HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 526 - 550 of 1381) sorted by null

<<21222324252627282930>>

  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
SSLSessionBindingEventTest.java 21 import java.security.cert.Certificate;
126 public Certificate[] getLocalCertificates() {
155 public Certificate[] getPeerCertificates()
  /libcore/luni/src/main/files/cacerts/
4d654d1d.0 1 -----BEGIN CERTIFICATE-----
15 -----END CERTIFICATE-----
16 Certificate:
7651b327.0 1 -----BEGIN CERTIFICATE-----
14 -----END CERTIFICATE-----
15 Certificate:
7d3cd826.0 1 -----BEGIN CERTIFICATE-----
18 -----END CERTIFICATE-----
19 Certificate:
119afc2e.0 1 -----BEGIN CERTIFICATE-----
29 -----END CERTIFICATE-----
30 Certificate:
66 X509v3 Certificate Policies:
83 Digital Signature, Non Repudiation, Key Encipherment, Certificate Sign, CRL Sign
1dac3003.0 1 -----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----
25 Certificate:
63 Digital Signature, Non Repudiation, Certificate Sign, CRL Sign
66 X509v3 Certificate Policies:
58a44af1.0 1 -----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----
25 Certificate:
62 Non Repudiation, Certificate Sign, CRL Sign
63 X509v3 Certificate Policies:
a0bc6fbb.0 1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
29 Certificate:
73 Certificate Sign, CRL Sign
80 X509v3 Certificate Policies:
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
AlgorithmIdentifier.java 37 * with the Algorithm Identifier which is a part of X.509 certificate
40 * Certificate and Certificate Revocation List (CRL) Profile.
SubjectPublicKeyInfo.java 39 * with the following structure which is a part of X.509 certificate
42 * Certificate and Certificate Revocation List (CRL) Profile.
  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory1Test.java 41 import java.security.cert.Certificate;
376 assertTrue("Not empty certificate collection", colCer.isEmpty());
435 Certificate cer;
446 assertNull("Not null certificate was created", cer);
453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty());
577 List<Certificate> list = null;
598 List<Certificate> list = new Vector<Certificate>();
601 List<? extends Certificate> list1 = cp.getCertificates();
609 * incorrect Certificate
    [all...]
  /packages/apps/UnifiedEmail/src/com/android/emailcommon/mail/
MessagingException.java 53 /** The server's SSL certificate couldn't be validated */
65 /** A client SSL certificate is required for connections to the server */
67 /** The client SSL certificate specified is invalid */
  /packages/services/Telephony/src/com/android/phone/common/mail/
MessagingException.java 52 /** The server's SSL certificate couldn't be validated */
64 /** A client SSL certificate is required for connections to the server */
66 /** The client SSL certificate specified is invalid */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libresolv-2.11.1.so 
libresolv.so 
libresolv.so.2 
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/
libresolv-2.15.so 
libresolv.so 
libresolv.so.2 
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 163 /* Windows CryptoAPI and access to certificate stores */
391 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate "
411 "certificate");
508 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
509 "system certificate store: subject='%s'", buf);
514 "certificate store");
980 /* handle a certificate and/or CA certificate */
1279 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate dNSName",
1311 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 135 # cert_in_cb - Whether to include a peer certificate dump in events
137 # its certificate chain are included in EAP peer certificate events. This is
442 # ca_cert: CA certificate for Interworking network selection
444 # client_cert: File path to client certificate file (PEM/DER)
446 # where client certificate/private key is used for authentication
455 # commented out. Both the private key and certificate will be read
460 # Windows certificate store can be used by leaving client_cert out and
470 # certificate store (My user account) is used, whereas computer store
560 # ocsp: Whether to use/require OCSP to check server certificate
    [all...]
  /external/boringssl/src/ssl/test/runner/
handshake_client.go 365 var leaf *x509.Certificate
379 certs := make([]*x509.Certificate, len(certMsg.certificates))
384 return errors.New("tls: failed to parse certificate from server: " + err.Error())
416 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", leaf.PublicKey)
461 var chainToSend *Certificate
468 // A list of the distinguished names of acceptable certificate
474 // send any certificate of the appropriate
499 for j, cert := range chain.Certificate {
501 // parse the certificate if this isn't the leaf
506 return errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error()
    [all...]
  /external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/
ssvnc.tcl 514 SSL Certificate Verification:
517 SSL Certificate, you are in principle vulnerable to a Man-In-The-Middle
518 attack. Without SSL Certificate verification, only passive network
527 web browser comes with a bundle of Certificate Authority certificates
528 and 2) the https sites have paid money to the Certificate Authorities to
529 have their website certificate signed by them. When using SSL in VNC we
531 the certificates manually. However, it is possible to use Certificate
541 follow a few dialogs to inspect and save the server certificate.
551 Advanced Method: Certificate Authority (CA):
554 a Certificate Authority (CA) to sign the VNC server and/or VNC clien
    [all...]
  /build/core/
prebuilt_internal.mk 169 # By setting .CERTIFICATE but not .PRIVATE_KEY, this package will be
170 # mentioned in apkcerts.txt (with certificate set to "PRESIGNED")
172 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := PRESIGNED
175 # If this is not an absolute certificate, assign it to a generic one.
181 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem
  /external/ipsec-tools/src/racoon/
racoon.conf.5 184 .Ic certificate
199 .It Ic path certificate Ar path ;
201 will search this directory if a certificate or certificate request is received.
204 will refuse to use a certificate stored outside of this directory.
456 will get the DN from the Subject field in the certificate.
499 Specifies a certificate specification.
505 means a file name of a certificate.
516 Specifies a root certificate authority specification.
522 means a file name of the root certificate authority
    [all...]

Completed in 411 milliseconds

<<21222324252627282930>>