HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 776 - 800 of 1381) sorted by null

<<31323334353637383940>>

  /external/jetty/src/java/org/eclipse/jetty/server/ssl/
SslCertificates.java 94 * order of trust. The first certificate in the chain is the one set by the
151 * effective keySize and the client certificate chain.
  /external/jetty/src/resources/org/eclipse/jetty/http/
mime.properties 167 wtls-ca-certificate = application/vnd.wap.wtls-ca-certificate
  /frameworks/base/docs/html/guide/topics/manifest/
permission-element.jd 106 application is signed with the same certificate as the application
114 certificate as the application that declared the permission. Please avoid using this
  /libcore/luni/src/main/java/java/net/
JarURLConnection.java 22 import java.security.cert.Certificate;
110 public Certificate[] getCertificates() throws java.io.IOException {
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 36 import java.security.cert.Certificate;
738 /* Certificate creation notes: certificate should be valid 37273 starting
752 Certificate cert = cf.generateCertificate(is);
768 /* Certificate creation notes: certificate should be valid 37273 starting
782 Certificate cert = cf.generateCertificate(is);
924 Certificate cert = cf.generateCertificate(is);
    [all...]
  /libcore/luni/src/test/java/tests/security/cert/
PolicyQualifierInfoTest.java 284 * Certificate and Certificate Revocation List (CRL) Profile.
  /packages/apps/Nfc/src/com/android/nfc/
NfceeAccessControl.java 57 * signed with the same certificate so in effect UID == certificate
  /external/libvncserver/webclients/java-applet/ssl/
SignedUltraViewerSSL.jar 
SignedVncViewer.jar 
UltraViewerSSL.jar 
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory_ImplTest.java 150 * Base64 encoded X.509 Certificate.
203 * The name of the algorithm used for Certificate/CRL signing.
279 * Tries to generates single CRL/Certificate
486 // -1 means that only 1 (-(-1)) Certificate will be generated
517 // Tests Certificate generation on the base of sequences of heterogeneous
520 // expected size og generated Certificate collection
    [all...]
  /external/boringssl/src/crypto/x509v3/
v3_purp.c 301 * then the verify process will normally reject the certificate.
558 /* can this still be regarded a CA certificate? I doubt it */
682 /* leaf certificate is checked in OCSP_verify() */
691 /* If ca is true we must return if this is a valid CA certificate. */
726 /* Various checks to see if one certificate issued the second.
733 * 3. If key_usage(issuer) exists check it supports certificate signing
  /external/boringssl/src/include/openssl/
ssl3.h 449 /* Client-only: cert_req determines if a client certificate is to be sent.
450 * This is 0 if no client Certificate message is to be sent, 1 if there is
451 * a client certificate, and 2 to send an empty client Certificate
459 /* Client-only: certificate_types contains the set of certificate types
472 /* Server-only: cert_request is true if a client certificate was
  /external/jetty/src/java/org/eclipse/jetty/util/ssl/
SslContextFactory.java 33 import java.security.cert.Certificate;
130 /** SSL certificate alias */
142 /** Set to true if client certificate authentication is required */
144 /** Set to true if client certificate authentication is desired */
169 /** Set to true if SSL certificate validation is required */
171 /** Set to true if SSL certificate of the peer validation is required */
175 /** Path to file that contains Certificate Revocation List */
179 /** Set to true to enable On-Line Certificate Status Protocol (OCSP) support */
250 // Create a trust manager that does not validate certificate chains
277 Certificate cert = _certAlias == null?null:keyStore.getCertificate(_certAlias)
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
172 tlsv1_server_log(conn, "Send Certificate");
185 /* body - Certificate */
193 "for Certificate (cert_len=%lu left=%lu)",
213 * to form a full certificate chain. The client may fail to
217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
  /libcore/luni/src/main/files/cacerts/
450c6e38.0 1 -----BEGIN CERTIFICATE-----
34 -----END CERTIFICATE-----
35 Certificate:
41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 2
45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 2
88 Digital Signature, Certificate Sign, CRL Sign
9ab62355.0 1 -----BEGIN CERTIFICATE-----
34 -----END CERTIFICATE-----
35 Certificate:
41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root EV CA 2
45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root EV CA 2
88 Digital Signature, Certificate Sign, CRL Sign
e60bf0c0.0 1 -----BEGIN CERTIFICATE-----
34 -----END CERTIFICATE-----
35 Certificate:
41 Issuer: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 1
45 Subject: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 1
