HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1101 - 1125 of 2776) sorted by null

<<41424344454647484950>>

  /libcore/luni/src/test/java/tests/security/cert/
CertificateFactory1Test.java 41 import java.security.cert.Certificate;
376 assertTrue("Not empty certificate collection", colCer.isEmpty());
435 Certificate cer;
446 assertNull("Not null certificate was created", cer);
453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty());
577 List<Certificate> list = null;
598 List<Certificate> list = new Vector<Certificate>();
601 List<? extends Certificate> list1 = cp.getCertificates();
609 * incorrect Certificate
    [all...]
  /libcore/ojluni/src/main/java/java/security/cert/
CollectionCertStoreParameters.java 65 * {@code Certificate} or {@code CRL}, that object will be
82 * {@code Certificate}s and {@code CRL}s
102 * Returns the {@code Collection} from which {@code Certificate}s
PolicyNode.java 115 * node's valid policy in the next certificate to be processed.
125 * Returns the criticality indicator of the certificate policy extension
126 * in the most recently processed certificate.
  /libcore/ojluni/src/main/java/sun/security/x509/
CertificateAlgorithmId.java 36 * This class defines the AlgorithmId for the Certificate.
46 * get, set, delete methods of Certificate, x509 type.
63 * Default constructor for the certificate attribute.
CertificateIssuerName.java 38 * This class defines the X500Name attribute for the Certificate.
47 * get, set, delete methods of Certificate, x509 type.
67 * Default constructor for the certificate attribute.
CertificateSubjectName.java 38 * This class defines the X500Name attribute for the Certificate.
47 * get, set, delete methods of Certificate, x509 type.
67 * Default constructor for the certificate attribute.
CertificateX509Key.java 37 * This class defines the X509Key attribute for the Certificate.
46 * get, set, delete methods of Certificate, x509 type.
59 * Default constructor for the certificate attribute.
SubjectKeyIdentifierExtension.java 42 * v3 certificate. For example a "Driving License Certificate" could have
59 * get, set, delete methods of Certificate, x509 type.
CertificateExtensions.java 41 * This class defines the Extensions attribute for the Certificate.
50 * get, set, delete methods of Certificate, x509 type.
148 * the context specific tag as needed in the X.509 v3 certificate.
186 if (!isCertReq) { // certificate
261 * @return a collection view of the extensions in this Certificate.
  /packages/apps/Dialer/java/com/android/voicemail/impl/mail/
MessagingException.java 52 /** The server's SSL certificate couldn't be validated */
64 /** A client SSL certificate is required for connections to the server */
66 /** The client SSL certificate specified is invalid */
  /packages/apps/UnifiedEmail/src/com/android/emailcommon/mail/
MessagingException.java 53 /** The server's SSL certificate couldn't be validated */
65 /** A client SSL certificate is required for connections to the server */
67 /** The client SSL certificate specified is invalid */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libresolv-2.11.1.so 
libresolv.so 
libresolv.so.2 
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/
libresolv-2.15.so 
libresolv.so 
libresolv.so.2 
  /external/wpa_supplicant_8/src/utils/
http_curl.c 934 wpa_printf(MSG_ERROR, "Could not parse certificate");
1001 wpa_printf(MSG_INFO, "No server certificate available");
1002 ctx->last_err = "No server certificate available";
1015 wpa_printf(MSG_INFO, "Server certificate chain - depth=%d err=%d (%s) subject=%s",
1017 debug_dump_cert("Server certificate chain - certificate", cert);
1030 wpa_printf(MSG_INFO, "OCSP: certificate revoked");
1037 "OCSP: bad certificate status response");
1143 debug_dump_cert("OpenSSL: Issuer certificate",
1148 "OpenSSL: Could not add issuer to certificate store")
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
test_ssl.py 108 # provided solely for this test, to exercise the certificate
319 self.fail("No server certificate on svn.python.org:443!")
327 self.fail("Got server certificate %s for svn.python.org!" % pem)
331 self.fail("No server certificate on svn.python.org:443!")
333 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
337 # certificate.
353 sys.stdout.write("Certificate is:\n%s\n" %
398 certfile=self.server.certificate,
405 # a mismatching protocol version, an invalid certificate,
485 def __init__(self, certificate, ssl_version=None,
    [all...]
  /device/linaro/bootloader/edk2/CryptoPkg/Include/Library/
BaseCryptLib.h     [all...]
  /external/curl/lib/vtls/
openssl.c 360 "could not load PEM client certificate, " OSSL_PACKAGE
376 "could not load ASN1 client certificate, " OSSL_PACKAGE
403 /* Load the certificate from the engine */
413 failf(data, "ssl engine didn't initialized the certificate "
419 failf(data, "unable to set client certificate");
426 failf(data, "crypto engine not set, can't load certificate");
432 failf(data, "file type ENG for certificate not implemented");
473 "could not load PKCS12 client certificate, " OSSL_PACKAGE
487 "does not match certificate in same file", cert_file);
490 /* Set Certificate Verification chain *
    [all...]
  /external/ipsec-tools/src/racoon/
racoon.conf.5 184 .Ic certificate
199 .It Ic path certificate Ar path ;
201 will search this directory if a certificate or certificate request is received.
204 will refuse to use a certificate stored outside of this directory.
456 will get the DN from the Subject field in the certificate.
499 Specifies a certificate specification.
505 means a file name of a certificate.
516 Specifies a root certificate authority specification.
522 means a file name of the root certificate authority
    [all...]
  /external/libcups/cups/
http-private.h 118 extern bool SecCertificateIsValid(SecCertificateRef certificate, CFAbsoluteTime verifyTime);
119 extern CFAbsoluteTime SecCertificateNotValidAfter(SecCertificateRef certificate);
121 extern SecIdentityRef SecIdentityCreate(CFAllocatorRef allocator, SecCertificateRef certificate, SecKeyRef privateKey);
244 PCCERT_CONTEXT localCert, /* Local certificate */
245 remoteCert; /* Remote (peer's) certificate */
  /libcore/luni/src/test/java/libcore/java/security/cert/
X509CertificateTest.java 41 import java.security.cert.Certificate;
400 * The certificate validity periods in the test certificate MUST lie
543 /* This certificate has no unique ID. */
547 // TODO: generate certificate that has a SubjectUniqueID field.
551 /* This certificate has no unique ID. */
555 // TODO: generate certificate that has a IssuerUniqueID field.
607 /* The test certificate is sha1WithRSAEncryption */
613 /* The test certificate is sha1WithRSAEncryption */
619 /* The test certificate is sha1WithRSAEncryption *
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client_test.go 118 // cert, if not empty, contains a DER-encoded certificate for the
604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
    [all...]

Completed in 328 milliseconds

<<41424344454647484950>>