HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 701 - 725 of 1381) sorted by null

<<21222324252627282930>>

  /packages/apps/Email/src/com/android/email/activity/setup/
CheckSettingsErrorDialogFragment.java 44 * Called to indicate the user wants to resolve the error by changing the client certificate
92 // Certificate error - show two buttons so the host fragment can auto pop
  /system/extras/verity/
generate_verity_key.c 134 printf("Failed to read PEM certificate from file '%s'\n", pem_file);
140 printf("Failed to extract public key from certificate '%s'\n", pem_file);
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 107 * ca_cert - CA certificate for Interworking network selection
112 * client_cert - File path to client certificate file (PEM/DER)
115 * where client certificate/private key is used for authentication
128 * commented out. Both the private key and certificate will be read
133 * Windows certificate store can be used by leaving client_cert out and
143 * certificate store (My user account) is used, whereas computer store
171 * server certificate in SubjectAltName dNSName element(s). If a
177 * included in the certificate. The certificate may include additional
294 * ocsp - Whether to use/require OCSP to check server certificate
    [all...]
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 29 generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
30 processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
36 processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
37 generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
48 // certificate is ECDSA. If this is not set then the cipher suite is
runner.go 48 var rsaCertificate, ecdsaCertificate Certificate
94 func getRSACertificate() Certificate {
99 func getECDSACertificate() Certificate {
157 // certFile is the path to the certificate to use for the server.
228 Certificates: []Certificate{getECDSACertificate()},
240 Certificates: []Certificate{getECDSACertificate()},
287 "-expect-certificate-types",
301 expectedLocalError: "client didn't provide a certificate",
666 Certificates: []Certificate{getECDSACertificate()},
678 Certificates: []Certificate{getRSACertificate()}
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedData.java 33 * the certificate isn't verified, just the fact that one of the certs
185 // certificate chain.
261 * Return any X.509 certificate objects in this SignedData structure as a Store of X509CertificateHolder objects.
281 * Return any X.509 attribute certificate objects in this SignedData structure as a Store of X509AttributeCertificateHolder objects.
493 * Replace the certificate and CRL information associated with this
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar 
  /external/openssh/
authfile.c 403 /* Load the certificate associated with the named private key */
434 /* Load private key and certificate */
462 /* Make sure the private key matches the certificate */
487 * If "check_ca" is set and "key" is a certificate, then its CA key is
549 * This will check both the key and, if it is a certificate, its CA key too.
auth2-pubkey.c 395 * their username in the certificate principals list.
400 reason = "Certificate does not contain an "
416 verbose("Accepted certificate ID \"%s\" "
445 /* Authenticate a certificate key against TrustedUserCAKeys */
468 * If AuthorizedPrincipals is in use, then compare the certificate
474 reason = "Certificate does not contain an "
488 verbose("Accepted certificate ID \"%s\" signed by %s CA %s via %s",
  /external/wpa_supplicant_8/hs20/client/
est.c 464 wpa_printf(MSG_MSGDUMP, "OpenSSL: Certificate request:\n%s",
671 wpa_printf(MSG_INFO, "EST certificate enrollment failed");
672 write_result(ctx, "EST certificate enrollment failed");
704 wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file");
705 write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file");
  /external/wpa_supplicant_8/hs20/server/ca/
setup.sh 106 echo " * Sign Root CA certificate"
107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
127 echo " * Sign Intermediate CA certificate"
128 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PASS -days 730 -extensions ext_server -policy policy_osu_server || fail "Failed to sign server certificate"
  /frameworks/base/docs/html/training/safetynet/
index.jd 248 certificate used to sign requesting app"],
276 <li>Extract the SSL certificate chain from the JWS message.
279 <li>Validate the SSL certificate chain and use SSL hostname matching to verify that the leaf
280 certificate was issued to the hostname {@code attest.android.com}.
