Searched
full:certificate (Results
576 -
600 of
1381) sorted by null
<<21222324252627282930>>
/external/boringssl/src/include/openssl/ |
pem.h | 110 #define PEM_STRING_X509_OLD "X509 CERTIFICATE" 111 #define PEM_STRING_X509 "CERTIFICATE" 112 #define PEM_STRING_X509_PAIR "CERTIFICATE PAIR" 113 #define PEM_STRING_X509_TRUSTED "TRUSTED CERTIFICATE" 114 #define PEM_STRING_X509_REQ_OLD "NEW CERTIFICATE REQUEST" 115 #define PEM_STRING_X509_REQ "CERTIFICATE REQUEST"
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 33 import java.security.cert.Certificate; 369 assertNotNull("The user certificate should exist for the generated entry", userCertBytes); 372 final Certificate userCert = 375 assertTrue("Certificate should be in X.509 format", userCert instanceof X509Certificate); 380 "Public key used to sign certificate should have the same algorithm as in KeyPair", 383 assertEquals("PublicKey used to sign certificate should match one returned in KeyPair",
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXParameters_ImplTest.java | 53 * certificate entries contained in the specified <code>KeyStore</code> 75 * certificate types are ignored 116 * trusted certificate entry
|
/external/boringssl/src/tool/ |
client.cc | 65 "-signed-certificate-timestamps", kBooleanArgument, 66 "Advertise support for signed certificate timestamps", 205 if (args_map.count("-signed-certificate-timestamps") != 0) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
BouncyCastleProvider.java | 174 // put("X509Store.CERTIFICATE/COLLECTION", "org.bouncycastle.jce.provider.X509StoreCertCollection"); 179 // put("X509Store.CERTIFICATE/LDAP", "org.bouncycastle.jce.provider.X509StoreLDAPCerts"); 187 // put("X509StreamParser.CERTIFICATE", "org.bouncycastle.jce.provider.X509CertParser");
|
X509CertificateObject.java | 17 import java.security.cert.Certificate; 74 private org.bouncycastle.asn1.x509.Certificate c; 83 org.bouncycastle.asn1.x509.Certificate c) 142 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 147 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 597 if (!(o instanceof Certificate)) 602 Certificate other = (Certificate)o; 814 throw new SignatureException("certificate does not verify with supplied key");
|
/external/conscrypt/src/main/java/org/conscrypt/ |
AbstractSessionContext.java | 24 import java.security.cert.Certificate; 219 Certificate[] certs = session.getPeerCertificates(); 222 for (Certificate cert : certs) {
|
OpenSSLX509Certificate.java | 30 import java.security.cert.Certificate; 160 public static OpenSSLX509Certificate fromCertificate(Certificate cert) 229 throw new CertificateNotYetValidException("Certificate not valid until " 234 throw new CertificateExpiredException("Certificate expired at "
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 67 "path certificate" to specify the location of the keys. This step is 73 path certificate "/etc/racoon"; 97 the "path certificate" directive. Keep in mind that privilege
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 229 printf("\n**Test for Certificate.**\n"); 400 /* NULL => name of the certificate file */ 426 "-----BEGIN CERTIFICATE-----\n" 442 "-----END CERTIFICATE-----\n\n", 444 "-----BEGIN X509 CERTIFICATE-----\n" 460 "-----END X509 CERTIFICATE-----\n\n", 462 "-----BEGIN CERTIFICATE-----\n" 476 "-----END CERTIFICATE-----\n\n", 478 "-----BEGIN CERTIFICATE-----\n" 501 "-----END CERTIFICATE-----\n\n" [all...] |
/external/libmtp/examples/ |
detect.c | 190 // Device certificate XML fragment 193 fprintf(stdout, "\nDevice Certificate:\n%s\n", devcert); 196 fprintf(stdout, "Unable to acquire device certificate, perhaps this device "
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 66 * by such a consumer can use a X509 certificate containing the consumer's 74 * consumer_cert must be a X509 Certificate containing the consumer's public 76 * or byte[]. In the latter two cases, the certificate must be DER-encoded
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
TBSCertificate.java | 39 * with TBSCertificate structure which is the part of X.509 certificate 42 * Certificate and Certificate Revocation List (CRL) Profile.
|
/packages/apps/CertInstaller/res/values-ro/ |
strings.xml | 28 <string name="p12_description" msgid="4128352087331630024">"Certificate în depozitul de chei PKCS12."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d certificate CA"</string> 50 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Numai proprietarul acestui dispozitiv poate instala certificate."</string>
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainTestActivity.java | 227 "My Test Certificate"); 252 log("Null certificate chain!"); 256 log("certificate[" + i + "]=" + certificateChain[i]);
|
/cts/hostsidetests/appsecurity/src/com/android/cts/appsecurity/ |
AppSecurityTests.java | 110 * if it is signed with a different certificate. 137 * certificate. 222 * Test that an app cannot instrument another app that is signed with different certificate. 255 * certificate than the app that declared the permission.
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/cts/tests/tests/telephony/src/android/telephony/cts/ |
CarrierConfigManagerTest.java | 84 * by certificate on the SIM.
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
X509Certificate2Test.java | 62 * Test for X.509 Certificate provider
|
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_ProviderJCE.java | 83 // Certificate
|
Support_ProviderRSA.java | 89 // Certificate
|
Support_ProviderTrust.java | 83 // Certificate
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
AttributeCertificateIssuer.java | 15 * Carrying class for an attribute certificate issuer.
|
/external/conscrypt/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 21 import java.security.cert.Certificate; 105 // We should ignore duplicate cruft in the certificate chain 316 public Certificate[] getLocalCertificates() { 337 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
|
/external/elfutils/src/ |
CONTRIBUTING | 23 Developer's Certificate of Origin
|
Completed in 376 milliseconds
<<21222324252627282930>>