HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 976 - 1000 of 2776) sorted by null

<<31323334353637383940>>

  /external/curl/lib/
x509asn1.h 99 /* X509 certificate: RFC 5280. */
101 curl_asn1Element certificate; member in struct:__anon16408
x509asn1.c 104 * It is intended to support certificate information gathering for SSL backends
106 * entry points to get particular certificate sub-fields.
687 /* ASN.1 parse an X509 certificate into structure subfields.
691 cert->certificate.header = NULL;
692 cert->certificate.beg = beg;
693 cert->certificate.end = end;
801 /* Generate a certificate information record for the public key. */
898 /* Prepare the certificate information for curl_easy_getinfo(). */
900 /* Extract the certificate ASN.1 elements. */
1003 /* Generate PEM certificate. *
    [all...]
  /external/curl/packages/vms/
curlmsg.msg 76 PEER_FAILED_VERIF <peer certificate or fingerprint failed>
83 SSL_CERTPROBLEM <SSL problem with the local certificate>
  /external/ipsec-tools/
setup.c 491 " udprsa <user-private-key> <user-certificate> \\\n"
492 " <ca-certificate> <server-certificate> <port>;\n"
496 " xauthrsa <user-private-key> <user-certificate> \\\n"
497 " <ca-certificate> <server-certificate> \\\n"
499 " hybridrsa <ca-certificate> <server-certificate> \\\n"
  /external/libchrome/crypto/
crypto.gyp 81 # Some files are built when NSS is used for the platform certificate library.
136 # Some files are built when NSS is used for the platform certificate library.
  /external/libcups/cups/
testcreds.c 82 printf(" Certificate Count: %d\n", cupsArrayCount(hcreds));
113 printf(" Certificate Count: %d\n", cupsArrayCount(tcreds));
  /external/libmicrohttpd/src/microspdy/
daemon.h 41 * @param certfile path to the certificate that will be used by server
42 * @param keyfile path to the keyfile for the certificate
  /external/libmicrohttpd/src/testcurl/https/
tls_test_common.h 46 #define MHD_E_CERT_FILE_CREAT "Error: failed to setup test certificate\n"
47 #define MHD_E_KEY_FILE_CREAT "Error: failed to setup test certificate\n"
  /external/okhttp/android/main/java/com/squareup/okhttp/
HttpsHandler.java 80 // Android support certificate pinning via NetworkSecurityConfig so there is no need to
82 // in Android should therefore always use the default certificate pinner, whose set of
  /external/openssh/
ssh-add.c 129 /* Now try to delete the corresponding certificate too */
135 error("Failed to load certificate \"%s\": %s",
141 fatal("Certificate %s does not match private key %s",
284 /* Now try to add the certificate flavour too */
288 error("Failed to load certificate \"%s\": %s",
294 error("Certificate %s does not match private key %s",
315 error("Certificate %s (%s) add failed: %s", certpath,
319 fprintf(stderr, "Certificate added: %s (%s)\n", certpath,
ssh2.h 172 /* Certificate types for OpenSSH certificate keys extension */
  /external/python/cpython2/Mac/BuildScript/resources/
ReadMe.rtf 26 \i Certificate verification and OpenSSL
101 \b \cf0 \ul Certificate verification and OpenSSL\
122 \b0 use the certificates from the system security framework, even when used on newer versions of OS X. Instead it consults a traditional OpenSSL concatenated certificate file (
124 \i0 ) or certificate directory (
134 \i0 ; it consults the same default certificate directory,
136 \f0 . As before, it is still necessary to manage certificates yourself when you use this Python variant and, with certificate verification now enabled by default, you may now need to take additional steps to ensure your Python programs have access to CA certificates you trust. If you use this Python variant to build standalone applications with third-party tools like {\field{\*\fldinst{HYPERLINK "https://pypi.python.org/pypi/py2app/"}}{\fldrslt
143 \i0 . Apple's 0.9.8 version includes an important additional feature: if a certificate cannot be verified using the manually administered certificates in
153 \f0 included with 2.7.9 has its own default certificate store for verifying download connections.\
  /external/webrtc/webrtc/tools/rtcbot/
README 42 == Why generating the private key and self signed certificate? ==
43 - Private key and certificate are used for creating HTTPs server in
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
ClientKeyManager.java 15 import java.security.cert.Certificate;
89 Certificate cert = mKeyStore.getCertificate(alias);
  /libcore/ojluni/src/main/java/java/security/cert/
CertificateEncodingException.java 29 * Certificate Encoding Exception. This is thrown whenever an error
30 * occurs while attempting to encode a certificate.
