HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1076 - 1100 of 1381) sorted by null

<<41424344454647484950>>

  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLProvider.java 274 /* === Certificate === */
OpenSSLSocketImpl.java 254 * cipher suites, or initiate a new session. The certificate chain is
543 throw new SSLException("Peer sent no certificate");
    [all...]
  /external/ipsec-tools/src/racoon/
remoteconf.c 543 plog(LLV_INFO, LOCATION, NULL, "\t/* peers certificate from payload */\n");
  /external/libvncserver/webclients/java-applet/ssl/
README 261 regarding a certificate. If we get the same cert (chain) from
  /external/libvncserver/x11vnc/
enc.h 191 " SSL Show Certificate mode: Set the cipher to 'showcert' to fetch\n"
192 " the SSL certificate from remotehost:port and print it to the stdout.\n"
193 " No certificate authentication or verification is performed. E.g.\n"
    [all...]
  /external/wpa_supplicant_8/hostapd/
defconfig 129 # PKCS#12 (PFX) support (used to read private key and certificate file from
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 306 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
  /frameworks/base/core/java/android/webkit/
WebViewProvider.java 89 public void setCertificate(SslCertificate certificate);
  /frameworks/base/docs/html/guide/topics/manifest/
manifest-element.jd 89 by the same certificate. Application with the same user ID can access each
  /frameworks/base/docs/html-intl/intl/ja/preview/
api-overview.jd 479 <li>{@link android.app.admin.DevicePolicyManager#installKeyPair(android.content.ComponentName,java.security.PrivateKey,java.security.cert.Certificate,java.lang.String)
  /frameworks/base/docs/html-intl/intl/ko/preview/
api-overview.jd 479 <li>{@link android.app.admin.DevicePolicyManager#installKeyPair(android.content.ComponentName,java.security.PrivateKey,java.security.cert.Certificate,java.lang.String)
  /frameworks/base/docs/html-intl/intl/ru/preview/
api-overview.jd 479 <li>{@link android.app.admin.DevicePolicyManager#installKeyPair(android.content.ComponentName,java.security.PrivateKey,java.security.cert.Certificate,java.lang.String)
    [all...]
  /frameworks/base/docs/html-intl/intl/zh-cn/preview/
api-overview.jd 479 <li>{@link android.app.admin.DevicePolicyManager#installKeyPair(android.content.ComponentName,java.security.PrivateKey,java.security.cert.Certificate,java.lang.String)
  /frameworks/base/docs/html-intl/intl/zh-tw/preview/
api-overview.jd 479 <li>{@link android.app.admin.DevicePolicyManager#installKeyPair(android.content.ComponentName,java.security.PrivateKey,java.security.cert.Certificate,java.lang.String)
  /frameworks/base/packages/CaptivePortalLogin/src/com/android/captiveportallogin/
CaptivePortalLoginActivity.java 342 Uri.parse(error.getUrl()).getHost() + " certificate: " +
  /frameworks/base/packages/SettingsLib/res/values/
strings.xml 63 or certificate). -->
  /frameworks/base/telephony/java/com/android/internal/telephony/
TelephonyIntents.java 267 * The carrier app must be signed using a certificate that matches the UICC access rules.
  /libcore/luni/src/test/java/libcore/java/security/cert/
X509CRLTest.java 314 * This is needed because the certificate revocation in our CRL can be a
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore4Test.java 25 import java.security.cert.Certificate;
  /packages/apps/Exchange/src/com/android/exchange/eas/
EasAutoDiscover.java 215 // SSL certificate to use, if one is needed.
