HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 576 - 600 of 2776) sorted by null

<<21222324252627282930>>

  /libcore/luni/src/test/java/tests/security/cert/
CRLTest.java 28 import java.security.cert.Certificate;
88 // that are abstract in <code>Certificate</code>
115 public boolean isRevoked(Certificate cert) {
  /libcore/ojluni/src/main/java/javax/security/cert/
CertificateEncodingException.java 30 * Certificate Encoding Exception. This is thrown whenever an error
31 * occurs whilst attempting to encode a certificate.
36 * use the standard Java SE certificate classes located in
CertificateExpiredException.java 30 * Certificate Expired Exception. This is thrown whenever the current
33 * of the certificate.
38 * use the standard Java SE certificate classes located in
CertificateNotYetValidException.java 30 * Certificate is not yet valid exception. This is thrown whenever
32 * is before the {@code notBefore} date/time in the Certificate
38 * use the standard Java SE certificate classes located in
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
State.java 36 * certificate is added to the current path.
46 * Update the state with the next certificate added to the path.
48 * @param cert the certificate which is used to update the state
  /prebuilts/go/darwin-x86/misc/ios/
README 15 certificate and have setup your iDevice properly to run apps signed by your
16 developer certificate. Then install https://github.com/phonegap/ios-deploy.
24 # sign the executable using your developer certificate
  /prebuilts/go/linux-x86/misc/ios/
README 15 certificate and have setup your iDevice properly to run apps signed by your
16 developer certificate. Then install https://github.com/phonegap/ios-deploy.
24 # sign the executable using your developer certificate
  /prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-acm/1.11.18/
aws-java-sdk-acm-1.11.18.pom 12 <name>AWS Java SDK for AWS Certificate Manager</name>
13 <description>The AWS Java SDK for AWS Certificate Manager module holds the client classes that are used for communicating with AWS Certificate Manager service.</description>
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeyCheckPage.java 63 "<p>Make sure the certificate is valid for the planned lifetime of the product.</p>"
64 + "<p>If the certificate expires, you will be forced to sign your application with "
66 + "<p>Applications cannot be upgraded if their certificate changes from "
87 setTitle("Destination and key/certificate checks");
181 String.format("<p>Certificate expires in %d years.</p>",
231 "<p>Certificate expired on %s</p>",
237 setErrorMessage("Certificate is expired.");
244 "<p>Certificate expires on %s.</p>",
254 sb.append("<p>The certificate expires this year.</p>");
258 "<p>The Certificate expires in %1$s %2$s.</p>"
    [all...]
  /device/linaro/bootloader/edk2/MdePkg/Include/Protocol/
Bis.h 3 against a digital certificate for the purpose of an integrity and authorization check.
98 /// platform Boot Object Authorization Certificate to create the certificateID.
220 Retrieves the certificate that has been configured as the identity of the organization designated as
225 @param Certificate The function writes an allocated EFI_BIS_DATA* containing the Boot
226 Object Authorization Certificate object. The caller must
232 @retval EFI_NOT_FOUND There is no Boot Object Authorization Certificate currently installed.
234 @retval EFI_INVALID_PARAMETER The Certificate parameter supplied by the caller is NULL or
242 OUT EFI_BIS_DATA **Certificate
347 certificate's key algorithm, or while attempting to retrieve
348 the public key algorithm of the manifest's signer's certificate,
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
RFC3280CertPathUtilities.java 84 * extension, verify that the certificate does not include the basic
89 * extension, verify that the certificate includes the basic constraints
97 * @param cert The certificate.
180 throw new AnnotatedException("Could not read certificate issuer.", e);
209 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point.");
234 "No match for certificate CRL issuing distribution point name to cRLIssuer CRL distribution point.");
277 * certificate issuer.
280 * @param cert The certificate ot attribute certificate.
352 throw new AnnotatedException("Cannot find matching CRL issuer for certificate.")
