OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
751 - 775
of
2776
) sorted by null
<<
31
32
33
34
35
36
37
38
39
40
>>
/external/libmtp/logs/
mtp-detect-sirius-stiletto2.txt
73
0xd102: Device
Certificate
216
Device
Certificate
:
217
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID
219
private="1">Ef9gt/+M0PMXJhpYgK6HoJ/20DyJ/HHAG3d64+pxiMmNCwf9Oj2EOA==</PUBLICKEY><KEYDATA>WuK3oQPAqaefrnCMi/6xIfsrcuo=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>c8IXWmqRilDx0XHV8xKXHFaUdW6BNbmppKK7xL+dftzGBt6g8WgFfQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>jnjYEjB5UV2Ry6EI+HoPIE0uBAo=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.108.89</SECURITYVERSION><
CERTIFICATE
220
private="1">Ef9gt/+M0PMXJhpYgK6HoJ/20DyJ/HHAG3d64+pxiMmNCwf9Oj2EOAIEbFl5weGVKFKBvp4iKwg8QrkeOjg9RojVO5aRxVDDAKMONn+VDb/svCcF</
CERTIFICATE
></FALLBACK><
CERTIFICATE
250
</LIMITS><PUBLICKEY>lC3XoSJVphgaNIcvbTOf56btAIm1RNkvSUutdWiXXvx1FStZEj/MKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>CfZATKRGLAZ4NTqQWYwCmiYMmBKrdwldaOcLfl0Zg+Vq8esSdYQkFQ==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
251
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1981</AUTH_ID><PUBLICKEY>btGasWaE7LqohJ2zfck00MzmG0/uy+56ploHWJnDmuFrZzn9oOswbw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>pNebugeKuigfNG74TRE5Zcs+bz9NvDCn5O8LxS3S24xaC4U4E86nBA==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICAT
[
all
...]
mtp-detect-thomson-rcah106.txt
84
0xd102: Device
Certificate
275
Device
Certificate
:
276
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">MLgAAAAAAAAAAAAAAAAAAAAAAAA=</UNIQUEID><PUBLICKEY private="1">/xk1FRLtUFQtLumioB3hnjjmCCStWRtCZ+OUINvN4wRjglPz1DTagw==</PUBLICKEY><KEYDATA>KkFgl/xxIQnFTSasJdjDCCv/P24=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>LD33X8FUDo00JUcw8aIxaslZOU1gwe23tnsDKRZCKxdEiLkZ6MqtRA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>lcs/XXhRSo4LmZvRM9Ng82/uNEA=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.103.93</SECURITYVERSION><
CERTIFICATE
private="1">/xk1FRLtUFQtLumioB3hnjjmCCStWRtCZ+OUINvN4wRjglPz1DTagwIEZ12zLMYIU+hJu3l1M4RYq3Wm7dvKElLPBtkNiU7D3DEFkb5rubXCF6sQ</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>H106</NAME>
301
</LIMITS><PUBLICKEY>eWGqaKD/rEgPNu6GrH4E4KOVmDLU3uH7S0yZJ6AhJCUwYZKiVI3JdQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>bNMpmF0aj44IYQDYnnbcURRgzU1rIlAlL9jNNOzJ0FtEHXngXg2fDw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>705</AUTH_ID><PUBLICKEY>0xGAyvWRMSN9LFmWL0S9WztdgXzTo5nwPQENDz2q6lJ4SPILToOvGQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>YjzR0s45M5rz4YiE8fZjo/rhVHGlVtsW5re00vPgGJS3dc1e3bpHcA==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
mtp-detect-trekstor-ibeat-sweez-fm.txt
63
0xd102: Device
Certificate
207
Device
Certificate
:
208
