HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 551 - 575 of 2776) sorted by null

<<21222324252627282930>>

  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin_arm_gen.go 11 // exists for a certificate, but the x509 API requires returning the entire
50 Type: "CERTIFICATE",
68 func selectCerts() ([]*x509.Certificate, error) {
79 var certs []*x509.Certificate
105 func sysCerts() (certs []*x509.Certificate, err error) {
106 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
117 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
  /system/ca-certificates/google/files/
594f1775.0 1 -----BEGIN CERTIFICATE-----
19 -----END CERTIFICATE-----
20 Certificate:
25 Issuer: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
29 Subject: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
48 DirName: C = US, O = Equifax, OU = Equifax Secure Certificate Authority, CN = CRL1
53 Certificate Sign, CRL Sign
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PoloChallengeResponse.java 24 import java.security.cert.Certificate;
44 * Certificate of the local peer in the protocol.
46 private Certificate mClientCertificate;
49 * Certificate of the remote peer in the protocol.
51 private Certificate mServerCertificate;
56 * @param clientCert the certificate of the client node
57 * @param serverCert the certificate of the server node
60 public PoloChallengeResponse(Certificate clientCert, Certificate serverCert,
  /external/libcups/cups/
tls-gnutls.c 33 static gnutls_x509_crl_t tls_crl = NULL;/* Certificate revocation list */
54 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair.
67 gnutls_x509_crt_t crt; /* Self-signed certificate */
70 crtfile[1024], /* Certificate filename */
138 * Create the self-signed certificate...
141 DEBUG_puts("1cupsMakeServerCredentials: Generating self-signed X.509 certificate.");
193 DEBUG_printf(("1cupsMakeServerCredentials: Unable to export public key and X.509 certificate: %s", gnutls_strerror(result)));
201 DEBUG_printf(("1cupsMakeServerCredentials: Writing public key and X.509 certificate to \"%s\".", crtfile));
207 DEBUG_printf(("1cupsMakeServerCredentials: Unable to create public key and X.509 certificate file \"%s\": %s", crtfile, strerror(errno)));
370 gnutls_x509_crt_t cert; /* Certificate */
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
PKIXCertPathChecker.java 38 * extension of each certificate in a certification path.
45 * methods will be called, in turn, for each certificate processed by a PKIX
132 * Returns an immutable {@code Set} of X.509 certificate extensions
141 * All X.509 certificate extensions that a {@code PKIXCertPathChecker}
152 * Performs the check(s) on the specified certificate using its internal
158 * @param cert the {@code Certificate} to be checked
161 * @exception CertPathValidatorException if the specified certificate does
164 public abstract void check(Certificate cert,
175 public void check(Certificate cert) throws CertPathValidatorException {
X509Extension.java 35 * {@link X509CRL CRLs} (Certificate Revocation
43 * <p>Each extension in a certificate/CRL may be designated as
44 * critical or non-critical. A certificate/CRL-using system (an application
45 * validating a certificate/CRL) must reject the certificate/CRL if it
82 * CRITICAL in the certificate/CRL managed by the object
111 * NON-CRITICAL in the certificate/CRL managed by the object
115 * X509CRL revoked certificate entry and print the OIDs:
124 * byte[] certData = <DER-encoded certificate data>
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 39 import java.security.cert.Certificate;
63 // Certificate type used during testing
87 * constructed using self signed test certificate
122 * containing single element (self signed test certificate).
206 public void check(Certificate arg0, Collection arg1)
297 // X.509 encoded certificate
298 private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n"
313 + "JDSM\n" + "-----END CERTIFICATE-----\n";
320 * Returns X.509 certificate encoding corresponding to version v1.
