HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 776 - 800 of 2776) sorted by null

<<31323334353637383940>>

  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 205 side certificate. When client certificate is used, a matching
211 formats. User certificate and private key can be included in the
214 <para>If the user certificate and private key is received in
219 # convert client certificate and private key to PEM format
221 # convert CA certificate (if included in PFX file) to PEM format
  /frameworks/base/packages/Osu/src/com/android/configparse/
ConfigBuilder.java 81 Certificate cert = ks.getCertificate(alias);
137 throw new IOException("Invalid certificate type for TLS: " +
143 for (X509Certificate certificate : clientChain) {
145 byte[] fingerprint = digester.digest(certificate.getEncoded());
147 clientCertificate = certificate;
152 throw new IOException("No certificate in chain matches supplied fingerprint");
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 26 import java.security.cert.Certificate;
237 X509Certificate certificate = certificateChain[0]; local
238 assertEquals(keyType, keyAlgName, certificate.getPublicKey().getAlgorithm());
240 String sigAlgName = certificate.getSigAlgName();
245 Arrays.<Certificate>asList(privateKeyEntry.getCertificateChain()),
246 Arrays.<Certificate>asList(certificateChain));
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreSpiTest.java 36 import java.security.cert.Certificate;
94 Certificate[] chain) throws KeyStoreException { keyEntryWasSet[0] = true; }
155 ksSpi.engineSetKeyEntry("", null, new char[0], new Certificate[0]);
160 ksSpi.engineSetKeyEntry("", new byte[0], new Certificate[0]);
230 class MyCertificate extends Certificate {
257 return "[My test Certificate, type: " + getType() + "]";
  /libcore/ojluni/src/main/java/sun/security/x509/
AuthorityInfoAccessExtension.java 40 * for the certificate in which it appears. It enables CAs to issue their
43 * certificate that identifies the specific OCSP Responder to use when
44 * performing on-line validation of that certificate.
47 * Internet X.509 PKI Certificate and Certificate Revocation List
71 * get, set, delete methods of Certificate, x509 type.
CertificatePoliciesExtension.java 36 * This class defines the certificate policies extension which specifies the
37 * policies under which the certificate has been issued
38 * and the purposes for which the certificate may be used.
42 * policy OIDs in the certificate to that list. If this extension is
45 * certificate.
73 * get, set, delete methods of Certificate, x509 type.
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin.go 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
46 // 2. Run "security find-certificate" to dump the list of system root
64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin.go 26 func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
46 // 2. Run "security find-certificate" to dump the list of system root
64 cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
123 if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
140 func verifyCertWithSystem(block *pem.Block, cert *Certificate) bool {
  /cts/hostsidetests/appsecurity/certs/pkgsigverify/
rsa-16384.x509.pem 1 -----BEGIN CERTIFICATE-----
93 -----END CERTIFICATE-----
  /device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/
AuthVariableLib.inf 92 gEfiCertTypeRsa2048Sha256Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the certificate.
93 gEfiCertPkcs7Guid ## SOMETIMES_CONSUMES ## GUID # Unique ID for the type of the certificate.
  /external/apache-http/android/src/android/net/http/
HttpConnection.java 47 // Update the certificate info (connection not secure - set to null)
50 eventHandler.certificate(mCertificate);
  /external/avb/libavb_atx/
avb_atx_types.h 52 /* Data structure of signed fields in an Android Things certificate. */
61 /* Data structure of an Android Things certificate. */
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cmc/
SimplePKIResponse.java 42 * @param responseEncoding BER/DER encoding of the certificate.
79 * Return any X.509 certificate objects in this SimplePKIResponse structure as a Store of X509CertificateHolder objects.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathValidatorSpi.java 37 * CertPathValidatorSpi implementation for X.509 Certificate validation ? la RFC
116 String message = "Certificate revocation of serial 0x" + serial.toString(16);
154 // RFC 5280 - CRLs must originate from the same trust anchor as the target certificate.
163 // Certificate for each interation of the validation loop
286 "Target certificate in certification path does not match targetConstraints.", null, certPath, 0);
306 String message = "Certificate revocation of public key " + workingPublicKey;
320 // set certificate to be checked in this round
414 // set signing certificate for next round
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
X509CertStoreSelector.java 4 import java.security.cert.Certificate;
34 public boolean match(Certificate cert)
  /external/curl/docs/libcurl/opts/
CURLINFO_CERTINFO.3 25 CURLINFO_CERTINFO \- get the TLS certificate chain
33 struct that holds a number of linked lists with info about the certificate
  /external/curl/tests/
stunnel.pem 2 # This file contains a private key and a certificate used for stunnel.
3 # The certificate contains a number of extensions essentially being
4 # used in the 509 test. The certificate has been generated using
13 nsComment = "CURL stunnel server test certificate"
59 Certificate:
92 CURL stunnel server test certificate
117 -----BEGIN CERTIFICATE-----
138 -----END CERTIFICATE-----
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 29 // Ensure that the certificate is not expired.
32 LOG(ERROR) << "Expired certificate";
  /external/libvncserver/webclients/java-applet/ssl/
onetimekey 19 # Note oneTimeKey is to provide a CLIENT Certificate for the viewer
58 n=`grep -n 'BEGIN CERTIFICATE' $in | awk -F: '{print $1}' | head -1`
  /frameworks/base/core/java/android/os/
ConfigUpdate.java 32 * Update system wide certificate pins for TLS connections.
63 * Update set of trusted logs used for Certificate Transparency support for TLS connections.
  /frameworks/base/core/java/android/security/net/config/
KeyStoreCertificateSource.java 22 import java.security.cert.Certificate;
31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a
  /frameworks/base/wifi/tests/src/android/net/wifi/
WifiEnterpriseConfigTest.java 59 // A newly-constructed WifiEnterpriseConfig object should have no CA certificate.
62 // Setting CA certificate to null explicitly.
65 // Setting CA certificate to null using setCaCertificates().
68 // Setting CA certificate to zero-length array.
99 // Setting the client certificate to null should clear the existing chain.
146 assertTrue("Invalid client certificate",
148 assertTrue("Invalid CA certificate",
393 /* Verify client certificate. */
  /libcore/luni/src/test/java/tests/security/cert/
CertStoreSpiTest.java 36 import java.security.cert.Certificate;
89 public boolean match (Certificate crl) {
PKIXCertPathCheckerTest.java 28 import java.security.cert.Certificate;
89 public void check(Certificate cert,
  /libcore/ojluni/src/main/java/java/security/
CodeSource.java 53 public CodeSource(URL url, java.security.cert.Certificate certs[]) {
67 public final java.security.cert.Certificate[] getCertificates() { return null; }

Completed in 670 milliseconds

<<31323334353637383940>>