OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
551 - 575
of
2776
) sorted by null
<<
21
22
23
24
25
26
27
28
29
30
>>
/prebuilts/go/linux-x86/src/crypto/x509/
root_darwin_arm_gen.go
11
// exists for a
certificate
, but the x509 API requires returning the entire
50
Type: "
CERTIFICATE
",
68
func selectCerts() ([]*x509.
Certificate
, error) {
79
var certs []*x509.
Certificate
105
func sysCerts() (certs []*x509.
Certificate
, err error) {
106
cmd := exec.Command("/usr/bin/security", "find-
certificate
", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117
if block.Type != "
CERTIFICATE
" || len(block.Headers) != 0 {
x509_test.go
224
c := &
Certificate
{
237
c = &
Certificate
{
248
c = &
Certificate
{
363
template :=
Certificate
{
427
t.Errorf("%s: failed to create
certificate
: %s", test.name, err)
433
t.Errorf("%s: failed to parse
certificate
: %s", test.name, err)
485
t.Errorf("%s: Issuing
certificate
URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535
template :=
Certificate
{
560
t.Fatalf("failed to create
certificate
: %s", err)
565
t.Fatalf("
Certificate
with unknown critical extension was not parsed: %s", err
[
all
...]
/system/ca-certificates/google/files/
594f1775.0
1
-----BEGIN
CERTIFICATE
-----
19
-----END
CERTIFICATE
-----
20
Certificate
:
25
Issuer: C=US, O=Equifax, OU=Equifax Secure
Certificate
Authority
29
Subject: C=US, O=Equifax, OU=Equifax Secure
Certificate
Authority
48
DirName: C = US, O = Equifax, OU = Equifax Secure
Certificate
Authority, CN = CRL1
53
Certificate
Sign, CRL Sign
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PoloChallengeResponse.java
24
import java.security.cert.
Certificate
;
44
*
Certificate
of the local peer in the protocol.
46
private
Certificate
mClientCertificate;
49
*
Certificate
of the remote peer in the protocol.
51
private
Certificate
mServerCertificate;
56
* @param clientCert the
certificate
of the client node
57
* @param serverCert the
certificate
of the server node
60
public PoloChallengeResponse(
Certificate
clientCert,
Certificate
serverCert,
/external/libcups/cups/
tls-gnutls.c
33
static gnutls_x509_crl_t tls_crl = NULL;/*
Certificate
revocation list */
54
* 'cupsMakeServerCredentials()' - Make a self-signed
certificate
and private key pair.
67
gnutls_x509_crt_t crt; /* Self-signed
certificate
*/
70
crtfile[1024], /*
Certificate
filename */
138
* Create the self-signed
certificate
...
141
DEBUG_puts("1cupsMakeServerCredentials: Generating self-signed X.509
certificate
.");
193
DEBUG_printf(("1cupsMakeServerCredentials: Unable to export public key and X.509
certificate
: %s", gnutls_strerror(result)));
201
DEBUG_printf(("1cupsMakeServerCredentials: Writing public key and X.509
certificate
to \"%s\".", crtfile));
207
DEBUG_printf(("1cupsMakeServerCredentials: Unable to create public key and X.509
certificate
file \"%s\": %s", crtfile, strerror(errno)));
370
gnutls_x509_crt_t cert; /*
Certificate
*/
[
all
...]
/libcore/ojluni/src/main/java/java/security/cert/
PKIXCertPathChecker.java
38
* extension of each
certificate
in a certification path.
45
* methods will be called, in turn, for each
certificate
processed by a PKIX
132
* Returns an immutable {@code Set} of X.509
certificate
extensions
141
* All X.509
certificate
extensions that a {@code PKIXCertPathChecker}
152
* Performs the check(s) on the specified
certificate
using its internal
158
* @param cert the {@code
Certificate
} to be checked
161
* @exception CertPathValidatorException if the specified
certificate
does
164
public abstract void check(
Certificate
cert,
175
public void check(
Certificate
cert) throws CertPathValidatorException {
X509Extension.java
35
* {@link X509CRL CRLs} (
Certificate
Revocation
43
* <p>Each extension in a
certificate
/CRL may be designated as
44
* critical or non-critical. A
certificate
/CRL-using system (an application
45
* validating a
certificate
/CRL) must reject the
certificate
/CRL if it
82
* CRITICAL in the
certificate
/CRL managed by the object
111
* NON-CRITICAL in the
certificate
/CRL managed by the object
115
* X509CRL revoked
certificate
entry and print the OIDs:
124
* byte[] certData = <DER-encoded
certificate
data>
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java
39
import java.security.cert.