88 Digital Signature, Certificate Sign, CRL Sign
  /external/boringssl/src/ssl/
internal.h 257 /* SSL_PKEY_* denote certificate types. */
267 * certificate type of |cipher| or -1 if there is none. */
271 * public key in the key exchange, sent in a server Certificate message.
501 /* Chain for this certificate */
536 /* Server-only: client_certificate_types is list of certificate types to
543 * algorithms extension for server or as part of a certificate
568 /* Certificate setup callback: if set is called whenever a
569 * certificate may be required (client or server). the callback
577 /* Optional X509_STORE for chain building or certificate validation
    [all...]
  /external/openssh/
sshd.0 49 Specifies a path to a certificate file to identify sshd during
50 key exchange. The certificate file must match a host key file
306 options. If both certificate restrictions and key options are
325 or a command embedded in a certificate.
382 certificate authentication as a comma-separated list. At least
383 one name from the list must appear in the certificate's list of
384 principals for the certificate to be accepted. This option is
385 ignored for keys that are not marked as trusted certificate
446 the server has presented a certificate for authentication, the key of the
447 certification authority that signed the certificate. For a key to b
    [all...]
sshd.8 123 Specifies a path to a certificate file to identify
126 The certificate file must match a host key file specified using the
531 If both certificate restrictions and key options are present, the most
555 directive or a command embedded in a certificate.
623 line, specifies allowed principals for certificate authentication as a
625 At least one name from the list must appear in the certificate's
626 list of principals for the certificate to be accepted.
627 This option is ignored for keys that are not marked as trusted certificate
716 if the server has presented a certificate for authentication, the key
717 of the certification authority that signed the certificate
    [all...]
  /packages/apps/Email/res/values/
strings.xml 228 the desire for an encrypted session on the selected port, including SSL certificate
238 port, including SSL certificate checks -->
266 <!-- On "Exchange" setup screen, a heading title for the current client certificate, should be uppercase where applicable [CHAR LIMIT=50] -->
267 <string name="account_setup_exchange_certificate_title">CLIENT CERTIFICATE</string>
268 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] -->
270 <!-- On "Exchange" setup screen, a button label to include a client certificate [CHAR LIMIT=35] -->
271 <string name="account_setup_exchange_use_certificate">Use client certificate</string>
272 <!-- On "Exchange" setup screen, a button label to remove the currently used client certificate [CHAR LIMIT=35] -->
275 certificate is used [CHAR LIMIT=50] -->
352 client certificate to connect [CHAR LIMIT=NONE] --
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
X509KeyManagerTest.java 36 Certificate:
80 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerTest
99 + "-----END CERTIFICATE-----";
101 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
230 Certificate:
258 OpenSSL Generated Certificate
274 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
291 + "-----END CERTIFICATE-----";
422 Certificate
    [all...]
  /packages/apps/Browser/res/values-tl/
strings.xml 42 <string name="ssl_warnings_header" msgid="79744901983636370">"May mga problema sa certificate na pangseguridad para sa site na ito."</string>
45 <string name="view_certificate" msgid="1472768887529093862">"Tingnan ang certificate"</string>
47 <string name="ssl_untrusted" msgid="7754507359360636447">"Ang certificate ay hindi mula sa isang pinagkakatiwalaang kinauukulan."</string>
48 <string name="ssl_mismatch" msgid="3809794439740523641">"Ang pangalan ng site ay hindi tumutugma sa pangalan sa certificate."</string>
49 <string name="ssl_expired" msgid="5739349389499575559">"Nag-expire na ang certificate na ito."</string>
50 <string name="ssl_not_yet_valid" msgid="8193083327719048247">"Wala pang bisa ang certificate na ito."</string>
51 <string name="ssl_date_invalid" msgid="3705563379257285534">"Ang certificate ay mayroong di-wastong petsa."</string>
52 <string name="ssl_invalid" msgid="9041704741505449967">"Di-wasto ang certificate na ito."</string>
53 <string name="ssl_unknown" msgid="5679243486524754571">"Hindi kilalang error ng certificate."</string>
    [all...]
  /docs/source.android.com/src/devices/tech/security/verifiedboot/
verified-boot.jd 494 Certificate ::= Certificate OPTIONAL
508 <p>The <code>Certificate</code> field is the full X.509 certificate containing
512 specified in the certificate to verify the signature. Signatures must always be

Completed in 457 milliseconds

<<31323334353637383940>>