283 <li>Use the certificate to verify the signature of the JWS message.
  /libcore/luni/src/main/files/cacerts/
f61bff45.0 1 -----BEGIN CERTIFICATE-----
43 -----END CERTIFICATE-----
44 Certificate:
85 X509v3 Certificate Policies:
98 Certificate Sign, CRL Sign
33815e15.0 1 -----BEGIN CERTIFICATE-----
44 -----END CERTIFICATE-----
45 Certificate:
50 Issuer: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
54 Subject: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
99 Digital Signature, Key Encipherment, Key Agreement, Certificate Sign, CRL Sign
110 X509v3 Certificate Policies:
33815e15.1 1 -----BEGIN CERTIFICATE-----
43 -----END CERTIFICATE-----
44 Certificate:
49 Issuer: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
53 Subject: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
98 Certificate Sign, CRL Sign
104 X509v3 Certificate Policies:
9339512a.0 1 -----BEGIN CERTIFICATE-----
38 -----END CERTIFICATE-----
39 Certificate:
92 X509v3 Certificate Policies:
95 Explicit Text: Any use of this Certificate constitutes acceptance of the QuoVadis Root CA 3 Certificate Policy / Certification Practice Statement.
99 Certificate Sign, CRL Sign
  /libcore/luni/src/main/java/java/security/cert/
X509CRLSelector.java 53 // the certificate being checked
258 * Sets a certificate hint to find CRLs. It's not a criterion but may help
262 * the certificate hint or {@code null}.
351 * Returns the certificate hint to find CRLs. It's not a criterion but may
354 * @return the certificate hint or {@code null} if none set.
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/
Extension.java 39 * with the Extension part of X.509 certificate
42 * Certificate and Certificate Revocation List (CRL) Profile.
59 // certificate extensions:
331 sb.append("Certificate Policies Extension");
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/provider/
HostAuth.java 71 // NOTE: The server certificate is NEVER automatically retrieved from EmailProvider
187 "Can't specify a certificate alias for a non-secure connection");
364 * @param clientCertAlias an optional alias to use if a client user certificate is to be
501 // We don't care about the server certificate for equals
525 * Note that the use of client certificate is specified in the URI, a secure connection type
  /packages/apps/Settings/tests/src/com/android/settings/vpn2/
VpnTests.java 124 Log.d(TAG, "certificate file for this vpn is " + vpnInfo.getCertificateFile());
127 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword());
333 * @param fileName certificate file name
334 * @param password password to extract certificate file
339 throw new Exception ("vpn profile, certificate file name and password can not be null");
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_ssl.py 104 # provided solely for this test, to exercise the certificate
359 self.fail("No server certificate on svn.python.org:443!")
367 self.fail("Got server certificate %s for svn.python.org!" % pem)
371 self.fail("No server certificate on svn.python.org:443!")
373 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
377 # certificate.
394 sys.stdout.write("Certificate is:\n%s\n" %
439 certfile=self.server.certificate,
446 # a mismatching protocol version, an invalid certificate,
527 def __init__(self, certificate, ssl_version=None
    [all...]
  /external/boringssl/src/ssl/
s3_clnt.c 869 * certificate which requires hashing the handshake transcript under a
953 CBS certificate; local
954 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) {
960 data = CBS_data(&certificate);
961 x = d2i_X509(NULL, &data, CBS_len(&certificate));
967 if (data != CBS_data(&certificate) + CBS_len(&certificate)) {
    [all...]
ssl_cert.c 247 /* Copy any custom client certificate types */
756 /* Add a certificate to a BUF_MEM structure */
774 /* Add certificate chain to internal SSL BUF_MEM structure. */
795 /* If we have a certificate specific chain use it, else use parent ctx. */
841 /* Build a certificate chain for current certificate */
926 /* Remove EE certificate from chain */
  /external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
PairingSession.java 39 import java.security.cert.Certificate;
209 Certificate clientCert = mPairingContext.getClientCertificate();
210 Certificate serverCert = mPairingContext.getServerCertificate();
379 Certificate clientCert = mPairingContext.getClientCertificate();
381 logDebug("Client certificate:");
385 Certificate serverCert = mPairingContext.getServerCertificate();
388 logDebug("Server certificate:");

Completed in 769 milliseconds

<<21222324252627282930>>