HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1026 - 1050 of 2776) sorted by null

<<41424344454647484950>>

  /external/libmtp/examples/
detect.c 205 // Device certificate XML fragment
210 * they support getting a device certificate but a lot of
216 fprintf(stdout, "\nDevice Certificate:\n%s\n", devcert);
219 fprintf(stdout, "Unable to acquire device certificate, perhaps this device "
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_tests_exp02.sh 29 # Import the combined certificate and key as public objects
tpmtoken_import_tests_exp05.sh 29 # Import the combined certificate and key as public objects
  /external/nist-sip/java/gov/nist/javax/sip/
ClientTransactionExt.java 3 import java.security.cert.Certificate;
  /external/openssh/regress/
cert-file.sh 27 # Move the certificate to a different address to better control
54 # XXX: verify that certificate used was what we expect. Needs exposure of
150 #with an untrusted certificate, should fail
157 #with an additional trusted certificate, should succeed
  /external/openssh/
ssh-keysign.0 40 certificate information corresponding with the private keys
  /external/python/cpython2/Lib/
ssl.py 16 cert_time_to_seconds -- convert time string used for certificate
21 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
23 validation of the certificate is performed.
38 The following group define certificate requirements that one side is
218 "too many wildcards in certificate DNS name: " + repr(dn))
258 raise ValueError("empty or no certificate, match_hostname needs a "
396 warnings.warn("unable to enumerate Windows certificate store")
675 certificate provided by the other end of the SSL channel.
676 Return None if no certificate was provided, {} if a
677 certificate was provided, but not validated.""
    [all...]
  /external/vboot_reference/tests/
gen_test_keys.sh 28 # Generate self-signed certificate from key.
  /external/webrtc/webrtc/base/
ssladapter.h 43 // If true, the server certificate need not match the configured hostname.
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.h 190 /* Certificate Encoding (RFC 4306, Sect. 3.6) */
195 /* X.509 Certificate - Signature: DER encoded X.509 certificate whose
199 /* DER encoded X.509 certificate revocation list */
  /frameworks/base/core/java/android/security/keymaster/
KeymasterCertificateChain.java 26 * Utility class for the Java side of keystore-generated certificate chains.
  /frameworks/base/media/lib/signer/
README.txt 23 This library will eventually be replaced when the provisioned certificate-
  /frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
CertificateMonitor.java 68 // Broadcast filter for changes to the trusted certificate store. Listens on the background
80 // Convert certificate data from X509 format to PEM.
131 * Broadcast receiver for changes to the trusted certificate store.
200 // Create an intent to launch an activity showing information about the certificate.
  /frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/pps/
UpdateParameterTest.java 237 * Verify that an UpdateParameter without trust root certificate URL is invalid.
249 * Verify that an UpdateParameter with invalid trust root certificate URL is invalid.
263 * Verify that an UpdateParameter without trust root certificate SHA-256 fingerprint is
276 * Verify that an UpdateParameter with an incorrect size trust root certificate SHA-256
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory2Test.java 38 import java.security.cert.Certificate;
132 Certificate cert = certFactory.generateCertificate(dis);
134 Collection<? extends Certificate> col = certFactory.generateCertificates(dis);
152 List<Certificate> list = null;
  /libcore/ojluni/src/main/java/java/security/
