/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 41 import java.security.cert.Certificate; 376 assertTrue("Not empty certificate collection", colCer.isEmpty()); 435 Certificate cer; 446 assertNull("Not null certificate was created", cer); 453 assertTrue("Not empty certificate Collection was created", colCer.isEmpty()); 577 List<Certificate> list = null; 598 List<Certificate> list = new Vector<Certificate>(); 601 List<? extends Certificate> list1 = cp.getCertificates(); 609 * incorrect Certificate [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
CollectionCertStoreParameters.java | 65 * {@code Certificate} or {@code CRL}, that object will be 82 * {@code Certificate}s and {@code CRL}s 102 * Returns the {@code Collection} from which {@code Certificate}s
|
PolicyNode.java | 115 * node's valid policy in the next certificate to be processed. 125 * Returns the criticality indicator of the certificate policy extension 126 * in the most recently processed certificate.
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
CertificateAlgorithmId.java | 36 * This class defines the AlgorithmId for the Certificate. 46 * get, set, delete methods of Certificate, x509 type. 63 * Default constructor for the certificate attribute.
|
CertificateIssuerName.java | 38 * This class defines the X500Name attribute for the Certificate. 47 * get, set, delete methods of Certificate, x509 type. 67 * Default constructor for the certificate attribute.
|
CertificateSubjectName.java | 38 * This class defines the X500Name attribute for the Certificate. 47 * get, set, delete methods of Certificate, x509 type. 67 * Default constructor for the certificate attribute.
|
CertificateX509Key.java | 37 * This class defines the X509Key attribute for the Certificate. 46 * get, set, delete methods of Certificate, x509 type. 59 * Default constructor for the certificate attribute.
|
SubjectKeyIdentifierExtension.java | 42 * v3 certificate. For example a "Driving License Certificate" could have 59 * get, set, delete methods of Certificate, x509 type.
|
CertificateExtensions.java | 41 * This class defines the Extensions attribute for the Certificate. 50 * get, set, delete methods of Certificate, x509 type. 148 * the context specific tag as needed in the X.509 v3 certificate. 186 if (!isCertReq) { // certificate 261 * @return a collection view of the extensions in this Certificate.
|
/packages/apps/Dialer/java/com/android/voicemail/impl/mail/ |
MessagingException.java | 52 /** The server's SSL certificate couldn't be validated */ 64 /** A client SSL certificate is required for connections to the server */ 66 /** The client SSL certificate specified is invalid */
|
/packages/apps/UnifiedEmail/src/com/android/emailcommon/mail/ |
MessagingException.java | 53 /** The server's SSL certificate couldn't be validated */ 65 /** A client SSL certificate is required for connections to the server */ 67 /** The client SSL certificate specified is invalid */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libresolv-2.11.1.so | |
libresolv.so | |
libresolv.so.2 | |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/ |
libresolv-2.15.so | |
libresolv.so | |
libresolv.so.2 | |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 934 wpa_printf(MSG_ERROR, "Could not parse certificate"); 1001 wpa_printf(MSG_INFO, "No server certificate available"); 1002 ctx->last_err = "No server certificate available"; 1015 wpa_printf(MSG_INFO, "Server certificate chain - depth=%d err=%d (%s) subject=%s", 1017 debug_dump_cert("Server certificate chain - certificate", cert); 1030 wpa_printf(MSG_INFO, "OCSP: certificate revoked"); 1037 "OCSP: bad certificate status response"); 1143 debug_dump_cert("OpenSSL: Issuer certificate", 1148 "OpenSSL: Could not add issuer to certificate store") [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_ssl.py | 108 # provided solely for this test, to exercise the certificate
319 self.fail("No server certificate on svn.python.org:443!")
327 self.fail("Got server certificate %s for svn.python.org!" % pem)
331 self.fail("No server certificate on svn.python.org:443!")
333 sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
337 # certificate.
353 sys.stdout.write("Certificate is:\n%s\n" %
398 certfile=self.server.certificate,
405 # a mismatching protocol version, an invalid certificate,
485 def __init__(self, certificate, ssl_version=None, [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Include/Library/ |
BaseCryptLib.h | [all...] |
/external/curl/lib/vtls/ |
openssl.c | 360 "could not load PEM client certificate, " OSSL_PACKAGE 376 "could not load ASN1 client certificate, " OSSL_PACKAGE 403 /* Load the certificate from the engine */ 413 failf(data, "ssl engine didn't initialized the certificate " 419 failf(data, "unable to set client certificate"); 426 failf(data, "crypto engine not set, can't load certificate"); 432 failf(data, "file type ENG for certificate not implemented"); 473 "could not load PKCS12 client certificate, " OSSL_PACKAGE 487 "does not match certificate in same file", cert_file); 490 /* Set Certificate Verification chain * [all...] |
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | 184 .Ic certificate 199 .It Ic path certificate Ar path ; 201 will search this directory if a certificate or certificate request is received. 204 will refuse to use a certificate stored outside of this directory. 456 will get the DN from the Subject field in the certificate. 499 Specifies a certificate specification. 505 means a file name of a certificate. 516 Specifies a root certificate authority specification. 522 means a file name of the root certificate authority [all...] |
/external/libcups/cups/ |
http-private.h | 118 extern bool SecCertificateIsValid(SecCertificateRef certificate, CFAbsoluteTime verifyTime); 119 extern CFAbsoluteTime SecCertificateNotValidAfter(SecCertificateRef certificate); 121 extern SecIdentityRef SecIdentityCreate(CFAllocatorRef allocator, SecCertificateRef certificate, SecKeyRef privateKey); 244 PCCERT_CONTEXT localCert, /* Local certificate */ 245 remoteCert; /* Remote (peer's) certificate */
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertificateTest.java | 41 import java.security.cert.Certificate; 400 * The certificate validity periods in the test certificate MUST lie 543 /* This certificate has no unique ID. */ 547 // TODO: generate certificate that has a SubjectUniqueID field. 551 /* This certificate has no unique ID. */ 555 // TODO: generate certificate that has a IssuerUniqueID field. 607 /* The test certificate is sha1WithRSAEncryption */ 613 /* The test certificate is sha1WithRSAEncryption */ 619 /* The test certificate is sha1WithRSAEncryption * [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client_test.go | 118 // cert, if not empty, contains a DER-encoded certificate for the 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 1103 verifyCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1122 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1128 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { 1150 config.VerifyPeerCertificate = func(rawCerts [][]byte, validatedChains [][]*x509.Certificate) error { [all...] |