HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 576 - 600 of 1381) sorted by null

<<21222324252627282930>>

  /external/boringssl/src/include/openssl/
pem.h 110 #define PEM_STRING_X509_OLD "X509 CERTIFICATE"
111 #define PEM_STRING_X509 "CERTIFICATE"
112 #define PEM_STRING_X509_PAIR "CERTIFICATE PAIR"
113 #define PEM_STRING_X509_TRUSTED "TRUSTED CERTIFICATE"
114 #define PEM_STRING_X509_REQ_OLD "NEW CERTIFICATE REQUEST"
115 #define PEM_STRING_X509_REQ "CERTIFICATE REQUEST"
  /frameworks/base/keystore/tests/src/android/security/keystore/
AndroidKeyPairGeneratorTest.java 33 import java.security.cert.Certificate;
369 assertNotNull("The user certificate should exist for the generated entry", userCertBytes);
372 final Certificate userCert =
375 assertTrue("Certificate should be in X.509 format", userCert instanceof X509Certificate);
380 "Public key used to sign certificate should have the same algorithm as in KeyPair",
383 assertEquals("PublicKey used to sign certificate should match one returned in KeyPair",
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
PKIXParameters_ImplTest.java 53 * certificate entries contained in the specified <code>KeyStore</code>
75 * certificate types are ignored
116 * trusted certificate entry
  /external/boringssl/src/tool/
client.cc 65 "-signed-certificate-timestamps", kBooleanArgument,
66 "Advertise support for signed certificate timestamps",
205 if (args_map.count("-signed-certificate-timestamps") != 0) {
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
BouncyCastleProvider.java 174 // put("X509Store.CERTIFICATE/COLLECTION", "org.bouncycastle.jce.provider.X509StoreCertCollection");
179 // put("X509Store.CERTIFICATE/LDAP", "org.bouncycastle.jce.provider.X509StoreLDAPCerts");
187 // put("X509StreamParser.CERTIFICATE", "org.bouncycastle.jce.provider.X509CertParser");
X509CertificateObject.java 17 import java.security.cert.Certificate;
74 private org.bouncycastle.asn1.x509.Certificate c;
83 org.bouncycastle.asn1.x509.Certificate c)
142 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
147 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
597 if (!(o instanceof Certificate))
602 Certificate other = (Certificate)o;
814 throw new SignatureException("certificate does not verify with supplied key");
  /external/conscrypt/src/main/java/org/conscrypt/
AbstractSessionContext.java 24 import java.security.cert.Certificate;
219 Certificate[] certs = session.getPeerCertificates();
222 for (Certificate cert : certs) {
OpenSSLX509Certificate.java 30 import java.security.cert.Certificate;
160 public static OpenSSLX509Certificate fromCertificate(Certificate cert)
229 throw new CertificateNotYetValidException("Certificate not valid until "
234 throw new CertificateExpiredException("Certificate expired at "
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 67 "path certificate" to specify the location of the keys. This step is
73 path certificate "/etc/racoon";
97 the "path certificate" directive. Keep in mind that privilege
  /external/ipsec-tools/src/racoon/
eaytest.c 229 printf("\n**Test for Certificate.**\n");
400 /* NULL => name of the certificate file */
426 "-----BEGIN CERTIFICATE-----\n"
442 "-----END CERTIFICATE-----\n\n",
444 "-----BEGIN X509 CERTIFICATE-----\n"
460 "-----END X509 CERTIFICATE-----\n\n",
462 "-----BEGIN CERTIFICATE-----\n"
476 "-----END CERTIFICATE-----\n\n",
478 "-----BEGIN CERTIFICATE-----\n"
501 "-----END CERTIFICATE-----\n\n"
    [all...]
  /external/libmtp/examples/
detect.c 190 // Device certificate XML fragment
193 fprintf(stdout, "\nDevice Certificate:\n%s\n", devcert);
196 fprintf(stdout, "Unable to acquire device certificate, perhaps this device "
  /external/oauth/core/src/main/java/net/oauth/signature/
RSA_SHA1.java 66 * by such a consumer can use a X509 certificate containing the consumer's
74 * consumer_cert must be a X509 Certificate containing the consumer's public
76 * or byte[]. In the latter two cases, the certificate must be DER-encoded
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
TBSCertificate.java 39 * with TBSCertificate structure which is the part of X.509 certificate
42 * Certificate and Certificate Revocation List (CRL) Profile.
  /packages/apps/CertInstaller/res/values-ro/
strings.xml 28 <string name="p12_description" msgid="4128352087331630024">"Certificate în depozitul de chei PKCS12."</string>
32 <string name="n_cacrts" msgid="2141498640685639208">"%d certificate CA"</string>
50 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Numai proprietarul acestui dispozitiv poate instala certificate."</string>
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainTestActivity.java 227 "My Test Certificate");
252 log("Null certificate chain!");
256 log("certificate[" + i + "]=" + certificateChain[i]);
  /cts/hostsidetests/appsecurity/src/com/android/cts/appsecurity/
AppSecurityTests.java 110 * if it is signed with a different certificate.
137 * certificate.
222 * Test that an app cannot instrument another app that is signed with different certificate.
255 * certificate than the app that declared the permission.
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyPairGeneratorTest.java 41 import java.security.cert.Certificate;
    [all...]
  /cts/tests/tests/telephony/src/android/telephony/cts/
CarrierConfigManagerTest.java 84 * by certificate on the SIM.
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
X509Certificate2Test.java 62 * Test for X.509 Certificate provider
  /external/apache-harmony/support/src/test/java/tests/support/
Support_ProviderJCE.java 83 // Certificate
Support_ProviderRSA.java 89 // Certificate
Support_ProviderTrust.java 83 // Certificate
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
AttributeCertificateIssuer.java 15 * Carrying class for an attribute certificate issuer.
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 21 import java.security.cert.Certificate;
105 // We should ignore duplicate cruft in the certificate chain
316 public Certificate[] getLocalCertificates() {
337 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /external/elfutils/src/
CONTRIBUTING 23 Developer's Certificate of Origin

Completed in 376 milliseconds

<<21222324252627282930>>