/libcore/luni/src/main/files/cacerts/ |
add67345.0 | 1 -----BEGIN CERTIFICATE----- 37 -----END CERTIFICATE----- 38 Certificate: 73 Certificate Sign, CRL Sign 79 FIGYELEM! Ezen tanusitvany a NetLock Kft. Altalanos Szolgaltatasi Felteteleiben leirt eljarasok alapjan keszult. A hitelesites folyamatat a NetLock Kft. termekfelelosseg-biztositasa vedi. A digitalis alairas elfogadasanak feltetele az eloirt ellenorzesi eljaras megtetele. Az eljaras leirasa megtalalhato a NetLock Kft. Internet honlapjan a https://www.netlock.net/docs cimen vagy kerheto az ellenorzes@netlock.net e-mail cimen. IMPORTANT! The issuance and the use of this certificate is subject to the NetLock CPS available at https://www.netlock.net/docs or by e-mail at cps@netlock.net.
|
aeb67534.0 | 1 -----BEGIN CERTIFICATE----- 31 -----END CERTIFICATE----- 32 Certificate: 72 Certificate Sign, CRL Sign 75 X509v3 Certificate Policies:
|
b872f2b4.0 | 1 -----BEGIN CERTIFICATE----- 21 -----END CERTIFICATE----- 22 Certificate: 63 X509v3 Certificate Policies: 67 Digital Signature, Certificate Sign, CRL Sign
|
cdaebb72.0 | 1 -----BEGIN CERTIFICATE----- 22 -----END CERTIFICATE----- 23 Certificate: 59 X509v3 Certificate Policies: 64 Certificate Sign, CRL Sign
|
d64f06f3.0 | 1 -----BEGIN CERTIFICATE----- 24 -----END CERTIFICATE----- 25 Certificate: 64 Certificate Sign, CRL Sign 75 X509v3 Certificate Policies:
|
ee7cd6fb.0 | 1 -----BEGIN CERTIFICATE----- 28 -----END CERTIFICATE----- 29 Certificate: 73 Certificate Sign, CRL Sign 80 X509v3 Certificate Policies:
|
/external/boringssl/src/include/openssl/ |
x509_vfy.h | 107 A X509_STORE_CTX is used while validating a single certificate. 110 certificate chain. 179 /* This is used to hold everything. It is used for all certificate 180 * validation. Once we have a certificate chain, the 'verify' 195 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ 202 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 243 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ 250 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 372 /* Certificate verify flags */ 386 /* Enable proxy certificate validation * [all...] |
/external/libvncserver/webclients/java-applet/ssl/ |
tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch | 215 +import java.security.cert.Certificate; 270 + java.security.cert.Certificate[] trustallCerts = null; 271 + java.security.cert.Certificate[] trustsrvCerts = null; 272 + java.security.cert.Certificate[] trusturlCerts = null; 577 + Certificate[] certs = new Certificate[c.toArray().length]; 579 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)); 585 + certs = (Certificate[]) c.toArray(); 605 + trustsrvCerts = new Certificate[c.toArray().length]; 607 + Certificate tmpcert = cf.generateCertificate(new ByteArrayInputStream(cert)) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 235 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message " 247 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message " 265 "message %d (expected Certificate/" 274 "TLSv1: Received Certificate (certificate_list len %lu)", 282 * } Certificate; 288 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate " 321 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate " 331 wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)", 339 "the certificate"); 350 "the certificate"); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README-HS20 | 130 # ca_cert: CA certificate for Interworking network selection 132 # client_cert: File path to client certificate file (PEM/DER) 134 # where client certificate/private key is used for authentication 143 # commented out. Both the private key and certificate will be read 148 # Windows certificate store can be used by leaving client_cert out and 158 # certificate store (My user account) is used, whereas computer store 173 # server certificate in SubjectAltName dNSName element(s). If a 179 # included in the certificate. The certificate may include additional 268 # ocsp: Whether to use/require OCSP to check server certificate [all...] |
/packages/apps/Settings/src/com/android/settings/ |
TrustedCredentialsSettings.java | 251 * Common interface for adapters of both expandable and non-expandable certificate lists. 255 * Remove a certificate from the list. 256 * @param certHolder the certificate to be removed. 446 // Saving the connection for later use on the certificate dialog. 726 X509Certificate certificate = KeyChain.toCertificate(encodedCertificate); local 727 certificates.add(certificate); 730 Log.e(TAG, "RemoteException while retrieving certificate chain for root " 734 for (X509Certificate certificate : certificates) { 735 addCertDetails(certificate, views, titles); 739 private void addCertDetails(X509Certificate certificate, final ArrayList<View> views [all...] |
/docs/source.android.com/src/devices/tech/ota/ |
sign_builds.jd | 40 <p>Each key comes in two files: the <i>certificate</i>, which has the 45 password known only to the people who make final releases. The certificate, in 79 certificate/private key pairs using the openssl tool from 90 # create a certificate with the public part of the key 215 the certificate embedded in the current build of any device to which you want 220 <li>The target-files .zip produced by the build sets the OTA certificate to 221 the certificate of the test key. Passing the <code>-o</code> flag to <code>
|
/external/boringssl/src/ssl/ |
ssl_rsa.c | 172 /* Sanity-check that the private key and the certificate match, unless the 344 /* Sanity-check that the private key and the certificate match, unless the 575 /* Read a file that contains our certificate in "PEM" format, possibly followed 577 * Certificate message. */ 606 ret = 0; /* Key/certificate mismatch doesn't imply ret==0 ... */ 610 /* If we could set up our certificate, now proceed to the CA 628 * (while we must free the main certificate, since its reference count is
