OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
1926 - 1950
of
2776
) sorted by null
<<
71
72
73
74
75
76
77
78
79
80
>>
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
WifiConfigurationUtilTest.java
117
* Verify WifiEnterpriseConfig added
Certificate
is detected.
135
* Verify WifiEnterpriseConfig
Certificate
change is detected.
154
* Verify WifiEnterpriseConfig added
Certificate
changes are detected.
/libcore/ojluni/src/main/java/java/util/jar/
JarFile.java
36
import java.security.cert.
Certificate
;
58
*
certificate
. A caller should inspect the return value of
288
public
Certificate
[] getCertificates() {
/packages/apps/Settings/res/values-ro/
arrays.xml
421
<item msgid="4725504331295252103">"L2TP/IPSec VPN cu
certificate
"</item>
423
<item msgid="8064740940687465039">"IPSec VPN cu
certificate
?i autentificare Xauth"</item>
424
<item msgid="4946199982372391490">"IPSec VPN cu
certificate
?i autentificare hibrid?"</item>
/packages/apps/Settings/res/values-tl/
arrays.xml
421
<item msgid="4725504331295252103">"L2TP/IPSec VPN na may mga
certificate
"</item>
423
<item msgid="8064740940687465039">"IPSec VPN na may mga
certificate
at pagpapatotoo ng Xauth"</item>
424
<item msgid="4946199982372391490">"IPSec VPN na may mga
certificate
at hybrid na pagpapatotoo"</item>
/prebuilts/go/darwin-x86/src/net/smtp/
smtp_test.go
694
config := &tls.Config{Certificates: []tls.
Certificate
{keypair}}
758
var localhostCert = []byte(`-----BEGIN
CERTIFICATE
-----
768
-----END
CERTIFICATE
-----`)
/prebuilts/go/linux-x86/src/net/smtp/
smtp_test.go
694
config := &tls.Config{Certificates: []tls.
Certificate
{keypair}}
758
var localhostCert = []byte(`-----BEGIN
CERTIFICATE
-----
768
-----END
CERTIFICATE
-----`)
/system/ca-certificates/files/
1dcd6f4c.0
1
-----BEGIN
CERTIFICATE
-----
32
-----END
CERTIFICATE
-----
33
Certificate
:
9d6523ce.0
1
-----BEGIN
CERTIFICATE
-----
33
-----END
CERTIFICATE
-----
34
Certificate
:
/tools/apksig/src/main/java/com/android/apksig/
DefaultApkSignerEngine.java
815
* Returns the
certificate
(s) of this signer. The first
certificate
's public key corresponds
[
all
...]
/prebuilts/tools/common/m2/repository/io/netty/netty-handler/4.1.6.Final/
netty-handler-4.1.6.Final.jar
/build/make/tools/signapk/src/com/android/signapk/
SignApk.java
93
* algorithm specified in the
certificate
and always used SHA1withRSA.
96
* the signature algorithm in the
certificate
to select which to use
99
* Because there are old keys still in use whose
certificate
actually
135
*
certificate
.
152
* update package using the private key corresponding to the provided
certificate
and the
[
all
...]
/external/curl/docs/
TheArtOfHttpScripting
616
need to enter before the
certificate
can be used by curl. The pass phrase
618
curl queries for it. Use a
certificate
with curl on a HTTPS server like:
623
verifying the server's
certificate
against a locally stored CA cert
628
More about server
certificate
verification and ca cert bundles can be read
634
curl to use that to verify the server's
certificate
:
/external/okhttp/
CHANGELOG.md
8
* Fix: Change the
certificate
pinner to always build full chains. This
9
prevents a potential crash when using
certificate
pinning with the Google
231
certificate
pinning, you must be very careful to avoid [bricking][brick]
446
* **New APIs to permit easy
certificate
pinning.** Be warned,
certificate
[
all
...]
/packages/apps/Settings/src/com/android/settings/wifi/
WifiConfigController.java
448
// Disallow submit if the user has not selected a CA
certificate
for an EAP network
465
// Disallow submit if the user has not selected a user
certificate
for an EAP network
488
// user-supplied CA
certificate
in an EAP network configuration.
626
// the use either their own
certificate
, or the system certificates, not both.
[
all
...]
/external/wpa_supplicant_8/hostapd/
hostapd.conf
[
all
...]
/external/wpa_supplicant_8/hs20/server/
spp_server.c
739
debug_print(ctx, 1, "
Certificate
credential - no need for DB "
[
all
...]
/external/wpa_supplicant_8/wpa_supplicant/
README
102
- X.509
certificate
processing
659
EAP-TTLS only require the server side
certificate
. When client
660
certificate
is used, a matching private key file has to also be
665
formats. User
certificate
and private key can be included in the same
668
If the user
certificate
and private key is received in PKCS#12/PFX
672
# convert client
certificate
and private key to PEM format
674
# convert CA
certificate
(if included in PFX file) to PEM format
[
all
...]
/prebuilts/tools/common/m2/repository/com/squareup/okhttp/okhttp-urlconnection/2.7.4/
okhttp-urlconnection-2.7.4.jar
/prebuilts/go/darwin-x86/pkg/darwin_amd64/net/http/
httptest.a
104
&