OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:certificate
(Results
451 - 475
of
2776
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509V2AttributeCertificate.java
36
* An implementation of a version 2 X.509 Attribute
Certificate
.
59
throw new IOException("exception decoding
certificate
structure: " + e.toString());
90
throw new IOException("invalid data structure in
certificate
!");
156
throw new CertificateExpiredException("
certificate
expired on " + this.getNotAfter());
161
throw new CertificateNotYetValidException("
certificate
not valid till " + this.getNotBefore());
180
throw new CertificateException("Signature algorithm in
certificate
info not same as outer
certificate
");
193
throw new SignatureException("Exception encoding
certificate
info object");
198
throw new InvalidKeyException("Public key presented not for
certificate
signature");
X509V3CertificateGenerator.java
45
* class to produce an X.509 Version 3
certificate
.
75
* set the serial number for the
certificate
.
90
*
certificate
.
107
*
certificate
.
277
* copying the extension value from another
certificate
.
307
* copying the extension value from another
certificate
.
320
* generate an X509
certificate
, based on the current issuer and subject
339
* generate an X509
certificate
, based on the current issuer and subject
360
* generate an X509
certificate
, based on the current issuer and subject,
373
* generate an X509
certificate
, based on the current issuer and subject
[
all
...]
/external/curl/docs/cmdline-opts/
insecure.d
8
certificate
bundle installed by default. This makes all connections considered
/external/curl/docs/libcurl/opts/
CURLOPT_CAINFO.3
25
CURLOPT_CAINFO \- path to
Certificate
Authority (CA) bundle
35
server's
certificate
, \fICURLOPT_CAINFO(3)\fP need not even indicate an
48
preferred method of verifying the peer's
certificate
chain.
56
For SSL engines that don't support
certificate
files the CURLOPT_CAINFO option
CURLOPT_CRLFILE.3
25
CURLOPT_CRLFILE \- specify a
Certificate
Revocation List file
32
concatenation of CRL (in PEM format) to use in the
certificate
validation that
38
set, requiring CRL check against all the elements of the
certificate
chain if
46
be loaded. A failure in
certificate
verification due to a revocation
CURLOPT_PINNEDPUBLICKEY.3
36
When negotiating a TLS or SSL connection, the server sends a
certificate
37
indicating its identity. A public key is extracted from this
certificate
and
62
server's
certificate
.
64
# retrieve the server's
certificate
if you don't already have it
66
# be sure to examine the
certificate
to see if it is what you expected
71
# - If you don't have sed, then just copy the
certificate
into a file:
72
# Lines from -----BEGIN
CERTIFICATE
----- to -----END
CERTIFICATE
-----.
76
# extract public key in pem format from
certificate
CURLOPT_PROXY_CAINFO.3
25
CURLOPT_PROXY_CAINFO \- path to proxy
Certificate
Authority (CA) bundle
36
server's
certificate
, \fICURLOPT_CAINFO(3)\fP need not even indicate an
49
preferred method of verifying the peer's
certificate
chain.
57
For SSL engines that don't support
certificate
files the CURLOPT_PROXY_CAINFO option
CURLOPT_PROXY_CRLFILE.3
25
CURLOPT_PROXY_CRLFILE \- specify a proxy
Certificate
Revocation List file
33
concatenation of CRL (in PEM format) to use in the
certificate
validation that
39
set, requiring CRL check against all the elements of the
certificate
chain if
47
be loaded. A failure in
certificate
verification due to a revocation
CURLOPT_PROXY_SSLCERT.3
25
CURLOPT_PROXY_SSLCERT \- set SSL proxy client
certificate
33
the file name of your client
certificate
. The default format is "P12" on
37
With NSS or Secure Transport, this can also be the nickname of the
certificate
42
When using a client
certificate
, you most likely also need to provide a
CURLOPT_SSLCERT.3
25
CURLOPT_SSLCERT \- set SSL client
certificate
32
the file name of your client
certificate
. The default format is "P12" on
36
With NSS or Secure Transport, this can also be the nickname of the
certificate
41
When using a client
certificate
, you most likely also need to provide a
/external/curl/tests/data/
test2048
6
PEM
certificate
test311
6
PEM
certificate
test313
6
PEM
certificate
/external/ipsec-tools/src/racoon/samples/
racoon.conf.in
13
# racoon will look for
certificate
file in the directory,
14
# if the
certificate
/
certificate
request payload is received.
15
path
certificate
"@sysconfdir_x@/cert";
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf
1
path
certificate
"/etc/openssl/certs";
/external/iw/
CONTRIBUTING
2
This project embraces the Developer
Certificate
of Origin (DCO) for
4
patches, if you agree with this developer
certificate
you acknowledge this by
14
Developer
Certificate
of Origin
25
Developer's
Certificate
of Origin 1.1
/external/openssh/
PROTOCOL.krl
1
This describes the key/
certificate
revocation list format for OpenSSH.
