/packages/apps/Email/src/com/android/email/activity/setup/ |
CheckSettingsErrorDialogFragment.java | 44 * Called to indicate the user wants to resolve the error by changing the client certificate 92 // Certificate error - show two buttons so the host fragment can auto pop
|
/system/extras/verity/ |
generate_verity_key.c | 134 printf("Failed to read PEM certificate from file '%s'\n", pem_file); 140 printf("Failed to extract public key from certificate '%s'\n", pem_file);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 107 * ca_cert - CA certificate for Interworking network selection 112 * client_cert - File path to client certificate file (PEM/DER) 115 * where client certificate/private key is used for authentication 128 * commented out. Both the private key and certificate will be read 133 * Windows certificate store can be used by leaving client_cert out and 143 * certificate store (My user account) is used, whereas computer store 171 * server certificate in SubjectAltName dNSName element(s). If a 177 * included in the certificate. The certificate may include additional 294 * ocsp - Whether to use/require OCSP to check server certificate [all...] |
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error) 30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error) 36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error 37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) 48 // certificate is ECDSA. If this is not set then the cipher suite is
|
runner.go | 48 var rsaCertificate, ecdsaCertificate Certificate 94 func getRSACertificate() Certificate { 99 func getECDSACertificate() Certificate { 157 // certFile is the path to the certificate to use for the server. 228 Certificates: []Certificate{getECDSACertificate()}, 240 Certificates: []Certificate{getECDSACertificate()}, 287 "-expect-certificate-types", 301 expectedLocalError: "client didn't provide a certificate", 666 Certificates: []Certificate{getECDSACertificate()}, 678 Certificates: []Certificate{getRSACertificate()} [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedData.java | 33 * the certificate isn't verified, just the fact that one of the certs 185 // certificate chain. 261 * Return any X.509 certificate objects in this SignedData structure as a Store of X509CertificateHolder objects. 281 * Return any X.509 attribute certificate objects in this SignedData structure as a Store of X509AttributeCertificateHolder objects. 493 * Replace the certificate and CRL information associated with this
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar | |
/external/openssh/ |
authfile.c | 403 /* Load the certificate associated with the named private key */ 434 /* Load private key and certificate */ 462 /* Make sure the private key matches the certificate */ 487 * If "check_ca" is set and "key" is a certificate, then its CA key is 549 * This will check both the key and, if it is a certificate, its CA key too.
|
auth2-pubkey.c | 395 * their username in the certificate principals list. 400 reason = "Certificate does not contain an " 416 verbose("Accepted certificate ID \"%s\" " 445 /* Authenticate a certificate key against TrustedUserCAKeys */ 468 * If AuthorizedPrincipals is in use, then compare the certificate 474 reason = "Certificate does not contain an " 488 verbose("Accepted certificate ID \"%s\" signed by %s CA %s via %s",
|
/external/wpa_supplicant_8/hs20/client/ |
est.c | 464 wpa_printf(MSG_MSGDUMP, "OpenSSL: Certificate request:\n%s", 671 wpa_printf(MSG_INFO, "EST certificate enrollment failed"); 672 write_result(ctx, "EST certificate enrollment failed"); 704 wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file"); 705 write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file");
|
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 106 echo " * Sign Root CA certificate" 107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 127 echo " * Sign Intermediate CA certificate" 128 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PASS -days 730 -extensions ext_server -policy policy_osu_server || fail "Failed to sign server certificate"
|
/frameworks/base/docs/html/training/safetynet/ |
index.jd | 248 certificate used to sign requesting app"], 276 <li>Extract the SSL certificate chain from the JWS message. 279 <li>Validate the SSL certificate chain and use SSL hostname matching to verify that the leaf 280 certificate was issued to the hostname {@code attest.android.com}. 283 <li>Use the certificate to verify the signature of the JWS message.
