HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 551 - 575 of 1381) sorted by null

<<21222324252627282930>>

  /libcore/luni/src/main/files/cacerts/
add67345.0 1 -----BEGIN CERTIFICATE-----
37 -----END CERTIFICATE-----
38 Certificate:
73 Certificate Sign, CRL Sign
79 FIGYELEM! Ezen tanusitvany a NetLock Kft. Altalanos Szolgaltatasi Felteteleiben leirt eljarasok alapjan keszult. A hitelesites folyamatat a NetLock Kft. termekfelelosseg-biztositasa vedi. A digitalis alairas elfogadasanak feltetele az eloirt ellenorzesi eljaras megtetele. Az eljaras leirasa megtalalhato a NetLock Kft. Internet honlapjan a https://www.netlock.net/docs cimen vagy kerheto az ellenorzes@netlock.net e-mail cimen. IMPORTANT! The issuance and the use of this certificate is subject to the NetLock CPS available at https://www.netlock.net/docs or by e-mail at cps@netlock.net.
aeb67534.0 1 -----BEGIN CERTIFICATE-----
31 -----END CERTIFICATE-----
32 Certificate:
72 Certificate Sign, CRL Sign
75 X509v3 Certificate Policies:
b872f2b4.0 1 -----BEGIN CERTIFICATE-----
21 -----END CERTIFICATE-----
22 Certificate:
63 X509v3 Certificate Policies:
67 Digital Signature, Certificate Sign, CRL Sign
cdaebb72.0 1 -----BEGIN CERTIFICATE-----
22 -----END CERTIFICATE-----
23 Certificate:
59 X509v3 Certificate Policies:
64 Certificate Sign, CRL Sign
d64f06f3.0 1 -----BEGIN CERTIFICATE-----
24 -----END CERTIFICATE-----
25 Certificate:
64 Certificate Sign, CRL Sign
75 X509v3 Certificate Policies:
ee7cd6fb.0 1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
29 Certificate:
73 Certificate Sign, CRL Sign
80 X509v3 Certificate Policies:
  /external/boringssl/src/include/openssl/
x509_vfy.h 107 A X509_STORE_CTX is used while validating a single certificate.
110 certificate chain.
179 /* This is used to hold everything. It is used for all certificate
180 * validation. Once we have a certificate chain, the 'verify'
195 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */
202 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
243 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */
250 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
372 /* Certificate verify flags */
386 /* Enable proxy certificate validation *
    [all...]
  /external/libvncserver/webclients/java-applet/ssl/
tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch 215 +import java.security.cert.Certificate;
270 + java.security.cert.Certificate[] trustallCerts = null;
271 + java.security.cert.Certificate[] trustsrvCerts = null;
272 + java.security.cert.Certificate[] trusturlCerts = null;
577 + Certificate[] certs = new Certificate[c.toArray().length];
579 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert));
585 + certs = (Certificate[]) c.toArray();
605 + trustsrvCerts = new Certificate[c.toArray().length];
607 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert))
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_read.c 235 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
247 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
265 "message %d (expected Certificate/"
274 "TLSv1: Received Certificate (certificate_list len %lu)",
282 * } Certificate;
288 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
321 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
331 wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
339 "the certificate");
350 "the certificate");
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
README-HS20 130 # ca_cert: CA certificate for Interworking network selection
132 # client_cert: File path to client certificate file (PEM/DER)
134 # where client certificate/private key is used for authentication
143 # commented out. Both the private key and certificate will be read
148 # Windows certificate store can be used by leaving client_cert out and
158 # certificate store (My user account) is used, whereas computer store
173 # server certificate in SubjectAltName dNSName element(s). If a
179 # included in the certificate. The certificate may include additional
268 # ocsp: Whether to use/require OCSP to check server certificate
    [all...]
  /packages/apps/Settings/src/com/android/settings/
TrustedCredentialsSettings.java 251 * Common interface for adapters of both expandable and non-expandable certificate lists.
255 * Remove a certificate from the list.
256 * @param certHolder the certificate to be removed.
446 // Saving the connection for later use on the certificate dialog.
726 X509Certificate certificate = KeyChain.toCertificate(encodedCertificate); local
727 certificates.add(certificate);
730 Log.e(TAG, "RemoteException while retrieving certificate chain for root "
734 for (X509Certificate certificate : certificates) {
735 addCertDetails(certificate, views, titles);
739 private void addCertDetails(X509Certificate certificate, final ArrayList<View> views
    [all...]
  /docs/source.android.com/src/devices/tech/ota/
sign_builds.jd 40 <p>Each key comes in two files: the <i>certificate</i>, which has the
45 password known only to the people who make final releases. The certificate, in
79 certificate/private key pairs using the openssl tool from
90 # create a certificate with the public part of the key
215 the certificate embedded in the current build of any device to which you want
220 <li>The target-files .zip produced by the build sets the OTA certificate to
221 the certificate of the test key. Passing the <code>-o</code> flag to <code>
  /external/boringssl/src/ssl/
ssl_rsa.c 172 /* Sanity-check that the private key and the certificate match, unless the
344 /* Sanity-check that the private key and the certificate match, unless the
575 /* Read a file that contains our certificate in "PEM" format, possibly followed
577 * Certificate message. */
606 ret = 0; /* Key/certificate mismatch doesn't imply ret==0 ... */
610 /* If we could set up our certificate, now proceed to the CA
