/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 17 cert_time_to_seconds -- convert time string used for certificate 22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided 24 validation of the certificate is performed. 39 The following group define certificate requirements that one side is 177 certificate provided by the other end of the SSL channel. 178 Return None if no certificate was provided, {} if a 179 certificate was provided, but not validated.""" 401 PEM_HEADER = "-----BEGIN CERTIFICATE-----" 402 PEM_FOOTER = "-----END CERTIFICATE-----" 406 """Takes a certificate in binary DER format and returns th [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 17 cert_time_to_seconds -- convert time string used for certificate 22 fetch_server_certificate (HOST, PORT) -- fetch the certificate provided 24 validation of the certificate is performed. 39 The following group define certificate requirements that one side is 177 certificate provided by the other end of the SSL channel. 178 Return None if no certificate was provided, {} if a 179 certificate was provided, but not validated.""" 401 PEM_HEADER = "-----BEGIN CERTIFICATE-----" 402 PEM_FOOTER = "-----END CERTIFICATE-----" 406 """Takes a certificate in binary DER format and returns th [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 131 error_log("EST: simpleenroll - Failed to parse certificate request"); 132 die("Failed to parse certificate request"); 141 error_log("EST: simpleenroll - Failed to sign certificate"); 142 die("Failed to sign certificate"); 165 error_log("EST: simpleenroll - Failed to convert certificate"); 166 die("Failed to convert certificate");
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 205 side certificate. When client certificate is used, a matching 211 formats. User certificate and private key can be included in the 214 <para>If the user certificate and private key is received in 219 # convert client certificate and private key to PEM format 221 # convert CA certificate (if included in PFX file) to PEM format
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 26 import java.security.cert.Certificate; 242 X509Certificate certificate = certificateChain[0]; local 243 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm()); 248 String actualSigAlgName = certificate.getSigAlgName().toUpperCase(); 257 Arrays.<Certificate>asList(privateKeyEntry.getCertificateChain()), 258 Arrays.<Certificate>asList(certificateChain));
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreSpiTest.java | 36 import java.security.cert.Certificate; 100 Certificate[] chain) throws KeyStoreException { keyEntryWasSet[0] = true; } 160 ksSpi.engineSetKeyEntry("", null, new char[0], new Certificate[0]); 165 ksSpi.engineSetKeyEntry("", new byte[0], new Certificate[0]); 235 class MyCertificate extends Certificate { 262 return "[My test Certificate, type: " + getType() + "]";
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SecureClassLoader2Test.java | 27 import java.security.cert.Certificate; 44 (Certificate[]) null));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertStoreSpiTest.java | 31 import java.security.cert.Certificate; 99 public boolean match(Certificate crl) {
|
/external/apache-harmony/security/src/test/api/java/tests/api/java/security/ |
DomainCombinerTest.java | 32 import java.security.cert.Certificate; 71 new CodeSource(null, (Certificate[]) null), new Permissions()) };
|
/external/apache-http/android/src/android/net/http/ |
HttpConnection.java | 47 // Update the certificate info (connection not secure - set to null) 50 eventHandler.certificate(mCertificate);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 36 * CertPathValidatorSpi implementation for X.509 Certificate validation ? la RFC 125 String message = "Certificate revocation of serial 0x" + serial.toString(16); 163 // RFC 5280 - CRLs must originate from the same trust anchor as the target certificate. 172 // Certificate for each interation of the validation loop 295 "Target certificate in certification path does not match targetConstraints.", null, certPath, 0); 315 String message = "Certificate revocation of public key " + workingPublicKey; 329 // set certificate to be checked in this round 423 // set signing certificate for next round
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509CertStoreSelector.java | 4 import java.security.cert.Certificate; 34 public boolean match(Certificate cert)
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.cc | 29 // Ensure that the certificate is not expired. 32 LOG(ERROR) << "Expired certificate";
|
/external/libvncserver/webclients/java-applet/ssl/ |
onetimekey | 19 # Note oneTimeKey is to provide a CLIENT Certificate for the viewer 58 n=`grep -n 'BEGIN CERTIFICATE' $in | awk -F: '{print $1}' | head -1`
|
/libcore/luni/src/main/java/java/security/ |
Signature.java | 21 import java.security.cert.Certificate; 301 * using the certificate of the identity whose signature is going to be 304 * If the given certificate is an instance of {@link X509Certificate} and 305 * has a key usage parameter that indicates, that this certificate is not to 308 * @param certificate 309 * the certificate used to verify a signature. 311 * if the publicKey in the certificate is not valid or not to be 314 public final void initVerify(Certificate certificate) 316 if (certificate instanceof X509Certificate) [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/x501/ |
DirectoryString.java | 35 * Certificate and Certificate Revocation List (CRL) Profile.
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
ReasonFlags.java | 35 * Certificate and Certificate Revocation List (CRL) Profile.
|
Time.java | 34 * Certificate and Certificate Revocation List (CRL) Profile.
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertStoreSpiTest.java | 36 import java.security.cert.Certificate; 89 public boolean match (Certificate crl) {
|
PKIXCertPathCheckerTest.java | 28 import java.security.cert.Certificate; 89 public void check(Certificate cert,
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 811 wpa_printf(MSG_DEBUG, "GnuTLS: Certificate purpose: %s", oid); 848 * check_ocsp_response() and rejected handshake if the certificate was 851 * re-import the OCSP response to check for unknown certificate status, 911 "bad certificate status response", 934 "GnuTLS: No peer certificate verification enabled"); 938 wpa_printf(MSG_DEBUG, "GnuTSL: Verifying peer certificate"); 959 "certificate chain"); 985 wpa_printf(MSG_INFO, "TLS: No peer certificate chain received"); 991 wpa_printf(MSG_INFO, "TLS: Peer certificate not trusted"); 993 wpa_printf(MSG_INFO, "TLS: Certificate uses insecure [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; [all...] |
/external/openssh/ |
auth-options.c | 450 error("Unable to parse certificate options: %s", 454 debug3("found certificate option \"%.100s\" len %zu", 486 error("Certificate has multiple " 502 error("Certificate has multiple " 518 "with valid certificate but not " 524 "certificate for login.", 529 error("Certificate source-address " 539 error("Certificate critical option \"%s\" " 543 logit("Certificate extension \"%s\" " 547 error("Certificate option \"%s\" corrupt [all...] |
/external/boringssl/src/ssl/test/runner/ |
handshake_server.go | 35 cert *Certificate 519 certMsg.certificates = hs.cert.Certificate 550 // Request a client certificate 568 // the client that it may send any certificate in response 571 // an appropriate certificate to give to us. 595 // If we requested a client certificate, then the client must send a 596 // certificate message, even if it's empty. 606 // The client didn't actually send a certificate 610 return errors.New("tls: client didn't provide a certificate") 647 // If we received a client cert in response to our certificate request message [all...] |
/cts/hostsidetests/appsecurity/test-apps/SimpleAppInstallDiffCert/ |
AndroidManifest.xml | 21 with different certificate.
|