/external/chromium/net/ocsp/ |
nss_ocsp.cc | 739 strcasecmp(mime_type, "application/x-x509-crl") == 0 || 742 strcasecmp(mime_type, "application/x-x509-ca-cert") == 0 || 743 strcasecmp(mime_type, "application/x-x509-server-cert") == 0 ||
|
/external/chromium/third_party/libjingle/source/talk/base/ |
openssladapter.cc | 628 X509* certificate = SSL_get_peer_certificate(ssl); 784 X509* cert = X509_STORE_CTX_get_current_cert(store); 834 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len);
|
/external/chromium_org/net/cert/ |
x509_certificate.h | 29 // Forward declaration; real one in <x509.h> 30 typedef struct x509_st X509; 62 typedef X509* OSCertHandle;
|
/external/chromium_org/net/ocsp/ |
nss_ocsp.cc | 788 strcasecmp(mime_type, "application/x-x509-crl") == 0 || 791 strcasecmp(mime_type, "application/x-x509-ca-cert") == 0 || 792 strcasecmp(mime_type, "application/x-x509-server-cert") == 0 || [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
openssladapter.cc | 660 X509* certificate = SSL_get_peer_certificate(ssl); 819 X509* cert = X509_STORE_CTX_get_current_cert(store); 866 X509* cert = d2i_X509(NULL, &cert_buffer, cert_buffer_len);
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
v3_utl.c | 58 /* X509 v3 extension utilities */ 466 STACK_OF(OPENSSL_STRING) *X509_get1_email(X509 *x) 477 STACK_OF(OPENSSL_STRING) *X509_get1_ocsp(X509 *x)
|
v3_addr.c | [all...] |
/external/openssl/crypto/x509v3/ |
v3_utl.c | 58 /* X509 v3 extension utilities */ 466 STACK_OF(OPENSSL_STRING) *X509_get1_email(X509 *x) 477 STACK_OF(OPENSSL_STRING) *X509_get1_ocsp(X509 *x)
|
v3_addr.c | [all...] |
/external/qemu/ |
qemu-monitor.hx | 587 matching on the x509 client certificate distinguished name, and SASL 600 normally be an exact username or x509 distinguished name, but can 607 normally be an exact username or x509 distinguished name, but can
|
qemu-options.hx | 563 @var{x509} or @var{x509verify} options. 565 @item x509=@var{/path/to/certificate/dir} 567 Valid if @option{tls} is specified. Require that x509 credentials are used 568 for negotiating the TLS session. The server will send its x509 certificate 571 this option specifies where the x509 certificates are to be loaded from. 576 Valid if @option{tls} is specified. Require that x509 credentials are used 577 for negotiating the TLS session. The server will send its x509 certificate 578 to the client, and request that the client send its own x509 certificate. 583 path following this option specifies where the x509 certificates are to 597 'x509' settings to enable use of SSL and server certificates. Thi [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 11 #include <gnutls/x509.h> 409 static int tls_match_altsubject(X509 *cert, const char *match) 463 X509 *err_cert;
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
GeneralName.java | 23 package org.apache.harmony.security.x509; 95 * @see org.apache.harmony.security.x509.NameConstraints 96 * @see org.apache.harmony.security.x509.GeneralSubtree
|
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
engine.h | 98 #include <openssl/x509.h> 292 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, 293 STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); 574 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **ppkey, 575 STACK_OF(X509) **pother, [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
engine.h | 98 #include <openssl/x509.h> 292 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, 293 STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); 574 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **ppkey, 575 STACK_OF(X509) **pother, [all...] |
/external/openssl/crypto/engine/ |
engine.h | 98 #include <openssl/x509.h> 292 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, 293 STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); 574 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **ppkey, 575 STACK_OF(X509) **pother, [all...] |
