HomeSort by relevance Sort by last modified time
    Searched full:certificateverify (Results 1 - 22 of 22) sorted by null

  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
CertificateVerifyTest.java 25 * Tests for <code>CertificateVerify</code> constructor and methods
42 new CertificateVerify(anonHash);
48 new CertificateVerify(in, 0);
53 CertificateVerify message = new CertificateVerify(signatures[i]);
56 assertTrue("incorrect CertificateVerify",
67 CertificateVerify message_2 = new CertificateVerify(in, message.length());
73 message_2 = new CertificateVerify(in, message.length() - 1);
81 message_2 = new CertificateVerify(in, message.length() + 3)
    [all...]
  /libcore/crypto/src/main/java/org/conscrypt/
CertificateVerify.java 27 public class CertificateVerify extends Message {
39 public CertificateVerify(byte[] hash) {
55 public CertificateVerify(HandshakeIODataStream in, int length)
59 "DECODE ERROR: incorrect CertificateVerify");
63 "DECODE ERROR: incorrect CertificateVerify");
ServerHandshakeImpl.java 163 || certificateVerify != null
168 certificateVerify = new CertificateVerify(io_stream, length);
186 if (!ds.verifySignature(certificateVerify.signedHash)) {
640 && certificateVerify == null)) {
HandshakeProtocol.java 109 protected CertificateVerify certificateVerify;
491 certificateVerify = null;
ClientHandshakeImpl.java 528 certificateVerify = new CertificateVerify(ds.sign());
529 send(certificateVerify);
  /external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/
FinishedTest.java 39 assertTrue("incorrect CertificateVerify", Arrays.equals(message
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 780 "CertificateVerify");
802 wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateVerify "
815 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected CertificateVerify "
827 "message %d (expected CertificateVerify)", type);
833 wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateVerify");
838 * } CertificateVerify;
918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
994 "CertificateVerify - did not match with calculated "
tlsv1_client_write.c 439 wpa_printf(MSG_DEBUG, "TLSv1: Send CertificateVerify");
468 * CertificateVerify message, including the type and length fields of
542 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
  /external/chromium_org/third_party/tlslite/tlslite/
TLSConnection.py     [all...]
TLSRecordLayer.py 707 yield CertificateVerify().parse(p)
    [all...]
messages.py 513 class CertificateVerify(HandshakeMsg):
  /external/chromium_org/net/base/
net_error_list.h 243 // We were unable to sign the CertificateVerify data of an SSL client auth
291 // a peer could not correctly verify a signature (in CertificateVerify or
  /external/chromium/net/base/
net_error_list.h 219 // We were unable to sign the CertificateVerify data of an SSL client auth
  /external/chromium_org/net/third_party/nss/patches/
clientauth.patch 383 +// Implement the client CertificateVerify message for SSL3/TLS1.0
  /external/chromium_org/third_party/openssl/openssl/apps/
s_cb.c 600 str_details1 = ", CertificateVerify";
  /external/openssl/apps/
s_cb.c 600 str_details1 = ", CertificateVerify";
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_srvr.c 635 * a certificate, the CertificateVerify
    [all...]
s3_srvr.c 609 * a certificate, the CertificateVerify
646 * FIXME - digest processing for CertificateVerify
    [all...]
  /external/openssl/ssl/
d1_srvr.c 635 * a certificate, the CertificateVerify
    [all...]
s3_srvr.c 609 * a certificate, the CertificateVerify
646 * FIXME - digest processing for CertificateVerify
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
sslimpl.h     [all...]
ssl3con.c 216 * CertificateVerify messages that use the handshake hash. */
    [all...]

Completed in 696 milliseconds