" + info.release + " certificate=" 79 + certificate); 109 Log.w(TAG, "Caller has more than one signature certificate!"); 127 // Check if the package name is valid for the certificate: 138 Log.i(TAG, "Caller has a valid certificate, but its package doesn't match any expected [all...] |
/libcore/ojluni/src/main/java/com/sun/net/ssl/internal/ssl/ |
X509ExtendedTrustManager.java | 66 * Given the partial or complete certificate chain provided by the 67 * peer, check its identity and build a certificate path to a trusted 71 * The authentication type is determined by the actual certificate 78 * the X509 certificate, in order to prevent masquerade attacks. 80 * @param chain the peer certificate chain 81 * @param authType the authentication type based on the client certificate 87 * @throws CertificateException if the certificate chain is not trusted 95 * Given the partial or complete certificate chain provided by the 96 * peer, check its identity and build a certificate path to a trusted 107 * the X509 certificate, in order to prevent masquerade attacks [all...] |
/libcore/ojluni/src/main/java/java/util/jar/ |
JarEntry.java | 31 import java.security.cert.Certificate; 39 Certificate[] certs; 91 * Returns the <code>Certificate</code> objects for this entry, or 97 * <p>The returned certificate array comprises all the signer certificates 98 * that were used to verify this entry. Each signer certificate is 99 * followed by its supporting certificate chain (which may be empty). 100 * Each signer certificate and its supporting certificate chain are ordered 101 * bottom-to-top (i.e., with the signer certificate first and the (root) 102 * certificate authority last) [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_unix.go | 14 // Possible directories with certificate files; stop after successfully 21 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 539 * Encode a CA certificate alias so it does not contain illegal character. 552 * Decode a previously-encoded CA certificate alias. 569 * Set CA certificate alias. 572 * a certificate 574 * @param alias identifies the certificate 582 * Set CA certificate aliases. When creating installing the corresponding certificate to 586 * a certificate. 588 * @param aliases identifies the certificate 611 * Get CA certificate alia [all...] |
/build/soong/java/ |
app.go | 33 // path to a certificate, or the name of a certificate in the default 34 // certificate directory, or blank to use the default product certificate 35 Certificate string 138 certificate := a.appProperties.Certificate 139 if certificate == "" { 140 certificate = ctx.AConfig().DefaultAppCertificate(ctx).String() 141 } else if dir, _ := filepath.Split(certificate); dir == "" [all...] |
/external/autotest/client/common_lib/cros/ |
site_eap_certs.py | 5 # These certificate trees are for testing only in sealed containers 35 ca_cert_1 = """-----BEGIN CERTIFICATE----- 54 -----END CERTIFICATE----- 56 server_cert_1 = """-----BEGIN CERTIFICATE----- 76 -----END CERTIFICATE----- 94 client_cert_1 = """-----BEGIN CERTIFICATE----- 113 -----END CERTIFICATE----- 134 server_expired_cert = """-----BEGIN CERTIFICATE----- 154 -----END CERTIFICATE----- 175 ca_cert_2 = """-----BEGIN CERTIFICATE---- [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
PKIXBuilderParameters.java | 52 * {@code KeyStore} instance containing trusted certificate entries, each 56 * certificate that the {@code CertPathBuilder} will attempt 60 * certificate. Minimal criteria for an {@code X509Certificate} usually 92 * constraints on the target certificate 111 * certificate entries contained in the specified {@code KeyStore}. 113 * are considered; all other certificate types are ignored. 118 * constraints on the target certificate 122 * not contain at least one trusted certificate entry 136 * certificates that may exist in a certification path. A certificate 138 * fields are identical and are not empty. Note that the last certificate [all...] |
PKIXReason.java | 38 * The certificate does not chain correctly. 43 * The certificate's key usage is invalid. 58 * The certificate contains one or more unrecognized critical 64 * The certificate is not a CA certificate.
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/include/ |
cert.h | 47 * If the issuer points to this same instance, the generated certificate will 54 const char *fn; /* Filename to save the certificate */ 55 const char *bin; /* Image associated to this certificate */ 59 X509 *x; /* X509 certificate container */ 62 cert_t *issuer; /* Issuer certificate */
|
/external/nist-sip/java/gov/nist/javax/sip/ |
TransactionExt.java | 4 import java.security.cert.Certificate; 56 * Get the certificate(s) that were sent to the peer during handshaking. 57 *@return the certificate(s) that were sent to the peer during handshaking. 61 Certificate[] getLocalCertificates() throws UnsupportedOperationException; 68 Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException;
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 20 import java.security.cert.Certificate; 27 private final Certificate[] certificates; 29 public FakeSSLSession(Certificate... certificates) throws Exception { 53 public Certificate[] getLocalCertificates() { 65 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
|