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">MDA0MDMwNjAwMDAwMDAwMDI0NTM=</UNIQUEID><PUBLICKEY private="1">H6xGkVu18CH1v3lGLZhg3CweLg5J9xcylHtvIfl93gvb598H3/nlZw==</PUBLICKEY><KEYDATA>VA+dyX2u0b9IRnjqQ/runjdCdSM=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>hZlIjGetjQoATRec1FGjMR7UGAmIpvLu8KHU76uwdY76ACnEn377Zg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>FPliQA8qBOXr2yodiMFZrkKUiH4=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.102.207</SECURITYVERSION><
CERTIFICATE
private="1">H6xGkVu18CH1v3lGLZhg3CweLg5J9xcylHtvIfl93gvb598H3/nlZwIEZs9t5iPaik/F07xZZei5SMOZfwC5bJA4oO40hI87xErcvjaiaFsQMvhj</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>MTP Player</NAME><MANUFACTURER>Corp.</MANUFACTURER><MAKE>Corp.</MAKE><DESTRIBUTOR>Corp.</DESTRIBUTOR><MODEL>M</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><TEMPLATE>0</TEMPLATE><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>yUtoiSoR3tOOYBKTaBj5l85u5YWA6Rn5AhKcdpxBtx4upnq4IIwfKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>qD4E29L/HI5ATLe7WEY9fBRmu09Wd1kK30ycYGdOt6rSrTE/nwHIYg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>563</AUTH_ID><PUBLICKEY>9JYeS4F89sMRFfIRMl0pjW2R91N6uMQaAU8+y+vgpk/jwYfefh8bJg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>mamgYHOs28hXiXYisA90WGHDGxaWfdBOg2dQw9nQee/DXbrohTRgJw==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
mtp-detect-creative-zen-V-plus.txt
82
0xd102: Device
Certificate
337
Device
Certificate
:
338
<DEVCERT version="1.0"><
CERTIFICATE
type="DEVICE"><DATA><UNIQUEID private="1">GIycxp36AgBP9p/GnfoCAAAAAAA=</UNIQUEID><PUBLICKEY private="1">uacrz8cfvmxT5HP4f6gXC21JnC6Un6l0qz1nSojtlfhDqlSvygmmSA==</PUBLICKEY><KEYDATA>ykYrz0s9Ggnh305LB+YlKuMxJx4=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>c5O+3ktOUyHhdR9uxBiJGjJNtBplqpo8IRCpVHX2rV7M0Yca4bb0Nw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>qsijKfmekVQKZZz+HCff802Mm3E=</SYMSIGNATURE></
CERTIFICATE
><FALLBACK><SECURITYVERSION>2.4.104.185</SECURITYVERSION><
CERTIFICATE
private="1">uacrz8cfvmxT5HP4f6gXC21JnC6Un6l0qz1nSojtlfhDqlSvygmmSAIEaLlw4Nr6rteI3w6kM+QTge1i95SzRgtiFiG5qQOx4M/Cdgf9RGNLhp8i</
CERTIFICATE
></FALLBACK><
CERTIFICATE
type="GROUP"><DATA><NAME>Creative Zen V Plus</NAME>
362
</LIMITS><PUBLICKEY>SSm10tOG7n2E+lBUEwdKnZfQQEfPcuxO4YXDzx9dAwbU5nUer5vMbQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>cVDd1wa6+5HzUpvZb7bsqGKbiWXlKrihJW90lAYA1EUlOgz33MzwIQ==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><
CERTIFICATE
type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1053</AUTH_ID><PUBLICKEY>aPD+vFB8wJZiyyqhYeYgGIxpZk29uo/JJPSgqJiTwzfeOXY+qlyrFQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>SywdNwotVIaw6M7gJSL73CqQcjV+ZPTHjMhFvFeHSqqRx3SRzAquJg==</MSDRM_SIGNATURE_VALUE></
CERTIFICATE
><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
[
all
...]
/external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.cc
99
LOG(LS_ERROR) << "Cannot create identity digest with no
certificate
";
105
// the
certificate
's signature.
