HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 426 - 450 of 2776) sorted by null

<<11121314151617181920>>

  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertificate.java 31 import java.security.cert.Certificate;
38 * Stub class for <code>java.security.cert.Certificate</code> tests
40 public class MyCertificate extends Certificate implements X509Extension {
89 return "[My test Certificate, type: " + getType() + "]";
114 public Certificate.CertificateRep getCertificateRep()
120 public class MyCertificateRep extends Certificate.CertificateRep {
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
mySSLSession.java 4 import java.security.cert.Certificate;
28 private Certificate[] certs = null;
45 public mySSLSession(Certificate[] xc) throws CertificateEncodingException, CertificateException {
49 for (Certificate cert : xc) {
77 public Certificate[] getLocalCertificates() {
89 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /system/ca-certificates/google/
extract_from_pem.py 3 """Extract certificates from a multi-certificate pem file.
5 Each certificate in the file is extracted into a format appropriate for use with
25 """Writes a certificate file to the output directory.
61 parser = argparse.ArgumentParser(description='PEM Certificate Importer')
74 pattern = r'-----BEGIN CERTIFICATE-----[^-]*-----END CERTIFICATE-----'
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 22 import java.security.cert.Certificate;
77 static final int CERTIFICATE = 1;
107 Certificate[] certChain;
112 Certificate obj)
114 this.type = CERTIFICATE;
123 Certificate[] certChain)
135 Certificate[] certChain)
186 Certificate[] certChain)
329 Certificate[] getCertificateChain()
341 Certificate cert
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptAuthenticodeNull.c 27 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
28 is used for certificate chain verification.
29 @param[in] CertSize Size of the trusted certificate in bytes.
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/
CryptAuthenticodeNull.c 27 @param[in] TrustedCert Pointer to a trusted/root certificate encoded in DER, which
28 is used for certificate chain verification.
29 @param[in] CertSize Size of the trusted certificate in bytes.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedGenerator.java 109 * Add a certificate to the certificate set to be included with the generated SignedData message.
111 * @param certificate the certificate to be included.
112 * @throws CMSException if the certificate cannot be encoded for adding.
115 X509CertificateHolder certificate)
118 certs.add(certificate.toASN1Structure());
122 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message.
158 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message.
161 * @throws CMSException if the attribute certificate cannot be encoded for adding
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
X509CertificateStructure.java 15 * Certificate ::= SEQUENCE {
21 * @deprecated use org.bouncycastle.asn1.x509.Certificate
71 throw new IllegalArgumentException("sequence wrong size for a certificate");
  /external/curl/docs/libcurl/opts/
CURLOPT_CERTINFO.3 25 CURLOPT_CERTINFO \- request SSL certificate information
31 Pass a long set to 1 to enable libcurl's certificate chain info gatherer. With
33 certificates in the certificate chain used in the SSL connection. This data
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
polochallengeresponse.h 29 // A Polo challenge response that contains the certificate keys.
34 // @param client_cert the client certificate
35 // @param server_cert the server certificate
  /external/libmtp/logs/
mtp-detect-creative-zen-V.txt 67 0xd102: Device Certificate
291 Device Certificate:
292 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">FcrwyJ36AgAcdfbInfoCAAAAAAA=</UNIQUEID><PUBLICKEY private="1">IMyjsSEUDWFZTQzjI0Zz5hdLE0dLFGYkXqBpJOGKtIUerw+QbgtvFA==</PUBLICKEY><KEYDATA>2mHbaCxFUmI+iWrsNvQz9IieH9w=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>BjVxd4okZ1Yqav43NW/Ffs5LDEyuA+lxcHhYmMgPg2u2ffwK3t8paQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>HiX3tAwfxY/yexXe6gQMLHLAAk4=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.104.139</SECURITYVERSION><CERTIFICATE private="1">IMyjsSEUDWFZTQzjI0Zz5hdLE0dLFGYkXqBpJOGKtIUerw+QbgtvFAIEaIt8JQF2IuBQudqJcdcn/plo8sPGc/Jix194wunu4/GA67FhZIQNGRln</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>Creative Zen V</NAME>