    [all...]
  /external/boringssl/src/crypto/x509/
x509_test.cc 34 "-----BEGIN CERTIFICATE-----\n"
49 "-----END CERTIFICATE-----\n";
52 "-----BEGIN CERTIFICATE-----\n"
66 "-----END CERTIFICATE-----\n";
69 "-----BEGIN CERTIFICATE-----\n"
83 "-----END CERTIFICATE-----\n";
86 "-----BEGIN CERTIFICATE-----\n"
100 "-----END CERTIFICATE-----\n";
103 "-----BEGIN CERTIFICATE-----\n"
117 "-----END CERTIFICATE-----\n"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_client.go 118 // certificate, which would be skipped if session resumption occurred.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
281 return errors.New("tls: failed to parse certificate from server: " + err.Error())
319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
325 // server's identity (i.e. leaf certificate) is unchanged and
375 var chainToSend *Certificate
400 // If the server requested a certificate then we have to send a
401 // Certificate message, even if it's empty because we don't have a
402 // certificate to send.
405 certMsg.certificates = chainToSend.Certificate
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_client.go 118 // certificate, which would be skipped if session resumption occurred.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
281 return errors.New("tls: failed to parse certificate from server: " + err.Error())
319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
325 // server's identity (i.e. leaf certificate) is unchanged and
375 var chainToSend *Certificate
400 // If the server requested a certificate then we have to send a
401 // Certificate message, even if it's empty because we don't have a
402 // certificate to send.
405 certMsg.certificates = chainToSend.Certificate
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 25 import java.security.cert.Certificate;
135 static final int CERTIFICATE = 1;
282 * tricky if a certificate appears in more than one chain... the store method
291 Certificate c = (Certificate)certs.remove(alias);
303 c = (Certificate)keyCerts.remove(id);
315 public Certificate engineGetCertificate(
323 Certificate c = (Certificate)certs.get(alias);
333 c = (Certificate)keyCerts.get(id)
    [all...]
  /prebuilts/tools/common/mkidentity/
mkidentity-prebuilt.jar 
  /system/ca-certificates/google/
roots.pem 2 # Issuer: CN=AAA Certificate Services O=Comodo CA Limited
3 # Subject: CN=AAA Certificate Services O=Comodo CA Limited
9 -----BEGIN CERTIFICATE-----
33 -----END CERTIFICATE-----
43 -----BEGIN CERTIFICATE-----
66 -----END CERTIFICATE-----
76 -----BEGIN CERTIFICATE-----
100 -----END CERTIFICATE-----
110 -----BEGIN CERTIFICATE-----
133 -----END CERTIFICATE----
    [all...]
  /build/make/core/
dpi_specific_apk.mk 30 $(built_dpi_apk): PRIVATE_CERTIFICATE := $(certificate)
51 $(built_dpi_apk) : $(private_key) $(certificate) $(SIGNAPK_JAR)
79 PACKAGES.$(dpi_apk_name).CERTIFICATE := $(certificate)
  /cts/hostsidetests/appsecurity/test-apps/SimpleAppInstall/
AndroidManifest.xml 21 different certificate.
  /cts/hostsidetests/appsecurity/test-apps/TargetInstrumentationApp/
AndroidManifest.xml 21 certificate.
  /cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/
AdminActionBookkeepingTest.java 28 import java.security.cert.Certificate;
39 "-----BEGIN CERTIFICATE-----\n" +
59 "-----END CERTIFICATE-----";
94 final Certificate cert = CertificateFactory.getInstance("X.509")
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/
tbb_ext.c 72 .ln = "SoC Firmware content certificate public key",
84 .ln = "SCP Firmware content certificate public key",
96 .ln = "Trusted OS Firmware content certificate public key",
108 .ln = "Non-Trusted Firmware content certificate public key",
  /device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
SecureBootConfigNvData.h 139 BOOLEAN AlwaysRevocation; // If the certificate is always revoked. Revocation time is hidden
140 UINT8 CertificateFormat; // The type of the certificate
141 EFI_HII_DATE RevocationDate; // The revocation date of the certificate
142 EFI_HII_TIME RevocationTime; // The revocation time of the certificate
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
X509.java 27 // certificate factories.
  /external/curl/docs/cmdline-opts/
capath.d 6 Tells curl to use the specified certificate directory to verify the

Completed in 1518 milliseconds

<<21222324252627282930>>