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 13 import java.security.cert.Certificate; 513 * Checks whether the given certificate is on this CRL. 515 * @param cert the certificate to check for. 516 * @return true if the given certificate is on this CRL, 519 public boolean isRevoked(Certificate cert) 560 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 564 throw new RuntimeException("Cannot process certificate");
|
X509CertificateObject.java | 15 import java.security.cert.Certificate; 73 private org.bouncycastle.asn1.x509.Certificate c; 82 org.bouncycastle.asn1.x509.Certificate c) 141 throw new CertificateExpiredException("certificate expired on " + c.getEndDate().getTime()); 146 throw new CertificateNotYetValidException("certificate not valid till " + c.getStartDate().getTime()); 241 * the certificate. 569 if (!(o instanceof Certificate)) 574 Certificate other = (Certificate)o; 795 throw new SignatureException("certificate does not verify with supplied key") [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLObject.java | 13 import java.security.cert.Certificate; 512 * Checks whether the given certificate is on this CRL. 514 * @param cert the certificate to check for. 515 * @return true if the given certificate is on this CRL, 518 public boolean isRevoked(Certificate cert) 559 issuer = org.bouncycastle.asn1.x509.Certificate.getInstance(cert.getEncoded()).getIssuer(); 563 throw new RuntimeException("Cannot process certificate");
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 27 import java.security.cert.Certificate; 52 private String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:HandshakeCompletedEventTest 66 + "-----END CERTIFICATE-----\n"; 122 ByteArrayInputStream bis = new ByteArrayInputStream(certificate.getBytes()); 157 Certificate[] res = event.getPeerCertificates(); 556 * Implements basically a dummy TrustManager. It stores the certificate
|
/libcore/luni/src/main/java/javax/crypto/ |
Cipher.java | 33 import java.security.cert.Certificate; [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
ExportWizard.java | 65 * Export wizard to export an apk signed with a release key/certificate. 268 // keystore is created, now load the private key and certificate. 283 "Certificate fingerprints:", 295 // check the private key/certificate again since it may have been created just above. 344 // a private key/certificate or the creation mode. In creation mode, unless 507 void setSigningInfo(PrivateKey privateKey, X509Certificate certificate) { 509 mCertificate = certificate;
|
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 896 wpa_printf(MSG_ERROR, "Could not parse certificate"); 963 wpa_printf(MSG_INFO, "No server certificate available"); 964 ctx->last_err = "No server certificate available"; 977 wpa_printf(MSG_INFO, "Server certificate chain - depth=%d err=%d (%s) subject=%s", 979 debug_dump_cert("Server certificate chain - certificate", cert); 1085 debug_dump_cert("OpenSSL: Issuer certificate", 1090 "OpenSSL: Could not add issuer to certificate store"); 1130 wpa_printf(MSG_DEBUG, "OpenSSL: Peer certificate not available for OCSP status check"); 1133 ctx->last_err = "Peer certificate not available for OCSP status check" [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertificateTest.java | 41 import java.security.cert.Certificate; 400 * The certificate validity periods in the test certificate MUST lie 543 /* This certificate has no unique ID. */ 547 // TODO: generate certificate that has a SubjectUniqueID field. 551 /* This certificate has no unique ID. */ 555 // TODO: generate certificate that has a IssuerUniqueID field. 607 /* The test certificate is sha1WithRSAEncryption */ 613 /* The test certificate is sha1WithRSAEncryption */ 619 /* The test certificate is sha1WithRSAEncryption * [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
SSLParametersImpl.java | 59 // default source of X.509 certificate based authentication keys 61 // default source of X.509 certificate based authentication trust decisions 74 // source of X.509 certificate based authentication keys or null if not provided 78 // source of X.509 certificate based authentication trust decisions or null if not provided 552 // setup peer certificate verification [all...] |
/frameworks/base/docs/html/tools/publishing/ |
preparing.jd | 71 <code>.apk</code> file, the release-ready <code>.apk</code> file is signed with your own certificate 112 certificate that is owned by the application's developer (that is, a certificate for which the 113 developer holds the private key). The Android system uses the certificate as a means of identifying 115 certificate that you use for signing does not need to be signed by a certificate authority; the 116 Android system allows you to sign your applications with a self-signed certificate. To learn about 117 certificate requirements, see <a href="{@docRoot}tools/publishing/app-signing.html">Signing Your 320 <p>The build process assumes that you have a certificate and private key 321 suitable for signing your application. If you do not have a suitable certificate and private key [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory1Test.java | 34 import java.security.cert.Certificate; 389 assertTrue("Not empty certificate collection", colCer.isEmpty()); 449 Certificate cer; 460 assertNull("Not null certificate was created", cer); 467 assertTrue("Not empty certificate Collection was created", colCer.isEmpty()); 628 * incorrect Certificate
|
/external/apache-http/android/src/android/net/http/ |
Connection.java | 58 * The server SSL certificate associated with this connection 60 * It would be nice to store the whole certificate chain, but 132 * @return The server SSL certificate associated with this 222 * know of any associated certificate, 225 req.mEventHandler.certificate(mCertificate); 352 // reset the certificate to null before opening a connection
|