  /libcore/ojluni/src/main/java/javax/net/ssl/
X509ExtendedKeyManager.java 51 * and the list of certificate issuer authorities recognized by
75 * and the list of certificate issuer authorities recognized by
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
URICertStore.java 70 * This <code>CertStore</code> also implements Certificate/CRL caching.
75 * we open an URLConnection to download the Certificate(s)/CRL using an
78 * or the Certificate(s)/CRL cannot be parsed, we remember this result and
100 // X.509 certificate factory instance
208 * object of a certificate's Authority Information Access Extension.
260 // Safe cast since xsel is an X509 certificate selector.
305 // Safe cast since factory is an X.509 certificate factory
370 // Safe cast since xsel is an X509 certificate selector.
  /packages/apps/Settings/src/com/android/settings/
MonitoringCertInfoActivity.java 52 ? R.plurals.ssl_ca_cert_settings_button // Check certificate
53 : R.plurals.ssl_ca_cert_dialog_title; // Trust or remove certificate
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
imagehlp.h 92 WINBOOL IMAGEAPI ImageAddCertificate(HANDLE FileHandle,LPWIN_CERTIFICATE Certificate,PDWORD Index);
95 WINBOOL IMAGEAPI ImageGetCertificateData(HANDLE FileHandle,DWORD CertificateIndex,LPWIN_CERTIFICATE Certificate,PDWORD RequiredLength);
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/project/
ExportHelper.java 87 * @param certificate the certificate used for signing. Can be null.
92 X509Certificate certificate, IProgressMonitor monitor) throws CoreException {
101 // if either key or certificate is null, ensure the other is null.
103 certificate = null;
104 } else if (certificate == null) {
284 certificate, local
376 null, //certificate
  /system/extras/verity/
generate_verity_key.c 81 printf("Failed to read PEM certificate from file '%s'\n", pem_file);
87 printf("Failed to extract public key from certificate '%s'\n", pem_file);
  /system/sepolicy/tools/
post_process_mac_perms 33 PEM_CERT_RE = """-----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
  /prebuilts/go/darwin-x86/pkg/darwin_amd64_race/crypto/
x509.a 16 x509 G|SGOROOT/src/crypto/x509/cert_pool.go0CertPoolbySubjectKeyId  byName  certs 0 x509.go?CertificateH?Raw"!RawTBSCertificate"-RawSubjectPublicKeyInfo"RawSubject"RawIssuer"Signature"#SignatureAlgorithm ?6 String@ algo·2 5isRSAPSS@"?#PublicKeyAlgorithm ?&?PublicKey VersionSerialNumber 0pkcs1.goIntbigmath/bignegabs nat WordTaddFz·2Fx·3Fy·4FandF@esc:0x12FB esc:0x1FDJF andNotF@HFB esc:0x9FDJFbitFx·2J i·3  bitLenFRJ bytesF@J" buf·3Ji·1 clearFz·1JcmpFRJFy·3Jr·1convertWordsFq·1
499 -{x509: certificate is not authorized to sign other certificates???
501 -ax509: certificate has expired or is not yet valid???
503 -?x509: a root or intermediate certificate is not authorized to sign in this domain???
507 -ix509: certificate specifies an incompatible key usage???
510 -?x509: issuer name does not match subject from issuing certificate????
512 -?x509: invalid signature: parent certificate cannot sign this kind of certificate????
600 net.a time.aunicode/utf8.acrypto.acrypto/dsa.acrypto/sha256.acrypto/sha512.astrconv.aruntime/cgo.asyscall.a?"".NewCertPool?*runtime.racefuncenter?*type.map[string][]int?runtime.makemap? type."".CertPool?"runtime.newobject?,runtime.racewriterange?"runtime.racewrite?(runtime.writeBarrier?(runtime.racefuncexit?.runtime.writebarrierptr?0runtime.morestack_noctxt?.autotmp_43?,type.*map[string][]int?.autotmp_42?"type.*"".CertPool?.autotmp_41?.autotmp_40?~r0?.fp?type.uintptr?Tgclocals·bbb04b643c29730bec89bd56cd9bd77e?Tgclocals·432c427e1f8b28d1832c05dfe9524ebf?H$GOROOT/src/crypto/x509/cert_pool.go?""".SystemCertPool?$"".loadSystemRoots?.autotmp_53?.autotmp_52?type.*uint8?.autotmp_51?~r1?type.error?Tgclocals·15b76348caca8a511afecadf603e9401?Tgclocals·beef1c0edbd4d21e0079520d217ae030?D"".(*CertPool).findVerifiedParents? runtime.raceread?H"".(*Certificate).CheckSignatureFrom?$runtime.panicslice?type.int?"runtime.growslice?$runtime.panicindex?8runtime.slicebytetostringtmp?4runtime.mapaccess1_faststr?candidates.len?c?.autotmp_80?.autotmp_75?.autotmp_74?.autotmp_71?.autotmp_81?type.*[]int?.autotmp_79?.type.*[]*"".Certificate?.autotmp_78?(type.*"".Certificate?.autotmp_77?.autotmp_76?.autotmp_73?.autotmp_72?typ (…)
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/InstrumentationAppDiffCert/
AndroidManifest.xml 21 certificate.
  /cts/tools/utils/
java-cert-list-generator.sh 22 # Output the Java file with the certificate fingerprints

Completed in 840 milliseconds

<<31323334353637383940>>