/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
CertificateVerifyTest.java | 25 * Tests for <code>CertificateVerify</code> constructor and methods 42 new CertificateVerify(anonHash); 48 new CertificateVerify(in, 0); 53 CertificateVerify message = new CertificateVerify(signatures[i]); 56 assertTrue("incorrect CertificateVerify", 67 CertificateVerify message_2 = new CertificateVerify(in, message.length()); 73 message_2 = new CertificateVerify(in, message.length() - 1); 81 message_2 = new CertificateVerify(in, message.length() + 3) [all...] |
/libcore/crypto/src/main/java/org/conscrypt/ |
CertificateVerify.java | 27 public class CertificateVerify extends Message { 39 public CertificateVerify(byte[] hash) { 55 public CertificateVerify(HandshakeIODataStream in, int length) 59 "DECODE ERROR: incorrect CertificateVerify"); 63 "DECODE ERROR: incorrect CertificateVerify");
|
ServerHandshakeImpl.java | 163 || certificateVerify != null 168 certificateVerify = new CertificateVerify(io_stream, length); 186 if (!ds.verifySignature(certificateVerify.signedHash)) { 640 && certificateVerify == null)) {
|
HandshakeProtocol.java | 109 protected CertificateVerify certificateVerify; 491 certificateVerify = null;
|
ClientHandshakeImpl.java | 528 certificateVerify = new CertificateVerify(ds.sign()); 529 send(certificateVerify);
|
/external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
FinishedTest.java | 39 assertTrue("incorrect CertificateVerify", Arrays.equals(message
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 780 "CertificateVerify"); 802 wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateVerify " 815 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected CertificateVerify " 827 "message %d (expected CertificateVerify)", type); 833 wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateVerify"); 838 * } CertificateVerify; 918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 994 "CertificateVerify - did not match with calculated "
|
tlsv1_client_write.c | 439 wpa_printf(MSG_DEBUG, "TLSv1: Send CertificateVerify"); 468 * CertificateVerify message, including the type and length fields of 542 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
|
/external/chromium_org/third_party/tlslite/tlslite/ |
TLSConnection.py | [all...] |
TLSRecordLayer.py | 707 yield CertificateVerify().parse(p) [all...] |
messages.py | 513 class CertificateVerify(HandshakeMsg):
|
/external/chromium_org/net/base/ |
net_error_list.h | 243 // We were unable to sign the CertificateVerify data of an SSL client auth 291 // a peer could not correctly verify a signature (in CertificateVerify or
|
/external/chromium/net/base/ |
net_error_list.h | 219 // We were unable to sign the CertificateVerify data of an SSL client auth
|
/external/chromium_org/net/third_party/nss/patches/ |
clientauth.patch | 383 +// Implement the client CertificateVerify message for SSL3/TLS1.0
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
s_cb.c | 600 str_details1 = ", CertificateVerify";
|
/external/openssl/apps/ |
s_cb.c | 600 str_details1 = ", CertificateVerify";
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_srvr.c | 635 * a certificate, the CertificateVerify [all...] |
s3_srvr.c | 609 * a certificate, the CertificateVerify 646 * FIXME - digest processing for CertificateVerify [all...] |
/external/openssl/ssl/ |
d1_srvr.c | 635 * a certificate, the CertificateVerify [all...] |
s3_srvr.c | 609 * a certificate, the CertificateVerify 646 * FIXME - digest processing for CertificateVerify [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslimpl.h | [all...] |
ssl3con.c | 216 * CertificateVerify messages that use the handshake hash. */ [all...] |