322 * Certificate encoding was created by hands according to X.509 Certificat
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
X509CertSelectorTest.java 542 assertTrue("Any certificate should match in the case of null "
654 assertTrue("The certificate should match the selection criteria.",
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 224 c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/ssl/
get-remote-certificate.py 3 # fetch the certificate that the server(s) are providing in PEM form
23 m = re.search(r"^([-]+BEGIN CERTIFICATE[-]+[\r]*\n"
24 r".*[\r]*^[-]+END CERTIFICATE[-]+)$",
  /docs/source.android.com/en/security/enhancements/
enhancements44.html 50 Android provides users with a warning if any certificate has been
51 added to the device certificate store that could allow monitoring of
59 <li><strong>Certificate Pinning.</strong>
  /external/autotest/client/site_tests/security_OpenSSLBlacklist/
security_OpenSSLBlacklist.py 39 raise error.TestFail('Certificate does not verify normally.')
42 raise error.TestFail('Certificate verified with %s' % b)
44 raise error.TestFail('Certificate does not verify with nonempty blacklist.')
  /external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/
FakeSSLSession.java 21 import java.security.cert.Certificate;
59 public Certificate[] getLocalCertificates() {
79 public Certificate[] getPeerCertificates() {
  /external/curl/docs/examples/
https.c 42 * If you want to connect to a site who isn't using a certificate that is
44 * verification of the server's certificate. This makes the connection
57 * they have mentioned in their server certificate's commonName (or
  /external/ipsec-tools/src/racoon/
netdb_dnssec.h 62 int ci_type; /* certificate type */
66 size_t ci_certlen; /* length of certificate */
67 char *ci_cert; /* certificate */
  /external/libmtp/logs/
mtp-detect-iriver-t7-volcano.txt 86 0xd102: Device Certificate
198 Device Certificate:
199 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
201 private="1">WbWEVwzD/6k56XKst4OnRTXFJSFurpcN/nEqZeM8/1nMhaqcqrUEQw==</PUBLICKEY><KEYDATA>yZBMmoENcUJrZlqoKjB3RqWbZBk=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>WbWEVwzD/6k56XKst4OnRTXFJSENGS5l+4hHr9gLDu1ThP1y59iwSQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>AZDXn3sieh4rYaQNQl/MdIAKcL0=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.111.31</SECURITYVERSION><CERTIFICATE
202 private="1">WbWEVwzD/6k56XKst4OnRTXFJSFurpcN/nEqZeM8/1nMhaqcqrUEQwIEbx9ZtYRXDMP/qTnpcqy3g6dFNcUlIf4NogOPQJYt/s2w7iE5BAM/r9Iq</CERTIFICATE></FALLBACK><CERTIFICATE
203 type="GROUP"><DATA><NAME>T7</NAME><MANUFACTURER>iriver</MANUFACTURER><MAKE>iriver</MAKE><DISTRIBUTOR>iriver</DISTRIBUTOR><MODEL>T7</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1.0</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>1.0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1.0</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>1.0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>0</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>0</ENCRYPTION><SYMMETRIC_OPT>0</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>6656</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>3BpF6JtA7FbR1nASAkawbHYRtEWT5o8TrP7a2L6Bvxb7/P0+i5NLLA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>WRTND1A2JBpLj8Qsi40ZqMRWx4h/7FCW2OCTmtILKq2DJfeA99WGVg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
204 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>2691</AUTH_ID><PUBLICKEY>WmzVzzbfShRhYsmIVMx/NHFUoxx4e0Mw84ZZX/Jkb5TDaeO2+Y3whA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>GU1KjL5g1ZWk23mePnHrT1lJSWscoAt36qwgV2jL+BX5R/uUTr3ADg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-iriver-u10.txt 62 0xd102: Device Certificate
161 Device Certificate:
