HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1226 - 1250 of 2776) sorted by null

<<41424344454647484950>>

  /libcore/ojluni/src/main/java/sun/security/x509/
InhibitAnyPolicyExtension.java 43 * match for other certificate policies. The value indicates the number
47 * ject of this certificate, but not in additional certificates in the
71 * get, set, delete methods of Certificate, x509 type.
PolicyConstraintsExtension.java 37 * This class defines the certificate extension which specifies the
43 * that each certificate in a path contain an acceptable policy
63 * get, set, delete methods of Certificate, x509 type.
  /packages/apps/CertInstaller/res/values-ro/
strings.xml 28 <string name="p12_description" msgid="4128352087331630024">"Certificate în depozitul de chei PKCS12."</string>
32 <string name="n_cacrts" msgid="2141498640685639208">"%d certificate CA"</string>
49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Numai proprietarul acestui dispozitiv poate instala certificate."</string>
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainTestActivity.java 227 "My Test Certificate");
252 log("Null certificate chain!");
256 log("certificate[" + i + "]=" + certificateChain[i]);
  /tools/apksig/src/apksigner/java/com/android/apksigner/
ApkSignerTool.java 47 import java.security.cert.Certificate;
193 signerParams.certFile = optionsParser.getRequiredValue("Certificate file");
461 "Signer #" + signerNumber + " certificate DN"
465 "Signer #" + signerNumber + " certificate SHA-256 digest: "
468 "Signer #" + signerNumber + " certificate SHA-1 digest: "
471 "Signer #" + signerNumber + " certificate MD5 digest: "
485 // DSA parameters may be inherited from the certificate. We
    [all...]
  /compatibility/cdd/9_security-model/
9_4_alternate-execution-environments.md 22 the standard Android mechanisms of shared user ID and signing certificate.
  /cts/hostsidetests/appsecurity/src/android/appsecurity/cts/
AppSecurityTests.java 120 * if it is signed with a different certificate.
148 * certificate.
234 * Test that an app cannot instrument another app that is signed with different certificate.
267 * certificate than the app that declared the permission.
  /cts/hostsidetests/os/test-apps/StaticSharedLibConsumerApp3/
AndroidManifest.xml 28 <additional-certificate android:certDigest="E4:95:82:FF:3A:0A:A4:C5:58:9F:C5:FE:AA:C6:B7:D6:E7:57:19:9D:D0:C6:74:2D:F7:BF:37:C2:FF:EF:95:F5"/>
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyPairGeneratorTest.java 41 import java.security.cert.Certificate;
    [all...]
  /development/samples/browseable/WatchFace/Application/res/values/
base-strings.xml 40 certificate from your signed APK. More details can be found [here][2].
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/
PeiCryptLib.inf 12 # certificate handler functions, authenticode signature verification functions,
  /device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/
DxeImageVerificationLib.inf 95 gEfiCertPkcs7Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the certificate.
  /docs/source.android.com/en/devices/tech/config/
carrier.html 47 certificate that has a matching signature to one on the SIM. See the <a
108 <p>The Carrier App in question must be signed with the same certificate found on
222 <h3 id=sign_app_with_same_certificate_on_sim>Sign app with same certificate on SIM</h3>
232 <li>A SIM containing a valid certificate signature
  /external/apache-harmony/support/src/test/java/tests/support/
Support_ProviderJCE.java 83 // Certificate
Support_ProviderRSA.java 89 // Certificate
Support_ProviderTrust.java 83 // Certificate
  /external/avb/libavb_atx/
avb_atx_validate.h 63 * the subject of the PSK certificate.
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
AttributeCertificateIssuer.java 15 * Carrying class for an attribute certificate issuer.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CertificateObject.java 17 import java.security.cert.Certificate;
79 private org.bouncycastle.asn1.x509.Certificate c;
88 org.bouncycastle.asn1.x509.Certificate c)
147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
602 if (!(o instanceof Certificate))
607 Certificate other = (Certificate)o;
849 throw new SignatureException("certificate does not verify with supplied key");
  /external/curl/docs/examples/
sessioninfo.c 66 fprintf(stderr, "Certificate #%d: %.*s", i, dn.size, dn.data);
  /external/curl/docs/libcurl/
curl_easy_setopt.3 493 Verify the host name in the SSL certificate. See \fICURLOPT_SSL_VERIFYHOST(3)\fP
495 Verify the host name in the proxy SSL certificate. See \fICURLOPT_PROXY_SSL_VERIFYHOST(3)\fP
497 Verify the SSL certificate. See \fICURLOPT_SSL_VERIFYPEER(3)\fP
499 Verify the proxy SSL certificate. See \fICURLOPT_PROXY_SSL_VERIFYPEER(3)\fP
501 Verify the SSL certificate's status. See \fICURLOPT_SSL_VERIFYSTATUS(3)\fP
507 Issuer certificate. See \fICURLOPT_ISSUERCERT(3)\fP
513 Certificate Revocation List. See \fICURLOPT_CRLFILE(3)\fP
515 Proxy Certificate Revocation List. See \fICURLOPT_PROXY_CRLFILE(3)\fP
517 Extract certificate info. See \fICURLOPT_CERTINFO(3)\fP
  /external/curl/docs/libcurl/opts/
CURLOPT_PROXY_SSL_OPTIONS.3 44 \fICURLSSLOPT_NO_REVOKE\fP tells libcurl to disable certificate revocation
CURLOPT_SSL_OPTIONS.3 43 \fICURLSSLOPT_NO_REVOKE\fP tells libcurl to disable certificate revocation
  /external/curl/tests/certs/
EdelCurlRoot-ca.cacert 0 Certificate:
44 Certificate Sign, CRL Sign
63 -----BEGIN CERTIFICATE-----
84 -----END CERTIFICATE-----
EdelCurlRoot-ca.crt 0 Certificate:
44 Certificate Sign, CRL Sign
63 -----BEGIN CERTIFICATE-----
84 -----END CERTIFICATE-----

Completed in 576 milliseconds

<<41424344454647484950>>