|
/libcore/luni/src/main/files/cacerts/ |
f61bff45.0 | 1 -----BEGIN CERTIFICATE----- 43 -----END CERTIFICATE----- 44 Certificate: 85 X509v3 Certificate Policies: 98 Certificate Sign, CRL Sign
|
33815e15.0 | 1 -----BEGIN CERTIFICATE----- 44 -----END CERTIFICATE----- 45 Certificate: 50 Issuer: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority 54 Subject: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority 99 Digital Signature, Key Encipherment, Key Agreement, Certificate Sign, CRL Sign 110 X509v3 Certificate Policies:
|
33815e15.1 | 1 -----BEGIN CERTIFICATE----- 43 -----END CERTIFICATE----- 44 Certificate: 49 Issuer: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority 53 Subject: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority 98 Certificate Sign, CRL Sign 104 X509v3 Certificate Policies:
|
9339512a.0 | 1 -----BEGIN CERTIFICATE----- 38 -----END CERTIFICATE----- 39 Certificate: 92 X509v3 Certificate Policies: 95 Explicit Text: Any use of this Certificate constitutes acceptance of the QuoVadis Root CA 3 Certificate Policy / Certification Practice Statement. 99 Certificate Sign, CRL Sign
|
/libcore/luni/src/main/java/java/security/cert/ |
X509CRLSelector.java | 53 // the certificate being checked 258 * Sets a certificate hint to find CRLs. It's not a criterion but may help 262 * the certificate hint or {@code null}. 351 * Returns the certificate hint to find CRLs. It's not a criterion but may 354 * @return the certificate hint or {@code null} if none set.
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Extension.java | 39 * with the Extension part of X.509 certificate 42 * Certificate and Certificate Revocation List (CRL) Profile. 59 // certificate extensions: 331 sb.append("Certificate Policies Extension");
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/provider/ |
HostAuth.java | 71 // NOTE: The server certificate is NEVER automatically retrieved from EmailProvider 187 "Can't specify a certificate alias for a non-secure connection"); 364 * @param clientCertAlias an optional alias to use if a client user certificate is to be 501 // We don't care about the server certificate for equals 525 * Note that the use of client certificate is specified in the URI, a secure connection type
|
/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
VpnTests.java | 124 Log.d(TAG, "certificate file for this vpn is " + vpnInfo.getCertificateFile()); 127 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword()); 333 * @param fileName certificate file name 334 * @param password password to extract certificate file 339 throw new Exception ("vpn profile, certificate file name and password can not be null");
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_ssl.py | 104 # provided solely for this test, to exercise the certificate 359 self.fail("No server certificate on svn.python.org:443!") 367 self.fail("Got server certificate %s for svn.python.org!" % pem) 371 self.fail("No server certificate on svn.python.org:443!") 373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) 377 # certificate. 394 sys.stdout.write("Certificate is:\n%s\n" % 439 certfile=self.server.certificate, 446 # a mismatching protocol version, an invalid certificate, 527 def __init__(self, certificate, ssl_version=None [all...] |
/external/boringssl/src/ssl/ |
s3_clnt.c | 869 * certificate which requires hashing the handshake transcript under a 953 CBS certificate; local 954 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) { 960 data = CBS_data(&certificate); 961 x = d2i_X509(NULL, &data, CBS_len(&certificate)); 967 if (data != CBS_data(&certificate) + CBS_len(&certificate)) { [all...] |
ssl_cert.c | 247 /* Copy any custom client certificate types */ 756 /* Add a certificate to a BUF_MEM structure */ 774 /* Add certificate chain to internal SSL BUF_MEM structure. */ 795 /* If we have a certificate specific chain use it, else use parent ctx. */ 841 /* Build a certificate chain for current certificate */ 926 /* Remove EE certificate from chain */
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingSession.java | 39 import java.security.cert.Certificate; 209 Certificate clientCert = mPairingContext.getClientCertificate(); 210 Certificate serverCert = mPairingContext.getServerCertificate(); 379 Certificate clientCert = mPairingContext.getClientCertificate(); 381 logDebug("Client certificate:"); 385 Certificate serverCert = mPairingContext.getServerCertificate(); 388 logDebug("Server certificate:");
|