HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1401 - 1425 of 2776) sorted by null

<<51525354555657585960>>

  /external/libmtp/logs/
mtp-detect-samsung-gt-s5230w.txt 101 0xd102: Device Certificate
133 Unable to acquire device certificate, perhaps this device does not support this
mtp-detect-samsung-sgh-u900.txt 108 0xd102: Device Certificate
144 Unable to acquire device certificate, perhaps this device does not support this
mtp-detect-slacker-pmp.txt 107 0xd102: Device Certificate
157 Unable to acquire device certificate, perhaps this device does not support
mtp-detect-sonyericsson-w890i.txt 89 0xd102: Device Certificate
154 Unable to acquire device certificate, perhaps this device does not support this
mtp-detect-thomson-m51.txt 87 0xd102: Device Certificate
138 Unable to acquire device certificate, perhaps this device does not support
mtp-detect-toshiba-gigabeat-v30.txt 88 0xd102: Device Certificate
135 Unable to acquire device certificate, perhaps this device does not support this
mtp-detect-creative-zen-x-fi.txt 97 0xd102: Device Certificate
153 Unable to acquire device certificate, perhaps this device
255 0xd102: Device Certificate
623 Device Certificate:
624 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">AQAIM5eLIA8h1AIAlwsJZQAAAAA=</UNIQUEID><PUBLICKEY private="1">qJvS95Ld8fjliLVYU7YoYBmJEWOI7UW+K4WFUQOXY16+uD1yOLU8dA==</PUBLICKEY><KEYDATA>ihbm/JN0v04ZByTL+d01fU86zcY=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>3bz/jgaemb2VD3Y+RUUXzH6ARAUQ1IDH/jX3t9FP1J5FPhzkQPWoAw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>ml/HpvSOmykMcFa9/afdTTrC3gA=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.108.193</SECURITYVERSION><CERTIFICATE private="1">qJvS95Ld8fjliLVYU7YoYBmJEWOI7UW+K4WFUQOXY16+uD1yOLU8dAIEbMFdxDP2F6TwEgUVpRLE4fbmJEZXKDFw+kDaNQbjnmr8gaIgDfoimp8A</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>Creative ZEN</NAME>
    [all...]
  /external/okhttp/android/main/java/com/squareup/okhttp/internal/
Platform.java 155 * OkHttp 2.7.5 uses this only for certificate pinning logic that we don't use
172 * to pass. OkHttp 2.7.5 uses this for certificate pinning logic which is unused
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Address.java 33 * SSL socket factory, hostname verifier, and certificate pinner.
167 /** Returns this address's certificate pinner, or null if this is not an HTTPS address. */
Cache.java 30 import java.security.cert.Certificate;
520 * is the length of the peer certificate chain. These certificates are
522 * contains the length of the local certificate chain. These
555 List<Certificate> peerCertificates = readCertificateList(source);
556 List<Certificate> localCertificates = readCertificateList(source);
618 private List<Certificate> readCertificateList(BufferedSource source) throws IOException {
624 List<Certificate> result = new ArrayList<>(length);
637 private void writeCertList(BufferedSink sink, List<Certificate> certificates)
  /external/openssh/regress/
limit-keytype.sh 16 # Make some keys and a certificate.
61 # Allow plain Ed25519 and RSA. The certificate should fail.
  /frameworks/av/drm/mediadrm/plugins/clearkey/
DrmPlugin.h 100 Vector<uint8_t>& certificate,
102 UNUSED(certificate);
  /frameworks/base/core/java/android/security/net/config/
DirectoryCertificateSource.java 29 import java.security.cert.Certificate;
205 Log.e(LOG_TAG, "Failed to read certificate from " + file, e);
  /frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/
ConfigParserTest.java 42 * CA (Certificate Authority) X.509 certificate {@link FakeKeys#CA_CERT0}.
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
PasspointManager.java 239 // For Hotspot 2.0 Release 1, the CA Certificate must be trusted by one of the pre-loaded
249 Log.e(TAG, "Failed to verify CA certificate: " + e.getMessage());
613 Log.e(TAG, "Missing CA Certificate for user credential");
618 Log.e(TAG, "Missing CA certificate for Certificate credential");
622 Log.e(TAG, "Missing client certificate and key for certificate credential");
628 // alias for the client certificate.
  /frameworks/support/compat/java/android/support/v4/provider/
FontRequest.java 113 * Returns the list of certificate sets given for this provider. This helps the system verify
125 * Returns the array resource id pointing to the certificate sets given for this provider. This
  /libcore/luni/src/test/java/libcore/java/util/zip/
OldAndroidZipStressTest.java 22 import java.security.cert.Certificate;
50 Certificate[] certs = je != null ? je.getCertificates() : null;
  /libcore/luni/src/test/java/tests/security/cert/
CertPathTest.java 57 * Assertion: returns hash of the <code>Certificate</code> instance
77 * Assertion: returns hash of the <code>Certificate</code> instance
  /libcore/ojluni/src/main/java/java/security/cert/
X509CRLSelector.java 43 * of a particular certificate.
56 * Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a>
440 * Sets the certificate being checked. This is not a criterion. Rather,
443 * specified certificate. If {@code null} is specified, then no
549 * Returns the certificate being checked. This is not a criterion. Rather,
552 * specified certificate. If the value returned is {@code null}, then
555 * @return the certificate being checked (or {@code null})
584 sb.append(" Certificate being checked: " + certChecking + "\n");
  /libcore/ojluni/src/main/java/sun/security/pkcs/
SigningCertificateInfo.java 38 * This class represents a signing certificate attribute.
56 * Hash ::= OCTET STRING -- SHA1 hash of entire certificate
  /libcore/ojluni/src/main/java/sun/security/x509/
ReasonFlags.java 39 * the reason for the certificate revocation.
224 sb.append(" Certificate Hold\n");
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestTrustManager.java 203 * Returns the list of certificate issuer authorities which are trusted for
206 * @return the list of certificate issuer authorities which are trusted for
  /packages/apps/Email/src/com/android/email/activity/setup/
CheckSettingsErrorDialogFragment.java 44 * Called to indicate the user wants to resolve the error by changing the client certificate
92 // Certificate error - show two buttons so the host fragment can auto pop
  /system/security/keystore/
keystore_attestation_id.cpp 181 /** Apps can only share a uid iff they were signed with the same certificate(s). Because the
182 * signature field actually holds the signing certificate, rather than a signature, we can
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 114 * ca_cert - CA certificate for Interworking network selection
119 * client_cert - File path to client certificate file (PEM/DER)
122 * where client certificate/private key is used for authentication
135 * commented out. Both the private key and certificate will be read
140 * Windows certificate store can be used by leaving client_cert out and
150 * certificate store (My user account) is used, whereas computer store
178 * server certificate in SubjectAltName dNSName element(s). If a
184 * included in the certificate. The certificate may include additional
301 * ocsp - Whether to use/require OCSP to check server certificate
    [all...]

Completed in 421 milliseconds

<<51525354555657585960>>