PublicKey.java 39 * @see Certificate
  /libcore/ojluni/src/main/java/javax/net/ssl/
SSLKeyException.java 31 * of the server or client SSL certificate and private key.
SSLPeerUnverifiedException.java 34 * identify itself (for example; no certificate, the particular
  /libcore/ojluni/src/main/java/sun/security/x509/
AttributeNameEnumeration.java 33 * by all the X509 certificate attributes to return the attribute
BasicConstraintsExtension.java 38 * certificate is a CA and how deep a certification path may exist
57 * get, set, delete methods of Certificate, x509 type.
91 * @param ca true, if the subject of the Certificate is a CA.
102 * @param ca true, if the subject of the Certificate is a CA.
NetscapeCertTypeExtension.java 35 * Represents Netscape Certificate Type Extension.
41 * (e.g., encipherment, signature, certificate signing) and the application
43 * certificate. This extension has been superseded by IETF PKIX extensions
56 * get, set, delete methods of Certificate, x509 type.
  /packages/apps/Email/res/layout/
client_certificate_selector.xml 17 <!-- A layout to select a certificate, akin to a file selector on web pages. -->
  /packages/apps/TimeZoneData/oem_template/data_app/
build_oem_data_app.mk 49 # OEM-INSTRUCTION: Configure your own certificate.
  /packages/apps/TimeZoneData/oem_template/data_app_prebuilt/
include_app_prebuilt.mk 35 # OEM-INSTRUCTION: Change this to match your app-specific signing certificate.
  /prebuilts/go/linux-x86/pkg/linux_amd64_race/crypto/
x509.a 16 x509 G|SGOROOT/src/crypto/x509/cert_pool.go0CertPoolbySubjectKeyId  byName  certs 0 x509.go?CertificateH?Raw"!RawTBSCertificate"-RawSubjectPublicKeyInfo"RawSubject"RawIssuer"Signature"#SignatureAlgorithm ?6 String@ algo·2 5isRSAPSS@"?#PublicKeyAlgorithm ?&?PublicKey VersionSerialNumber 0pkcs1.goIntbigmath/bignegabs nat WordTaddFz·2Fx·3Fy·4FandF@esc:0x12FB esc:0x1FDJF andNotF@HFB esc:0x9FDJFbitFx·2J i·3  bitLenFRJ bytesF@J" buf·3Ji·1 clearFz·1JcmpFRJFy·3Jr·1convertWordsFq·1
498 -{x509: certificate is not authorized to sign other certificates???
500 -ax509: certificate has expired or is not yet valid???
502 -?x509: a root or intermediate certificate is not authorized to sign in this domain???
506 -ix509: certificate specifies an incompatible key usage???
509 -?x509: issuer name does not match subject from issuing certificate????
511 -?x509: invalid signature: parent certificate cannot sign this kind of certificate????
553 net.a time.aunicode/utf8.acrypto.acrypto/dsa.acrypto/sha1.acrypto/sha256.acrypto/sha512.astrconv.a?"".NewCertPool?*runtime.racefuncenter?*type.map[string][]int?runtime.makemap? type."".CertPool?"runtime.newobject?,runtime.racewriterange?"runtime.racewrite?(runtime.writeBarrier?(runtime.racefuncexit?.runtime.writebarrierptr?0runtime.morestack_noctxt?.autotmp_35?,type.*map[string][]int?.autotmp_34?"type.*"".CertPool?.autotmp_33?.autotmp_32?~r0?.fp?type.uintptr?Tgclocals·bbb04b643c29730bec89bd56cd9bd77e?Tgclocals·432c427e1f8b28d1832c05dfe9524ebf?H$GOROOT/src/crypto/x509/cert_pool.go?""".SystemCertPool?$"".loadSystemRoots?.autotmp_45?.autotmp_44?type.*uint8?.autotmp_43?~r1?type.error?Tgclocals·15b76348caca8a511afecadf603e9401?Tgclocals·beef1c0edbd4d21e0079520d217ae030?D"".(*CertPool).findVerifiedParents? runtime.raceread?H"".(*Certificate).CheckSignatureFrom?$runtime.panicslice?type.int?"runtime.growslice?$runtime.panicindex?8runtime.slicebytetostringtmp?4runtime.mapaccess1_faststr?candidates.len?c?.autotmp_72?.autotmp_67?.autotmp_66?.autotmp_63?.autotmp_73?type.*[]int?.autotmp_71?.type.*[]*"".Certificate?.autotmp_70?(type.*"".Certificate?.autotmp_69?.autotmp_68?.autotmp_65?.autotmp_64?typ (…)
    [all...]

Completed in 284 milliseconds

<<41424344454647484950>>