HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 376 - 400 of 1381) sorted by null

<<11121314151617181920>>

  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
ssl.py 17 cert_time_to_seconds -- convert time string used for certificate
22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided
24 validation of the certificate is performed.
39 The following group define certificate requirements that one side is
177 certificate provided by the other end of the SSL channel.
178 Return None if no certificate was provided, {} if a
179 certificate was provided, but not validated."""
401 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
402 PEM_FOOTER = "-----END CERTIFICATE-----"
406 """Takes a certificate in binary DER format and returns th
    [all...]
  /external/wpa_supplicant_8/hs20/server/www/
est.php 131 error_log("EST: simpleenroll - Failed to parse certificate request");
132 die("Failed to parse certificate request");
141 error_log("EST: simpleenroll - Failed to sign certificate");
142 die("Failed to sign certificate");
165 error_log("EST: simpleenroll - Failed to convert certificate");
166 die("Failed to convert certificate");
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 205 side certificate. When client certificate is used, a matching
211 formats. User certificate and private key can be included in the
214 <para>If the user certificate and private key is received in
219 # convert client certificate and private key to PEM format
221 # convert CA certificate (if included in PFX file) to PEM format
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 26 import java.security.cert.Certificate;
242 X509Certificate certificate = certificateChain[0]; local
243 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm());
248 String actualSigAlgName = certificate.getSigAlgName().toUpperCase();
257 Arrays.<Certificate>asList(privateKeyEntry.getCertificateChain()),
258 Arrays.<Certificate>asList(certificateChain));
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreSpiTest.java 36 import java.security.cert.Certificate;
100 Certificate[] chain) throws KeyStoreException { keyEntryWasSet[0] = true; }
160 ksSpi.engineSetKeyEntry("", null, new char[0], new Certificate[0]);
165 ksSpi.engineSetKeyEntry("", new byte[0], new Certificate[0]);
235 class MyCertificate extends Certificate {
262 return "[My test Certificate, type: " + getType() + "]";
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
SecureClassLoader2Test.java 27 import java.security.cert.Certificate;
44 (Certificate[]) null));
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertStoreSpiTest.java 31 import java.security.cert.Certificate;
99 public boolean match(Certificate crl) {
  /external/apache-harmony/security/src/test/api/java/tests/api/java/security/
DomainCombinerTest.java 32 import java.security.cert.Certificate;
71 new CodeSource(null, (Certificate[]) null), new Permissions()) };
  /external/apache-http/android/src/android/net/http/
HttpConnection.java 47 // Update the certificate info (connection not secure - set to null)
50 eventHandler.certificate(mCertificate);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathValidatorSpi.java 36 * CertPathValidatorSpi implementation for X.509 Certificate validation ? la RFC
125 String message = "Certificate revocation of serial 0x" + serial.toString(16);
163 // RFC 5280 - CRLs must originate from the same trust anchor as the target certificate.
172 // Certificate for each interation of the validation loop
295 "Target certificate in certification path does not match targetConstraints.", null, certPath, 0);
315 String message = "Certificate revocation of public key " + workingPublicKey;
329 // set certificate to be checked in this round
423 // set signing certificate for next round
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509CertStoreSelector.java 4 import java.security.cert.Certificate;
34 public boolean match(Certificate cert)
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 29 // Ensure that the certificate is not expired.
32 LOG(ERROR) << "Expired certificate";
  /external/libvncserver/webclients/java-applet/ssl/
onetimekey 19 # Note oneTimeKey is to provide a CLIENT Certificate for the viewer
58 n=`grep -n 'BEGIN CERTIFICATE' $in | awk -F: '{print $1}' | head -1`
  /libcore/luni/src/main/java/java/security/
Signature.java 21 import java.security.cert.Certificate;
301 * using the certificate of the identity whose signature is going to be
304 * If the given certificate is an instance of {@link X509Certificate} and
305 * has a key usage parameter that indicates, that this certificate is not to
308 * @param certificate
309 * the certificate used to verify a signature.
311 * if the publicKey in the certificate is not valid or not to be
314 public final void initVerify(Certificate certificate)
316 if (certificate instanceof X509Certificate)
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/x501/
DirectoryString.java 35 * Certificate and Certificate Revocation List (CRL) Profile.
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
ReasonFlags.java 35 * Certificate and Certificate Revocation List (CRL) Profile.
Time.java 34 * Certificate and Certificate Revocation List (CRL) Profile.
  /libcore/luni/src/test/java/tests/security/cert/
CertStoreSpiTest.java 36 import java.security.cert.Certificate;
89 public boolean match (Certificate crl) {
PKIXCertPathCheckerTest.java 28 import java.security.cert.Certificate;
89 public void check(Certificate cert,
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 811 wpa_printf(MSG_DEBUG, "GnuTLS: Certificate purpose: %s", oid);
848 * check_ocsp_response() and rejected handshake if the certificate was
851 * re-import the OCSP response to check for unknown certificate status,
911 "bad certificate status response",
934 "GnuTLS: No peer certificate verification enabled");
938 wpa_printf(MSG_DEBUG, "GnuTSL: Verifying peer certificate");
959 "certificate chain");
985 wpa_printf(MSG_INFO, "TLS: No peer certificate chain received");
991 wpa_printf(MSG_INFO, "TLS: Peer certificate not trusted");
993 wpa_printf(MSG_INFO, "TLS: Certificate uses insecure
    [all...]
  /frameworks/base/keystore/tests/src/android/security/keystore/
AndroidKeyStoreTest.java 41 import java.security.cert.Certificate;
    [all...]
  /external/openssh/
auth-options.c 450 error("Unable to parse certificate options: %s",
454 debug3("found certificate option \"%.100s\" len %zu",
486 error("Certificate has multiple "
502 error("Certificate has multiple "
518 "with valid certificate but not "
524 "certificate for login.",
529 error("Certificate source-address "
539 error("Certificate critical option \"%s\" "
543 logit("Certificate extension \"%s\" "
547 error("Certificate option \"%s\" corrupt
    [all...]
  /external/boringssl/src/ssl/test/runner/
handshake_server.go 35 cert *Certificate
519 certMsg.certificates = hs.cert.Certificate
550 // Request a client certificate
568 // the client that it may send any certificate in response
571 // an appropriate certificate to give to us.
595 // If we requested a client certificate, then the client must send a
596 // certificate message, even if it's empty.
606 // The client didn't actually send a certificate
610 return errors.New("tls: client didn't provide a certificate")
647 // If we received a client cert in response to our certificate request message
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/SimpleAppInstallDiffCert/
AndroidManifest.xml 21 with different certificate.

Completed in 168 milliseconds

<<11121314151617181920>>