/external/curl/tests/certs/ |
Server-localhost0h-sv.prm | 25 # the certificate
|
/external/curl/tests/data/ |
test2035 | 6 PEM certificate
|
test2038 | 6 PEM certificate
|
test2042 | 6 PEM certificate
|
test310 | 6 PEM certificate
|
test312 | 6 PEM certificate
|
/external/emma/ |
ANDROID-CHANGES.txt | 7 4) Add java.security.cert.Certificate cast to core/java12/com/vladium/emma/rt/InstrClassLoader.java to fix compiler error
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
polochallengeresponsetest.cc | 32 char client_pem[] = "-----BEGIN CERTIFICATE-----\n" 48 "-----END CERTIFICATE-----\n"; 50 char server_pem[] = "-----BEGIN CERTIFICATE-----\n" 66 "-----END CERTIFICATE-----\n";
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 7 path certificate "/etc/racoon";
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
README | 3 gateway authenticates to the client using a certificate, and the client 32 to install a server certificate and key in /etc/openssl/certs/server.crt 44 certificate authority that signed the VPN gateway certificate in
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
TrustRootIndex.java | 21 /** Returns the trusted CA certificate that signed {@code cert}. */
|
/external/webrtc/webrtc/base/ |
sslstreamadapterhelper.h | 90 // Our key and certificate, mostly useful in peer-to-peer mode. 92 // in traditional mode, the server name that the server's certificate 95 // The peer's certificate. Only used for GetPeerCertificate. 98 // The digest of the certificate that the peer must present.
|
/external/wpa_supplicant_8/hs20/server/ca/ |
openssl-root.cnf | 26 certificate = $dir/cacert.pem # The CA certificate 37 cert_opt = ca_default # Certificate field options 104 # Extensions to add to a certificate request
|
/frameworks/base/keystore/java/android/security/ |
KeyChainAliasCallback.java | 27 * Called with the alias of the certificate chosen by the user, or
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertificateException.java | 31 * This exception indicates one of a variety of certificate problems. 34 * @see Certificate 41 * Constructs a certificate exception with no detail message. A detail 49 * Constructs a certificate exception with the given detail
|
/libcore/ojluni/src/main/java/sun/security/provider/ |
X509Factory.java | 34 * This class defines a certificate factory for X.509 v3 certificates & 35 * certification paths, and X.509 v2 certificate revocation lists (CRLs). 43 * @see java.security.cert.Certificate 57 // public static final String BEGIN_CERT = "-----BEGIN CERTIFICATE-----"; 58 // public static final String END_CERT = "-----END CERTIFICATE-----"; 71 * Generates an X.509 certificate object and initializes it with 74 * @param is an input stream with the certificate data. 76 * @return an X.509 certificate object initialized with the data 82 public Certificate engineGenerateCertificate(InputStream is) 105 throw new CertificateException("Could not parse certificate: " [all...] |
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertAttrSet.java | 34 * This interface defines the methods required of a certificate attribute. 35 * Examples of X.509 certificate attributes are Validity, Issuer_Name, and 50 * Returns a short string describing this certificate attribute. 52 * @return value of this certificate attribute in
|
NameConstraintsExtension.java | 44 * a certificate issued by a given CA. Restrictions may apply to the 67 * get, set, delete methods of Certificate, x509 type. 324 * (j) If permittedSubtrees is present in the certificate, set the 328 * (k) If excludedSubtrees is present in the certificate, set the 344 * If excludedSubtrees is present in the certificate, set the 361 * If permittedSubtrees is present in the certificate, set the 401 * check whether a certificate conforms to these NameConstraints. 409 * @returns true if certificate verifies successfully 415 throw new IOException("Certificate is null"); 446 // following returns null if certificate contains no extension [all...] |
/system/ca-certificates/files/ |
0d69c7e1.0 | 1 -----BEGIN CERTIFICATE----- 13 -----END CERTIFICATE----- 14 Certificate: 37 Certificate Sign, CRL Sign
|
7a7c655d.0 | 1 -----BEGIN CERTIFICATE----- 12 -----END CERTIFICATE----- 13 Certificate: 38 Digital Signature, Certificate Sign, CRL Sign
|
/system/ca-certificates/google/files/ |
0d69c7e1.0 | 1 -----BEGIN CERTIFICATE----- 13 -----END CERTIFICATE----- 14 Certificate: 37 Certificate Sign, CRL Sign
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
AlgorithmChecker.java | 39 import java.security.cert.Certificate; 63 * specified certificate contains the required algorithm constraints. 65 * Certificate fields such as the subject public key, the signature 107 * certificate 118 * path where the trust anchor is unknown, or a certificate list which may 134 * certificate 149 // Check for anchor certificate restrictions 203 public void check(Certificate cert, 208 // ignore the check for non-x.509 certificate or null constraints 360 * certificate [all...] |
/system/extras/verity/ |
BootSignature.java | 27 import java.security.cert.Certificate; 51 * certificate ::= Certificate 67 private ASN1Encodable certificate; field in class:BootSignature 101 certificate = sequence.getObjectAt(1); 102 byte[] encoded = ((ASN1Object) certificate).getEncoded(); 151 certificate = s.readObject(); 182 v.add(certificate); 302 if (args.length >= 4 && "-certificate".equals(args[2])) { 303 /* args[3] is the path to a public key certificate */ [all...] |
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 29 echo "Generating CA certificate..." 62 echo "Generating user certificate..."
|
/cts/hostsidetests/appsecurity/certs/pkgsigverify/ |
rsa-8192.x509.pem | 1 -----BEGIN CERTIFICATE----- 50 -----END CERTIFICATE-----
|