HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 451 - 475 of 2776) sorted by null

<<11121314151617181920>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V2AttributeCertificate.java 36 * An implementation of a version 2 X.509 Attribute Certificate.
59 throw new IOException("exception decoding certificate structure: " + e.toString());
90 throw new IOException("invalid data structure in certificate!");
156 throw new CertificateExpiredException("certificate expired on " + this.getNotAfter());
161 throw new CertificateNotYetValidException("certificate not valid till " + this.getNotBefore());
180 throw new CertificateException("Signature algorithm in certificate info not same as outer certificate");
193 throw new SignatureException("Exception encoding certificate info object");
198 throw new InvalidKeyException("Public key presented not for certificate signature");
X509V3CertificateGenerator.java 45 * class to produce an X.509 Version 3 certificate.
75 * set the serial number for the certificate.
90 * certificate.
107 * certificate.
277 * copying the extension value from another certificate.
307 * copying the extension value from another certificate.
320 * generate an X509 certificate, based on the current issuer and subject
339 * generate an X509 certificate, based on the current issuer and subject
360 * generate an X509 certificate, based on the current issuer and subject,
373 * generate an X509 certificate, based on the current issuer and subject
    [all...]
  /external/curl/docs/cmdline-opts/
insecure.d 8 certificate bundle installed by default. This makes all connections considered
  /external/curl/docs/libcurl/opts/
CURLOPT_CAINFO.3 25 CURLOPT_CAINFO \- path to Certificate Authority (CA) bundle
35 server's certificate, \fICURLOPT_CAINFO(3)\fP need not even indicate an
48 preferred method of verifying the peer's certificate chain.
56 For SSL engines that don't support certificate files the CURLOPT_CAINFO option
CURLOPT_CRLFILE.3 25 CURLOPT_CRLFILE \- specify a Certificate Revocation List file
32 concatenation of CRL (in PEM format) to use in the certificate validation that
38 set, requiring CRL check against all the elements of the certificate chain if
46 be loaded. A failure in certificate verification due to a revocation
CURLOPT_PINNEDPUBLICKEY.3 36 When negotiating a TLS or SSL connection, the server sends a certificate
37 indicating its identity. A public key is extracted from this certificate and
62 server's certificate.
64 # retrieve the server's certificate if you don't already have it
66 # be sure to examine the certificate to see if it is what you expected
71 # - If you don't have sed, then just copy the certificate into a file:
72 # Lines from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----.
76 # extract public key in pem format from certificate
CURLOPT_PROXY_CAINFO.3 25 CURLOPT_PROXY_CAINFO \- path to proxy Certificate Authority (CA) bundle
36 server's certificate, \fICURLOPT_CAINFO(3)\fP need not even indicate an
49 preferred method of verifying the peer's certificate chain.
57 For SSL engines that don't support certificate files the CURLOPT_PROXY_CAINFO option
CURLOPT_PROXY_CRLFILE.3 25 CURLOPT_PROXY_CRLFILE \- specify a proxy Certificate Revocation List file
33 concatenation of CRL (in PEM format) to use in the certificate validation that
39 set, requiring CRL check against all the elements of the certificate chain if
47 be loaded. A failure in certificate verification due to a revocation
CURLOPT_PROXY_SSLCERT.3 25 CURLOPT_PROXY_SSLCERT \- set SSL proxy client certificate
33 the file name of your client certificate. The default format is "P12" on
37 With NSS or Secure Transport, this can also be the nickname of the certificate
42 When using a client certificate, you most likely also need to provide a
CURLOPT_SSLCERT.3 25 CURLOPT_SSLCERT \- set SSL client certificate
32 the file name of your client certificate. The default format is "P12" on
36 With NSS or Secure Transport, this can also be the nickname of the certificate
41 When using a client certificate, you most likely also need to provide a
  /external/curl/tests/data/
test2048 6 PEM certificate
test311 6 PEM certificate
test313 6 PEM certificate
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.in 13 # racoon will look for certificate file in the directory,
14 # if the certificate/certificate request payload is received.
15 path certificate "@sysconfdir_x@/cert";
  /external/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf 1 path certificate "/etc/openssl/certs";