Certificate
;
63
//
Certificate
type used during testing
87
* constructed using self signed test
certificate
122
* containing single element (self signed test
certificate
).
206
public void check(
Certificate
arg0, Collection arg1)
297
// X.509 encoded
certificate
298
private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN
CERTIFICATE
-----\n"
313
+ "JDSM\n" + "-----END
CERTIFICATE
-----\n";
320
* Returns X.509
certificate
encoding corresponding to version v1.
322
*
Certificate
encoding was created by hands according to X.509 Certificat
[
all
...]
/libcore/luni/src/test/java/tests/security/cert/
X509CertSelectorTest.java
542
assertTrue("Any
certificate
should match in the case of null "
654
assertTrue("The
certificate
should match the selection criteria.",
[
all
...]
/prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go
224
c := &
Certificate
{
237
c = &
Certificate
{
248
c = &
Certificate
{
363
template :=
Certificate
{
427
t.Errorf("%s: failed to create
certificate
: %s", test.name, err)
433
t.Errorf("%s: failed to parse
certificate
: %s", test.name, err)
485
t.Errorf("%s: Issuing
certificate
URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535
template :=
Certificate
{
560
t.Fatalf("failed to create
certificate
: %s", err)
565
t.Fatalf("
Certificate
with unknown critical extension was not parsed: %s", err
[
all
...]
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/ssl/
get-remote-certificate.py
3
# fetch the
certificate
that the server(s) are providing in PEM form
23
m = re.search(r"^([-]+BEGIN
CERTIFICATE
[-]+[\r]*\n"
24
r".*[\r]*^[-]+END
CERTIFICATE
[-]+)$",
/docs/source.android.com/en/security/enhancements/
enhancements44.html
50
Android provides users with a warning if any
certificate
has been
51
added to the device
certificate
store that could allow monitoring of
59
<li><strong>
Certificate
Pinning.</strong>
/external/autotest/client/site_tests/security_OpenSSLBlacklist/
security_OpenSSLBlacklist.py
39
raise error.TestFail('
Certificate
does not verify normally.')
42
raise error.TestFail('
Certificate
verified with %s' % b)
44
raise error.TestFail('
Certificate
does not verify with nonempty blacklist.')
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/
FakeSSLSession.java
21
import java.security.cert.
Certificate
;
59
public
Certificate
[] getLocalCertificates() {
79
public
Certificate
[] getPeerCertificates() {
/external/curl/docs/examples/
https.c
42
* If you want to connect to a site who isn't using a
certificate
that is
44
* verification of the server's
certificate
. This makes the connection
57
* they have mentioned in their server
certificate
's commonName (or
/external/ipsec-tools/src/racoon/
netdb_dnssec.h
62
int ci_type; /*
certificate
type */
66
size_t ci_certlen; /* length of
certificate
*/
67
char *ci_cert; /*
certificate
*/
/external/libmtp/logs/
mtp-detect-iriver-t7-volcano.txt
86
0xd102: Device
Certificate
198
Device
Certificate
:
199
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID
201
private="1">WbWEVwzD/6k56XKst4OnRTXFJSFurpcN/nEqZeM8/1nMhaqcqrUEQw==</PUBLICKEY><KEYDATA>yZBMmoENcUJrZlqoKjB3RqWbZBk=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>WbWEVwzD/6k56XKst4OnRTXFJSENGS5l+4hHr9gLDu1ThP1y59iwSQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>AZDXn3sieh4rYaQNQl/MdIAKcL0=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.111.31</SECURITYVERSION><
CERTIFICATE
202
private="1">WbWEVwzD/6k56XKst4OnRTXFJSFurpcN/nEqZeM8/1nMhaqcqrUEQwIEbx9ZtYRXDMP/qTnpcqy3g6dFNcUlIf4NogOPQJYt/s2w7iE5BAM/r9Iq</
CERTIFICATE
></FALLBACK><
CERTIFICATE
203
type="GROUP"><DATA><NAME>T7</NAME><MANUFACTURER>iriver</MANUFACTURER><MAKE>iriver</MAKE><DISTRIBUTOR>iriver</DISTRIBUTOR><MODEL>T7</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1.0</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>1.0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1.0</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>1.0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>0</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>0</ENCRYPTION><SYMMETRIC_OPT>0</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>6656</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>3BpF6JtA7FbR1nASAkawbHYRtEWT5o8TrP7a2L6Bvxb7/P0+i5NLLA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>WRTND1A2JBpLj8Qsi40ZqMRWx4h/7FCW2OCTmtILKq2DJfeA99WGVg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
204
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>2691</AUTH_ID><PUBLICKEY>WmzVzzbfShRhYsmIVMx/NHFUoxx4e0Mw84ZZX/Jkb5TDaeO2+Y3whA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>GU1KjL5g1ZWk23mePnHrT1lJSWscoAt36qwgV2jL+BX5R/uUTr3ADg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICAT
[
all
...]
