/frameworks/base/wifi/java/android/net/wifi/passpoint/ |
WifiPasspointPolicy.java | 246 // EAP CA Certificate 257 //User certificate
|
/libcore/luni/src/main/java/java/security/ |
SignatureSpi.java | 203 * public key or a certificate of the signer. 223 * a certificate of the signer.
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 29 import java.security.cert.Certificate; 85 Certificate [] certs = juc.getCertificates();
|
/packages/apps/Email/tests/src/com/android/emailcommon/provider/ |
HostAuthTests.java | 176 // user certificate. 185 fail("Shouldn't be able to set a client certificate on an unsecure connection");
|
/external/google-breakpad/src/third_party/curl/ |
curl.h | 368 CURLE_PEER_FAILED_VERIFICATION, /* 51 - peer's certificate or fingerprint 377 CURLE_SSL_CERTPROBLEM, /* 58 - problem with the local certificate */ 752 /* name of the file keeping your private SSL-certificate */ [all...] |
/external/boringssl/src/ssl/ |
s3_srvr.c | 2181 CBS certificate; local [all...] |
/external/libvncserver/x11vnc/ |
sslhelper.c | 147 rfbLog("Using SSL Certificate:\n"); 150 if (strstr(line, "BEGIN CERTIFICATE")) { 156 if (strstr(line, "END CERTIFICATE")) { 293 rfbLog("Creating a self-signed PEM certificate...\n"); 295 rfbLog("Creating a temporary, self-signed PEM certificate...\n"); 300 rfbLog("get the certificate information to the VNC viewers SSL\n"); 305 rfbLog("The cert inside -----BEGIN CERTIFICATE-----\n"); 307 rfbLog(" -----END CERTIFICATE-----\n"); 311 rfbLog("server certificate.\n"); 322 " your Certificate parameters.\n") [all...] |
/external/openssh/ |
ssh-keygen.c | 90 /* Flag indicating that we want to show the contents of a certificate */ 116 /* Certificate serial number */ 132 /* Certificate options */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | 56 * include peer certificate in EAP events even without a separate probe 184 * added support for OCSP stapling to validate AAA server certificate 326 * added support for using OCSP stapling to validate server certificate 331 EAP-TLS) to specify additional constraint for the server certificate 511 certificate configuration between Phase 1 and Phase 2 [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
PackageSignatureTest.java | 141 * DER encoded certificate file.
|
/development/testrunner/ |
android_mk.py | 37 CERTIFICATE = "LOCAL_CERTIFICATE"
|
/docs/source.android.com/src/devices/tech/security/overview/ |
app-security.jd | 295 its Application Sandbox. The signed application certificate defines which user 300 Manager verifies that the APK has been properly signed with the certificate 301 included in that APK. If the certificate (or, more accurately, the public key 302 in the certificate) matches the key used to sign any other APK on the device,
|
/external/antlr/antlr-3.4/runtime/Python/ |
README | 88 have to sign the "Developer's Certificate of Origin", which can be found on
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
ProtectionDomainTest.java | 60 cs = new CodeSource(url, (java.security.cert.Certificate[]) null);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchorTest.java | 320 * was not specified as trusted certificate<br> 321 * Test preconditions: test object is not specified as trusted certificate<br> 374 * Certificate and Certificate Revocation List (CRL) Profile.
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/ |
Signature_Impl2Test.java | 231 private class MyCertificate extends java.security.cert.Certificate {
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CertificateTest.java | 49 // Base64 encoded form of ASN.1 DER encoded X.509 Certificate
|
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_TestProvider.java | 115 // Certificate
|
/external/boringssl/src/crypto/x509/ |
t_crl.c | 91 BIO_printf(out, "Certificate Revocation List (CRL):\n");
|
x509_lu.c | 620 /* Try to get issuer certificate from store. Due to limitations 621 * of the API this can only retrieve a single certificate matching 628 * 0 certificate not found. 655 /* If certificate matches all OK */
|
x_req.c | 64 * invalid encodings. Some broken certificate requests don't
|
/external/boringssl/src/crypto/x509v3/ |
v3_bitst.c | 84 {5, "Certificate Sign", "keyCertSign"},
|
v3_enum.c | 72 {CRL_REASON_CERTIFICATE_HOLD, "Certificate Hold", "certificateHold"},
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXCRLStoreSelector.java | 20 * This class is a Selector implementation for X.509 certificate revocation
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 33 * Handles NetScape certificate request (KEYGEN), these are constructed as:
|