HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 701 - 725 of 832) sorted by null

<<21222324252627282930>>

  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl3Test.java 31 import java.security.cert.Certificate;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
CertUtils.java 1 package org.bouncycastle.cert;
X509AttributeCertificateHolder.java 1 package org.bouncycastle.cert;
X509CRLHolder.java 1 package org.bouncycastle.cert;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
SignerInfoGenerator.java 19 import org.bouncycastle.cert.X509CertificateHolder;
  /external/chromium/chrome/browser/printing/
print_dialog_cloud_uitest.cc 77 info->ssl_info.cert =
  /external/chromium/net/base/
x509_certificate.h 34 // Forward declaration; real one in <cert.h>
214 // If we were unable to parse either date from the certificate (or if the cert
242 // Returns true if I already contain the given intermediate cert.
243 bool HasIntermediateCertificate(OSCertHandle cert);
252 // Do any of the given issuer names appear in this cert's chain of trust?
259 // |server_domain| is a hint for which domain the cert is to be sent to
260 // (a cert previously specified as the default for that domain will be given
269 // Creates the chain of certs to use for this client identity cert.
465 // Blocks multiple threads from verifying the cert simultaneously.
  /external/chromium/net/proxy/
proxy_script_fetcher_impl.cc 189 X509Certificate* cert) {
  /external/chromium/net/socket/
ssl_client_socket_openssl.cc 200 DVLOG(3) << "skipping cert verify";
561 LOG(WARNING) << "Client cert found without private key";
575 ssl_info->cert = server_cert_;
763 // doesn't require a client cert), we need to invalidate the SSL session
766 // cert again.
868 // Eventually, we should cache the cert verification results so that we don't
870 // Alternatively, we could use the cert's status that we stored along with
871 // the cert in the allowed_bad_certs vector.
    [all...]
  /external/chromium/net/url_request/
url_request.h 190 X509Certificate* cert);
url_request_test_util.cc 152 net::X509Certificate* cert) {
  /external/ipsec-tools/src/racoon/
handler.h 163 cert_t *cert; /* CERT minus general header */ member in struct:ph1handle
164 cert_t *cert_p; /* peer's CERT minus general header */
isakmp_agg.c 108 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ]
332 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R
608 * sig: HDR, [ CERT, ] SIG_I
671 if (iph1->cert != NULL && iph1->rmconf->send_cert)
674 /* add CERT payload if there */
677 iph1->cert->pl, ISAKMP_NPTYPE_CERT);
774 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ]
926 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R
1116 if (iph1->cert != NULL && iph1->rmconf->send_cert)
1135 /* add CERT payload if there *
    [all...]
isakmp_base.c 407 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I
493 if (iph1->cert && iph1->rmconf->send_cert)
500 /* add CERT payload if there */
503 iph1->cert->pl, ISAKMP_NPTYPE_CERT);
579 * sig: HDR, KE, [CERT,] SIG_R
1068 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I
1220 * sig: HDR, KE, [CERT,] SIG_R
1314 if (iph1->cert && iph1->rmconf->send_cert)
1321 /* add CERT payload if there */
1324 iph1->cert->pl, ISAKMP_NPTYPE_CERT)
    [all...]
  /external/openssl/apps/
crl2p7.c 227 p7s->cert=cert_stack;
x509.c 131 " -checkend arg - check whether the cert expires in the next arg seconds\n",
133 " -signkey arg - self sign cert with arg\n",
164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
1068 nx.cert=x;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.h 314 const u8 *cert; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.h 308 const u8 *cert; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 224 * @cert: Peer certificate
227 const char *cert_hash, const struct wpabuf *cert);
  /frameworks/base/core/java/android/net/http/
HttpsConnection.java 46 import java.security.cert.X509Certificate;
  /libcore/luni/src/main/java/java/security/cert/
PKIXParameters.java 18 package java.security.cert;
46 // List of cert stores that used to find certificates and CRLs
57 // Indicates whether cert revocation is enabled or not
563 sb.append("\n Cert Stores: ");
568 sb.append("\n Cert Path Checkers: ");
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainServiceTest.java 31 import java.security.cert.Certificate;
  /packages/apps/Settings/src/com/android/settings/wifi/
WifiConfigController.java 696 private void setCertificate(Spinner spinner, String prefix, String cert) {
697 if (cert != null && cert.startsWith(prefix)) {
698 setSelection(spinner, cert.substring(prefix.length()));
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeySelectionPage.java 43 import java.security.cert.CertificateException;
  /tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/packaging/sign/
SignatureBlockFile.java 28 import java.security.cert.X509Certificate;

Completed in 884 milliseconds

<<21222324252627282930>>