/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 31 import java.security.cert.Certificate;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
CertUtils.java | 1 package org.bouncycastle.cert;
|
X509AttributeCertificateHolder.java | 1 package org.bouncycastle.cert;
|
X509CRLHolder.java | 1 package org.bouncycastle.cert;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInfoGenerator.java | 19 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/chromium/chrome/browser/printing/ |
print_dialog_cloud_uitest.cc | 77 info->ssl_info.cert =
|
/external/chromium/net/base/ |
x509_certificate.h | 34 // Forward declaration; real one in <cert.h> 214 // If we were unable to parse either date from the certificate (or if the cert 242 // Returns true if I already contain the given intermediate cert. 243 bool HasIntermediateCertificate(OSCertHandle cert); 252 // Do any of the given issuer names appear in this cert's chain of trust? 259 // |server_domain| is a hint for which domain the cert is to be sent to 260 // (a cert previously specified as the default for that domain will be given 269 // Creates the chain of certs to use for this client identity cert. 465 // Blocks multiple threads from verifying the cert simultaneously.
|
/external/chromium/net/proxy/ |
proxy_script_fetcher_impl.cc | 189 X509Certificate* cert) {
|
/external/chromium/net/socket/ |
ssl_client_socket_openssl.cc | 200 DVLOG(3) << "skipping cert verify"; 561 LOG(WARNING) << "Client cert found without private key"; 575 ssl_info->cert = server_cert_; 763 // doesn't require a client cert), we need to invalidate the SSL session 766 // cert again. 868 // Eventually, we should cache the cert verification results so that we don't 870 // Alternatively, we could use the cert's status that we stored along with 871 // the cert in the allowed_bad_certs vector. [all...] |
/external/chromium/net/url_request/ |
url_request.h | 190 X509Certificate* cert);
|
url_request_test_util.cc | 152 net::X509Certificate* cert) {
|
/external/ipsec-tools/src/racoon/ |
handler.h | 163 cert_t *cert; /* CERT minus general header */ member in struct:ph1handle 164 cert_t *cert_p; /* peer's CERT minus general header */
|
isakmp_agg.c | 108 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] 332 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R 608 * sig: HDR, [ CERT, ] SIG_I 671 if (iph1->cert != NULL && iph1->rmconf->send_cert) 674 /* add CERT payload if there */ 677 iph1->cert->pl, ISAKMP_NPTYPE_CERT); 774 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] 926 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R 1116 if (iph1->cert != NULL && iph1->rmconf->send_cert) 1135 /* add CERT payload if there * [all...] |
isakmp_base.c | 407 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 493 if (iph1->cert && iph1->rmconf->send_cert) 500 /* add CERT payload if there */ 503 iph1->cert->pl, ISAKMP_NPTYPE_CERT); 579 * sig: HDR, KE, [CERT,] SIG_R 1068 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 1220 * sig: HDR, KE, [CERT,] SIG_R 1314 if (iph1->cert && iph1->rmconf->send_cert) 1321 /* add CERT payload if there */ 1324 iph1->cert->pl, ISAKMP_NPTYPE_CERT) [all...] |
/external/openssl/apps/ |
crl2p7.c | 227 p7s->cert=cert_stack;
|
x509.c | 131 " -checkend arg - check whether the cert expires in the next arg seconds\n", 133 " -signkey arg - self sign cert with arg\n", 164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 1068 nx.cert=x; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.h | 314 const u8 *cert; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 308 const u8 *cert; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 224 * @cert: Peer certificate 227 const char *cert_hash, const struct wpabuf *cert);
|
/frameworks/base/core/java/android/net/http/ |
HttpsConnection.java | 46 import java.security.cert.X509Certificate;
|
/libcore/luni/src/main/java/java/security/cert/ |
PKIXParameters.java | 18 package java.security.cert; 46 // List of cert stores that used to find certificates and CRLs 57 // Indicates whether cert revocation is enabled or not 563 sb.append("\n Cert Stores: "); 568 sb.append("\n Cert Path Checkers: ");
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 31 import java.security.cert.Certificate;
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 696 private void setCertificate(Spinner spinner, String prefix, String cert) { 697 if (cert != null && cert.startsWith(prefix)) { 698 setSelection(spinner, cert.substring(prefix.length()));
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeySelectionPage.java | 43 import java.security.cert.CertificateException;
|
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/packaging/sign/ |
SignatureBlockFile.java | 28 import java.security.cert.X509Certificate;
|