/external/libmtp/examples/ |
detect.c | 205 // Device certificate XML fragment 210 * they support getting a device certificate but a lot of 216 fprintf(stdout, "\nDevice Certificate:\n%s\n", devcert); 219 fprintf(stdout, "Unable to acquire device certificate, perhaps this device "
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
tpmtoken_import_tests_exp02.sh | 29 # Import the combined certificate and key as public objects
|
tpmtoken_import_tests_exp05.sh | 29 # Import the combined certificate and key as public objects
|
/external/nist-sip/java/gov/nist/javax/sip/ |
ClientTransactionExt.java | 3 import java.security.cert.Certificate;
|
/external/openssh/regress/ |
cert-file.sh | 27 # Move the certificate to a different address to better control 54 # XXX: verify that certificate used was what we expect. Needs exposure of 150 #with an untrusted certificate, should fail 157 #with an additional trusted certificate, should succeed
|
/external/openssh/ |
ssh-keysign.0 | 40 certificate information corresponding with the private keys
|
/external/python/cpython2/Lib/ |
ssl.py | 16 cert_time_to_seconds -- convert time string used for certificate 21 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided 23 validation of the certificate is performed. 38 The following group define certificate requirements that one side is 218 "too many wildcards in certificate DNS name: " + repr(dn)) 258 raise ValueError("empty or no certificate, match_hostname needs a " 396 warnings.warn("unable to enumerate Windows certificate store") 675 certificate provided by the other end of the SSL channel. 676 Return None if no certificate was provided, {} if a 677 certificate was provided, but not validated."" [all...] |
/external/vboot_reference/tests/ |
gen_test_keys.sh | 28 # Generate self-signed certificate from key.
|
/external/webrtc/webrtc/base/ |
ssladapter.h | 43 // If true, the server certificate need not match the configured hostname.
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 190 /* Certificate Encoding (RFC 4306, Sect. 3.6) */ 195 /* X.509 Certificate - Signature: DER encoded X.509 certificate whose 199 /* DER encoded X.509 certificate revocation list */
|
/frameworks/base/core/java/android/security/keymaster/ |
KeymasterCertificateChain.java | 26 * Utility class for the Java side of keystore-generated certificate chains.
|
/frameworks/base/media/lib/signer/ |
README.txt | 23 This library will eventually be replaced when the provisioned certificate-
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
CertificateMonitor.java | 68 // Broadcast filter for changes to the trusted certificate store. Listens on the background 80 // Convert certificate data from X509 format to PEM. 131 * Broadcast receiver for changes to the trusted certificate store. 200 // Create an intent to launch an activity showing information about the certificate.
|
/frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/pps/ |
UpdateParameterTest.java | 237 * Verify that an UpdateParameter without trust root certificate URL is invalid. 249 * Verify that an UpdateParameter with invalid trust root certificate URL is invalid. 263 * Verify that an UpdateParameter without trust root certificate SHA-256 fingerprint is 276 * Verify that an UpdateParameter with an incorrect size trust root certificate SHA-256
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory2Test.java | 38 import java.security.cert.Certificate; 132 Certificate cert = certFactory.generateCertificate(dis); 134 Collection<? extends Certificate> col = certFactory.generateCertificates(dis); 152 List<Certificate> list = null;
|
/libcore/ojluni/src/main/java/java/security/ |
PublicKey.java | 39 * @see Certificate
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
SSLKeyException.java | 31 * of the server or client SSL certificate and private key.
|
SSLPeerUnverifiedException.java | 34 * identify itself (for example; no certificate, the particular
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
AttributeNameEnumeration.java | 33 * by all the X509 certificate attributes to return the attribute
|
BasicConstraintsExtension.java | 38 * certificate is a CA and how deep a certification path may exist 57 * get, set, delete methods of Certificate, x509 type. 91 * @param ca true, if the subject of the Certificate is a CA. 102 * @param ca true, if the subject of the Certificate is a CA.
|
NetscapeCertTypeExtension.java | 35 * Represents Netscape Certificate Type Extension. 41 * (e.g., encipherment, signature, certificate signing) and the application 43 * certificate. This extension has been superseded by IETF PKIX extensions 56 * get, set, delete methods of Certificate, x509 type.
|
/packages/apps/Email/res/layout/ |
client_certificate_selector.xml | 17 <!-- A layout to select a certificate, akin to a file selector on web pages. -->
|
/packages/apps/TimeZoneData/oem_template/data_app/ |
build_oem_data_app.mk | 49 # OEM-INSTRUCTION: Configure your own certificate.
|
/packages/apps/TimeZoneData/oem_template/data_app_prebuilt/ |
include_app_prebuilt.mk | 35 # OEM-INSTRUCTION: Change this to match your app-specific signing certificate.
|
/prebuilts/go/linux-x86/pkg/linux_amd64_race/crypto/ |
x509.a | 16 x509
G|SGOROOT/src/crypto/x509/cert_pool.go0CertPool bySubjectKeyId byName certs
0
x509.go?Certificate |