HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 351 - 375 of 2776) sorted by null

<<11121314151617181920>>

  /prebuilts/go/linux-x86/src/crypto/x509/
root_bsd.go 9 // Possible certificate files; stop after finding one.
root_solaris.go 7 // Possible certificate files; stop after finding one.
root_unix.go 14 // Possible directories with certificate files; stop after successfully
21 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/
FingerprintUtils.java 22 import java.security.cert.Certificate;
28 * Returns the {@link Certificate} fingerprint as returned by <code>keytool</code>.
30 * @param certificate
33 public static String getFingerprint(Certificate cert, String hashAlgorithm) {
  /libcore/luni/src/test/java/libcore/java/security/cert/
CertificateFactoryTest.java 45 import java.security.cert.Certificate;
67 "-----BEGIN CERTIFICATE-----\n"
85 + "-----END CERTIFICATE-----\n";
88 "-----BEGIN CERTIFICATE-----\r\n"
106 + "-----END CERTIFICATE-----\r\n";
108 private static final byte[] VALID_CERTIFICATE_PEM_HEADER = "-----BEGIN CERTIFICATE-----\n"
130 private static final byte[] VALID_CERTIFICATE_PEM_FOOTER = "\n-----END CERTIFICATE-----\n"
134 "-----BEGIN CERTIFICATE-----\n"
169 + "-----END CERTIFICATE-----";
190 Certificate c = cf.generateCertificate(new ByteArrayInputStream(valid))
290 Certificate certificate = cf.generateCertificate(certStream); local
521 public X509Certificate certificate; field in class:CertificateFactoryTest.KeyHolder
    [all...]
SubjectAlternativeNameTest.java 21 import java.security.cert.Certificate;
53 Certificate root = new TestKeyStore.Builder()
66 private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception {
67 byte[] encoded = certificate.getEncoded();
  /development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/
PackageValidator.java 45 * Map allowed callers' certificate keys to the expected caller information.
66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
70 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
73 validCertificates.put(certificate, infos);
77 " certificate=", certificate);
107 LogHelper.w(TAG, "Caller has more than one signature certificate!");
126 // Check if the package name is valid for the certificate:
137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any "
    [all...]
  /device/linaro/bootloader/edk2/BaseTools/Source/C/Include/Common/
UefiMultiPhase.h 82 @param dwLength The length of the entire certificate,
90 @param wCertificateType The certificate type. See
92 certificate types. The UEFI
94 certificate type values from 0x0EF0
97 @param bCertificate The actual certificate. The format of
98 the certificate depends on
137 @param CertData This is the certificate data. The format of
142 @param Information The WIN_CERTIFICATE_UEFI_GUID certificate
145 without requiring a new certificate type.
148 size of the certificate less the fixed
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptTsNull.c 27 @param[in] TsaCert Pointer to a trusted/root TSA certificate encoded in DER, which
28 is used for TSA certificate chain verification.
29 @param[in] CertSize Size of the trusted certificate in bytes.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
Holder.java 14 * For an v2 attribute certificate this is:
20 * -- the holder's Public Key Certificate
30 * For an v1 attribute certificate this is:
35 * -- associated with a Public Key Certificate
73 * Constructor for a holder for an V1 attribute certificate.
94 * Constructor for a holder for an V2 attribute certificate.
135 * Constructs a holder from a IssuerSerial for a V1 or V2 certificate.
138 * @param version The version of the attribute certificate.
149 * @return The version of the attribute certificate.
171 * @param version The version of the attribute certificate.
    [all...]