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainActivity.java 164 Log.e(TAG, "Loading certificate aliases interrupted", e);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libresolv.a 270 ; flags: qr aa tc rd ra ?? ad cd; %s: %d, %s: %dINCHAOSHSHESIODANYNONEQUERYANSWERAUTHORITYADDITIONALZONEPREREQUISITEUPDATERSARSA KEY with MD5 hashDHDiffie HellmanDSADigital Signature AlgorithmEXPIREONLYNo algorithmPRIVATEAlgorithm obtained from OIDPKIXPKIX (X.509v3) CertificateSPKISPKI certificatePGPPGP certificateURLURL PrivateOIDOID PrivateAaddressNSname serverMDmail destination (deprecated)MFmail forwarder (deprecated)CNAMEcanonical nameSOAstart of authorityMBmailboxMGmail group memberMRmail renameNULLnullWKSPTRdomain name pointerHINFOhost informationMINFOmailbox informationMXmail exchangerTXTtextRPresponsible personAFSDBDCE or AFS serverX25X25 addressISDNISDN addressRTrouterNSAPnsap addressNSAP_PTRSIGsignatureKEYkeyPXmapping informationGPOSAAAAIPv6 addressLOClocationNXTEIDNIMLOCSRVserver selectionATMAATM address (unimplemented)DNAMENon-terminal DNAME (for IPv6)TSIGtransaction signatureIXFRincremental zone transferAXFRzone transferZXFRcompressed zone transferMAILBMAILAmail agent (deprecated)NAPTRURN Naming AuthorityKXKey ExchangeCERTCertificate"any"NOERRORno errorFORMERRformat errorSERVFAILserver failedNXDOMAINno such domain nameNOTIMPnot implementedREFUSEDrefusedYXDOMAINdomain name existsYXRRSETrrset existsNXRRSETrrset doesn't existNOTAUTHnot authoritativeNOTZONENot in zoneBADSIGbad signatureBADKEYbad keyBADTIMEbad time?%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %d.%.2dm %sm %sm %sm;; ->>HEADER<<- opcode: %s, status: %s, id: %d
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/xen/
libresolv.a 264 ; flags: qr aa tc rd ra ?? ad cd; %s: %d, %s: %dINCHAOSHSHESIODANYNONEQUERYANSWERAUTHORITYADDITIONALZONEPREREQUISITEUPDATERSARSA KEY with MD5 hashDHDiffie HellmanDSADigital Signature AlgorithmEXPIREONLYNo algorithmPRIVATEAlgorithm obtained from OIDPKIXPKIX (X.509v3) CertificateSPKISPKI certificatePGPPGP certificateURLURL PrivateOIDOID PrivateAaddressNSname serverMDmail destination (deprecated)MFmail forwarder (deprecated)CNAMEcanonical nameSOAstart of authorityMBmailboxMGmail group memberMRmail renameNULLnullWKSPTRdomain name pointerHINFOhost informationMINFOmailbox informationMXmail exchangerTXTtextRPresponsible personAFSDBDCE or AFS serverX25X25 addressISDNISDN addressRTrouterNSAPnsap addressNSAP_PTRSIGsignatureKEYkeyPXmapping informationGPOSAAAAIPv6 addressLOClocationNXTEIDNIMLOCSRVserver selectionATMAATM address (unimplemented)DNAMENon-terminal DNAME (for IPv6)TSIGtransaction signatureIXFRincremental zone transferAXFRzone transferZXFRcompressed zone transferMAILBMAILAmail agent (deprecated)NAPTRURN Naming AuthorityKXKey ExchangeCERTCertificate"any"NOERRORno errorFORMERRformat errorSERVFAILserver failedNXDOMAINno such domain nameNOTIMPnot implementedREFUSEDrefusedYXDOMAINdomain name existsYXRRSETrrset existsNXRRSETrrset doesn't existNOTAUTHnot authoritativeNOTZONENot in zoneBADSIGbad signatureBADKEYbad keyBADTIMEbad time?%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %d.%.2dm %sm %sm %sm;; ->>HEADER<<- opcode: %s, status: %s, id: %d
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
poplib.py 325 certfile - PEM formatted certificate chain file
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
poplib.py 325 certfile - PEM formatted certificate chain file

Completed in 614 milliseconds

<<41424344454647484950>>