109
LOG(LS_ERROR) << "Failed to retrieve the
certificate
's digest algorithm";
dtlstransport.h
34
const rtc::scoped_refptr<rtc::RTCCertificate>&
certificate
)
36
certificate_(
certificate
),
45
const rtc::scoped_refptr<rtc::RTCCertificate>&
certificate
) override {
46
certificate_ =
certificate
;
49
rtc::scoped_refptr<rtc::RTCCertificate>*
certificate
) override {
53
*
certificate
= certificate_;
/external/wpa_supplicant_8/src/tls/
x509v3.h
2
* X.509v3
certificate
parsing and processing
102
* The DER format
certificate
follows struct x509_certificate. These
110
/* Meta data used for
certificate
validation */
tlsv1_client_read.c
367
wpa_printf(MSG_DEBUG, "TLSv1: Too short
Certificate
message "
379
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected
Certificate
message "
397
"message %d (expected
Certificate
/"
406
"TLSv1: Received
Certificate
(certificate_list len %lu)",
414
* }
Certificate
;
420
wpa_printf(MSG_DEBUG, "TLSv1: Too short
Certificate
"
453
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected
certificate
"
463
wpa_printf(MSG_DEBUG, "TLSv1:
Certificate
%lu (len %lu)",
471
"the
certificate
");
482
"the
certificate
");
[
all
...]
/frameworks/base/core/java/android/security/net/config/
ResourceCertificateSource.java
23
import java.security.cert.
Certificate
;
56
Collection<? extends
Certificate
> certs;
69
for (
Certificate
cert : certs) {
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/commands/
ClientCertInfo.java
12
<xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client
certificate
of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation>
21
<xsd:documentation>The issuer name of an acceptable provider-issued
certificate
. The text of this element is formatted in accordance with the Issuer Name field in RFC-3280. This element is present only when acceptProviderCerts is true.</xsd:documentation>
51
* The issuer name of an acceptable provider-issued
certificate
.
/frameworks/base/services/core/java/com/android/server/
CertBlacklister.java
35
*
certificate
public keys and serial numbers.
82
Slog.i(TAG, "
Certificate
blacklist changed, updating...");
96
Slog.i(TAG, "
Certificate
blacklist updated");
/libcore/luni/src/test/java/tests/targets/security/cert/
CertificateTest.java
27
import java.security.cert.
Certificate
;
41
* Following
certificate
chain was taken from https://www.verisign.com and
42
* uses MD2withRSA for the root
certificate
. This chain stops validating
47
* A selfsigned
certificate
using MD2withRSA
50
*
Certificate
:
87
"-----BEGIN
CERTIFICATE
-----\n"
100
+ "-----END
CERTIFICATE
-----\n";
103
* A
certificate
signed by selfSignedCertMD2
106
*
Certificate
:
146
*
Certificate
Sign, CRL Sig
597
Certificate
certificate
=
certificate
Factory
local
610
Certificate
certificate
=
certificate
Factory
local
[
all
...]
/libcore/ojluni/src/main/java/java/security/cert/
CertificateParsingException.java
29
*
Certificate
Parsing Exception. This is thrown whenever an
30
* invalid DER-encoded
certificate
is parsed or unsupported DER features
31
* are found in the
Certificate
.
/libcore/ojluni/src/main/java/sun/security/util/
AnchorCertificates.java
85
* Checks if a
certificate
is a trust anchor.
87
* @param cert the
certificate
to check
88
* @return true if the
certificate
is trusted.
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/
KeyStoreTestSupport.java
28
import java.security.cert.
Certificate
;
116
* Additional class to create
Certificate
and Key objects
118
public static class MCertificate extends
Certificate
{
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertificateFactorySpi.java
30
import java.security.cert.
Certificate
;
66
public
Certificate
engineGenerateCertificate(InputStream inStream)
124
public CertPath engineGenerateCertPath(List<? extends
Certificate
> certificates) {
/packages/apps/Email/src/com/android/email/view/
CertificateSelector.java
37
* A simple view that can be used to select a
certificate
from the system {@link KeyChain}.
43
/** Button to select or remove the
certificate
. */
102
* Gets the alias for the currently selected
certificate
, or null if one is not selected.
/prebuilts/gdb/darwin-x86/lib/python2.7/
ssl.py
17
cert_time_to_seconds -- convert time string used for
certificate
22
fetch_server_certificate (HOST, PORT) -- fetch the
certificate
provided
24
validation of the
certificate
is performed.
