/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 64 # With NAT-T you shouldn't use PSK. Let's go on with certs.
|
/external/openssl/crypto/asn1/ |
nsseq.c | 80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
/external/openssl/crypto/x509/ |
x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/openssl/include/openssl/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/frameworks/base/core/java/android/content/pm/ |
PackageParser.java | 504 Certificate[] certs = null; local 512 certs = loadCertificates(jarFile, jarEntry, readBuffer); 513 if (certs == null) { 523 + " certs=" + (certs != null ? certs.length : 0)); 524 if (certs != null) { 525 final int N = certs.length; 528 + certs[i].getPublicKey().getEncoded() 529 + " " + certs[i].getPublicKey()) [all...] |
/external/apache-harmony/support/src/test/java/org/apache/harmony/testframework/serialization/ |
SerializationTest.java | 337 java.security.cert.Certificate[] certs = up1.getUnresolvedCerts(); 338 if (certs != null && certs.length == 0) { 366 java.security.cert.Certificate[] certs = initPerm 368 if (certs != null && certs.length == 0) {
|
/external/chromium/net/base/ |
x509_certificate.h | 245 // Returns true if I already contain all the given intermediate certs. 246 bool HasIntermediateCertificates(const OSCertHandles& certs); 258 // Adds all available SSL client identity certs to the given vector. 262 // If valid_issuers is non-empty, only certs that were transitively issued by 267 CertificateList* certs); 269 // Creates the chain of certs to use for this client identity cert.
|
x509_certificate_mac.cc | [all...] |
x509_certificate_unittest.cc | 26 // turn this on to test EV certs. But leave it turned off for the automated 991 CertificateList certs = CreateCertificateListFromFile( local [all...] |
/external/openssl/crypto/x509v3/ |
pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 768 STACK_OF(X509) *certs, 778 ret = tree_init(&tree, certs, flags);
|
/external/chromium/crypto/ |
nss_util.cc | 87 // On chromeos, return a read-only directory with fake root CA certs for testing 88 // (which will not exist on non-testing images). These root CA certs are used 456 // Load nss's built-in root certs. 458 SECMODModule* root = LoadModule("Root Certs", "libnssckbi.so", NULL); 536 // If this gets set, then we'll use the TPM for certs with
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 61 * certs) authorized to sign OTA updates. 93 /** @return the set of certs that can be used to sign an OTA package. */ 138 * package or certs files.
|
/frameworks/base/tests/CoreTests/android/core/ |
MiscRegressionTest.java | 186 Certificate[] certs = je != null ? je.getCertificates() : null; local 190 if (certs == null) { 193 android.util.Log.d("TestHarness", "We have " + certs.length + " certificates");
|
/cts/tests/appsecurity-tests/src/com/android/cts/appsecurity/ |
AppSecurityTests.java | 103 Log.i(LOG_TAG, "installing apks with shared uid, but different certs"); 130 Log.i(LOG_TAG, "installing app upgrade with different certs");
|
/external/openssl/android.testssl/ |
server2.pem | 226 /Email=server-certs@thawte.com 229 /Email=server-certs@thawte.com
|
/external/openssl/apps/ |
crl2p7.c | 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 292 * number of certs added if successful, -1 if not.
|
server.pem | 219 /Email=server-certs@thawte.com 222 /Email=server-certs@thawte.com
|
server2.pem | 226 /Email=server-certs@thawte.com 229 /Email=server-certs@thawte.com
|
/frameworks/base/core/java/android/net/http/ |
HttpsConnection.java | 92 X509Certificate[] certs, String authType) { 96 X509Certificate[] certs, String authType) {
|
/frameworks/base/docs/html/intl/ja/guide/publishing/ |
app-signing.jd | 303 <pre>$ jarsigner -verify -verbose -certs my_application.apk</pre> 305 <p>??? <code>-certs</code> ???????????????????CN=?????????????????????</p>
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 85 Certificate [] certs = juc.getCertificates(); local 86 assertEquals(3, certs.length);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 254 java.security.Certificate[] certs = sub.certificates(); local 256 certs[0], certImpl);
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | 696 private X509Certificate[] certs= new X509Certificate[3]; field in class:CertificateTest [all...] |