mtp-detect-iriver-u10.txt
62
0xd102: Device
Certificate
161
Device
Certificate
:
162
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">GBqHHaqO+pqv/ONmwK163V+99wcvhIGg8ejENGcqxmDRgatTYT5pLg==</PUBLICKEY><KEYDATA>ImdEQacSpOcuyTX8LShcPujn6ZU=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>8+8w53BteDaRuDYpCUnH7VqsGIXOACG0e1xxhphp0uWeZujfLD0HAQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>fJJmQt+jz3ss5lIu0d+AHqspSQo=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.102.3</SECURITYVERSION><
CERTIFICATE
private="1">GBqHHaqO+pqv/ONmwK163V+99wcvhIGg8ejENGcqxmDRgatTYT5pLgIEZgNTl1aNjjIDx38pP578Ybicaf16IAl67726OApjZ1Jz+QU3dxMnZ5hU</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>iRiver H10 Series</NAME><MANUFACTURER>iRiver</MANUFACTURER><MAKE>iRiver</MAKE><DISTRIBUTOR>ReignCom</DISTRIBUTOR><MODEL>H10</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>8jeq4PyJZUL8NpU2+/tgvUZC9ijn3RdlK3wd04Iws6oXHoA+D6vFfQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>HZ85tGf5VnDwKLGq2S0OlK/oJCKbCx3A2yudzMOv8ERwi6drHW5xOA==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>359</AUTH_ID><PUBLICKEY>DpMhgaZkXUFNFIs4KJe7S9MZYwuE1bBic6AV6wAc7Ir0Stfx8U+SKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>GWscwHnDoSazgB+YOP2D7xrqDifWEFztujqAWwrkM7onynIcfOBBMQ==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
mtp-detect-nokia-5300.txt
65
0xd102: Device
Certificate
317
Device
Certificate
:
318
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">JZAAEbVGAFgx+MV+VC/czNMloKA=</UNIQUEID><PUBLICKEY private="1">gUGSG+640hANCmgA6RLrXE+m53F0aAMFk1iXOYk0Rm7M76/D2fi8NQ==</PUBLICKEY><KEYDATA></KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>TcOZj5ejJ/zHYGlCzKS444kT6Wg+rinH3yxNWJNX3R5jAWDwm2RKAw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE></SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.105.95</SECURITYVERSION><
CERTIFICATE
private="1">gUGSG+640hANCmgA6RLrXE+m53F0aAMFk1iXOYk0Rm7M76/D2fi8NQIEaV8Z6cCn0YHtkvT7n7D6qmKMTH2gFCJO7mBWOUCJfpZ/fOnrKMAk23lE</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>5300</NAME>
344
</LIMITS><PUBLICKEY>9rINx4Chrx4JhS7Kda7EKnSbkkoRTWfda6jDxtkw72kR5+9yVucHKA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>ENGLQZMiDlDKvjtsA1ChU2O8EC0okniesTjA8zEocHSvtKJWfhAsSA==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1219</AUTH_ID><PUBLICKEY>XCfO2C+e0jeoy+QZ/JUtVF7BkQxz5AWfeYOqFy+63SzL7OPIGc1QMw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>sFJ8k94G4bJPrLaP+n4jB5bw9GQtSph6puqb8GqVbbdxIShDQDngaA==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
mtp-detect-panasonic-p905i.txt
75
0xd102: Device
Certificate
184
Device
Certificate
:
185
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID
190
MSIGNATURE>CH1xzklFcUG9psOZGdkwk5iP1J8=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><S
191
ECURITYVERSION>2.4.108.233</SECURITYVERSION><
CERTIFICATE
193
41/lyIJhR/emYvf2MsQP+42XHYI6OwPxQ9/U+ooMQRQc</
CERTIFICATE
></FALLBACK><
CERTIFICATE
218
FjHD+A66mQcmJ4ag==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
222
E2LHw5Zw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICAT
[
all
...]
mtp-detect-philips-psa610.txt
69
0xd102: Device
Certificate
206
Device
Certificate
:
207
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID
216
MSIGNATURE>YBrqCUevZbLYeGqCYGhBhd+gGas=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><S
217
ECURITYVERSION>2.4.102.55</SECURITYVERSION><
CERTIFICATE
219
05i95w6ev6NP7R5UF8b7BqGgIvdTYgSLoM/tjsXxXkZl</
CERTIFICATE
></FALLBACK><
CERTIFICATE
249
9ZC1qvALdRXLCTiQ==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
253
pDCJoFw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICAT
[
all
...]
