Searched
full:certificate (Results
1226 -
1250 of
2776) sorted by null
<<41424344454647484950>>
/libcore/ojluni/src/main/java/sun/security/x509/ |
InhibitAnyPolicyExtension.java | 43 * match for other certificate policies. The value indicates the number 47 * ject of this certificate, but not in additional certificates in the 71 * get, set, delete methods of Certificate, x509 type.
|
PolicyConstraintsExtension.java | 37 * This class defines the certificate extension which specifies the 43 * that each certificate in a path contain an acceptable policy 63 * get, set, delete methods of Certificate, x509 type.
|
/packages/apps/CertInstaller/res/values-ro/ |
strings.xml | 28 <string name="p12_description" msgid="4128352087331630024">"Certificate în depozitul de chei PKCS12."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d certificate CA"</string> 49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Numai proprietarul acestui dispozitiv poate instala certificate."</string>
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainTestActivity.java | 227 "My Test Certificate"); 252 log("Null certificate chain!"); 256 log("certificate[" + i + "]=" + certificateChain[i]);
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
ApkSignerTool.java | 47 import java.security.cert.Certificate; 193 signerParams.certFile = optionsParser.getRequiredValue("Certificate file"); 461 "Signer #" + signerNumber + " certificate DN" 465 "Signer #" + signerNumber + " certificate SHA-256 digest: " 468 "Signer #" + signerNumber + " certificate SHA-1 digest: " 471 "Signer #" + signerNumber + " certificate MD5 digest: " 485 // DSA parameters may be inherited from the certificate. We [all...] |
/compatibility/cdd/9_security-model/ |
9_4_alternate-execution-environments.md | 22 the standard Android mechanisms of shared user ID and signing certificate.
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
AppSecurityTests.java | 120 * if it is signed with a different certificate. 148 * certificate. 234 * Test that an app cannot instrument another app that is signed with different certificate. 267 * certificate than the app that declared the permission.
|
/cts/hostsidetests/os/test-apps/StaticSharedLibConsumerApp3/ |
AndroidManifest.xml | 28 <additional-certificate android:certDigest="E4:95:82:FF:3A:0A:A4:C5:58:9F:C5:FE:AA:C6:B7:D6:E7:57:19:9D:D0:C6:74:2D:F7:BF:37:C2:FF:EF:95:F5"/>
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyPairGeneratorTest.java | 41 import java.security.cert.Certificate; [all...] |
/development/samples/browseable/WatchFace/Application/res/values/ |
base-strings.xml | 40 certificate from your signed APK. More details can be found [here][2].
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/ |
PeiCryptLib.inf | 12 # certificate handler functions, authenticode signature verification functions,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeImageVerificationLib/ |
DxeImageVerificationLib.inf | 95 gEfiCertPkcs7Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the certificate.
|
/docs/source.android.com/en/devices/tech/config/ |
carrier.html | 47 certificate that has a matching signature to one on the SIM. See the <a 108 <p>The Carrier App in question must be signed with the same certificate found on 222 <h3 id=sign_app_with_same_certificate_on_sim>Sign app with same certificate on SIM</h3> 232 <li>A SIM containing a valid certificate signature
|
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_ProviderJCE.java | 83 // Certificate
|
Support_ProviderRSA.java | 89 // Certificate
|
Support_ProviderTrust.java | 83 // Certificate
|
/external/avb/libavb_atx/ |
avb_atx_validate.h | 63 * the subject of the PSK certificate.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
AttributeCertificateIssuer.java | 15 * Carrying class for an attribute certificate issuer.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 17 import java.security.cert.Certificate; 79 private org.bouncycastle.asn1.x509.Certificate c; 88 org.bouncycastle.asn1.x509.Certificate c) 147 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 152 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 602 if (!(o instanceof Certificate)) 607 Certificate other = (Certificate)o; 849 throw new SignatureException("certificate does not verify with supplied key");
|
/external/curl/docs/examples/ |
sessioninfo.c | 66 fprintf(stderr, "Certificate #%d: %.*s", i, dn.size, dn.data);
|
/external/curl/docs/libcurl/ |
curl_easy_setopt.3 | 493 Verify the host name in the SSL certificate. See \fICURLOPT_SSL_VERIFYHOST(3)\fP 495 Verify the host name in the proxy SSL certificate. See \fICURLOPT_PROXY_SSL_VERIFYHOST(3)\fP 497 Verify the SSL certificate. See \fICURLOPT_SSL_VERIFYPEER(3)\fP 499 Verify the proxy SSL certificate. See \fICURLOPT_PROXY_SSL_VERIFYPEER(3)\fP 501 Verify the SSL certificate's status. See \fICURLOPT_SSL_VERIFYSTATUS(3)\fP 507 Issuer certificate. See \fICURLOPT_ISSUERCERT(3)\fP 513 Certificate Revocation List. See \fICURLOPT_CRLFILE(3)\fP 515 Proxy Certificate Revocation List. See \fICURLOPT_PROXY_CRLFILE(3)\fP 517 Extract certificate info. See \fICURLOPT_CERTINFO(3)\fP
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_PROXY_SSL_OPTIONS.3 | 44 \fICURLSSLOPT_NO_REVOKE\fP tells libcurl to disable certificate revocation
|
CURLOPT_SSL_OPTIONS.3 | 43 \fICURLSSLOPT_NO_REVOKE\fP tells libcurl to disable certificate revocation
|
/external/curl/tests/certs/ |
EdelCurlRoot-ca.cacert | 0 Certificate: 44 Certificate Sign, CRL Sign 63 -----BEGIN CERTIFICATE----- 84 -----END CERTIFICATE-----
|
EdelCurlRoot-ca.crt | 0 Certificate: 44 Certificate Sign, CRL Sign 63 -----BEGIN CERTIFICATE----- 84 -----END CERTIFICATE-----
|
Completed in 576 milliseconds
<<41424344454647484950>>