/external/chromium_org/chromeos/test/data/network/ |
uidata_for_wifi_clientref.json | 2 "certificate_type": "ref",
|
uidata_for_wifi_clientcert.json | 11 "certificate_type": "pattern",
|
uidata_for_l2tpipsec_clientcert.json | 17 "certificate_type": "pattern",
|
uidata_for_openvpn_clientcert.json | 17 "certificate_type": "pattern",
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 9 certificate_type x509 "server.crt" "server.key";
|
racoon.conf-radius | 9 certificate_type x509 "server.crt" "server.key";
|
/external/chromium_org/chromeos/network/ |
network_ui_data_unittest.cc | 42 EXPECT_EQ(CLIENT_CERT_TYPE_NONE, ui_data.certificate_type()); 48 EXPECT_EQ(CLIENT_CERT_TYPE_REF, ui_data.certificate_type()); 61 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, ui_data.certificate_type()); 72 ui_data_dict.SetString("certificate_type", "pattern");
|
network_ui_data.h | 57 ClientCertType certificate_type() const { function in class:chromeos::NetworkUIData
|
network_connection_handler_unittest.cc | 198 " \\\"certificate_type\\\": \\\"pattern\\\","
|
network_ui_data.cc | 16 const char NetworkUIData::kKeyCertificateType[] = "certificate_type";
|
network_connection_handler.cc | 426 if (ui_data && ui_data->certificate_type() == CLIENT_CERT_TYPE_PATTERN) {
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 16 certificate_type x509 "my.cert.pem" "my.key.pem";
|
racoon.conf.in | 60 certificate_type x509 "my.cert.pem" "my.key.pem"; 83 #certificate_type x509 "mycert" "mypriv";
|
racoon.conf.sample-plainrsa | 22 certificate_type plain_rsa "privatekey.rsa";
|
racoon.conf.sample | 27 #certificate_type x509 "foo@kame.net.cert" "foo@kame.net.priv" ;
|
racoon.conf.sample-natt | 66 certificate_type x509 "your-host.cert.pem" "your-host.key.pem";
|
/external/chromium_org/third_party/tlslite/tlslite/ |
messages.py | 224 self.certificate_type = CertificateType.x509 229 certificate_type): 234 self.certificate_type = certificate_type 252 self.certificate_type = p.get(1) 269 if self.certificate_type and self.certificate_type != \ 279 if self.certificate_type and self.certificate_type != \ 283 w.add(self.certificate_type, 1 [all...] |
TLSConnection.py | 578 if serverHello.certificate_type not in certificateTypes: 635 certificateType = serverHello.certificate_type [all...] |
/external/chromium_org/third_party/tlslite/patches/ |
channel_id.patch | 162 self.certificate_type = CertificateType.x509 167 certificate_type): 180 w.add(self.certificate_type, 1)
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl_unittest.cc | 264 CertParam(net::CertType certificate_type, 267 : cert_type(certificate_type),
|
/external/ipsec-tools/src/racoon/ |
cfparse.h | 126 CERTIFICATE_TYPE = 342, 291 #define CERTIFICATE_TYPE 342
|
cftoken.l | 323 <S_RMTS>certificate_type { YYD; return(CERTIFICATE_TYPE); }
|
cfparse.y | 216 %token CERTIFICATE_TYPE CERTTYPE PEERS_CERTFILE CA_TYPE [all...] |
racoon.conf.5 | 498 .It Ic certificate_type Ar certspec ; [all...] |
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 79 certificate_type plain_rsa "/etc/racoon/boston.priv";
|