/external/curl/lib/ |
x509asn1.h | 99 /* X509 certificate: RFC 5280. */ 101 curl_asn1Element certificate; member in struct:__anon16408
|
x509asn1.c | 104 * It is intended to support certificate information gathering for SSL backends 106 * entry points to get particular certificate sub-fields. 687 /* ASN.1 parse an X509 certificate into structure subfields. 691 cert->certificate.header = NULL; 692 cert->certificate.beg = beg; 693 cert->certificate.end = end; 801 /* Generate a certificate information record for the public key. */ 898 /* Prepare the certificate information for curl_easy_getinfo(). */ 900 /* Extract the certificate ASN.1 elements. */ 1003 /* Generate PEM certificate. * [all...] |
/external/curl/packages/vms/ |
curlmsg.msg | 76 PEER_FAILED_VERIF <peer certificate or fingerprint failed> 83 SSL_CERTPROBLEM <SSL problem with the local certificate>
|
/external/ipsec-tools/ |
setup.c | 491 " udprsa <user-private-key> <user-certificate> \\\n" 492 " <ca-certificate> <server-certificate> <port>;\n" 496 " xauthrsa <user-private-key> <user-certificate> \\\n" 497 " <ca-certificate> <server-certificate> \\\n" 499 " hybridrsa <ca-certificate> <server-certificate> \\\n"
|
/external/libchrome/crypto/ |
crypto.gyp | 81 # Some files are built when NSS is used for the platform certificate library. 136 # Some files are built when NSS is used for the platform certificate library.
|
/external/libcups/cups/ |
testcreds.c | 82 printf(" Certificate Count: %d\n", cupsArrayCount(hcreds)); 113 printf(" Certificate Count: %d\n", cupsArrayCount(tcreds));
|
/external/libmicrohttpd/src/microspdy/ |
daemon.h | 41 * @param certfile path to the certificate that will be used by server 42 * @param keyfile path to the keyfile for the certificate
|
/external/libmicrohttpd/src/testcurl/https/ |
tls_test_common.h | 46 #define MHD_E_CERT_FILE_CREAT "Error: failed to setup test certificate\n" 47 #define MHD_E_KEY_FILE_CREAT "Error: failed to setup test certificate\n"
|
/external/okhttp/android/main/java/com/squareup/okhttp/ |
HttpsHandler.java | 80 // Android support certificate pinning via NetworkSecurityConfig so there is no need to 82 // in Android should therefore always use the default certificate pinner, whose set of
|
/external/openssh/ |
ssh-add.c | 129 /* Now try to delete the corresponding certificate too */ 135 error("Failed to load certificate \"%s\": %s", 141 fatal("Certificate %s does not match private key %s", 284 /* Now try to add the certificate flavour too */ 288 error("Failed to load certificate \"%s\": %s", 294 error("Certificate %s does not match private key %s", 315 error("Certificate %s (%s) add failed: %s", certpath, 319 fprintf(stderr, "Certificate added: %s (%s)\n", certpath,
|
ssh2.h | 172 /* Certificate types for OpenSSH certificate keys extension */
|
/external/python/cpython2/Mac/BuildScript/resources/ |
ReadMe.rtf | 26 \i Certificate verification and OpenSSL 101 \b \cf0 \ul Certificate verification and OpenSSL\ 122 \b0 use the certificates from the system security framework, even when used on newer versions of OS X. Instead it consults a traditional OpenSSL concatenated certificate file ( 124 \i0 ) or certificate directory ( 134 \i0 ; it consults the same default certificate directory, 136 \f0 . As before, it is still necessary to manage certificates yourself when you use this Python variant and, with certificate verification now enabled by default, you may now need to take additional steps to ensure your Python programs have access to CA certificates you trust. If you use this Python variant to build standalone applications with third-party tools like {\field{\*\fldinst{HYPERLINK "https://pypi.python.org/pypi/py2app/"}}{\fldrslt 143 \i0 . Apple's 0.9.8 version includes an important additional feature: if a certificate cannot be verified using the manually administered certificates in 153 \f0 included with 2.7.9 has its own default certificate store for verifying download connections.\
|
/external/webrtc/webrtc/tools/rtcbot/ |
README | 42 == Why generating the private key and self signed certificate? == 43 - Private key and certificate are used for creating HTTPs server in
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
ClientKeyManager.java | 15 import java.security.cert.Certificate; 89 Certificate cert = mKeyStore.getCertificate(alias);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
CertificateEncodingException.java | 29 * Certificate Encoding Exception. This is thrown whenever an error 30 * occurs while attempting to encode a certificate.
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
X509ExtendedKeyManager.java | 51 * and the list of certificate issuer authorities recognized by 75 * and the list of certificate issuer authorities recognized by
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
URICertStore.java | 70 * This <code>CertStore</code> also implements Certificate/CRL caching. 75 * we open an URLConnection to download the Certificate(s)/CRL using an 78 * or the Certificate(s)/CRL cannot be parsed, we remember this result and 100 // X.509 certificate factory instance 208 * object of a certificate's Authority Information Access Extension. 260 // Safe cast since xsel is an X509 certificate selector. 305 // Safe cast since factory is an X.509 certificate factory 370 // Safe cast since xsel is an X509 certificate selector.
|
/packages/apps/Settings/src/com/android/settings/ |
MonitoringCertInfoActivity.java | 52 ? R.plurals.ssl_ca_cert_settings_button // Check certificate 53 : R.plurals.ssl_ca_cert_dialog_title; // Trust or remove certificate
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
imagehlp.h | 92 WINBOOL IMAGEAPI ImageAddCertificate(HANDLE FileHandle,LPWIN_CERTIFICATE Certificate,PDWORD Index); 95 WINBOOL IMAGEAPI ImageGetCertificateData(HANDLE FileHandle,DWORD CertificateIndex,LPWIN_CERTIFICATE Certificate,PDWORD RequiredLength);
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/project/ |
ExportHelper.java | 87 * @param certificate the certificate used for signing. Can be null. 92 X509Certificate certificate, IProgressMonitor monitor) throws CoreException { 101 // if either key or certificate is null, ensure the other is null. 103 certificate = null; 104 } else if (certificate == null) { 284 certificate, local 376 null, //certificate
|
/system/extras/verity/ |
generate_verity_key.c | 81 printf("Failed to read PEM certificate from file '%s'\n", pem_file); 87 printf("Failed to extract public key from certificate '%s'\n", pem_file);
|
/system/sepolicy/tools/ |
post_process_mac_perms | 33 PEM_CERT_RE = """-----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE-----
|
/prebuilts/go/darwin-x86/pkg/darwin_amd64_race/crypto/ |
x509.a | 16 x509
G|SGOROOT/src/crypto/x509/cert_pool.go0CertPool bySubjectKeyId byName certs
0
x509.go?Certificate |