HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 751 - 775 of 2776) sorted by null

<<31323334353637383940>>

  /external/libmtp/logs/
mtp-detect-sirius-stiletto2.txt 73 0xd102: Device Certificate
216 Device Certificate:
217 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID
219 private="1">Ef9gt/+M0PMXJhpYgK6HoJ/20DyJ/HHAG3d64+pxiMmNCwf9Oj2EOA==</PUBLICKEY><KEYDATA>WuK3oQPAqaefrnCMi/6xIfsrcuo=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>c8IXWmqRilDx0XHV8xKXHFaUdW6BNbmppKK7xL+dftzGBt6g8WgFfQ==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>jnjYEjB5UV2Ry6EI+HoPIE0uBAo=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.108.89</SECURITYVERSION><CERTIFICATE
220 private="1">Ef9gt/+M0PMXJhpYgK6HoJ/20DyJ/HHAG3d64+pxiMmNCwf9Oj2EOAIEbFl5weGVKFKBvp4iKwg8QrkeOjg9RojVO5aRxVDDAKMONn+VDb/svCcF</CERTIFICATE></FALLBACK><CERTIFICATE
250 </LIMITS><PUBLICKEY>lC3XoSJVphgaNIcvbTOf56btAIm1RNkvSUutdWiXXvx1FStZEj/MKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>CfZATKRGLAZ4NTqQWYwCmiYMmBKrdwldaOcLfl0Zg+Vq8esSdYQkFQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE
251 type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1981</AUTH_ID><PUBLICKEY>btGasWaE7LqohJ2zfck00MzmG0/uy+56ploHWJnDmuFrZzn9oOswbw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>pNebugeKuigfNG74TRE5Zcs+bz9NvDCn5O8LxS3S24xaC4U4E86nBA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICAT
    [all...]
mtp-detect-thomson-rcah106.txt 84 0xd102: Device Certificate
275 Device Certificate:
276 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">MLgAAAAAAAAAAAAAAAAAAAAAAAA=</UNIQUEID><PUBLICKEY private="1">/xk1FRLtUFQtLumioB3hnjjmCCStWRtCZ+OUINvN4wRjglPz1DTagw==</PUBLICKEY><KEYDATA>KkFgl/xxIQnFTSasJdjDCCv/P24=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>LD33X8FUDo00JUcw8aIxaslZOU1gwe23tnsDKRZCKxdEiLkZ6MqtRA==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>lcs/XXhRSo4LmZvRM9Ng82/uNEA=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.103.93</SECURITYVERSION><CERTIFICATE private="1">/xk1FRLtUFQtLumioB3hnjjmCCStWRtCZ+OUINvN4wRjglPz1DTagwIEZ12zLMYIU+hJu3l1M4RYq3Wm7dvKElLPBtkNiU7D3DEFkb5rubXCF6sQ</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>H106</NAME>
301 </LIMITS><PUBLICKEY>eWGqaKD/rEgPNu6GrH4E4KOVmDLU3uH7S0yZJ6AhJCUwYZKiVI3JdQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>bNMpmF0aj44IYQDYnnbcURRgzU1rIlAlL9jNNOzJ0FtEHXngXg2fDw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>705</AUTH_ID><PUBLICKEY>0xGAyvWRMSN9LFmWL0S9WztdgXzTo5nwPQENDz2q6lJ4SPILToOvGQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>YjzR0s45M5rz4YiE8fZjo/rhVHGlVtsW5re00vPgGJS3dc1e3bpHcA==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-trekstor-ibeat-sweez-fm.txt 63 0xd102: Device Certificate
207 Device Certificate:
