OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
1251 - 1275
of
2776
) sorted by null
<<
51
52
53
54
55
56
57
58
59
60
>>
/external/curl/tests/certs/
Server-localhost0h-sv.pem
25
# the
certificate
42
Certificate
:
102
-----BEGIN
CERTIFICATE
-----
121
-----END
CERTIFICATE
-----
/external/elfutils/
CONTRIBUTING
23
Developer's
Certificate
of Origin
/external/ipsec-tools/src/racoon/
strnames.c
197
{ ISAKMP_CERT_PKCS7, "PKCS #7 wrapped X.509
certificate
", NULL },
198
{ ISAKMP_CERT_PGP, "PGP
Certificate
", NULL },
200
{ ISAKMP_CERT_X509SIGN, "X.509
Certificate
Signature", NULL },
201
{ ISAKMP_CERT_X509KE, "X.509
Certificate
Key Exchange", NULL },
203
{ ISAKMP_CERT_CRL, "
Certificate
Revocation List (CRL)", NULL },
205
{ ISAKMP_CERT_SPKI, "SPKI
Certificate
", NULL },
206
{ ISAKMP_CERT_X509ATTR, "X.509
Certificate
Attribute", NULL },
264
{ ISAKMP_NTYPE_INVALID_CERTIFICATE, "INVALID-
CERTIFICATE
", NULL },
272
{ ISAKMP_NTYPE_CERTIFICATE_UNAVAILABLE, "
CERTIFICATE
-UNAVAILABLE", NULL },
/external/libchrome/crypto/
scoped_capi_types.h
44
// scoped_ptr-like class for the CryptoAPI cryptography and
certificate
/external/libvncserver/libvncclient/
tls_gnutls.c
291
rfbClientLog("No CA
certificate
provided.\n");
313
rfbClientLog("Cannot load client
certificate
or key: %s.\n", gnutls_strerror(ret));
319
rfbClientLog("No client
certificate
or key provided.\n");
451
/* TODO: validate
certificate
*/
/external/okhttp/okhttp-android-support/src/main/java/com/squareup/okhttp/internal/huc/
JavaApiConverter.java
41
import java.security.cert.
Certificate
;
118
Certificate
[] peerCertificates;
125
Certificate
[] localCertificates = httpsUrlConnection.getLocalCertificates();
242
List<
Certificate
> peerCertificates;
248
List<
Certificate
> localCertificates = javaSecureCacheResponse.getLocalCertificateChain();
301
public List<
Certificate
> getLocalCertificateChain() {
304
List<
Certificate
> certificates = handshake.localCertificates();
309
public List<
Certificate
> getServerCertificateChain() throws SSLPeerUnverifiedException {
312
List<
Certificate
> certificates = handshake.peerCertificates();
/external/openssh/
ssh.h
22
* Maximum number of
certificate
files that can be specified
/external/protobuf/protoc-artifacts/
Dockerfile
17
RUN wget -q --no-cookies --no-check-
certificate
\
/external/vogar/src/vogar/
JavaVm.java
67
* creating a self-signed X509
certificate
. Needs to be run
/external/webrtc/webrtc/base/
sslfingerprint.cc
28
return Create(algorithm, &(identity->
certificate
()));
/external/webrtc/webrtc/p2p/base/
transport.h
187
const rtc::scoped_refptr<rtc::RTCCertificate>&
certificate
) {}
189
// Get a copy of the local
certificate
provided by SetLocalCertificate.
191
rtc::scoped_refptr<rtc::RTCCertificate>*
certificate
) {
195
// Get a copy of the remote
certificate
in use by the specified channel.
/external/wpa_supplicant_8/
CONTRIBUTIONS
15
the Developer
Certificate
of Origin (DCO) version 1.1 terms (see below;
22
To indicate your acceptance of Developer's
Certificate
of Origin 1.1
98
Developer
Certificate
of Origin
109
Developer's
Certificate
of Origin 1.1
/external/wpa_supplicant_8/src/eap_peer/
eap_tls.c
226
"EAP-TLS: External
certificate
check succeeded - continue handshake");
235
"EAP-TLS: External
certificate
check failed - force authentication failure");
243
"EAP-TLS: Continuing to wait external server
certificate
validation");
270
"EAP-TLS: Waiting external server
certificate
validation");
/frameworks/base/core/java/android/net/
SSLCertificateSocketFactory.java
53
* <li>Optionally bypass all SSL
certificate
checks
63
* This implementation does check the server's
certificate
hostname, but only
70
* {@link HostnameVerifier} to verify the
certificate
hostname.