  /external/iw/
CONTRIBUTING 2 This project embraces the Developer Certificate of Origin (DCO) for
4 patches, if you agree with this developer certificate you acknowledge this by
14 Developer Certificate of Origin
25 Developer's Certificate of Origin 1.1
  /external/openssh/
PROTOCOL.krl 1 This describes the key/certificate revocation list format for OpenSSH.
40 2. Certificate section
52 the certificate section applies to all CAs (this is most useful when
60 The certificate section types are:
67 2.1 Certificate serial list section
78 2.2. Certificate serial range section
91 2.3. Certificate serial bitmap section
106 KRL_SECTION_CERT_KEY_ID sections revoke particular certificate "key
126 must be a raw key (i.e. not a certificate).
  /external/python/cpython2/Lib/test/
sha256.pem 0 # Certificate chain for https://sha256.tbs-internet.com
4 -----BEGIN CERTIFICATE-----
39 -----END CERTIFICATE-----
42 -----BEGIN CERTIFICATE-----
72 -----END CERTIFICATE-----
75 -----BEGIN CERTIFICATE-----
100 -----END CERTIFICATE-----
103 -----BEGIN CERTIFICATE-----
128 -----END CERTIFICATE-----
  /frameworks/base/wifi/tests/assets/hsr1/
README.txt 1 HSR1ProfileWithCACert.conf - unencoded installation file that contains a Passpoint profile and a CA Certificate
  /libcore/luni/src/test/java/tests/security/cert/
CertificateCertificateRepTest.java 10 import java.security.cert.Certificate;
28 * <code>Certificate.CertificateRep(String type, byte[] data)</code>
74 Certificate obj = (Certificate) rep1.readResolve();
  /libcore/luni/src/test/java/tests/targets/security/
KeyStoreTest.java 33 import java.security.cert.Certificate;
103 Certificate certificate = null; local
105 certificate = certificateFactory
114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey()
123 .getPrivate(), new Certificate[] {certificate});
167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n"
189 + "-----END CERTIFICATE-----\n";
  /libcore/ojluni/src/main/java/java/security/
Timestamp.java 29 import java.security.cert.Certificate;
57 * The TSA's certificate path.
72 * @param signerCertPath is the TSA's certificate path. It must not be null.
93 * Returns the certificate path for the Timestamping Authority.
95 * @return The TSA's certificate path.
104 * and the TSA's certificate path.
118 * their timestamp's and their signer's certificate paths are equal.
141 * its signer's certificate.
147 List<? extends Certificate> certs = signerCertPath.getCertificates();
  /libcore/ojluni/src/main/java/java/security/cert/
CertStoreSpi.java 71 * Returns a {@code Collection} of {@code Certificate}s that
72 * match the specified selector. If no {@code Certificate}s
77 * {@code Certificate}s that match the selector. For instance,
80 * contain the {@code Certificate}s it is looking for.
89 * {@code Certificate}s should be returned. Specify {@code null}
90 * to return all {@code Certificate}s (if supported).
91 * @return A {@code Collection} of {@code Certificate}s that
95 public abstract Collection<? extends Certificate> engineGetCertificates
114 * and/or the certificate to be checked are especially useful.
PKIXRevocationChecker.java 42 * certificates with the Online Certificate Status Protocol (OCSP) or
43 * Certificate Revocation Lists (CRLs). OCSP is described in RFC 2560 and
44 * is a network protocol for determining the status of a certificate. A CRL
90 * <p>See RFC 2560: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol -
91 * OCSP, RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation
113 * responder specified in a certificate's Authority Information Access
126 * location is determined from the certificate's Authority Information
136 * Sets the OCSP responder's certificate. This overrides the
141 * @param cert the responder's certificate
    [all...]
  /libcore/ojluni/src/main/java/javax/net/ssl/
X509KeyManager.java 34 * Instances of this interface manage which X509 certificate-based
57 * certificate issuer authorities recognized by the peer (if any).
70 * certificate issuer authorities recognized by the peer (if any).
89 * certificate issuer authorities recognized by the peer (if any).
102 * certificate issuer authorities recognized by the peer (if any).
118 * Returns the certificate chain associated with the given alias.
121 * @return the certificate chain (ordered with the user's certificate first
122 * and the root certificate authority last), or null

Completed in 338 milliseconds

<<11121314151617181920>>