mtp-detect-pocket-tunes-4.txt
82
0xd102: Device
Certificate
201
Device
Certificate
:
202
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1"></UNIQUEID><PUBLICKEY private="1"></PUBLICKEY><KEYDATA></KEYDATA></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE><SYMSIGNATURE></SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.101.143</SECURITYVERSION><
CERTIFICATE
private="1"></
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>Pocket Tunes</NAME>
222
</LIMITS><PUBLICKEY></PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>243</AUTH_ID><PUBLICKEY></PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY></PUBLICKEY></DATA><MS (…)
[
all
...]
mtp-detect-samsung-x830.txt
71
0xd102: Device
Certificate
297
Device
Certificate
:
298
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">PxxT7kQIRdpyVpl2bWdZfnMhaF6W4DfsUJkQ5RkXH0lps1jsEsRlhw==</PUBLICKEY><KEYDATA>TA5OeR0fCrQsfuiwmFzcAcMhw3w=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>w4+BYH2GXELBvtSMweNY/niwCTQAUuF67ljdn2k/0UnQj2Qqf/tSfA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>JpNQontONOULhKUYGYTkP0PXDyc=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.105.249</SECURITYVERSION><
CERTIFICATE
private="1">PxxT7kQIRdpyVpl2bWdZfnMhaF6W4DfsUJkQ5RkXH0lps1jsEsRlhwIEafnQYfen9/1lF7XVCmhf5GSKVPLXdUKo/4ESTuf0V+SyNX/TGnGFJuoF</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><MANUFACTURER>SAMSUNG</MANUFACTURER>
321
</LIMITS><PUBLICKEY>FRWb6sogmyejs+zIk91Q8Pys5Suk3mnC+l7lbgGbe52wwavCTiuAEw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>A7Jf+PoUXIgfuPVT/Y+WoEDE2lhtZtICn4hegNkzKerSWiiiCEssBw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1373</AUTH_ID><PUBLICKEY>sfafmxUhwSGkSopRF/o1gi//mEWxV/OFzRWZg31Ti8n8ItDrrME1eg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>b0cBrnQlTRQVuDLPMFAiLYLK0B2wT12UOBoa9tPjtID7vHMPScYyVw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
mtp-detect-sandisk-sansa-e280.txt
79
0xd102: Device
Certificate
227
Device
Certificate
:
228
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">AAAAAAAAAACHs3g5Evn92QAAAAA=</UNIQUEID><PUBLICKEY private="1">XBfYUExu4RJLuwN77zcT2xTkvh7T7N0magJQRAYkpknJSDnq1Or2UQ==</PUBLICKEY><KEYDATA>OgqWjYuBrpsm8wc2n4glUWNh/JA=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>7rvLVlnF84HOsB5zCfI8AhtflCjrHZ+4BEw6kPCVnFMKuXdAbLI1Qg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>mQM969YcrKLwCguMNsbDagLb66k=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.104.93</SECURITYVERSION><
CERTIFICATE
private="1">XBfYUExu4RJLuwN77zcT2xTkvh7T7N0magJQRAYkpknJSDnq1Or2UQIEaF15le90TVR36HoyIGeh6ETPgoy7DLyBMQ6KzvSi40OekNHTfq2eH/kJ</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>Sansa e200 Series</NAME>
250
</LIMITS><PUBLICKEY>n4ahYQBHQ72FRfkzvy7BruWYDSilgfObLpzG0M8SNcfDGWvJhvbrhA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>lB5HvVHvcXLb0QiYfskM3Wu0eXtx9Tw0QIiCoKLhBIer0k3ablA4Zg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>961</AUTH_ID><PUBLICKEY>vjU5IwzlqSww/T8ihHxTDmbw1hVeXXG8oNVvgBBYFinhSvQ1e0gNEQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>3DU5omHe8sFqztXjYZ9vNr2/DkLabfYH5VIfWrf+XXA+RNASNDpnTg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
/external/python/cpython2/Tools/ssl/
get-remote-certificate.py
3
# fetch the
certificate
that the server(s) are providing in PEM form
23
m = re.search(r"^([-]+BEGIN
CERTIFICATE
[-]+[\r]*\n"
24
r".*[\r]*^[-]+END
CERTIFICATE
[-]+)$",
Completed in 259 milliseconds
<<
21
22
23
24
25
26
27
28
29
30
>>