73
* SSL
certificate
and hostname checks for testing purposes. This setting
176
* Verify the hostname of the
certificate
used by the other end of a
182
* so "foo.bar.example.com" is verified if the peer has a
certificate
435
* <p>This method verifies the peer's
certificate
hostname after connecting
508
* <p>This method verifies the peer's
certificate
hostname after connecting
529
* <p>This method verifies the peer's
certificate
hostname after connecting
/frameworks/base/tests/CoreTests/android/core/
TestEventHandler.java
445
* Implements the EventHandler
certificate
method called every
448
public void
certificate
(SslCertificate
certificate
) {}
method in class:TestEventHandler
496
* SSL
certificate
error callback. Handles SSL error(s) on the way
505
"
certificate
: " + error.getCertificate());
510
expectDetails.append("SSL
Certificate
error event received "+
527
if (expectSslErrors == -1) // && expectSslCertificate ==
certificate
?
730
public void expectSSLCertificateError(SslCertificate
certificate
) {
732
expectCertificate =
certificate
;
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
NetworkSecurityConfigTests.java
28
import java.security.cert.
Certificate
;
89
Certificate
cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES));
278
preNCerts.add(anchor.
certificate
);
282
nCerts.add(anchor.
certificate
);
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
CarrierKeyDownloadMgrTest.java
66
private static final String CERT = "-----BEGIN
CERTIFICATE
-----\r\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\r\n-----END
CERTIFICATE
-----";
69
private String mJsonStr = "{ \"carrier-keys\": [ { \"
certificate
\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }, { \"
certificate
\": \"" + CERT + "\", \"key-type\": \"WLAN\", \"key-identifier\": \"key1=value\", \"expiration-date\": 1502577746000 }]}";
/hardware/interfaces/drm/1.0/
IDrmPlugin.hal
173
* provisioning server to retrieve a device
certificate
. getProvisionRequest
177
* @param certificateType the type of
certificate
requested, e.g. "X.509"
178
* @param certificateAuthority identifies the
certificate
authority. A
179
*
certificate
authority (CA) is an entity which issues digital certificates
185
* @return request if successful the opaque
certificate
request blob
208
* @return
certificate
the public
certificate
resulting from the provisioning
209
* operation, if any. An empty vector indicates that no
certificate
was
216
vec<uint8_t>
certificate
, vec<uint8_t> wrappedKey);
/libcore/luni/src/main/java/java/security/
security.properties
60
# The following Android-only property controls peer
certificate
validation.
/libcore/luni/src/main/java/libcore/util/
RecoverySystem.java
44
// Take the first
certificate
from the signature (packages
/libcore/ojluni/src/main/java/java/security/
PrivateKey.java
49
* @see
Certificate
/libcore/ojluni/src/main/java/javax/net/ssl/
HostnameVerifier.java
36
* The policies can be
certificate
-based
/libcore/ojluni/src/main/java/sun/security/provider/certpath/
AdjacencyList.java
39
* <code>
Certificate
</code>. Specifically, a <code>Vertex</code> object
40
* contains a <code>
Certificate
</code> and an index value referencing the
69
* <code>
Certificate
</code> that the builder is considering at this point in
70
* the build. <code>FOLLOW</code> denotes a <code>
Certificate
</code> (one of
/libcore/support/src/test/java/tests/resources/x509/
default.cnf
91
certificate
= $dir/cacert.pem # The CA
certificate
102
cert_opt = ca_default #
Certificate
field options
143
req_extensions = v3_req # The extensions to add to a
certificate
request
/libcore/support/src/test/java/tests/support/
Support_ProviderTrust.java
85
//
Certificate
Completed in 630 milliseconds
<<
51
52
53
54
55
56
57
58
59
60
>>