316 </LIMITS><PUBLICKEY>AwE2OSTIgFuzHvE8vC1w6E9MG1PCQ3HzTPJGtSMl8NvC2U7OikanZw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>ANlrFR1DlR4vZwcsaLD6roTpv3nImj/OnFG3yOSWUwsCVD4kb+uhfQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1007</AUTH_ID><PUBLICKEY>fP5fVUkHCjq7OoLGkVhca1u5ehuKNerfFzwY8+38k6idDPn3KNhYGA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>uvG3IvEcpr+y86jyvARIl/3r8US21GTPDEh176DnbwZ5aiTLgiWyPg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-motorola-v3m-verizon.txt 64 0xd102: Device Certificate
124 Device Certificate:
125 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">Fw+wFC4eYClcPMBSuHiApXDxAEs=</UNIQUEID><PUBLICKEY private="1">1hp1UWLVxX31SJBARq+jAOvmE2i1n7d5Tw0B/K6I3TTzawZ4AspYhg==</PUBLICKEY><KEYDATA>XWSKRW03C02IZBazt7616CIlh2Y=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>1ByoWiOq6aFG2tEa/8Zm7p/0wH08rAJHkQF7lzKFn3nzY+4tafu4Fw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>MVLZEMS3kGCK6aSAWJC0/xq4Vwo=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.104.17</SECURITYVERSION><CERTIFICATE private="1">1hp1UWLVxX31SJBARq+jAOvmE2i1n7d5Tw0B/K6I3TTzawZ4AspYhgIEaBGdBaa43tDT4ly9ha+OssesmhgHZxsVZR61+HdUoZ9oFTgRTV6FpFE5</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>V3m</NAME>
147 </LIMITS><PUBLICKEY>w9sptKYU2s6pTa+PNmYtZ8dlSGb0aJEPpMIsst819+vGsllK+IViMg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>JIH185LxQeN5XXsdEZtUAag7MycUvSWgRd5vViP4VDt4E6XbEfj/Bw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>885</AUTH_ID><PUBLICKEY>MMAVZgWISRBBMxtNJXyxjpVymz8oNEBWJdEb6gjJCEniO/F8JGo3Sg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>aXt99Bc+fjwpul3XroBZCPToxWSHwbwSXVnXZeAuCQA3aifv0G8sdA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-philips-hdd6320_00.txt 61 0xd102: Device Certificate
214 Device Certificate:
215 <DEVCERT version="1.0"><CERTIFICATE
218 private="1">jBhMqa0lBCpOYWsFK8LkfJAdLH945Kv0pd3mhfqmc5PKin6qmwxCFw==</PUBLICKEY><KEYDATA>29XvtV3A70+LV4diJUsGJ3wV4xI=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>tZUX1sBduQ4NrV/xMaAHIz7GfyNO8w5IUGIM2ORrAvMt0vz3qFL6Xg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>O4YrsP5oIBYnxd98jdocdKXlYXw=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.77</SECURITYVERSION><CERTIFICATE
219 private="1">jBhMqa0lBCpOYWsFK8LkfJAdLH945Kv0pd3mhfqmc5PKin6qmwxCFwIEZk3zHJZ2v8JcDBZ2lvcL07mtOM8xKZR8jikVFBru9znaDWLLXgIltZ1u</CERTIFICATE></FALLBACK><CERTIFICATE
250 </LIMITS><PUBLICKEY>iGsKDv08tZMvr6joKFlDDsGWT1IFtS8dN1g3w397Te6K1Vf0Hmliaw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>WRgzjEdWwFxP1Y+LXq/HmDjXynKlQ1kcEZ7E/iFslde05/pdH7CJHA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
251 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>433</AUTH_ID><PUBLICKEY>yP70OqmSYjdJMD8v4GtqIwZM6Yfn0jm4klhiFfv2RTPSUXme8q6ahA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>Crh93A1ab47cAuDaAwKCb6+07yd6fenkSfGt+UXP93LL7Ddz628RTA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-samsung-yp-k3.txt 68 0xd102: Device Certificate
229 Device Certificate:
230 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
232 private="1">YtPj9AvCSm05fwJXTAdgRRxPrXtiqFncz3eFkF7ksqwnFSLk3G0lIw==</PUBLICKEY><KEYDATA>mUFPcatg/R69gpSXuBUAFdjpb9I=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>vhjROwm8YZ05KiCxbjY2AjAbMXYS1ifJpYQsUa0K1JGE2YqGGHQ0Uw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>Xggs8dOmEc+bKZd3Qx6pOsr/Ej0=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.105.107</SECURITYVERSION><CERTIFICATE
233 private="1">YtPj9AvCSm05fwJXTAdgRRxPrXtiqFncz3eFkF7ksqwnFSLk3G0lIwIEaWvbaNg3uxfic0BX2xkhsBnWUnDwBL5IplWrIrglSmyQ04VGCdGlbbgJ</CERTIFICATE></FALLBACK><CERTIFICATE
235 /Bg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
236 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1231</AUTH_ID><PUBLICKEY>uVjt9gtU10r8MkVOz6naLCacO3grl8HqKs4gN5R73dJBaF7nKmTIHA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>3k5byRIQtCXmA6y0BJO1qA7Xmx9/+yMnCaukIoVpqO95vefmrE9DLQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
    [all...]
