/external/chromium_org/chromeos/test/data/network/ |
uidata_for_wifi_clientref.json | 2 "certificate_type": "ref",
|
uidata_for_wifi_clientcert.json | 11 "certificate_type": "pattern",
|
uidata_for_l2tpipsec_clientcert.json | 17 "certificate_type": "pattern",
|
uidata_for_openvpn_clientcert.json | 17 "certificate_type": "pattern",
|
/external/chromium_org/chromeos/test/data/network/policy/ |
shill_policy_on_unmanaged_ethernet_eap.json | 6 "UIData": "{\"certificate_pattern\":{\"IssuerCAPEMs\":[\"pem1\"]},\"certificate_type\":\"pattern\",\"onc_source\":\"user_policy\"}"
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 9 certificate_type x509 "server.crt" "server.key";
|
racoon.conf-radius | 9 certificate_type x509 "server.crt" "server.key";
|
/external/chromium_org/chromeos/network/ |
network_ui_data_unittest.cc | 42 EXPECT_EQ(CLIENT_CERT_TYPE_NONE, ui_data.certificate_type()); 48 EXPECT_EQ(CLIENT_CERT_TYPE_REF, ui_data.certificate_type()); 61 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, ui_data.certificate_type()); 72 ui_data_dict.SetString("certificate_type", "pattern");
|
network_ui_data.h | 57 ClientCertType certificate_type() const { function in class:chromeos::NetworkUIData
|
network_connection_handler_unittest.cc | 198 " \\\"certificate_type\\\": \\\"pattern\\\","
|
network_ui_data.cc | 16 const char NetworkUIData::kKeyCertificateType[] = "certificate_type";
|
network_connection_handler.cc | 407 (ui_data && ui_data->certificate_type() != CLIENT_CERT_TYPE_NONE)) 423 if (ui_data && ui_data->certificate_type() == CLIENT_CERT_TYPE_PATTERN) {
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 16 certificate_type x509 "my.cert.pem" "my.key.pem";
|
racoon.conf.in | 60 certificate_type x509 "my.cert.pem" "my.key.pem"; 83 #certificate_type x509 "mycert" "mypriv";
|
racoon.conf.sample-plainrsa | 22 certificate_type plain_rsa "privatekey.rsa";
|
racoon.conf.sample | 27 #certificate_type x509 "foo@kame.net.cert" "foo@kame.net.priv" ;
|
racoon.conf.sample-natt | 66 certificate_type x509 "your-host.cert.pem" "your-host.key.pem";
|
/external/chromium_org/third_party/tlslite/tlslite/ |
messages.py | 243 self.certificate_type = CertificateType.x509 250 certificate_type): 255 self.certificate_type = certificate_type 273 self.certificate_type = p.get(1) 290 if self.certificate_type and self.certificate_type != \ 306 if self.certificate_type and self.certificate_type != \ 310 w.add(self.certificate_type, 1 [all...] |
/external/chromium_org/third_party/tlslite/patches/ |
channel_id.patch | 162 self.certificate_type = CertificateType.x509 167 certificate_type): 180 w.add(self.certificate_type, 1)
|
signed_certificate_timestamps.patch | 120 self.certificate_type = CertificateType.x509 126 certificate_type):
|
status_request.patch | 149 certificate_type):
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl_unittest.cc | 264 CertParam(net::CertType certificate_type, 267 : cert_type(certificate_type),
|
/external/ipsec-tools/src/racoon/ |
cfparse.h | 126 CERTIFICATE_TYPE = 342, 291 #define CERTIFICATE_TYPE 342
|
cftoken.l | 323 <S_RMTS>certificate_type { YYD; return(CERTIFICATE_TYPE); }
|
/external/ipsec-tools/src/racoon/doc/ |
README.plainrsa | 79 certificate_type plain_rsa "/etc/racoon/boston.priv";
|