628 * (while we must free the main certificate, since its reference count is
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLObject.java 13 import java.security.cert.Certificate;
513 * Checks whether the given certificate is on this CRL.
515 * @param cert the certificate to check for.
516 * @return true if the given certificate is on this CRL,
519 public boolean isRevoked(Certificate cert)
560 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
564 throw new RuntimeException("Cannot process certificate");
X509CertificateObject.java 15 import java.security.cert.Certificate;
73 private org.bouncycastle.asn1.x509.Certificate c;
82 org.bouncycastle.asn1.x509.Certificate c)
141 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime());
146 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime());
241 * the certificate.
569 if (!(o instanceof Certificate))
574 Certificate other = (Certificate)o;
795 throw new SignatureException("certificate does not verify with supplied key")
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CRLObject.java 13 import java.security.cert.Certificate;
512 * Checks whether the given certificate is on this CRL.
514 * @param cert the certificate to check for.
515 * @return true if the given certificate is on this CRL,
518 public boolean isRevoked(Certificate cert)
559 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer();
563 throw new RuntimeException("Cannot process certificate");
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 27 import java.security.cert.Certificate;
52 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest
66 + "-----END CERTIFICATE-----\n";
122 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes());
157 Certificate[] res = event.getPeerCertificates();
556 * Implements basically a dummy TrustManager. It stores the certificate
  /libcore/luni/src/main/java/javax/crypto/
Cipher.java 33 import java.security.cert.Certificate;
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
ExportWizard.java 65 * Export wizard to export an apk signed with a release key/certificate.
268 // keystore is created, now load the private key and certificate.
283 "Certificate fingerprints:",
295 // check the private key/certificate again since it may have been created just above.
344 // a private key/certificate or the creation mode. In creation mode, unless
507 void setSigningInfo(PrivateKey privateKey, X509Certificate certificate) {
509 mCertificate = certificate;
  /external/wpa_supplicant_8/src/utils/
http_curl.c 896 wpa_printf(MSG_ERROR, "Could not parse certificate");
963 wpa_printf(MSG_INFO, "No server certificate available");
964 ctx->last_err = "No server certificate available";
977 wpa_printf(MSG_INFO, "Server certificate chain - depth=%d err=%d (%s) subject=%s",
979 debug_dump_cert("Server certificate chain - certificate", cert);
1085 debug_dump_cert("OpenSSL: Issuer certificate",
1090 "OpenSSL: Could not add issuer to certificate store");
1130 wpa_printf(MSG_DEBUG, "OpenSSL: Peer certificate not available for OCSP status check");
1133 ctx->last_err = "Peer certificate not available for OCSP status check"
    [all...]
  /libcore/luni/src/test/java/libcore/java/security/cert/
X509CertificateTest.java 41 import java.security.cert.Certificate;
400 * The certificate validity periods in the test certificate MUST lie
543 /* This certificate has no unique ID. */
547 // TODO: generate certificate that has a SubjectUniqueID field.
551 /* This certificate has no unique ID. */
555 // TODO: generate certificate that has a IssuerUniqueID field.
607 /* The test certificate is sha1WithRSAEncryption */
613 /* The test certificate is sha1WithRSAEncryption */
619 /* The test certificate is sha1WithRSAEncryption *
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
SSLParametersImpl.java 59 // default source of X.509 certificate based authentication keys
61 // default source of X.509 certificate based authentication trust decisions
74 // source of X.509 certificate based authentication keys or null if not provided
78 // source of X.509 certificate based authentication trust decisions or null if not provided
552 // setup peer certificate verification
    [all...]
  /frameworks/base/docs/html/tools/publishing/
preparing.jd 71 <code>.apk</code> file, the release-ready <code>.apk</code> file is signed with your own certificate
112 certificate that is owned by the application's developer (that is, a certificate for which the
113 developer holds the private key). The Android system uses the certificate as a means of identifying
115 certificate that you use for signing does not need to be signed by a certificate authority; the
116 Android system allows you to sign your applications with a self-signed certificate. To learn about
117 certificate requirements, see <a href="{@docRoot}tools/publishing/app-signing.html">Signing Your
320 <p>The build process assumes that you have a certificate and private key
321 suitable for signing your application. If you do not have a suitable certificate and private key
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory1Test.java 34 import java.security.cert.Certificate;
389 assertTrue("Not empty certificate collection", colCer.isEmpty());
449 Certificate cer;
460 assertNull("Not null certificate was created", cer);
467 assertTrue("Not empty certificate Collection was created", colCer.isEmpty());
628 * incorrect Certificate
  /external/apache-http/android/src/android/net/http/
Connection.java 58 * The server SSL certificate associated with this connection
60 * It would be nice to store the whole certificate chain, but
132 * @return The server SSL certificate associated with this
222 * know of any associated certificate,
225 req.mEventHandler.certificate(mCertificate);
352 // reset the certificate to null before opening a connection

Completed in 472 milliseconds

<<21222324252627282930>>