HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1251 - 1275 of 2776) sorted by null

<<51525354555657585960>>

  /external/curl/tests/certs/
Server-localhost0h-sv.pem 25 # the certificate
42 Certificate:
102 -----BEGIN CERTIFICATE-----
121 -----END CERTIFICATE-----
  /external/elfutils/
CONTRIBUTING 23 Developer's Certificate of Origin
  /external/ipsec-tools/src/racoon/
strnames.c 197 { ISAKMP_CERT_PKCS7, "PKCS #7 wrapped X.509 certificate", NULL },
198 { ISAKMP_CERT_PGP, "PGP Certificate", NULL },
200 { ISAKMP_CERT_X509SIGN, "X.509 Certificate Signature", NULL },
201 { ISAKMP_CERT_X509KE, "X.509 Certificate Key Exchange", NULL },
203 { ISAKMP_CERT_CRL, "Certificate Revocation List (CRL)", NULL },
205 { ISAKMP_CERT_SPKI, "SPKI Certificate", NULL },
206 { ISAKMP_CERT_X509ATTR, "X.509 Certificate Attribute", NULL },
264 { ISAKMP_NTYPE_INVALID_CERTIFICATE, "INVALID-CERTIFICATE", NULL },
272 { ISAKMP_NTYPE_CERTIFICATE_UNAVAILABLE, "CERTIFICATE-UNAVAILABLE", NULL },
  /external/libchrome/crypto/
scoped_capi_types.h 44 // scoped_ptr-like class for the CryptoAPI cryptography and certificate
  /external/libvncserver/libvncclient/
tls_gnutls.c 291 rfbClientLog("No CA certificate provided.\n");
313 rfbClientLog("Cannot load client certificate or key: %s.\n", gnutls_strerror(ret));
319 rfbClientLog("No client certificate or key provided.\n");
451 /* TODO: validate certificate */
  /external/okhttp/okhttp-android-support/src/main/java/com/squareup/okhttp/internal/huc/
JavaApiConverter.java 41 import java.security.cert.Certificate;
118 Certificate[] peerCertificates;
125 Certificate[] localCertificates = httpsUrlConnection.getLocalCertificates();
242 List<Certificate> peerCertificates;
248 List<Certificate> localCertificates = javaSecureCacheResponse.getLocalCertificateChain();
301 public List<Certificate> getLocalCertificateChain() {
304 List<Certificate> certificates = handshake.localCertificates();
309 public List<Certificate> getServerCertificateChain() throws SSLPeerUnverifiedException {
312 List<Certificate> certificates = handshake.peerCertificates();
  /external/openssh/
ssh.h 22 * Maximum number of certificate files that can be specified
  /external/protobuf/protoc-artifacts/
Dockerfile 17 RUN wget -q --no-cookies --no-check-certificate \
  /external/vogar/src/vogar/
JavaVm.java 67 * creating a self-signed X509 certificate. Needs to be run
  /external/webrtc/webrtc/base/
sslfingerprint.cc 28 return Create(algorithm, &(identity->certificate()));
  /external/webrtc/webrtc/p2p/base/
transport.h 187 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {}
189 // Get a copy of the local certificate provided by SetLocalCertificate.
191 rtc::scoped_refptr<rtc::RTCCertificate>* certificate) {
195 // Get a copy of the remote certificate in use by the specified channel.
  /external/wpa_supplicant_8/
CONTRIBUTIONS 15 the Developer Certificate of Origin (DCO) version 1.1 terms (see below;
22 To indicate your acceptance of Developer's Certificate of Origin 1.1
98 Developer Certificate of Origin
109 Developer's Certificate of Origin 1.1
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls.c 226 "EAP-TLS: External certificate check succeeded - continue handshake");
235 "EAP-TLS: External certificate check failed - force authentication failure");
243 "EAP-TLS: Continuing to wait external server certificate validation");
270 "EAP-TLS: Waiting external server certificate validation");
  /frameworks/base/core/java/android/net/
SSLCertificateSocketFactory.java 53 * <li>Optionally bypass all SSL certificate checks
63 * This implementation does check the server's certificate hostname, but only
70 * {@link HostnameVerifier} to verify the certificate hostname.
73 * SSL certificate and hostname checks for testing purposes. This setting
176 * Verify the hostname of the certificate used by the other end of a
182 * so "foo.bar.example.com" is verified if the peer has a certificate
435 * <p>This method verifies the peer's certificate hostname after connecting
508 * <p>This method verifies the peer's certificate hostname after connecting
529 * <p>This method verifies the peer's certificate hostname after connecting
  /frameworks/base/tests/CoreTests/android/core/
TestEventHandler.java 445 * Implements the EventHandler certificate method called every
448 public void certificate(SslCertificate certificate) {} method in class:TestEventHandler
496 * SSL certificate error callback. Handles SSL error(s) on the way
505 " certificate: " + error.getCertificate());
510 expectDetails.append("SSL Certificate error event received "+
527 if (expectSslErrors == -1) // && expectSslCertificate == certificate?
730 public void expectSSLCertificateError(SslCertificate certificate) {
732 expectCertificate = certificate;
  /frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
NetworkSecurityConfigTests.java 28 import java.security.cert.Certificate;
89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES));
278 preNCerts.add(anchor.certificate);
282 nCerts.add(anchor.certificate);
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
CarrierKeyDownloadMgrTest.java 66 private static final String CERT = "-----BEGIN CERTIFICATE-----\r\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\r\n-----END CERTIFICATE-----";
69 private String mJsonStr = "{ \"carrier-keys\": [ { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"certificate\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
  /hardware/interfaces/drm/1.0/
IDrmPlugin.hal 173 * provisioning server to retrieve a device certificate. getProvisionRequest
177 * @param certificateType the type of certificate requested, e.g. "X.509"
178 * @param certificateAuthority identifies the certificate authority. A
179 * certificate authority (CA) is an entity which issues digital certificates
185 * @return request if successful the opaque certificate request blob
208 * @return certificate the public certificate resulting from the provisioning
209 * operation, if any. An empty vector indicates that no certificate was
216 vec<uint8_t> certificate, vec<uint8_t> wrappedKey);
  /libcore/luni/src/main/java/java/security/
security.properties 60 # The following Android-only property controls peer certificate validation.
  /libcore/luni/src/main/java/libcore/util/
RecoverySystem.java 44 // Take the first certificate from the signature (packages
  /libcore/ojluni/src/main/java/java/security/
PrivateKey.java 49 * @see Certificate
  /libcore/ojluni/src/main/java/javax/net/ssl/
HostnameVerifier.java 36 * The policies can be certificate-based
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
AdjacencyList.java 39 * <code>Certificate</code>. Specifically, a <code>Vertex</code> object
40 * contains a <code>Certificate</code> and an index value referencing the
69 * <code>Certificate</code> that the builder is considering at this point in
70 * the build. <code>FOLLOW</code> denotes a <code>Certificate</code> (one of
  /libcore/support/src/test/java/tests/resources/x509/
default.cnf 91 certificate = $dir/cacert.pem # The CA certificate
102 cert_opt = ca_default # Certificate field options
143 req_extensions = v3_req # The extensions to add to a certificate request
  /libcore/support/src/test/java/tests/support/
Support_ProviderTrust.java 85 // Certificate

Completed in 630 milliseconds

<<51525354555657585960>>