  /external/libmtp/logs/
mtp-detect-philips-hdd1630_17.txt 59 0xd102: Device Certificate
212 Device Certificate:
213 <DEVCERT version="1.0"><CERTIFICATE
216 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbg==</PUBLICKEY><KEYDATA>/MVcBaRhfnQtcg5PdNT/1gi4ldE=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>vJq0MP4vNqqz2va7X9cVJ5RHlGWEUGv+uaYXKlR95v2RoQHBqSAbDg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>OsXzV9+S6QPcaWrYUg+sdyNGbGs=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.75</SECURITYVERSION><CERTIFICATE
217 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbgIEZkt0I+gaMIFOO/X9qhavGtcu6qagfgvD3pGQOV/4kTqGaLPyhUAdLZYm</CERTIFICATE></FALLBACK><CERTIFICATE
248 </LIMITS><PUBLICKEY>Z3qaAjhCqOB1esbbg4/nbJeQJG9j0muW3uUMpVjhx9PMjgoPwMllOQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>kROhCPVXSrV6kWuObwqLBzkjSHqKPyNYf0LLwJ7/p48OSHKhUa7wIw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
249 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>431</AUTH_ID><PUBLICKEY>cKc3BWl4UETOcysM5vgzRIHY5l7Ukk0CajoL6evzhUtNVTCERxvcgA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>RQzUsdEClPGWTNiHmu2V0FLW2HASfdGSj2M3NuL1iTK0Ncub4UWlAA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-phillips-hdd1630_17.txt 59 0xd102: Device Certificate
212 Device Certificate:
213 <DEVCERT version="1.0"><CERTIFICATE
216 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbg==</PUBLICKEY><KEYDATA>/MVcBaRhfnQtcg5PdNT/1gi4ldE=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>vJq0MP4vNqqz2va7X9cVJ5RHlGWEUGv+uaYXKlR95v2RoQHBqSAbDg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>OsXzV9+S6QPcaWrYUg+sdyNGbGs=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.75</SECURITYVERSION><CERTIFICATE
217 private="1">2BNZryntm+AwFPQB+/7ps8kBmiKjPjcTTQx5tk2JLuM9EbgQA2/hbgIEZkt0I+gaMIFOO/X9qhavGtcu6qagfgvD3pGQOV/4kTqGaLPyhUAdLZYm</CERTIFICATE></FALLBACK><CERTIFICATE
248 </LIMITS><PUBLICKEY>Z3qaAjhCqOB1esbbg4/nbJeQJG9j0muW3uUMpVjhx9PMjgoPwMllOQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>kROhCPVXSrV6kWuObwqLBzkjSHqKPyNYf0LLwJ7/p48OSHKhUa7wIw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
249 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>431</AUTH_ID><PUBLICKEY>cKc3BWl4UETOcysM5vgzRIHY5l7Ukk0CajoL6evzhUtNVTCERxvcgA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>RQzUsdEClPGWTNiHmu2V0FLW2HASfdGSj2M3NuL1iTK0Ncub4UWlAA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-samsung-yp-t9.txt 61 0xd102: Device Certificate
164 Device Certificate:
165 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
169 XBA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>nZrrzPrtSob0+7BSXjdTlRBUJwU=</SYMSIGNATURE></CERTIFICATE><FAL
170 LBACK><SECURITYVERSION>2.4.105.105</SECURITYVERSION><CERTIFICATE
172 LNQ1cl236PXPnGhBweRO</CERTIFICATE></FALLBACK><CERTIFICATE
179 OV3F4q2xlvMfFBZtW/YaNhE/9IBGpQpxDJG4cljg81O1sxP/KhA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
182 2kAjf3LecPk0UOgCjPmQrGsKUfmyRBTRujDP3/LQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
  /frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/
PackageValidator.java 47 * Map allowed callers' certificate keys to the expected caller information.
68 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local
70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
72 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
75 validCertificates.put(certificate, infos);
78 + info.packageName + " release=" + info.release + " certificate="
79 + certificate);
109 Log.w(TAG, "Caller has more than one signature certificate!");
127 // Check if the package name is valid for the certificate:
138 Log.i(TAG, "Caller has a valid certificate, but its package doesn't match any expected
    [all...]
  /libcore/ojluni/src/main/java/com/sun/net/ssl/internal/ssl/
X509ExtendedTrustManager.java 66 * Given the partial or complete certificate chain provided by the
67 * peer, check its identity and build a certificate path to a trusted
71 * The authentication type is determined by the actual certificate
78 * the X509 certificate, in order to prevent masquerade attacks.
