Searched
full:certificate (Results
526 -
550 of
1381) sorted by null
<<21222324252627282930>>
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLSessionBindingEventTest.java | 21 import java.security.cert.Certificate; 126 public Certificate[] getLocalCertificates() { 155 public Certificate[] getPeerCertificates()
|
/libcore/luni/src/main/files/cacerts/ |
4d654d1d.0 | 1 -----BEGIN CERTIFICATE----- 15 -----END CERTIFICATE----- 16 Certificate:
|
7651b327.0 | 1 -----BEGIN CERTIFICATE----- 14 -----END CERTIFICATE----- 15 Certificate:
|
7d3cd826.0 | 1 -----BEGIN CERTIFICATE----- 18 -----END CERTIFICATE----- 19 Certificate:
|
119afc2e.0 | 1 -----BEGIN CERTIFICATE----- 29 -----END CERTIFICATE----- 30 Certificate: 66 X509v3 Certificate Policies: 83 Digital Signature, Non Repudiation, Key Encipherment, Certificate Sign, CRL Sign
|
1dac3003.0 | 1 -----BEGIN CERTIFICATE----- 24 -----END CERTIFICATE----- 25 Certificate: 63 Digital Signature, Non Repudiation, Certificate Sign, CRL Sign 66 X509v3 Certificate Policies:
|
58a44af1.0 | 1 -----BEGIN CERTIFICATE----- 24 -----END CERTIFICATE----- 25 Certificate: 62 Non Repudiation, Certificate Sign, CRL Sign 63 X509v3 Certificate Policies:
|
a0bc6fbb.0 | 1 -----BEGIN CERTIFICATE----- 28 -----END CERTIFICATE----- 29 Certificate: 73 Certificate Sign, CRL Sign 80 X509v3 Certificate Policies:
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
AlgorithmIdentifier.java | 37 * with the Algorithm Identifier which is a part of X.509 certificate 40 * Certificate and Certificate Revocation List (CRL) Profile.
|
SubjectPublicKeyInfo.java | 39 * with the following structure which is a part of X.509 certificate 42 * Certificate and Certificate Revocation List (CRL) Profile.
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 41 import java.security.cert.Certificate; 376 assertTrue("Not empty certificate collection", colCer.isEmpty()); 435 Certificate cer; 446 assertNull("Not null certificate was created", cer); 453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty()); 577 List<Certificate> list = null; 598 List<Certificate> list = new Vector<Certificate>(); 601 List<? extends Certificate> list1 = cp.getCertificates(); 609 * incorrect Certificate [all...] |
/packages/apps/UnifiedEmail/src/com/android/emailcommon/mail/ |
MessagingException.java | 53 /** The server's SSL certificate couldn't be validated */ 65 /** A client SSL certificate is required for connections to the server */ 67 /** The client SSL certificate specified is invalid */
|
/packages/services/Telephony/src/com/android/phone/common/mail/ |
MessagingException.java | 52 /** The server's SSL certificate couldn't be validated */ 64 /** A client SSL certificate is required for connections to the server */ 66 /** The client SSL certificate specified is invalid */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libresolv-2.11.1.so | |
libresolv.so | |
libresolv.so.2 | |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/ |
libresolv-2.15.so | |
libresolv.so | |
libresolv.so.2 | |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 163 /* Windows CryptoAPI and access to certificate stores */ 391 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " 411 "certificate"); 508 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 509 "system certificate store: subject='%s'", buf); 514 "certificate store"); 980 /* handle a certificate and/or CA certificate */ 1279 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate dNSName", 1311 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 135 # cert_in_cb - Whether to include a peer certificate dump in events 137 # its certificate chain are included in EAP peer certificate events. This is 442 # ca_cert: CA certificate for Interworking network selection 444 # client_cert: File path to client certificate file (PEM/DER) 446 # where client certificate/private key is used for authentication 455 # commented out. Both the private key and certificate will be read 460 # Windows certificate store can be used by leaving client_cert out and 470 # certificate store (My user account) is used, whereas computer store 560 # ocsp: Whether to use/require OCSP to check server certificate [all...] |
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 365 var leaf *x509.Certificate 379 certs := make([]*x509.Certificate, len(certMsg.certificates)) 384 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 416 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", leaf.PublicKey) 461 var chainToSend *Certificate 468 // A list of the distinguished names of acceptable certificate 474 // send any certificate of the appropriate 499 for j, cert := range chain.Certificate { 501 // parse the certificate if this isn't the leaf 506 return errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error() [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
ssvnc.tcl | 514 SSL Certificate Verification: 517 SSL Certificate, you are in principle vulnerable to a Man-In-The-Middle 518 attack. Without SSL Certificate verification, only passive network 527 web browser comes with a bundle of Certificate Authority certificates 528 and 2) the https sites have paid money to the Certificate Authorities to 529 have their website certificate signed by them. When using SSL in VNC we 531 the certificates manually. However, it is possible to use Certificate 541 follow a few dialogs to inspect and save the server certificate. 551 Advanced Method: Certificate Authority (CA): 554 a Certificate Authority (CA) to sign the VNC server and/or VNC clien [all...] |
/build/core/ |
prebuilt_internal.mk | 169 # By setting .CERTIFICATE but not .PRIVATE_KEY, this package will be 170 # mentioned in apkcerts.txt (with certificate set to "PRESIGNED") 172 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := PRESIGNED 175 # If this is not an absolute certificate, assign it to a generic one. 181 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem
|
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | 184 .Ic certificate 199 .It Ic path certificate Ar path ; 201 will search this directory if a certificate or certificate request is received. 204 will refuse to use a certificate stored outside of this directory. 456 will get the DN from the Subject field in the certificate. 499 Specifies a certificate specification. 505 means a file name of a certificate. 516 Specifies a root certificate authority specification. 522 means a file name of the root certificate authority [all...] |
Completed in 411 milliseconds
<<21222324252627282930>>