/system/ca-certificates/google/files/ |
124bbd54.0 | 1 -----BEGIN CERTIFICATE----- 25 -----END CERTIFICATE----- 26 Certificate: 31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Trusted Certificate Services 35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Trusted Certificate Services 63 Certificate Sign, CRL Sign
|
75680d2e.0 | 1 -----BEGIN CERTIFICATE----- 25 -----END CERTIFICATE----- 26 Certificate: 31 Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 35 Subject: C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 63 Certificate Sign, CRL Sign
|
85cde254.0 | 1 -----BEGIN CERTIFICATE----- 23 -----END CERTIFICATE----- 24 Certificate: 29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2 33 Subject: C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2 61 Certificate Sign, CRL Sign
|
bc3f2570.0 | 1 -----BEGIN CERTIFICATE----- 23 -----END CERTIFICATE----- 24 Certificate: 29 Issuer: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 33 Subject: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 61 Certificate Sign, CRL Sign
|
/external/boringssl/src/ssl/test/runner/ |
handshake_server.go | 37 cert *Certificate 787 // Request a client certificate 798 // the client that it may send any certificate in response 801 // an appropriate certificate to give to us. 813 for i, certData := range hs.cert.Certificate { 910 // from the client certificate are sent over these keys. 939 // If we requested a client certificate, then the client must send a 940 // certificate message, even if it's empty. 955 // The client didn't actually send a certificate 959 return errors.New("tls: client didn't provide a certificate") [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509.go | 119 type certificate struct { type 625 // A Certificate represents an X.509 certificate. 626 type Certificate struct { 627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 714 // a certificate. For example: checking a signature when the public key isn't a 715 // certificate signing key. 719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509.go | 119 type certificate struct { type 625 // A Certificate represents an X.509 certificate. 626 type Certificate struct { 627 Raw []byte // Complete ASN.1 DER content (certificate, signature algorithm and signature). 628 RawTBSCertificate []byte // Certificate part of raw ASN.1 DER content. 714 // a certificate. For example: checking a signature when the public key isn't a 715 // certificate signing key. 719 return "x509: invalid signature: parent certificate cannot sign this kind of certificate" [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
TrustedCertificateStoreTest.java | 32 import java.security.cert.Certificate; 274 * The construction below is to build a certificate chain that has a loop 288 Certificate certLoopTempCaCert1 = ((TrustedCertificateEntry) certLoopTempCa1 332 * The construction below creates a certificate with multiple possible issuer certs. 799 assertEquals("System certificate stored in the wrong file", 802 // The two statements below indirectly assert that the certificate can be looked up 806 assertNotNull("Issuer certificate not found for system certificate " + actualFile, 808 assertNotNull("Trust anchor not found for system certificate " + actualFile, 820 // Checking that the certificate is stored in a file is extraneous given the curren [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 103 * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER 108 * @subject_match: String to match in the subject of the peer certificate or 111 * certificate or %NULL to allow all alternative subjects 113 * certificate or %NULL to allow all domain names. This may allow subdomains an 116 * certificate or %NULL to allow all domain names. This requires a full, 118 * @client_cert: File or reference name for client X.509 certificate in PEM or 138 * @cert_id: the certificate's id when using engine 139 * @ca_cert_id: the CA certificate's id when using engine 152 * (file path or reference to certificate store) or by providing the same data 302 * tls_global_set_verify - Set global certificate verification option [all...] |
/libcore/ojluni/src/main/java/java/util/jar/ |
JarVerifier.java | 337 * Return an array of java.security.cert.Certificate objects for 342 public java.security.cert.Certificate[] getCerts(String name) 347 public java.security.cert.Certificate[] getCerts(JarFile jar, JarEntry entry) 385 * Convert an array of signers into an array of concatenated certificate 388 private static java.security.cert.Certificate[] mapSignersToCertArray( 392 ArrayList<java.security.cert.Certificate> certChains = new ArrayList<>(); 398 // Convert into a Certificate[] 400 new java.security.cert.Certificate[certChains.size()]); 613 java.security.cert.Certificate[] vcerts; 623 VerifierCodeSource(Object csdomain, URL location, java.security.cert.Certificate[] certs) [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_ssl.c | 5 certificate decoding. Chris Stawarz contributed some non-blocking
290 errstr = ERRSTR("Both the key & certificate files "
297 errstr = ERRSTR("Both the key & certificate files "
673 _get_peer_alt_names (X509 *certificate) {
699 if (certificate == NULL)
707 certificate, NID_subject_alt_name, i)) >= 0) {
716 ext = X509_get_ext(certificate, i);
824 _decode_certificate (X509 *certificate, int verbose) {
844 X509_get_subject_name(certificate));
855 X509_get_issuer_name(certificate));
[all...] |
/compatibility/cdd/9_security-model/ |
9_8_privacy.md | 45 Certificate Authority (CA) store as [provided]( 46 https://source.android.com/security/overview/app-security.html#certificate-authorities)
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
CompHelperActivity.java | 52 "-----BEGIN CERTIFICATE-----\n" + 72 "-----END CERTIFICATE-----";
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
Attestation.java | 28 * Parses an attestation certificate and provides an easy-to-use interface for examining the 59 * @throws CertificateParsingException if the certificate does not contain a properly-formatted
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
ConfigParserTest.java | 37 * CA (Certificate Authority) X.509 certificate {@link FakeKeys#CA_CERT0}.
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-resourcesrc/src/android/security/net/config/cts/ |
ResourceSourceTest.java | 25 import java.security.cert.Certificate; 77 for (Certificate cert : factory.generateCertificates(is)) {
|
/developers/build/prebuilts/gradle/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/multidatasetservice/ |
PackageVerifier.kt | 32 * Verifies if a package is valid by matching its certificate with the previously stored 33 * certificate.
|
/developers/samples/android/input/autofill/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/multidatasetservice/ |
PackageVerifier.kt | 32 * Verifies if a package is valid by matching its certificate with the previously stored 33 * certificate.
|
/development/samples/KeyChainDemo/ |
_index.html | 4 grant permission to the app to use the installed key chain and finally display the certificate and 6 at an SSL socket using the same certificate in the key chain.
|
/external/avb/test/ |
avb_atx_generate_test_data | 65 # Construct a PIK certificate. 72 # Construct a PSK certificate.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
OCSPReqBuilder.java | 52 * @param certId certificate ID of interest 65 * @param certId certificate ID of interest
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedBuilderParameters.java | 60 * A value of 0 implies that the path can only contain a single certificate. 65 * The basic constraints extension of a CA certificate overrides this value
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
OpenSSLX509CertificateTest.java | 114 /* Calling withDeletedExtension should not modify the original certificate, only make a copy. 127 /* withDeletedExtension should be safe to call on a certificate without the extension, and
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 52 throw new CertificateException("Unacceptable certificate: " 63 throw new CertificateException("Unacceptable certificate: "
|
/external/curl/docs/examples/ |
simplessl.c | 31 1. set pCertFile to the file with the client certificate 42 !! verify of the server certificate is not implemented here !!
|