/external/chromium_org/third_party/tlslite/tlslite/ |
Checker.py | 18 Currently, the Checker can check either an X.509 or a cryptoID 22 def __init__(self, cryptoID=None, protocol=None, 29 - cryptoID[, protocol] (requires cryptoIDlib) 33 @type cryptoID: str 34 @param cryptoID: A cryptoID which the other party's certificate 39 @param protocol: A cryptoID protocol URI which the other 40 party's certificate chain must match. Requires the 'cryptoID' 46 match. Mutually exclusive with the 'cryptoID' and 53 installed. Mutually exclusive with the 'cryptoID' an [all...] |
HandshakeSettings.py | 49 The allowed values in this list are 'x509' and 'cryptoID'. This 54 NOTE: If 'cryptoID' is used in this list, but cryptoIDlib is not 55 installed, then 'cryptoID' will be silently removed. 81 self.certificateTypes = ["x509", "cryptoID"] 105 if e != "cryptoID"] 136 if s not in ("x509", "cryptoID"): 155 elif ct == "cryptoID": 156 l.append(CertificateType.cryptoID)
|
constants.py | 6 cryptoID = 2
|
messages.py | 315 elif self.certificateType == CertificateType.cryptoID: 322 "cryptoID cert chain received, cryptoIDlib not present") 347 elif self.certificateType == CertificateType.cryptoID:
|
TLSConnection.py | 136 will authenticate itself using an X.509 or cryptoID certificate 417 if "cryptoID" not in settings.certificateTypes: 420 settings.certificateTypes = ["cryptoID"] [all...] |
/external/chromium_org/third_party/tlslite/test/ |
clientCryptoIDChain.xml | 1 <certChain chainID="zUuTTlYaoCcQt7olivgLTwi4Dcc=" cryptoID="fpxef.4kvyi.v98yh.fmpnb" xmlns="http://trevp.net/cryptoID">
|
serverCryptoIDChain.xml | 1 <certChain chainID="+YzLTjs06lZvpdErm4XvLrdDIm0=" cryptoID="fcqnh.x9ipq.7htkd.36ciw" xmlns="http://trevp.net/cryptoID">
|
index.html | 14 <a name="cryptoID"> 15 <H2><a href="cryptoID/">CryptoIDs</a></H2> 16 <b>Paper 1:</b> Public Key Distribution through "cryptoIDs" (<a href="cryptoID/cryptoID.pdf">.pdf</a>, <a href="cryptoID/cryptoID.html">.html</a>) <i>(presented at <a href="http://www.nspw.org/2003/">NSPW 2003</a>)</i><br> 17 <b>Paper 2:</b> The CryptoID Key Management Protocols (<a href="cryptoID/cryptoID2.pdf">.pdf</a>) <i>(the best introduction)</i><br> 18 <b>Schema:</b> XML Schema for <certChain> (<a href="cryptoID/cryptoID.xsd">.xsd</a>)<br [all...] |
/external/chromium_org/third_party/tlslite/tlslite/integration/ |
SMTP_TLS.py | 13 cryptoID=None, protocol=None, 32 - cryptoID[, protocol] (requires cryptoIDlib) 68 @type cryptoID: str 69 @param cryptoID: cryptoID for server authentication. Mutually 73 @param protocol: cryptoID protocol URI for server 74 authentication. Requires the 'cryptoID' argument. 78 server authentication. Mutually exclusive with the 'cryptoID' 86 'cryptoID' and 'x509Fingerprint' arguments. 92 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
IntegrationHelper.py | 7 cryptoID=None, protocol=None, 45 #Authenticate the server based on its cryptoID or fingerprint 46 if sharedKey and (cryptoID or protocol or x509Fingerprint): 50 self.checker = Checker(cryptoID, protocol, x509Fingerprint,
|
ClientHelper.py | 15 cryptoID=None, protocol=None, 30 - cryptoID[, protocol] (requires cryptoIDlib) 69 @type cryptoID: str 70 @param cryptoID: cryptoID for server authentication. Mutually 74 @param protocol: cryptoID protocol URI for server 75 authentication. Requires the 'cryptoID' argument. 79 server authentication. Mutually exclusive with the 'cryptoID' 87 'cryptoID' and 'x509Fingerprint' arguments. 93 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
