/libcore/ojluni/src/main/java/sun/security/x509/ |
X509CRLImpl.java | 41 import java.security.cert.Certificate; 56 * An implementation for X509 CRL (Certificate Revocation List). 67 * Public Key Infrastructure Certificate and CRL Profile</a>. 602 * Checks whether the given certificate is on this CRL. 604 * @param cert the certificate to check for. 605 * @return true if the given certificate is on this CRL, 608 public boolean isRevoked(Certificate cert) { 714 * Gets the CRL entry for the given certificate. 794 * Identifiers for the Internet X.509 Public Key Infrastructure Certificate [all...] |
/external/openssh/ |
sshd.8 | 118 Specifies a path to a certificate file to identify 121 The certificate file must match a host key file specified using the 472 If both certificate restrictions and key options are present, the most 502 If a command is specified and a forced-command is embedded in a certificate 503 used for authentication, then the certificate will be accepted only if the 572 line, specifies allowed principals for certificate authentication as a 574 At least one name from the list must appear in the certificate's 575 list of principals for the certificate to be accepted. 576 This option is ignored for keys that are not marked as trusted certificate 690 if the server has presented a certificate for authentication, the ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README-HS20 | 130 # ca_cert: CA certificate for Interworking network selection 132 # client_cert: File path to client certificate file (PEM/DER) 134 # where client certificate/private key is used for authentication 143 # commented out. Both the private key and certificate will be read 148 # Windows certificate store can be used by leaving client_cert out and 158 # certificate store (My user account) is used, whereas computer store 173 # server certificate in SubjectAltName dNSName element(s). If a 179 # included in the certificate. The certificate may include additional 268 # ocsp: Whether to use/require OCSP to check server certificate [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 29 import java.security.cert.Certificate; 53 * {@link Certificate#getPublicKey()}. 130 * Certificate[] certChain = ...; // Certificate chain with the first certificate 160 * Certificate[] certChain = ...; // Certificate chain with the first certificate 194 * Certificate[] certChain = ...; // Certificate chain with the first certificat [all...] |
/external/boringssl/src/ssl/test/runner/ |
runner.go | 59 resourceDir = flag.String("resource-dir", ".", "The directory in which to find certificate and key files.") 133 rsaCertificate Certificate 134 rsa1024Certificate Certificate 135 rsaChainCertificate Certificate 136 ecdsaP224Certificate Certificate 137 ecdsaP256Certificate Certificate 138 ecdsaP384Certificate Certificate 139 ecdsaP521Certificate Certificate 140 ed25519Certificate Certificate 146 cert *Certificate [all...] |
/build/make/core/ |
package_internal.mk | 548 # an explicit certificate, use the default. 563 # If this is not an absolute certificate, assign it to a generic one. 568 certificate := $(LOCAL_CERTIFICATE).x509.pem macro 571 $(LOCAL_BUILT_MODULE): $(private_key) $(certificate) $(SIGNAPK_JAR) 573 $(LOCAL_BUILT_MODULE): PRIVATE_CERTIFICATE := $(certificate) 576 PACKAGES.$(LOCAL_PACKAGE_NAME).CERTIFICATE := $(certificate) 683 $(built_apk_splits): PRIVATE_CERTIFICATE := $(certificate)
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
FakeKeys.java | 34 private static final String CA_CERT0_STRING = "-----BEGIN CERTIFICATE-----\n" + 52 "-----END CERTIFICATE-----\n"; 55 private static final String CA_CERT1_STRING = "-----BEGIN CERTIFICATE-----\n" + 73 "-----END CERTIFICATE-----\n"; 76 private static final String CA_PUBLIC_CERT_STRING = "-----BEGIN CERTIFICATE-----\n" + 93 "-----END CERTIFICATE-----\n"; 96 private static final String CLIENT_CERT_STR = "-----BEGIN CERTIFICATE-----\n" + 124 "-----END CERTIFICATE-----\n";
|
/cts/tests/tests/networksecurityconfig/src/android/security/net/config/cts/ |
TestUtils.java | 27 import java.security.cert.Certificate; 85 for (Certificate c : factory.generateCertificates(is)) {
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Payload.h | 205 // IKEV2 Certificate Payload
218 // IKEV2 Certificate Request Payload
|
/docs/source.android.com/en/devices/tech/ota/ |
sign_builds.html | 114 certificate to match the test key. On a released image, a 115 different certificate must be used so that devices can verify the 118 the test key certificate with the release key certificate from your certs 146 <p>Each key comes in two files: the <i>certificate</i>, which has the 149 may itself be protected by a password. The certificate, in 271 certificate/private key pairs using the openssl tool from 282 # create a certificate with the public part of the key
|
/docs/source.android.com/en/security/verifiedboot/ |
verified-boot.html | 99 verification using the certificate embedded in the partition signature. 114 embedded certificate, and the signature is valid. The bootloader 290 Boot partition has been verified using the certificate embedded into 443 Certificate ::= Certificate 457 <p>The <code>Certificate</code> field is the full X.509 certificate containing 461 first, and only boot to YELLOW or RED states if the embedded certificate is
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
control.wifi_check1x_WPA | 91 # The server will reject us if we use the wrong certificate chain. 107 # We will reject the server if its certificate is expired.
|
/external/boringssl/src/crypto/pkcs7/ |
pkcs7_x509.c | 138 * "CERTIFICATE". */ 160 * "CERTIFICATE". */
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
X509Extension.java | 83 * Certificate Issuer 98 * Certificate Policies
|
/external/conscrypt/ |
Dockerfile | 22 RUN wget -q --no-cookies --no-check-certificate \ 34 RUN wget --no-check-certificate http://people.centos.org/tru/devtools-2/devtools-2.repo
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509CertPath.java | 23 import java.security.cert.Certificate; 93 public List<? extends Certificate> getCertificates() {
|
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/ |
TestTrustManager.java | 204 * Returns the list of certificate issuer authorities which are trusted for 207 * @return the list of certificate issuer authorities which are trusted for
|
/external/curl/docs/ |
mk-ca-bundle.1 | 62 specific information about each certificate that is stored in the original 93 each certificate and output when run in plain text mode.
|
/external/curl/lib/vtls/ |
axtls.c | 79 case -42: /* bad certificate alert from server */ 200 * 1) certificate revocation list checking 203 * 4) set certificate priority. axTLS ignores type and sends certs in 207 /* Load client certificate */ 304 /* Verify server's certificate */ 313 infof(data, "\t server certificate verification SKIPPED\n"); 361 failf(data, "unable to obtain common name from peer certificate"); 365 infof(data, "unable to obtain common name from peer certificate");
|
/external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/ |
CoverageTransformerTest.java | 26 import java.security.cert.Certificate; 181 CodeSource cs = new CodeSource(null, new Certificate[0]);
|
/external/libmicrohttpd/src/examples/ |
benchmark_https.c | 148 const char srv_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n" 166 "-----END CERTIFICATE-----\n";
|
/external/libmtp/logs/ |
mtp-detect-lg-gr500.txt | 104 0xd102: Device Certificate 141 Unable to acquire device certificate, perhaps this device does not support this
|
mtp-detect-maxfield-g-flash-ng-1GB.txt | 94 0xd102: Device Certificate 142 Unable to acquire device certificate, perhaps this device does not support this
|
mtp-detect-mymusix-pd6070.txt | 78 0xd102: Device Certificate 111 Unable to acquire device certificate, perhaps this device does not support this
|
mtp-detect-nokia-5800.txt | 92 0xd102: Device Certificate 152 Unable to acquire device certificate, perhaps this device does not support this
|