HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 951 - 975 of 2776) sorted by null

<<31323334353637383940>>

  /system/ca-certificates/google/files/
124bbd54.0 1 -----BEGIN CERTIFICATE-----
25 -----END CERTIFICATE-----
26 Certificate:
31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Trusted Certificate Services
35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Trusted Certificate Services
63 Certificate Sign, CRL Sign
75680d2e.0 1 -----BEGIN CERTIFICATE-----
25 -----END CERTIFICATE-----
26 Certificate:
31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
63 Certificate Sign, CRL Sign
85cde254.0 1 -----BEGIN CERTIFICATE-----
23 -----END CERTIFICATE-----
24 Certificate:
29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
33 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
61 Certificate Sign, CRL Sign
bc3f2570.0 1 -----BEGIN CERTIFICATE-----
23 -----END CERTIFICATE-----
24 Certificate:
29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
33 Subject: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
61 Certificate Sign, CRL Sign
  /external/boringssl/src/ssl/test/runner/
handshake_server.go 37 cert *Certificate
787 // Request a client certificate
798 // the client that it may send any certificate in response
801 // an appropriate certificate to give to us.
813 for i, certData := range hs.cert.Certificate {
910 // from the client certificate are sent over these keys.
939 // If we requested a client certificate, then the client must send a
940 // certificate message, even if it's empty.
955 // The client didn't actually send a certificate
959 return errors.New("tls: client didn't provide a certificate")
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509.go 119 type certificate struct { type
625 // A Certificate represents an X.509 certificate.
626 type Certificate struct {
627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
714 // a certificate. For example: checking a signature when the public key isn't a
715 // certificate signing key.
719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
x509.go 119 type certificate struct { type
625 // A Certificate represents an X.509 certificate.
626 type Certificate struct {
627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature).
628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content.
714 // a certificate. For example: checking a signature when the public key isn't a
715 // certificate signing key.
719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate"
    [all...]
  /external/conscrypt/platform/src/test/java/org/conscrypt/
TrustedCertificateStoreTest.java 32 import java.security.cert.Certificate;
274 * The construction below is to build a certificate chain that has a loop
288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1
332 * The construction below creates a certificate with multiple possible issuer certs.
799 assertEquals("System certificate stored in the wrong file",
802 // The two statements below indirectly assert that the certificate can be looked up
806 assertNotNull("Issuer certificate not found for system certificate " + actualFile,
808 assertNotNull("Trust anchor not found for system certificate " + actualFile,
820 // Checking that the certificate is stored in a file is extraneous given the curren
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 103 * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER
108 * @subject_match: String to match in the subject of the peer certificate or
111 * certificate or %NULL to allow all alternative subjects
113 * certificate or %NULL to allow all domain names. This may allow subdomains an
116 * certificate or %NULL to allow all domain names. This requires a full,
118 * @client_cert: File or reference name for client X.509 certificate in PEM or
138 * @cert_id: the certificate's id when using engine
139 * @ca_cert_id: the CA certificate's id when using engine
152 * (file path or reference to certificate store) or by providing the same data
302 * tls_global_set_verify - Set global certificate verification option
    [all...]
  /libcore/ojluni/src/main/java/java/util/jar/
JarVerifier.java 337 * Return an array of java.security.cert.Certificate objects for
342 public java.security.cert.Certificate[] getCerts(String name)
347 public java.security.cert.Certificate[] getCerts(JarFile jar, JarEntry entry)
385 * Convert an array of signers into an array of concatenated certificate
388 private static java.security.cert.Certificate[] mapSignersToCertArray(
392 ArrayList<java.security.cert.Certificate> certChains = new ArrayList<>();
398 // Convert into a Certificate[]
400 new java.security.cert.Certificate[certChains.size()]);
613 java.security.cert.Certificate[] vcerts;
623 VerifierCodeSource(Object csdomain, URL location, java.security.cert.Certificate[] certs)
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
_ssl.c 5 certificate decoding. Chris Stawarz contributed some non-blocking
290 errstr = ERRSTR("Both the key & certificate files "
297 errstr = ERRSTR("Both the key & certificate files "
673 _get_peer_alt_names (X509 *certificate) {
699 if (certificate == NULL)
707 certificate, NID_subject_alt_name, i)) >= 0) {
716 ext = X509_get_ext(certificate, i);
824 _decode_certificate (X509 *certificate, int verbose) {
844 X509_get_subject_name(certificate));
855 X509_get_issuer_name(certificate));
    [all...]
  /compatibility/cdd/9_security-model/
9_8_privacy.md 45 Certificate Authority (CA) store as [provided](
46 https://source.android.com/security/overview/app-security.html#certificate-authorities)
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
CompHelperActivity.java 52 "-----BEGIN CERTIFICATE-----\n" +
72 "-----END CERTIFICATE-----";
  /cts/tests/tests/keystore/src/android/keystore/cts/
Attestation.java 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the
59 * @throws CertificateParsingException if the certificate does not contain a properly-formatted
  /cts/tests/tests/net/src/android/net/wifi/cts/
ConfigParserTest.java 37 * CA (Certificate Authority) X.509 certificate {@link FakeKeys#CA_CERT0}.
  /cts/tests/tests/networksecurityconfig/networksecurityconfig-resourcesrc/src/android/security/net/config/cts/
ResourceSourceTest.java 25 import java.security.cert.Certificate;
77 for (Certificate cert : factory.generateCertificates(is)) {
  /developers/build/prebuilts/gradle/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/multidatasetservice/
PackageVerifier.kt 32 * Verifies if a package is valid by matching its certificate with the previously stored
33 * certificate.
  /developers/samples/android/input/autofill/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/multidatasetservice/
PackageVerifier.kt 32 * Verifies if a package is valid by matching its certificate with the previously stored
33 * certificate.
  /development/samples/KeyChainDemo/
_index.html 4 grant permission to the app to use the installed key chain and finally display the certificate and
6 at an SSL socket using the same certificate in the key chain.
  /external/avb/test/
avb_atx_generate_test_data 65 # Construct a PIK certificate.
72 # Construct a PSK certificate.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/
OCSPReqBuilder.java 52 * @param certId certificate ID of interest
65 * @param certId certificate ID of interest
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKIXExtendedBuilderParameters.java 60 * A value of 0 implies that the path can only contain a single certificate.
65 * The basic constraints extension of a CA certificate overrides this value
  /external/conscrypt/openjdk/src/test/java/org/conscrypt/
OpenSSLX509CertificateTest.java 114 /* Calling withDeletedExtension should not modify the original certificate, only make a copy.
127 /* withDeletedExtension should be safe to call on a certificate without the extension, and
  /external/conscrypt/platform/src/main/java/org/conscrypt/
ChainStrengthAnalyzer.java 52 throw new CertificateException("Unacceptable certificate: "
63 throw new CertificateException("Unacceptable certificate: "
  /external/curl/docs/examples/
simplessl.c 31 1. set pCertFile to the file with the client certificate
42 !! verify of the server certificate is not implemented here !!

Completed in 652 milliseconds

<<31323334353637383940>>