208 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">MDA0MDMwNjAwMDAwMDAwMDI0NTM=</UNIQUEID><PUBLICKEY private="1">H6xGkVu18CH1v3lGLZhg3CweLg5J9xcylHtvIfl93gvb598H3/nlZw==</PUBLICKEY><KEYDATA>VA+dyX2u0b9IRnjqQ/runjdCdSM=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>hZlIjGetjQoATRec1FGjMR7UGAmIpvLu8KHU76uwdY76ACnEn377Zg==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>FPliQA8qBOXr2yodiMFZrkKUiH4=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.102.207</SECURITYVERSION><CERTIFICATE private="1">H6xGkVu18CH1v3lGLZhg3CweLg5J9xcylHtvIfl93gvb598H3/nlZwIEZs9t5iPaik/F07xZZei5SMOZfwC5bJA4oO40hI87xErcvjaiaFsQMvhj</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>MTP Player</NAME><MANUFACTURER>Corp.</MANUFACTURER><MAKE>Corp.</MAKE><DESTRIBUTOR>Corp.</DESTRIBUTOR><MODEL>M</MODEL><SECURITYLEVEL>2000</SECURITYLEVEL><HARDWARE_VER_MAJOR>1</HARDWARE_VER_MAJOR><HARDWARE_VER_MINOR>0</HARDWARE_VER_MINOR><FIRMWARE_VER_MAJOR>1</FIRMWARE_VER_MAJOR><FIRMWARE_VER_MINOR>0</FIRMWARE_VER_MINOR><FEATURES><TEMPLATE>0</TEMPLATE><CLOCK>2</CLOCK><SECURECLOCK><URL>http://go.microsoft.com/fwlink/?LinkId=25817</URL><PUBLICKEY>!CNhvvz1WaNV1AFUmetxkvm9iD4UrE9cnGUi!qcqdxMiXmD1*ikYGA==</PUBLICKEY></SECURECLOCK><METERING>1</METERING><LICENSE_ACQ>1</LICENSE_ACQ><LICENSE_SYNC>1</LICENSE_SYNC><ENCRYPTION>1</ENCRYPTION><SYMMETRIC_OPT>1</SYMMETRIC_OPT></FEATURES><LIMITS><MAXCHAINDEPTH>2</MAXCHAINDEPTH><MAXLICENSESIZE>10240</MAXLICENSESIZE><MAXHEADERSIZE>5120</MAXHEADERSIZE></LIMITS><PUBLICKEY>yUtoiSoR3tOOYBKTaBj5l85u5YWA6Rn5AhKcdpxBtx4upnq4IIwfKw==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>qD4E29L/HI5ATLe7WEY9fBRmu09Wd1kK30ycYGdOt6rSrTE/nwHIYg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>563</AUTH_ID><PUBLICKEY>9JYeS4F89sMRFfIRMl0pjW2R91N6uMQaAU8+y+vgpk/jwYfefh8bJg==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>mamgYHOs28hXiXYisA90WGHDGxaWfdBOg2dQw9nQee/DXbrohTRgJw==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
mtp-detect-creative-zen-V-plus.txt 82 0xd102: Device Certificate
337 Device Certificate:
338 <DEVCERT version="1.0"><CERTIFICATE type="DEVICE"><DATA><UNIQUEID private="1">GIycxp36AgBP9p/GnfoCAAAAAAA=</UNIQUEID><PUBLICKEY private="1">uacrz8cfvmxT5HP4f6gXC21JnC6Un6l0qz1nSojtlfhDqlSvygmmSA==</PUBLICKEY><KEYDATA>ykYrz0s9Ggnh305LB+YlKuMxJx4=</KEYDATA></DATA><MSDRM_SIGNATURE_VALUE>c5O+3ktOUyHhdR9uxBiJGjJNtBplqpo8IRCpVHX2rV7M0Yca4bb0Nw==</MSDRM_SIGNATURE_VALUE><SYMSIGNATURE>qsijKfmekVQKZZz+HCff802Mm3E=</SYMSIGNATURE></CERTIFICATE><FALLBACK><SECURITYVERSION>2.4.104.185</SECURITYVERSION><CERTIFICATE private="1">uacrz8cfvmxT5HP4f6gXC21JnC6Un6l0qz1nSojtlfhDqlSvygmmSAIEaLlw4Nr6rteI3w6kM+QTge1i95SzRgtiFiG5qQOx4M/Cdgf9RGNLhp8i</CERTIFICATE></FALLBACK><CERTIFICATE type="GROUP"><DATA><NAME>Creative Zen V Plus</NAME>
362 </LIMITS><PUBLICKEY>SSm10tOG7n2E+lBUEwdKnZfQQEfPcuxO4YXDzx9dAwbU5nUer5vMbQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>cVDd1wa6+5HzUpvZb7bsqGKbiWXlKrihJW90lAYA1EUlOgz33MzwIQ==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION"><DATA><SECURITYLEVEL>2000</SECURITYLEVEL><AUTH_ID>1053</AUTH_ID><PUBLICKEY>aPD+vFB8wJZiyyqhYeYgGIxpZk29uo/JJPSgqJiTwzfeOXY+qlyrFQ==</PUBLICKEY></DATA><MSDRM_SIGNATURE_VALUE>SywdNwotVIaw6M7gJSL73CqQcjV+ZPTHjMhFvFeHSqqRx3SRzAquJg==</MSDRM_SIGNATURE_VALUE></CERTIFICATE><CERTIFICATE type="AUTHORIZATION_ROOT"><DATA><AUTH_ID>1</AUTH_ID><PUBLICKEY>a1t3hxrg!qbOgktnbYaEEi (…)
    [all...]
  /external/webrtc/webrtc/p2p/base/
transportdescriptionfactory.cc 99 LOG(LS_ERROR) << "Cannot create identity digest with no certificate";
105 // the certificate's signature.