40
2.
Certificate
section
52
the
certificate
section applies to all CAs (this is most useful when
60
The
certificate
section types are:
67
2.1
Certificate
serial list section
78
2.2.
Certificate
serial range section
91
2.3.
Certificate
serial bitmap section
106
KRL_SECTION_CERT_KEY_ID sections revoke particular
certificate
"key
126
must be a raw key (i.e. not a
certificate
).
/external/python/cpython2/Lib/test/
sha256.pem
0
#
Certificate
chain for https://sha256.tbs-internet.com
4
-----BEGIN
CERTIFICATE
-----
39
-----END
CERTIFICATE
-----
42
-----BEGIN
CERTIFICATE
-----
72
-----END
CERTIFICATE
-----
75
-----BEGIN
CERTIFICATE
-----
100
-----END
CERTIFICATE
-----
103
-----BEGIN
CERTIFICATE
-----
128
-----END
CERTIFICATE
-----
/frameworks/base/wifi/tests/assets/hsr1/
README.txt
1
HSR1ProfileWithCACert.conf - unencoded installation file that contains a Passpoint profile and a CA
Certificate
/libcore/luni/src/test/java/tests/security/cert/
CertificateCertificateRepTest.java
10
import java.security.cert.
Certificate
;
28
* <code>
Certificate
.CertificateRep(String type, byte[] data)</code>
74
Certificate
obj = (
Certificate
) rep1.readResolve();
/libcore/luni/src/test/java/tests/targets/security/
KeyStoreTest.java
33
import java.security.cert.
Certificate
;
103
Certificate
certificate
= null;
local
105
certificate
= certificateFactory
114
generator = KeyPairGenerator.getInstance(
certificate
.getPublicKey()
123
.getPrivate(), new
Certificate
[] {
certificate
});
167
private String encodedCertificate = "-----BEGIN
CERTIFICATE
-----\n"
189
+ "-----END
CERTIFICATE
-----\n";
/libcore/ojluni/src/main/java/java/security/
Timestamp.java
29
import java.security.cert.
Certificate
;
57
* The TSA's
certificate
path.
72
* @param signerCertPath is the TSA's
certificate
path. It must not be null.
93
* Returns the
certificate
path for the Timestamping Authority.
95
* @return The TSA's
certificate
path.
104
* and the TSA's
certificate
path.
118
* their timestamp's and their signer's
certificate
paths are equal.
141
* its signer's
certificate
.
147
List<? extends
Certificate
> certs = signerCertPath.getCertificates();
/libcore/ojluni/src/main/java/java/security/cert/
CertStoreSpi.java
71
* Returns a {@code Collection} of {@code
Certificate
}s that
72
* match the specified selector. If no {@code
Certificate
}s
77
* {@code
Certificate
}s that match the selector. For instance,
80
* contain the {@code
Certificate
}s it is looking for.
89
* {@code
Certificate
}s should be returned. Specify {@code null}
90
* to return all {@code
Certificate
}s (if supported).
91
* @return A {@code Collection} of {@code
Certificate
}s that
95
public abstract Collection<? extends
Certificate
> engineGetCertificates
114
* and/or the
certificate
to be checked are especially useful.
PKIXRevocationChecker.java
42
* certificates with the Online
Certificate
Status Protocol (OCSP) or
43
*
Certificate
Revocation Lists (CRLs). OCSP is described in RFC 2560 and
44
* is a network protocol for determining the status of a
certificate
. A CRL
90
* <p>See RFC 2560: X.509 Internet Public Key Infrastructure Online
Certificate
Status Protocol -
91
* OCSP, RFC 5280: Internet X.509 Public Key Infrastructure
Certificate
and
Certificate
Revocation
113
* responder specified in a
certificate
's Authority Information Access
126
* location is determined from the
certificate
's Authority Information
136
* Sets the OCSP responder's
certificate
. This overrides the
141
* @param cert the responder's
certificate
[
all
...]
/libcore/ojluni/src/main/java/javax/net/ssl/
X509KeyManager.java
34
* Instances of this interface manage which X509
certificate
-based
57
*
certificate
issuer authorities recognized by the peer (if any).
70
*
certificate
issuer authorities recognized by the peer (if any).
89
*
certificate
issuer authorities recognized by the peer (if any).
102
*
certificate
issuer authorities recognized by the peer (if any).
118
* Returns the
certificate
chain associated with the given alias.
121
* @return the
certificate
chain (ordered with the user's
certificate
first
122
* and the root
certificate
authority last), or null
Completed in 338 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>