162 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">GBqHHaqO+pqv/ONmwK163V+99wcvhIGg8ejENGcqxmDRgatTYT5pLg==</PUBLICKEY><KEYDATA>ImdEQacSpOcuyTX8LShcPujn6ZU=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>8+8w53BteDaRuDYpCUnH7VqsGIXOACG0e1xxhphp0uWeZujfLD0HAQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>fJJmQt+jz3ss5lIu0d+AHqspSQo=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.3</SECURITYVERSION><CERTIFICATE private="1">GBqHHaqO+pqv/ONmwK163V+99wcvhIGg8ejENGcqxmDRgatTYT5pLgIEZgNTl1aNjjIDx38pP578Ybicaf16IAl67726OApjZ1Jz+QU3dxMnZ5hU</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>iRiver H10 Series</NAME><MANUFACTURER>iRiver</MANUFACTURER><MAKE>iRiver</MAKE><DISTRIBUTOR>ReignCom</DISTRIBUTOR><MODEL>H10</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>8jeq4PyJZUL8NpU2+/tgvUZC9ijn3RdlK3wd04Iws6oXHoA+D6vFfQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>HZ85tGf5VnDwKLGq2S0OlK/oJCKbCx3A2yudzMOv8ERwi6drHW5xOA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>359</AUTH_ID><PUBLICKEY>DpMhgaZkXUFNFIs4KJe7S9MZYwuE1bBic6AV6wAc7Ir0Stfx8U+SKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>GWscwHnDoSazgB+YOP2D7xrqDifWEFztujqAWwrkM7onynIcfOBBMQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-nokia-5300.txt 65 0xd102: Device Certificate
317 Device Certificate:
318 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">JZAAEbVGAFgx+MV+VC/czNMloKA=</UNIQUEID><PUBLICKEY private="1">gUGSG+640hANCmgA6RLrXE+m53F0aAMFk1iXOYk0Rm7M76/D2fi8NQ==</PUBLICKEY><KEYDATA></KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>TcOZj5ejJ/zHYGlCzKS444kT6Wg+rinH3yxNWJNX3R5jAWDwm2RKAw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE></SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.105.95</SECURITYVERSION><CERTIFICATE private="1">gUGSG+640hANCmgA6RLrXE+m53F0aAMFk1iXOYk0Rm7M76/D2fi8NQIEaV8Z6cCn0YHtkvT7n7D6qmKMTH2gFCJO7mBWOUCJfpZ/fOnrKMAk23lE</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>5300</NAME>
344 </LIMITS><PUBLICKEY>9rINx4Chrx4JhS7Kda7EKnSbkkoRTWfda6jDxtkw72kR5+9yVucHKA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>ENGLQZMiDlDKvjtsA1ChU2O8EC0okniesTjA8zEocHSvtKJWfhAsSA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1219</AUTH_ID><PUBLICKEY>XCfO2C+e0jeoy+QZ/JUtVF7BkQxz5AWfeYOqFy+63SzL7OPIGc1QMw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>sFJ8k94G4bJPrLaP+n4jB5bw9GQtSph6puqb8GqVbbdxIShDQDngaA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-panasonic-p905i.txt 75 0xd102: Device Certificate
184 Device Certificate:
185 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
190 MSIGNATURE>CH1xzklFcUG9psOZGdkwk5iP1J8=</SYMSIGNATURE></CERTIFICATE><FALLBACK><S
191 ECURITYVERSION>2.4.108.233</SECURITYVERSION><CERTIFICATE
193 41/lyIJhR/emYvf2MsQP+42XHYI6OwPxQ9/U+ooMQRQc</CERTIFICATE></FALLBACK><CERTIFICATE
218 FjHD+A66mQcmJ4ag==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
222 E2LHw5Zw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-philips-psa610.txt 69 0xd102: Device Certificate
206 Device Certificate:
207 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
216 MSIGNATURE>YBrqCUevZbLYeGqCYGhBhd+gGas=</SYMSIGNATURE></CERTIFICATE><FALLBACK><S
217 ECURITYVERSION>2.4.102.55</SECURITYVERSION><CERTIFICATE
219 05i95w6ev6NP7R5UF8b7BqGgIvdTYgSLoM/tjsXxXkZl</CERTIFICATE></FALLBACK><CERTIFICATE
249 9ZC1qvALdRXLCTiQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
253 pDCJoFw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-pocket-tunes-4.txt 82 0xd102: Device Certificate
201 Device Certificate:
202 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1"></UNIQUEID><PUBLICKEY private="1"></PUBLICKEY><KEYDATA></KEYDATA></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE><SYMSIGNATURE></SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.101.143</SECURITYVERSION><CERTIFICATE private="1"></CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>Pocket Tunes</NAME>
222 </LIMITS><PUBLICKEY></PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>243</AUTH_ID><PUBLICKEY></PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE></MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY></PUBLICKEY></DATA><MS (…)
    [all...]