/external/openssl/include/openssl/ |
engine.h | 98 #include <openssl/x509.h> 292 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, 293 STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); 574 STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **ppkey, 575 STACK_OF(X509) **pother, [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | [all...] |
/dalvik/hit/samples/ |
android.hprof | 56 s?`uArray s?`AlertDialog_centerMedium . n??org.apache.harmony.security.x509.Extension ' tbhWindowAnimation_windowHideAnimation
u??CONNECTED v\?id_cti_ets_proofOfDelivery ; s? android.widget.ExpandableListView$OnGroupExpandListener v??ALIGN_CENTER I p??(Landroid/content/Context;)Landroid/graphics/drawable/BitmapDrawable;
r]?Maps.java x{0corePoolSize r>?initServiceCache t? GL_NORMAL_ARRAY_TYPE $ tAndroidManifestProvider_syncable
rW?getString E q??(Ljava/lang/reflect/Constructor;Ljava/lang/reflect/Constructor;)I v?HMODEL t(BitmapDrawable w?FLUSH_FAILURE s?xWindow_windowIsTranslucent q?(getEntryBlocking C r?(Ljava/util/concurrent/locks/AbstractQueuedSynchronizer$Node;)V v IS_RINGTONE C q??(Ljava/util/concurrent/locks/AbstractQueuedSynchronizer$Node;)Z * sR`(Ljava/lang/String;Ljava/lang/Class;)V x?8TRANSACTION_peekCredentials p?ServiceManagerNative.java vo?tpBasis vC?REQUEST_DOC_AS_TEXT u??IMPLEMENTATION_VENDOR_ID qr?valueOf | q??(Ljava/lang/CharSequence;Landroid/text/TextPaint;Landroid/text/BoringLayout$Metrics;)Landroid/text/BoringLayout$Metrics; vP(AUTHORITY_PLUS_LABELS v?KEYCODE_ALT_LEFT t7PRotateDrawable upMODE_INVALID u??ACTION_MEDIA_SCANNER_STARTED w0HINT_VIEW_ID 88 wm?mRange xhPolicyMappings
wd?mDragging " r??java.util.Collections$EmptyMap " v6?TRANSACTION_setAppWillBeHidden u??TRANSACTION_enqueueToast t??MITER v%?android.text.Editable vO?android.os.HandlerThread " t?FrameLayout_measureAllChildren w?xtheDoctypeName + u?android.graphics.drawable.PaintDrawable t??GL_MODULATE x`SIZEOF_JDOUBLE 5 rr?org.apache.harmony.security.x509.TBSCertificate$1 wC@java.text.DateFormat [all...] |
/external/chromium_org/chrome/app/ |
google_chrome_strings.grd | 207 <message name="IDS_CERT_ERROR_COMMON_NAME_INVALID_EXTRA_INFO_2" desc="2nd paragraph of extra information for an unsafe common name in an X509 certificate"> 210 <message name="IDS_CERT_ERROR_EXPIRED_DETAILS" desc="Details for an expired X509 certificate"> 213 <message name="IDS_CERT_ERROR_NOT_YET_VALID_DETAILS" desc="Details for an X509 certificate that is not yet valid"> 217 <message name="IDS_CERT_ERROR_AUTHORITY_INVALID_DETAILS" desc="Details for an X509 certificate with an invalid authority"> 223 <message name="IDS_CERT_ERROR_AUTHORITY_INVALID_DETAILS" desc="Details for an X509 certificate with an invalid authority"> 227 <message name="IDS_CERT_ERROR_CONTAINS_ERRORS_DETAILS" desc="Details of the error page for an X509 certificate that contains errors"> [all...] |
/external/chromium_org/chromeos/docs/ |
onc_spec.html | [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/err/ |
err.c | 141 {ERR_PACK(ERR_LIB_X509,0,0) ,"x509 certificate routines"}, 149 {ERR_PACK(ERR_LIB_X509V3,0,0) ,"X509 V3 routines"}, 191 {ERR_R_X509_LIB ,"X509 lib"},
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
channelid.patch | 310 #include <openssl/x509.h> 617 #define SSL_CTX_add_extra_chain_cert(ctx,x509) \ 618 SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509) [all...] |
/external/openssl/crypto/err/ |
err.c | 141 {ERR_PACK(ERR_LIB_X509,0,0) ,"x509 certificate routines"}, 149 {ERR_PACK(ERR_LIB_X509V3,0,0) ,"X509 V3 routines"}, 191 {ERR_R_X509_LIB ,"X509 lib"},
|
/external/openssl/patches/ |
channelid.patch | 310 #include <openssl/x509.h> 617 #define SSL_CTX_add_extra_chain_cert(ctx,x509) \ 618 SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509) [all...] |