80 * @param chain the peer certificate chain
81 * @param authType the authentication type based on the client certificate
87 * @throws CertificateException if the certificate chain is not trusted
95 * Given the partial or complete certificate chain provided by the
96 * peer, check its identity and build a certificate path to a trusted
107 * the X509 certificate, in order to prevent masquerade attacks
    [all...]
  /libcore/ojluni/src/main/java/java/util/jar/
JarEntry.java 31 import java.security.cert.Certificate;
39 Certificate[] certs;
91 * Returns the <code>Certificate</code> objects for this entry, or
97 * <p>The returned certificate array comprises all the signer certificates
98 * that were used to verify this entry. Each signer certificate is
99 * followed by its supporting certificate chain (which may be empty).
100 * Each signer certificate and its supporting certificate chain are ordered
101 * bottom-to-top (i.e., with the signer certificate first and the (root)
102 * certificate authority last)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_unix.go 14 // Possible directories with certificate files; stop after successfully
21 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 539 * Encode a CA certificate alias so it does not contain illegal character.
552 * Decode a previously-encoded CA certificate alias.
569 * Set CA certificate alias.
572 * a certificate
574 * @param alias identifies the certificate
582 * Set CA certificate aliases. When creating installing the corresponding certificate to
586 * a certificate.
588 * @param aliases identifies the certificate
611 * Get CA certificate alia
    [all...]
  /build/soong/java/
app.go 33 // path to a certificate, or the name of a certificate in the default
34 // certificate directory, or blank to use the default product certificate
35 Certificate string
138 certificate := a.appProperties.Certificate
139 if certificate == "" {
140 certificate = ctx.AConfig().DefaultAppCertificate(ctx).String()
141 } else if dir, _ := filepath.Split(certificate); dir == ""
    [all...]
  /external/autotest/client/common_lib/cros/
site_eap_certs.py 5 # These certificate trees are for testing only in sealed containers
35 ca_cert_1 = """-----BEGIN CERTIFICATE-----
54 -----END CERTIFICATE-----
56 server_cert_1 = """-----BEGIN CERTIFICATE-----
76 -----END CERTIFICATE-----
94 client_cert_1 = """-----BEGIN CERTIFICATE-----
113 -----END CERTIFICATE-----
134 server_expired_cert = """-----BEGIN CERTIFICATE-----
154 -----END CERTIFICATE-----
175 ca_cert_2 = """-----BEGIN CERTIFICATE----
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
PKIXBuilderParameters.java 52 * {@code KeyStore} instance containing trusted certificate entries, each
56 * certificate that the {@code CertPathBuilder} will attempt
60 * certificate. Minimal criteria for an {@code X509Certificate} usually
92 * constraints on the target certificate
111 * certificate entries contained in the specified {@code KeyStore}.
113 * are considered; all other certificate types are ignored.
118 * constraints on the target certificate
122 * not contain at least one trusted certificate entry
136 * certificates that may exist in a certification path. A certificate
138 * fields are identical and are not empty. Note that the last certificate
    [all...]
PKIXReason.java 38 * The certificate does not chain correctly.
43 * The certificate's key usage is invalid.
58 * The certificate contains one or more unrecognized critical
64 * The certificate is not a CA certificate.
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/include/
cert.h 47 * If the issuer points to this same instance, the generated certificate will
54 const char *fn; /* Filename to save the certificate */
55 const char *bin; /* Image associated to this certificate */
59 X509 *x; /* X509 certificate container */
62 cert_t *issuer; /* Issuer certificate */
  /external/nist-sip/java/gov/nist/javax/sip/
TransactionExt.java 4 import java.security.cert.Certificate;
56 * Get the certificate(s) that were sent to the peer during handshaking.
57 *@return the certificate(s) that were sent to the peer during handshaking.
61 Certificate[] getLocalCertificates() throws UnsupportedOperationException;
68 Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException;
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
FakeSSLSession.java 20 import java.security.cert.Certificate;
27 private final Certificate[] certificates;
29 public FakeSSLSession(Certificate... certificates) throws Exception {
53 public Certificate[] getLocalCertificates() {
65 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {

Completed in 1202 milliseconds

<<11121314151617181920>>