/external/jetty/src/java/org/eclipse/jetty/server/ssl/ |
SslCertificates.java | 94 * order of trust. The first certificate in the chain is the one set by the 151 * effective keySize and the client certificate chain.
|
/external/jetty/src/resources/org/eclipse/jetty/http/ |
mime.properties | 167 wtls-ca-certificate = application/vnd.wap.wtls-ca-certificate
|
/frameworks/base/docs/html/guide/topics/manifest/ |
permission-element.jd | 106 application is signed with the same certificate as the application 114 certificate as the application that declared the permission. Please avoid using this
|
/libcore/luni/src/main/java/java/net/ |
JarURLConnection.java | 22 import java.security.cert.Certificate; 110 public Certificate[] getCertificates() throws java.io.IOException {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 36 import java.security.cert.Certificate; 738 /* Certificate creation notes: certificate should be valid 37273 starting 752 Certificate cert = cf.generateCertificate(is); 768 /* Certificate creation notes: certificate should be valid 37273 starting 782 Certificate cert = cf.generateCertificate(is); 924 Certificate cert = cf.generateCertificate(is); [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
PolicyQualifierInfoTest.java | 284 * Certificate and Certificate Revocation List (CRL) Profile.
|
/packages/apps/Nfc/src/com/android/nfc/ |
NfceeAccessControl.java | 57 * signed with the same certificate so in effect UID == certificate
|
/external/libvncserver/webclients/java-applet/ssl/ |
SignedUltraViewerSSL.jar | |
SignedVncViewer.jar | |
UltraViewerSSL.jar | |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 150 * Base64 encoded X.509 Certificate. 203 * The name of the algorithm used for Certificate/CRL signing. 279 * Tries to generates single CRL/Certificate 486 // -1 means that only 1 (-(-1)) Certificate will be generated 517 // Tests Certificate generation on the base of sequences of heterogeneous 520 // expected size og generated Certificate collection [all...] |
/external/boringssl/src/crypto/x509v3/ |
v3_purp.c | 301 * then the verify process will normally reject the certificate. 558 /* can this still be regarded a CA certificate? I doubt it */ 682 /* leaf certificate is checked in OCSP_verify() */ 691 /* If ca is true we must return if this is a valid CA certificate. */ 726 /* Various checks to see if one certificate issued the second. 733 * 3. If key_usage(issuer) exists check it supports certificate signing
|
/external/boringssl/src/include/openssl/ |
ssl3.h | 449 /* Client-only: cert_req determines if a client certificate is to be sent. 450 * This is 0 if no client Certificate message is to be sent, 1 if there is 451 * a client certificate, and 2 to send an empty client Certificate 459 /* Client-only: certificate_types contains the set of certificate types 472 /* Server-only: cert_request is true if a client certificate was
|
/external/jetty/src/java/org/eclipse/jetty/util/ssl/ |
SslContextFactory.java | 33 import java.security.cert.Certificate; 130 /** SSL certificate alias */ 142 /** Set to true if client certificate authentication is required */ 144 /** Set to true if client certificate authentication is desired */ 169 /** Set to true if SSL certificate validation is required */ 171 /** Set to true if SSL certificate of the peer validation is required */ 175 /** Path to file that contains Certificate Revocation List */ 179 /** Set to true to enable On-Line Certificate Status Protocol (OCSP) support */ 250 // Create a trust manager that does not validate certificate chains 277 Certificate cert = _certAlias == null?null:keyStore.getCertificate(_certAlias) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 172 tlsv1_server_log(conn, "Send Certificate"); 185 /* body - Certificate */ 193 "for Certificate (cert_len=%lu left=%lu)", 213 * to form a full certificate chain. The client may fail to 217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
|
/libcore/luni/src/main/files/cacerts/ |
450c6e38.0 | 1 -----BEGIN CERTIFICATE----- 34 -----END CERTIFICATE----- 35 Certificate: 41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 2 45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 2 88 Digital Signature, Certificate Sign, CRL Sign
|
9ab62355.0 | 1 -----BEGIN CERTIFICATE----- 34 -----END CERTIFICATE----- 35 Certificate: 41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root EV CA 2 45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root EV CA 2 88 Digital Signature, Certificate Sign, CRL Sign
|
e60bf0c0.0 | 1 -----BEGIN CERTIFICATE----- 34 -----END CERTIFICATE----- 35 Certificate: 41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 1 45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 1 88 Digital Signature, Certificate Sign, CRL Sign