mtp-detect-samsung-x830.txt 71 0xd102: Device Certificate
297 Device Certificate:
298 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">CgoKCgoKCgoKCgoKCgoKCgoKCgo=</UNIQUEID><PUBLICKEY private="1">PxxT7kQIRdpyVpl2bWdZfnMhaF6W4DfsUJkQ5RkXH0lps1jsEsRlhw==</PUBLICKEY><KEYDATA>TA5OeR0fCrQsfuiwmFzcAcMhw3w=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>w4+BYH2GXELBvtSMweNY/niwCTQAUuF67ljdn2k/0UnQj2Qqf/tSfA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>JpNQontONOULhKUYGYTkP0PXDyc=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.105.249</SECURITYVERSION><CERTIFICATE private="1">PxxT7kQIRdpyVpl2bWdZfnMhaF6W4DfsUJkQ5RkXH0lps1jsEsRlhwIEafnQYfen9/1lF7XVCmhf5GSKVPLXdUKo/4ESTuf0V+SyNX/TGnGFJuoF</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><MANUFACTURER>SAMSUNG</MANUFACTURER>
321 </LIMITS><PUBLICKEY>FRWb6sogmyejs+zIk91Q8Pys5Suk3mnC+l7lbgGbe52wwavCTiuAEw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>A7Jf+PoUXIgfuPVT/Y+WoEDE2lhtZtICn4hegNkzKerSWiiiCEssBw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1373</AUTH_ID><PUBLICKEY>sfafmxUhwSGkSopRF/o1gi//mEWxV/OFzRWZg31Ti8n8ItDrrME1eg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>b0cBrnQlTRQVuDLPMFAiLYLK0B2wT12UOBoa9tPjtID7vHMPScYyVw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-sandisk-sansa-e280.txt 79 0xd102: Device Certificate
227 Device Certificate:
228 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">AAAAAAAAAACHs3g5Evn92QAAAAA=</UNIQUEID><PUBLICKEY private="1">XBfYUExu4RJLuwN77zcT2xTkvh7T7N0magJQRAYkpknJSDnq1Or2UQ==</PUBLICKEY><KEYDATA>OgqWjYuBrpsm8wc2n4glUWNh/JA=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>7rvLVlnF84HOsB5zCfI8AhtflCjrHZ+4BEw6kPCVnFMKuXdAbLI1Qg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>mQM969YcrKLwCguMNsbDagLb66k=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.104.93</SECURITYVERSION><CERTIFICATE private="1">XBfYUExu4RJLuwN77zcT2xTkvh7T7N0magJQRAYkpknJSDnq1Or2UQIEaF15le90TVR36HoyIGeh6ETPgoy7DLyBMQ6KzvSi40OekNHTfq2eH/kJ</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>Sansa e200 Series</NAME>
250 </LIMITS><PUBLICKEY>n4ahYQBHQ72FRfkzvy7BruWYDSilgfObLpzG0M8SNcfDGWvJhvbrhA==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>lB5HvVHvcXLb0QiYfskM3Wu0eXtx9Tw0QIiCoKLhBIer0k3ablA4Zg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>961</AUTH_ID><PUBLICKEY>vjU5IwzlqSww/T8ihHxTDmbw1hVeXXG8oNVvgBBYFinhSvQ1e0gNEQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>3DU5omHe8sFqztXjYZ9vNr2/DkLabfYH5VIfWrf+XXA+RNASNDpnTg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
  /external/python/cpython2/Tools/ssl/
get-remote-certificate.py 3 # fetch the certificate that the server(s) are providing in PEM form
23 m = re.search(r"^([-]+BEGIN CERTIFICATE[-]+[\r]*\n"
24 r".*[\r]*^[-]+END CERTIFICATE[-]+)$",

Completed in 259 milliseconds

<<21222324252627282930>>