HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1626 - 1650 of 2776) sorted by null

<<61626364656667686970>>

  /system/ca-certificates/files/
c907e29b.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
88 X509v3 Certificate Policies:
93 Certificate Sign, CRL Sign
d16a5865.0 1 -----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
36 Certificate:
90 Certificate Sign, CRL Sign
93 X509v3 Certificate Policies:
ea169617.0 1 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
34 Certificate:
91 Digital Signature, Certificate Sign, CRL Sign
94 X509v3 Certificate Policies:
  /tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/
V2SchemeVerifier.java 281 X509Certificate certificate; local
283 certificate =
299 certificate = new GuaranteedEncodedFormX509Certificate(certificate, encodedCert);
300 result.certs.add(certificate);
    [all...]
  /external/curl/docs/
curl.1 328 (HTTPS/FTPS) Provide a file using PEM format with a Certificate Revocation
504 .IP "-E, --cert <certificate[:password]>"
505 (SSL) Tells curl to use the specified client certificate file when getting a
506 file with HTTPS, FTPS or another SSL-based protocol. The certificate must be
509 the terminal. Note that this option assumes a \&"certificate" file that is the
510 private key and the client certificate concatenated! See \fI--cert\fP and
514 curl the nickname of the certificate to use within the NSS database defined
524 certificate string can either be the name of a certificate/private key in the
525 system or user keychain, or the path to a PKCS#12-encoded certificate an
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ChangeLog 90 - support validating server certificate hash
94 - support server certificate probing
106 * added support for external server certificate chain validation
204 * fixed OpenSSL PKCS#12 extra certificate handling
263 * include peer certificate in EAP events even without a separate probe
391 * added support for OCSP stapling to validate AAA server certificate
533 * added support for using OCSP stapling to validate server certificate
538 EAP-TLS) to specify additional constraint for the server certificate
    [all...]
  /external/curl/include/curl/
curl.h 492 CURLE_PEER_FAILED_VERIFICATION, /* 51 - peer's certificate or fingerprint
501 CURLE_SSL_CERTPROBLEM, /* 58 - problem with the local certificate */
551 CURLE_SSL_INVALIDCERTSTATUS, /* 91 - invalid certificate status */
757 /* - NO_REVOKE tells libcurl to disable certificate revocation checks for those
    [all...]
  /external/wpa_supplicant_8/hs20/client/
osu_client.c 196 wpa_printf(MSG_INFO, "PPS for certificate credential - fqdn=%s", fqdn);
203 write_result(ctx, "Invalid client certificate SHA256 hash value in PPS");
211 wpa_printf(MSG_INFO, "Could not find client certificate from EST");
212 write_result(ctx, "Could not find client certificate from EST");
223 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO");
224 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO");
228 wpa_printf(MSG_INFO, "Client certificate from EST matches PPS MO");
303 write_result(ctx, "Invalid SHA256 hash value for downloaded certificate");
309 write_summary(ctx, "Download certificate from %s", url);
331 wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match")
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyStoreTest.java 42 import java.security.cert.Certificate;
75 private static final String ALIAS_CERTIFICATE = "certificate";
80 private static final String ALIAS_ALT_CASE_CERTIFICATE = "cErTiFiCaTe";
192 // RI can't handle certificate in PKCS12, but BC can
374 public static void setCertificate(KeyStore ks, String alias, Certificate certificate)
376 ks.setCertificateEntry(alias, certificate);
417 public static void assertCertificate(Certificate actual)
421 public static void assertCertificate2(Certificate actual)
432 public static void assertCertificateChain(Certificate[] actual
    [all...]
  /development/ndk/platforms/android-21/include/media/
NdkMediaDrm.h 55 * This event type indicates that the app needs to request a certificate from
199 * problem with the device certificate.
262 * server to retrieve a device certificate. If provisionining is required, the
  /external/curl/docs/examples/
curlx.c 9 certificate presented during ssl session establishment.
225 - a private key and certificate
226 - a trusted ca certificate
  /external/curl/docs/libcurl/
libcurl-errors.3 166 The remote server's SSL certificate or SSH md5 fingerprint was deemed not OK.
179 problem with the local client certificate.
183 Peer certificate cannot be authenticated with known CA certificates.
  /external/libcups/cups/
tls-boringssl.c 65 * 'cupsMakeServerCredentials()' - Make a self-signed certificate and private key pair.
90 crtfile[1024], /* Certificate filename */
170 * 'http_gnutls_make_path()' - Format a filename for a certificate or key file.
  /external/libmtp/logs/
mtp-detect-microsoft-kin-1.txt 134 0xd102: Device Certificate
    [all...]
mtp-detect-microsoft-zune-hd.txt 138 0xd102: Device Certificate
    [all...]
mtp-detect-trekstor-vibez.txt 70 0xd102: Device Certificate
    [all...]
  /external/libvncserver/libvncclient/
tls_openssl.c 193 /* calculate the MD5 hash of the raw certificate */
201 /* TODO: Don't just ignore certificate checks
539 /* TODO: validate certificate */
  /external/nanohttpd/
README.md 237 ### generating an self signed ssl certificate
239 Just a hint how to generate a certificate for localhost.
243 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
  /external/nanohttpd/src/site/markdown/
index.md 233 ### generating an self signed ssl certificate
235 Just a hint how to generate a certificate for localhost.
239 This will generate a keystore file named 'keystore.jks' with a self signed certificate for a host named localhost with the ip adress 127.0.0.1 . Now
  /external/openssh/regress/
cert-hostkey.sh 68 # Prepare certificate, plain key and CA KRLs
241 test_one "user-certificate" failure "-n $HOSTS"
282 # Wrong certificate
  /frameworks/av/media/ndk/include/media/
NdkMediaDrm.h 58 * This event type indicates that the app needs to request a certificate from
201 * problem with the device certificate.
264 * server to retrieve a device certificate. If provisionining is required, the
  /frameworks/base/packages/Osu/src/com/android/hotspot2/est/
ESTHandler.java 139 for (X509Certificate certificate : mCACerts) {
140 Log.d(TAG, "CA-Cert: " + certificate.getSubjectX500Principal());
195 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(certBytes));
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Signature2Test.java 36 import java.security.cert.Certificate;
271 * java.security.Signature#initVerify(java.security.cert.Certificate)
287 Signature.getInstance("DSA").initVerify((Certificate) null);
SignatureTest.java 40 import java.security.cert.Certificate;
133 * Class under test for void initVerify(Certificate)
553 private class MyCertificate extends java.security.cert.Certificate {
  /libcore/ojluni/src/main/java/sun/security/x509/
IssuingDistributionPointExtension.java 50 ate and Certificate Revocation List (CRL) Profile</a>.
74 * get, set, delete methods of Certificate, x509 type.
129 * issuer. The responsible authority is indicated by a certificate

Completed in 601 milliseconds

<<61626364656667686970>>