39
The following group define
certificate
requirements that one side is
177
certificate
provided by the other end of the SSL channel.
178
Return None if no
certificate
was provided, {} if a
179
certificate
was provided, but not validated."""
401
PEM_HEADER = "-----BEGIN
CERTIFICATE
-----"
402
PEM_FOOTER = "-----END
CERTIFICATE
-----"
406
"""Takes a
certificate
in binary DER format and returns th
[
all
...]
/prebuilts/gdb/linux-x86/lib/python2.7/
ssl.py
17
cert_time_to_seconds -- convert time string used for
certificate
22
fetch_server_certificate (HOST, PORT) -- fetch the
certificate
provided
24
validation of the
certificate
is performed.
39
The following group define
certificate
requirements that one side is
177
certificate
provided by the other end of the SSL channel.
178
Return None if no
certificate
was provided, {} if a
179
certificate
was provided, but not validated."""
401
PEM_HEADER = "-----BEGIN
CERTIFICATE
-----"
402
PEM_FOOTER = "-----END
CERTIFICATE
-----"
406
"""Takes a
certificate
in binary DER format and returns th
[
all
...]
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py
17
cert_time_to_seconds -- convert time string used for
certificate
22
fetch_server_certificate (HOST, PORT) -- fetch the
certificate
provided
24
validation of the
certificate
is performed.
39
The following group define
certificate
requirements that one side is
177
certificate
provided by the other end of the SSL channel.
178
Return None if no
certificate
was provided, {} if a
179
certificate
was provided, but not validated."""
401
PEM_HEADER = "-----BEGIN
CERTIFICATE
-----"
402
PEM_FOOTER = "-----END
CERTIFICATE
-----"
406
"""Takes a
certificate
in binary DER format and returns th
[
all
...]
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py
17
cert_time_to_seconds -- convert time string used for
certificate
22
fetch_server_certificate (HOST, PORT) -- fetch the
certificate
provided
24
validation of the
certificate
is performed.
39
The following group define
certificate
requirements that one side is
177
certificate
provided by the other end of the SSL channel.
178
Return None if no
certificate
was provided, {} if a
179
certificate
was provided, but not validated."""
401
PEM_HEADER = "-----BEGIN
CERTIFICATE
-----"
402
PEM_FOOTER = "-----END
CERTIFICATE
-----"
406
"""Takes a
certificate
in binary DER format and returns th
[
all
...]
/tools/apksig/src/test/java/com/android/apksig/internal/util/
Resources.java
24
import java.security.cert.
Certificate
;
63
Collection<? extends
Certificate
> certs;
71
for (
Certificate
cert : certs) {
/bootable/recovery/tests/component/
verifier_test.cpp
54
std::vector<
Certificate
> certs;
73
std::vector<
Certificate
> certs;
79
std::vector<
Certificate
> certs;
125
std::vector<
Certificate
> certs;
144
std::vector<
Certificate
> certs;
171
std::vector<
Certificate
> certs;
/external/conscrypt/common/src/main/java/org/conscrypt/
ActiveSession.java
22
import java.security.cert.
Certificate
;
129
* Returns the signed
certificate
timestamp (SCT) received from the peer. Returns a
220
public
Certificate
[] getLocalCertificates() {
225
* Returns the
certificate
(s) of the peer in this SSL session
231
*
certificate
were used during the SSL connection.
232
* @throws SSLPeerUnverifiedException if either a non-X.509
certificate
/external/wpa_supplicant_8/hs20/server/www/
est.php
131
error_log("EST: simpleenroll - Failed to parse
certificate
request");
132
die("Failed to parse
certificate
request");
141
error_log("EST: simpleenroll - Failed to sign
certificate
");
142
die("Failed to sign
certificate
");
165
error_log("EST: simpleenroll - Failed to convert
certificate
");
166
die("Failed to convert
certificate
");
Completed in 1284 milliseconds
<<
31
32
33
34
35
36
37
38
39
40
>>