/external/curl/docs/ |
TODO | 123 15.1 Add support for client certificate authentication 124 15.2 Add support for custom server certificate validation 722 certificate, but this doesn't seem to be exposed in the libcurl APIs. Could 812 15.1 Add support for client certificate authentication 815 certificate and private key stores. This does not allow the application 816 or the user to supply a custom client certificate using curl or libcurl. 819 implemented by supplying a custom certificate to the SChannel APIs, see: 820 - Getting a Certificate for Schannel 823 15.2 Add support for custom server certificate validation 826 certificate trust store. This does not allow the application or user t [all...] |
FAQ | 77 4.12 Why do I get "certificate verify failed" ? 697 CLIENT CERTIFICATE 701 require this, you don't need a client certificate. 703 A client certificate is always used together with a private key, and the 706 SERVER CERTIFICATE 708 The server you communicate with has a server certificate. You can and should 709 verify this certificate to make sure that you are truly talking to the real 712 CERTIFICATE AUTHORITY CERTIFICATE ("CA cert") 715 verify a server certificate that was signed by one of the authorities in th [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509KeyManagerTest.java | 36 Certificate: 80 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:X509KeyManagerTest 99 + "-----END CERTIFICATE-----"; 101 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 230 Certificate: 258 OpenSSL Generated Certificate 274 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 291 + "-----END CERTIFICATE-----"; 422 Certificate [all...] |
/build/make/core/ |
prebuilt_internal.mk | 318 # By setting .CERTIFICATE but not .PRIVATE_KEY, this package will be 319 # mentioned in apkcerts.txt (with certificate set to "PRESIGNED") 321 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := PRESIGNED 324 # If this is not an absolute certificate, assign it to a generic one. 330 PACKAGES.$(LOCAL_MODULE).CERTIFICATE := $(LOCAL_CERTIFICATE).x509.pem
|
/external/boringssl/src/ssl/ |
ssl_asn1.cc | 115 * peer [3] Certificate OPTIONAL, 131 * certChain [19] SEQUENCE OF Certificate OPTIONAL, 226 /* The peer certificate is only serialized if the SHA-256 isn't 346 /* The certificate chain is only serialized if the leaf's SHA-256 isn't 649 /* |peer| is processed with the certificate chain. */
|
/external/curl/lib/ |
strerror.c | 191 return "SSL peer certificate or SSH remote key was not OK"; 212 return "Problem with the local SSL certificate"; 218 return "Peer certificate cannot be authenticated with given CA " 243 return "Issuer check against peer certificate failed"; 306 return "SSL server certificate status verification FAILED";
|
/external/curl/lib/vtls/ |
mbedtls.c | 246 /* Load the client certificate */ 522 infof(data, "Unable to dump certificate information.\n"); 534 failf(data, "Failed due to missing peer certificate"); 549 failf(data, "Failed copying peer certificate"); 558 failf(data, "Failed copying public key from peer certificate");
|
/external/wpa_supplicant_8/hs20/client/ |
est.c | 510 wpa_printf(MSG_MSGDUMP, "OpenSSL: Certificate request:\n%s", 719 wpa_printf(MSG_INFO, "EST certificate enrollment failed"); 720 write_result(ctx, "EST certificate enrollment failed"); 752 wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file"); 753 write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file");
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 288 /* body - Certificate */ 296 "for Certificate (cert_len=%lu left=%lu)", 316 * to form a full certificate chain. The server may fail to 320 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
|
/frameworks/av/drm/libmediadrm/ |
IDrm.cpp | 264 Vector<uint8_t> &certificate, 275 readVector(reply, certificate); 736 Vector<uint8_t> certificate; local 739 status_t result = provideProvisionResponse(response, certificate, wrappedKey); 740 writeVector(reply, certificate);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
WspTypeDecoder.java | 68 WELL_KNOWN_MIME_TYPES.put(0x18, "application/vnd.wap.wtls-ca-certificate"); 69 WELL_KNOWN_MIME_TYPES.put(0x19, "application/vnd.wap.wtls-user-certificate"); 100 WELL_KNOWN_MIME_TYPES.put(0x38, "application/vnd.wap.hashed-certificate"); 101 WELL_KNOWN_MIME_TYPES.put(0x39, "application/vnd.wap.signed-certificate"); 107 WELL_KNOWN_MIME_TYPES.put(0x3F, "application/vnd.wap.rollover-certificate");
|
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
SignerInfo.java | 257 * Returns the (user) certificate pertaining to this SignerInfo. 266 * Returns the certificate chain pertaining to this SignerInfo. 434 throw new SignatureException("Certificate has unsupported " 438 // Make sure that if the usage of the key in the certificate is 447 // critical in the certificate.
|
/packages/apps/Email/res/values-en-rAU/ |
strings.xml | 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string> 103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string> 136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string> 137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
|
/packages/apps/Email/res/values-en-rGB/ |
strings.xml | 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string> 103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string> 136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string> 137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
|
/packages/apps/Email/res/values-en-rIN/ |
strings.xml | 101 <string name="account_setup_exchange_certificate_title" msgid="8756785660598838350">"CLIENT CERTIFICATE"</string> 103 <string name="account_setup_exchange_use_certificate" msgid="6513687497912094538">"Use client certificate"</string> 136 <string name="account_setup_failed_certificate_required" msgid="4607859382193244795">"A client certificate is required. Do you want to connect to the server with a client certificate?"</string> 137 <string name="account_setup_failed_certificate_inaccessible" msgid="4574461885959029072">"The certificate is invalid or inaccessible."</string>
|
/packages/apps/Settings/src/com/android/settings/ |
TrustedCredentialsSettings.java | 406 * Called when the switch on a system certificate is clicked. This will toggle whether it 703 // Saving the connection for later use on the certificate dialog. 947 X509Certificate certificate = KeyChain.toCertificate(encodedCertificate); local [all...] |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.ecf.ssl_1.1.0.v20130604-1622.jar | |
/system/ca-certificates/files/ |
1eb37bdf.0 | 1 -----BEGIN CERTIFICATE----- 42 -----END CERTIFICATE----- 43 Certificate: 104 Certificate Sign, CRL Sign 105 X509v3 Certificate Policies:
|
3c860d51.0 | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 34 Certificate: 86 Certificate Sign, CRL Sign 94 X509v3 Certificate Policies:
|
3c9a4d3b.0 | 1 -----BEGIN CERTIFICATE----- 44 -----END CERTIFICATE----- 45 Certificate: 107 X509v3 Certificate Policies: 119 Certificate Sign, CRL Sign
|
3d441de8.0 | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 34 Certificate: 87 X509v3 Certificate Policies: 92 Certificate Sign, CRL Sign
|
5046c355.0 | 1 -----BEGIN CERTIFICATE----- 33 -----END CERTIFICATE----- 34 Certificate: 86 Certificate Sign, CRL Sign 94 X509v3 Certificate Policies:
|
7672ac4b.0 | 1 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE----- 33 Certificate: 87 Certificate Sign, CRL Sign 90 X509v3 Certificate Policies:
|
9f533518.0 | 1 -----BEGIN CERTIFICATE----- 41 -----END CERTIFICATE----- 42 Certificate: 103 Certificate Sign, CRL Sign 104 X509v3 Certificate Policies:
|
b936d1c6.0 | 1 -----BEGIN CERTIFICATE----- 32 -----END CERTIFICATE----- 33 Certificate: 88 Certificate Sign, CRL Sign 91 X509v3 Certificate Policies:
|