|
/external/boringssl/src/ssl/ |
internal.h | 257 /* SSL_PKEY_* denote certificate types. */ 267 * certificate type of |cipher| or -1 if there is none. */ 271 * public key in the key exchange, sent in a server Certificate message. 501 /* Chain for this certificate */ 536 /* Server-only: client_certificate_types is list of certificate types to 543 * algorithms extension for server or as part of a certificate 568 /* Certificate setup callback: if set is called whenever a 569 * certificate may be required (client or server). the callback 577 /* Optional X509_STORE for chain building or certificate validation [all...] |
/external/openssh/ |
sshd.0 | 49 Specifies a path to a certificate file to identify sshd during 50 key exchange. The certificate file must match a host key file 306 options. If both certificate restrictions and key options are 325 or a command embedded in a certificate. 382 certificate authentication as a comma-separated list. At least 383 one name from the list must appear in the certificate's list of 384 principals for the certificate to be accepted. This option is 385 ignored for keys that are not marked as trusted certificate 446 the server has presented a certificate for authentication, the key of the 447 certification authority that signed the certificate. For a key to b [all...] |
sshd.8 | 123 Specifies a path to a certificate file to identify 126 The certificate file must match a host key file specified using the 531 If both certificate restrictions and key options are present, the most 555 directive or a command embedded in a certificate. 623 line, specifies allowed principals for certificate authentication as a 625 At least one name from the list must appear in the certificate's 626 list of principals for the certificate to be accepted. 627 This option is ignored for keys that are not marked as trusted certificate 716 if the server has presented a certificate for authentication, the key 717 of the certification authority that signed the certificate [all...] |
/packages/apps/Email/res/values/ |
strings.xml | 228 the desire for an encrypted session on the selected port, including SSL certificate 238 port, including SSL certificate checks --> 266 <!-- On "Exchange" setup screen, a heading title for the current client certificate, should be uppercase where applicable [CHAR LIMIT=50] --> 267 <string name="account_setup_exchange_certificate_title">CLIENT CERTIFICATE</string> 268 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] --> 270 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] --> 271 <string name="account_setup_exchange_use_certificate">Use client certificate</string> 272 <!-- On "Exchange" setup screen, a button label to remove the currently used client certificate [CHAR LIMIT=35] --> 275 certificate is used [CHAR LIMIT=50] --> 352 client certificate to connect [CHAR LIMIT=NONE] -- [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509KeyManagerTest.java | 36 Certificate: 80 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerTest 99 + "-----END CERTIFICATE-----"; 101 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 230 Certificate: 258 OpenSSL Generated Certificate 274 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 291 + "-----END CERTIFICATE-----"; 422 Certificate [all...] |
/packages/apps/Browser/res/values-tl/ |
strings.xml | 42 <string name="ssl_warnings_header" msgid="79744901983636370">"May mga problema sa certificate na pangseguridad para sa site na ito."</string> 45 <string name="view_certificate" msgid="1472768887529093862">"Tingnan ang certificate"</string> 47 <string name="ssl_untrusted" msgid="7754507359360636447">"Ang certificate ay hindi mula sa isang pinagkakatiwalaang kinauukulan."</string> 48 <string name="ssl_mismatch" msgid="3809794439740523641">"Ang pangalan ng site ay hindi tumutugma sa pangalan sa certificate."</string> 49 <string name="ssl_expired" msgid="5739349389499575559">"Nag-expire na ang certificate na ito."</string> 50 <string name="ssl_not_yet_valid" msgid="8193083327719048247">"Wala pang bisa ang certificate na ito."</string> 51 <string name="ssl_date_invalid" msgid="3705563379257285534">"Ang certificate ay mayroong di-wastong petsa."</string> 52 <string name="ssl_invalid" msgid="9041704741505449967">"Di-wasto ang certificate na ito."</string> 53 <string name="ssl_unknown" msgid="5679243486524754571">"Hindi kilalang error ng certificate."</string> [all...] |
/docs/source.android.com/src/devices/tech/security/verifiedboot/ |
verified-boot.jd | 494 Certificate ::= Certificate OPTIONAL 508 <p>The <code>Certificate</code> field is the full X.509 certificate containing 512 specified in the certificate to verify the signature. Signatures must always be
|