109 LOG(LS_ERROR) << "Failed to retrieve the certificate's digest algorithm";
dtlstransport.h 34 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate)
36 certificate_(certificate),
45 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) override {
46 certificate_ = certificate;
49 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) override {
53 *certificate = certificate_;
  /external/wpa_supplicant_8/src/tls/
x509v3.h 2 * X.509v3 certificate parsing and processing
102 * The DER format certificate follows struct x509_certificate. These
110 /* Meta data used for certificate validation */
tlsv1_client_read.c 367 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
379 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
397 "message %d (expected Certificate/"
406 "TLSv1: Received Certificate (certificate_list len %lu)",
414 * } Certificate;
420 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
453 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
463 wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
471 "the certificate");
482 "the certificate");
    [all...]
  /frameworks/base/core/java/android/security/net/config/
ResourceCertificateSource.java 23 import java.security.cert.Certificate;
56 Collection<? extends Certificate> certs;
69 for (Certificate cert : certs) {
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/commands/
ClientCertInfo.java 12 <xsd:documentation>Command to mobile to re-negotiate the TLS connection using a client certificate of the accepted type or Issuer to authenticate with the Subscription server.</xsd:documentation>
21 <xsd:documentation>The issuer name of an acceptable provider-issued certificate. The text of this element is formatted in accordance with the Issuer Name field in RFC-3280. This element is present only when acceptProviderCerts is true.</xsd:documentation>
51 * The issuer name of an acceptable provider-issued certificate.
  /frameworks/base/services/core/java/com/android/server/
CertBlacklister.java 35 * certificate public keys and serial numbers.
82 Slog.i(TAG, "Certificate blacklist changed, updating...");
96 Slog.i(TAG, "Certificate blacklist updated");
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertificateTest.java 27 import java.security.cert.Certificate;
41 * Following certificate chain was taken from https://www.verisign.com and
42 * uses MD2withRSA for the root certificate. This chain stops validating
47 * A selfsigned certificate using MD2withRSA
50 * Certificate:
87 "-----BEGIN CERTIFICATE-----\n"
100 + "-----END CERTIFICATE-----\n";
103 * A certificate signed by selfSignedCertMD2
106 * Certificate:
146 * Certificate Sign, CRL Sig
597 Certificate certificate = certificateFactory local
610 Certificate certificate = certificateFactory local
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
CertificateParsingException.java 29 * Certificate Parsing Exception. This is thrown whenever an
30 * invalid DER-encoded certificate is parsed or unsupported DER features
31 * are found in the Certificate.
  /libcore/ojluni/src/main/java/sun/security/util/
AnchorCertificates.java 85 * Checks if a certificate is a trust anchor.
87 * @param cert the certificate to check
88 * @return true if the certificate is trusted.
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
KeyStoreTestSupport.java 28 import java.security.cert.Certificate;
116 * Additional class to create Certificate and Key objects
118 public static class MCertificate extends Certificate {
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
MyCertificateFactorySpi.java 30 import java.security.cert.Certificate;
66 public Certificate engineGenerateCertificate(InputStream inStream)
124 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) {
  /packages/apps/Email/src/com/android/email/view/
CertificateSelector.java 37 * A simple view that can be used to select a certificate from the system {@link KeyChain}.
43 /** Button to select or remove the certificate. */
102 * Gets the alias for the currently selected certificate, or null if one is not selected.
  /prebuilts/gdb/darwin-x86/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /tools/apksig/src/test/java/com/android/apksig/internal/util/
Resources.java 24 import java.security.cert.Certificate;
63 Collection<? extends Certificate> certs;
71 for (Certificate cert : certs) {
  /bootable/recovery/tests/component/
verifier_test.cpp 54 std::vector<Certificate> certs;
73 std::vector<Certificate> certs;
79 std::vector<Certificate> certs;
125 std::vector<Certificate> certs;
144 std::vector<Certificate> certs;
171 std::vector<Certificate> certs;
  /external/conscrypt/common/src/main/java/org/conscrypt/
ActiveSession.java 22 import java.security.cert.Certificate;
129 * Returns the signed certificate timestamp (SCT) received from the peer. Returns a
220 public Certificate[] getLocalCertificates() {
225 * Returns the certificate(s) of the peer in this SSL session
231 * certificate were used during the SSL connection.
232 * @throws SSLPeerUnverifiedException if either a non-X.509 certificate
  /external/wpa_supplicant_8/hs20/server/www/
est.php 131 error_log("EST: simpleenroll - Failed to parse certificate request");
132 die("Failed to parse certificate request");
141 error_log("EST: simpleenroll - Failed to sign certificate");
142 die("Failed to sign certificate");
165 error_log("EST: simpleenroll - Failed to convert certificate");
166 die("Failed to convert certificate");

Completed in 1284 milliseconds

<<31323334353637383940>>