/system/ca-certificates/files/ |
c907e29b.0 | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 34 Certificate: 88 X509v3 Certificate Policies: 93 Certificate Sign, CRL Sign
|
d16a5865.0 | 1 -----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 36 Certificate: 90 Certificate Sign, CRL Sign 93 X509v3 Certificate Policies:
|
ea169617.0 | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 34 Certificate: 91 Digital Signature, Certificate Sign, CRL Sign 94 X509v3 Certificate Policies:
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
V2SchemeVerifier.java | 281 X509Certificate certificate; local 283 certificate = 299 certificate = new GuaranteedEncodedFormX509Certificate(certificate, encodedCert); 300 result.certs.add(certificate); [all...] |
/external/curl/docs/ |
curl.1 | 328 (HTTPS/FTPS) Provide a file using PEM format with a Certificate Revocation 504 .IP "-E, --cert <certificate[:password]>" 505 (SSL) Tells curl to use the specified client certificate file when getting a 506 file with HTTPS, FTPS or another SSL-based protocol. The certificate must be 509 the terminal. Note that this option assumes a \&"certificate" file that is the 510 private key and the client certificate concatenated! See \fI--cert\fP and 514 curl the nickname of the certificate to use within the NSS database defined 524 certificate string can either be the name of a certificate/private key in the 525 system or user keychain, or the path to a PKCS#12-encoded certificate an [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | 90 - support validating server certificate hash 94 - support server certificate probing 106 * added support for external server certificate chain validation 204 * fixed OpenSSL PKCS#12 extra certificate handling 263 * include peer certificate in EAP events even without a separate probe 391 * added support for OCSP stapling to validate AAA server certificate 533 * added support for using OCSP stapling to validate server certificate 538 EAP-TLS) to specify additional constraint for the server certificate [all...] |
/external/curl/include/curl/ |
curl.h | 492 CURLE_PEER_FAILED_VERIFICATION, /* 51 - peer's certificate or fingerprint 501 CURLE_SSL_CERTPROBLEM, /* 58 - problem with the local certificate */ 551 CURLE_SSL_INVALIDCERTSTATUS, /* 91 - invalid certificate status */ 757 /* - NO_REVOKE tells libcurl to disable certificate revocation checks for those [all...] |
/external/wpa_supplicant_8/hs20/client/ |
osu_client.c | 196 wpa_printf(MSG_INFO, "PPS for certificate credential - fqdn=%s", fqdn); 203 write_result(ctx, "Invalid client certificate SHA256 hash value in PPS"); 211 wpa_printf(MSG_INFO, "Could not find client certificate from EST"); 212 write_result(ctx, "Could not find client certificate from EST"); 223 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO"); 224 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO"); 228 wpa_printf(MSG_INFO, "Client certificate from EST matches PPS MO"); 303 write_result(ctx, "Invalid SHA256 hash value for downloaded certificate"); 309 write_summary(ctx, "Download certificate from %s", url); 331 wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match") [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 42 import java.security.cert.Certificate; 75 private static final String ALIAS_CERTIFICATE = "certificate"; 80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe"; 192 // RI can't handle certificate in PKCS12, but BC can 374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate) 376 ks.setCertificateEntry(alias, certificate); 417 public static void assertCertificate(Certificate actual) 421 public static void assertCertificate2(Certificate actual) 432 public static void assertCertificateChain(Certificate[] actual [all...] |
/development/ndk/platforms/android-21/include/media/ |
NdkMediaDrm.h | 55 * This event type indicates that the app needs to request a certificate from 199 * problem with the device certificate. 262 * server to retrieve a device certificate. If provisionining is required, the
|
/external/curl/docs/examples/ |
curlx.c | 9 certificate presented during ssl session establishment. 225 - a private key and certificate 226 - a trusted ca certificate
|
/external/curl/docs/libcurl/ |
libcurl-errors.3 | 166 The remote server's SSL certificate or SSH md5 fingerprint was deemed not OK. 179 problem with the local client certificate. 183 Peer certificate cannot be authenticated with known CA certificates.
|
/external/libcups/cups/ |
tls-boringssl.c | 65 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair. 90 crtfile[1024], /* Certificate filename */ 170 * 'http_gnutls_make_path()' - Format a filename for a certificate or key file.
|
/external/libmtp/logs/ |
mtp-detect-microsoft-kin-1.txt | 134 0xd102: Device Certificate [all...] |
mtp-detect-microsoft-zune-hd.txt | 138 0xd102: Device Certificate [all...] |
mtp-detect-trekstor-vibez.txt | 70 0xd102: Device Certificate [all...] |
/external/libvncserver/libvncclient/ |
tls_openssl.c | 193 /* calculate the MD5 hash of the raw certificate */ 201 /* TODO: Don't just ignore certificate checks 539 /* TODO: validate certificate */
|
/external/nanohttpd/ |
README.md | 237 ### generating an self signed ssl certificate 239 Just a hint how to generate a certificate for localhost. 243 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
|
/external/nanohttpd/src/site/markdown/ |
index.md | 233 ### generating an self signed ssl certificate 235 Just a hint how to generate a certificate for localhost. 239 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
|
/external/openssh/regress/ |
cert-hostkey.sh | 68 # Prepare certificate, plain key and CA KRLs 241 test_one "user-certificate" failure "-n $HOSTS" 282 # Wrong certificate
|
/frameworks/av/media/ndk/include/media/ |
NdkMediaDrm.h | 58 * This event type indicates that the app needs to request a certificate from 201 * problem with the device certificate. 264 * server to retrieve a device certificate. If provisionining is required, the
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/est/ |
ESTHandler.java | 139 for (X509Certificate certificate : mCACerts) { 140 Log.d(TAG, "CA-Cert: " + certificate.getSubjectX500Principal()); 195 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(certBytes));
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Signature2Test.java | 36 import java.security.cert.Certificate; 271 * java.security.Signature#initVerify(java.security.cert.Certificate) 287 Signature.getInstance("DSA").initVerify((Certificate) null);
|
SignatureTest.java | 40 import java.security.cert.Certificate; 133 * Class under test for void initVerify(Certificate) 553 private class MyCertificate extends java.security.cert.Certificate {
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
IssuingDistributionPointExtension.java | 50 ate and Certificate Revocation List (CRL) Profile</a>. 74 * get, set, delete methods of Certificate, x509 type. 129 * issuer. The responsible authority is indicated by a certificate
|