HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 801 - 825 of 1381) sorted by null

<<31323334353637383940>>

  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
TrustAnchor_ImplTest.java 474 * Assertion: returns most trusted CA certificate<br>
475 * Test preconditions: valid certificate passed to the constructor<br>
476 * Expected: the same certificate must be returned by the method<br>
567 * Certificate and Certificate Revocation List (CRL) Profile.
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
151 /* body - Certificate */
159 "for Certificate (cert_len=%lu left=%lu)",
179 * to form a full certificate chain. The server may fail to
183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
  /frameworks/av/media/libmedia/
IDrm.cpp 263 Vector<uint8_t> &certificate,
274 readVector(reply, certificate);
742 Vector<uint8_t> certificate; local
745 status_t result = provideProvisionResponse(response, certificate, wrappedKey);
746 writeVector(reply, certificate);
  /frameworks/base/core/java/android/os/
RecoverySystem.java 51 import org.apache.harmony.security.x509.Certificate;
205 List<Certificate> encCerts = signedData.getCertificates();
209 // Take the first certificate from the signature (packages
211 Iterator<Certificate> it = encCerts.iterator();
229 // Check that the public key of the certificate contained
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
WspTypeDecoder.java 68 WELL_KNOWN_MIME_TYPES.put(0x18, "application/vnd.wap.wtls-ca-certificate");
69 WELL_KNOWN_MIME_TYPES.put(0x19, "application/vnd.wap.wtls-user-certificate");
100 WELL_KNOWN_MIME_TYPES.put(0x38, "application/vnd.wap.hashed-certificate");
101 WELL_KNOWN_MIME_TYPES.put(0x39, "application/vnd.wap.signed-certificate");
107 WELL_KNOWN_MIME_TYPES.put(0x3F, "application/vnd.wap.rollover-certificate");
  /libcore/luni/src/main/files/cacerts/
1eb37bdf.0 1 -----BEGIN CERTIFICATE-----
42 -----END CERTIFICATE-----
43 Certificate:
104 Certificate Sign, CRL Sign
105 X509v3 Certificate Policies:
3c860d51.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
86 Certificate Sign, CRL Sign
94 X509v3 Certificate Policies:
3c9a4d3b.0 1 -----BEGIN CERTIFICATE-----
44 -----END CERTIFICATE-----
45 Certificate:
107 X509v3 Certificate Policies:
119 Certificate Sign, CRL Sign
3d441de8.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
87 X509v3 Certificate Policies:
92 Certificate Sign, CRL Sign
5046c355.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
86 Certificate Sign, CRL Sign
94 X509v3 Certificate Policies:
7672ac4b.0 1 -----BEGIN CERTIFICATE-----
32 -----END CERTIFICATE-----
33 Certificate:
87 Certificate Sign, CRL Sign
90 X509v3 Certificate Policies:
9f533518.0 1 -----BEGIN CERTIFICATE-----
41 -----END CERTIFICATE-----
42 Certificate:
103 Certificate Sign, CRL Sign
104 X509v3 Certificate Policies:
d16a5865.0 1 -----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
36 Certificate:
90 Certificate Sign, CRL Sign
93 X509v3 Certificate Policies:
ea169617.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
91 Digital Signature, Certificate Sign, CRL Sign
94 X509v3 Certificate Policies:
  /packages/apps/Email/res/values-en-rAU/
strings.xml 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string>
103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string>
136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string>
137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
  /packages/apps/Email/res/values-en-rGB/
strings.xml 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string>
103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string>
136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string>
137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
  /packages/apps/Email/res/values-en-rIN/
strings.xml 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string>
103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string>
136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string>
137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar 
  /prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar 
  /external/wpa_supplicant_8/hs20/client/
osu_client.c 196 wpa_printf(MSG_INFO, "PPS for certificate credential - fqdn=%s", fqdn);
203 write_result(ctx, "Invalid client certificate SHA256 hash value in PPS");
211 wpa_printf(MSG_INFO, "Could not find client certificate from EST");
212 write_result(ctx, "Could not find client certificate from EST");
223 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO");
224 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO");
228 wpa_printf(MSG_INFO, "Client certificate from EST matches PPS MO");
303 write_result(ctx, "Invalid SHA256 hash value for downloaded certificate");
309 write_summary(ctx, "Download certificate from %s", url);
331 wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match")
    [all...]
  /development/ndk/platforms/android-21/include/media/
NdkMediaDrm.h 55 * This event type indicates that the app needs to request a certificate from
199 * problem with the device certificate.
262 * server to retrieve a device certificate. If provisionining is required, the
  /external/boringssl/src/ssl/test/runner/
prf.go 337 return signatureAndHash{}, errors.New("tls: no supported signature algorithm found for signing client certificate")
341 // id suitable for signing by a TLS client certificate.
345 return nil, 0, errors.New("tls: unsupported signature type for client certificate")
  /frameworks/av/include/ndk/
NdkMediaDrm.h 55 * This event type indicates that the app needs to request a certificate from
199 * problem with the device certificate.
262 * server to retrieve a device certificate. If provisionining is required, the
  /libcore/luni/src/test/java/libcore/java/security/
KeyStoreTest.java 42 import java.security.cert.Certificate;
72 private static final String ALIAS_CERTIFICATE = "certificate";
77 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe";
189 // RI can't handle certificate in PKCS12, but BC can
371 public static void setCertificate(KeyStore ks, String alias, Certificate certificate)
373 ks.setCertificateEntry(alias, certificate);
414 public static void assertCertificate(Certificate actual)
418 public static void assertCertificate2(Certificate actual)
429 public static void assertCertificateChain(Certificate[] actual
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Signature2Test.java 36 import java.security.cert.Certificate;
274 * java.security.Signature#initVerify(java.security.cert.Certificate)
290 Signature.getInstance("DSA").initVerify((Certificate) null);

Completed in 278 milliseconds

<<31323334353637383940>>