mtp-detect-samsung-yp-k5.txt 65 0xd102: Device Certificate
216 Device Certificate:
217 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">NGS91AABaVHnEhM/8AIfFgAAAAA=</UNIQUEID><PUBLICKEY private="1">lb+TWhA19FA+sD+8fEw8PAaJamIZIWURWRZ4x8z5tZ1cKDzwwQiVNg==</PUBLICKEY><KEYDATA>6EIECFXN5pF4h4/xXnBvWm0X3Ko=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>3ZpQV/dynAhxFjt2SFd1WBnuNTqRRT7NGJ6ur0OVfSjCU/+Ny588dg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>NNMbAxV9x2JNUmpoTKn+EGL4zF0=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.104.243</SECURITYVERSION><CERTIFICATE private="1">lb+TWhA19FA+sD+8fEw8PAaJamIZIWURWRZ4x8z5tZ1cKDzwwQiVNgIEaPPAdAIRpqxdInYSUyr7KfBg4sZaQvPhyKizDQrsIfus/7CH5bxWeG5e</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>YP-K5</NAME><MANUFACTURER>Samsung</MANUFACTURER><MAKE>Samsung</MAKE><DISTRIBUTOR>WorldWideImporters</DISTRIBUTOR><MODEL>YP-K5</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>0</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>0</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>QZt5UOW2pMsgDW5jPJeSa0oC3yE44+ivNp4dZps6Ofkk3LeLWwX0UQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>WUq0iNivBCcNDPHJa//l7X698WTcN1vmBtumyrUjwIxay9XBj0BiVA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1111</AUTH_ID><PUBLICKEY>xXZnNTfy+kMtWdcE4fV1VKU6Q0XXOtOYmynpZzxuCWaMZQVNduZPLA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>Le5pFakN0g5yVyafphKn3wWwqkaVys9oEvA+DzQM6yBInixDJPI8aQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/
CertInstallerHelper.java 45 import java.security.cert.Certificate;
55 * Certificate installer helper to extract information from a provided file
64 private X509Certificate mUserCert; // user certificate
109 Log.e(TAG, "failed to extract certificate" + e);
111 Log.e(TAG, "failed to extract certificate" + e);
113 Log.e(TAG, "failed to extract certificate" + e);
115 Log.e(TAG, "failed to extract certificate" + e);
135 Certificate[] certs = entry.getCertificateChain();
138 for (Certificate c : certs) {
166 * Extract certificate from the given file, and install it to keystor
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
CertificateVerifier.java 31 * system key store. This class is created to allow the certificate verification to be mocked in
37 * Verify that the given certificate is trusted by one of the pre-loaded public CAs in the
40 * @param caCert The CA Certificate to verify
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/net/
SecureCacheResponseTest.java 23 import java.security.cert.Certificate;
49 public List<Certificate> getLocalCertificateChain() {
67 public List<Certificate> getServerCertificateChain() throws SSLPeerUnverifiedException {
  /libcore/support/src/test/java/libcore/javax/net/ssl/
FakeSSLSession.java 21 import java.security.cert.Certificate;
51 public Certificate[] getLocalCertificates() {
67 public Certificate[] getPeerCertificates() {
  /packages/apps/Nfc/etc/
sample_nfcee_access.xml 14 SIGNATURE is a hex encoded X.509 certificate
22 specified certificate is granted NFCEE access.
24 with the specified certificate must have a package name that is an
  /packages/apps/Settings/tests/app/src/com/android/settings/vpn2/
CertInstallerHelper.java 46 import java.security.cert.Certificate;
56 * Certificate installer helper to extract information from a provided file
65 private X509Certificate mUserCert; // user certificate
110 Log.e(TAG, "failed to extract certificate" + e);
112 Log.e(TAG, "failed to extract certificate" + e);
114 Log.e(TAG, "failed to extract certificate" + e);
116 Log.e(TAG, "failed to extract certificate" + e);
136 Certificate[] certs = entry.getCertificateChain();
139 for (Certificate c : certs) {
167 * Extract certificate from the given file, and install it to keystor
    [all...]
  /cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/
CertInstallerReceiver.java 32 import java.security.cert.Certificate;
36 * Delegated certificate installer app that responds to specific intents and executes various DPM
37 * certificate manipulation APIs. The following APIs are exercised:
128 Certificate certificate = CertificateFactory.getInstance("X.509") local
138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias),
160 Certificate certificateToMatch = readCertificate(toMatch);
162 Certificate cert = readCertificate(certBuffer);
170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
  /device/google/vrservices/vrcore/sepolicy/
keys.conf 6 # Unfortnately the infrastructure requires a certificate for each build variant,
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
sha256.pem 0 # Certificate chain for https://sha256.tbs-internet.com
4 -----BEGIN CERTIFICATE-----
40 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
73 -----END CERTIFICATE-----
76 -----BEGIN CERTIFICATE-----
101 -----END CERTIFICATE-----
104 -----BEGIN CERTIFICATE-----
129 -----END CERTIFICATE-----
  /external/apache-http/android/src/android/net/http/
LoggingEventHandler.java 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler
71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);

Completed in 298 milliseconds

<<11121314151617181920>>