XMLRPCTransport.py | 15 cryptoID=None, protocol=None, 40 - cryptoID[, protocol] (requires cryptoIDlib) 80 @type cryptoID: str 81 @param cryptoID: cryptoID for server authentication. Mutually 85 @param protocol: cryptoID protocol URI for server 86 authentication. Requires the 'cryptoID' argument. 90 server authentication. Mutually exclusive with the 'cryptoID' 98 'cryptoID' and 'x509Fingerprint' arguments. 104 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
HTTPTLSConnection.py | 62 cryptoID=None, protocol=None, 78 - cryptoID[, protocol] (requires cryptoIDlib) 125 @type cryptoID: str 126 @param cryptoID: cryptoID for server authentication. Mutually 130 @param protocol: cryptoID protocol URI for server 131 authentication. Requires the 'cryptoID' argument. 135 server authentication. Mutually exclusive with the 'cryptoID' 143 'cryptoID' and 'x509Fingerprint' arguments. 149 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
IMAP4_TLS.py | 17 cryptoID=None, protocol=None, 33 - cryptoID[, protocol] (requires cryptoIDlib) 75 @type cryptoID: str 76 @param cryptoID: cryptoID for server authentication. Mutually 80 @param protocol: cryptoID protocol URI for server 81 authentication. Requires the 'cryptoID' argument. 85 server authentication. Mutually exclusive with the 'cryptoID' 93 'cryptoID' and 'x509Fingerprint' arguments. 99 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
POP3_TLS.py | 17 cryptoID=None, protocol=None, 33 - cryptoID[, protocol] (requires cryptoIDlib) 75 @type cryptoID: str 76 @param cryptoID: cryptoID for server authentication. Mutually 80 @param protocol: cryptoID protocol URI for server 81 authentication. Requires the 'cryptoID' argument. 85 server authentication. Mutually exclusive with the 'cryptoID' 93 'cryptoID' and 'x509Fingerprint' arguments. 99 the 'cryptoID' and 'x509Fingerprint' arguments. Requires th [all...] |
/external/chromium_org/third_party/tlslite/ |
setup.py | 22 description="tlslite implements SSL and TLS with SRP, shared-keys, cryptoID, or X.509 authentication.",
|
readme.txt | 57 - If you have cryptoIDlib [8], you can use cryptoID certificate chains for 175 X.509 or cryptoID certificate chain. To use cryptoID chains, you'll need the 180 Below are examples of loading cryptoID and X.509 certificate chains: 182 #Load cryptoID certChain and privateKey. Requires cryptoIDlib. 313 ignore the other certificates. CryptoID fingerprints (aka "cryptoIDs") are 314 based on the root cryptoID certificate, so you have to call validate() on the 315 CertChain to be sure you're really talking to the cryptoID. 444 #Authenticate server based on its cryptoID 446 cryptoID="dmqb6.fq345.cxk6g.5fha3" [all...] |
/external/chromium_org/third_party/tlslite/patches/ |
send_certificate_types.patch | 7 cryptoID = 2
|
/external/chromium_org/third_party/tlslite/scripts/ |
tls.py | 122 print "Test 8 - good SRP: with cryptoID certificate chain" 132 print "Test 9 - CryptoID with SRP faults" 174 print "Test 12 - good cryptoID" 182 print "Test 13 - cryptoID faults" 229 print "Test 16 - good mutual cryptoID" 240 print "Test 17 - mutual cryptoID faults" 304 print "Test 21a - HTTPS test SRP+cryptoID" 312 time.sleep(2) #Time to generate key and cryptoID 320 cryptoID=fingerprint, protocol=protocol) 327 fingerprint = h.tlsSession.serverCertChain.cryptoID [all...] |
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
RSAKey.py | 48 """Return the cryptoID <keyHash> value corresponding to this 56 """Return the cryptoID sigAlgo value corresponding to this key.
|
xmltools.py | 136 nsRegEx = "http://trevp.net/cryptoID\Z"
|