/external/chromium_org/net/cert/ |
jwk_serializer_nss.cc | 5 #include "net/cert/jwk_serializer.h" 7 #include <cert.h>
|
nss_cert_database_chromeos.cc | 5 #include "net/cert/nss_cert_database_chromeos.h" 7 #include <cert.h> 17 #include "net/cert/x509_certificate.h"
|
/external/chromium_org/net/ssl/ |
client_cert_store_chromeos.cc | 7 #include <cert.h>
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.h | 88 virtual bool GetPeerCertificate(SSLCertificate** cert) const;
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
transportchannel.h | 115 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const = 0;
|
transportchannelproxy.h | 79 virtual bool GetRemoteCertificate(talk_base::SSLCertificate** cert) const;
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
s_apps.h | 157 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
pcy_int.h | 146 /* Cert for this level */ 147 X509 *cert; member in struct:X509_POLICY_LEVEL_st
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_srvr.c | 183 if (s->cert == NULL) 478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 499 if (/* don't request cert unless asked for it: */ 502 * don't request cert during re-negotiation: */ 505 /* never request cert in anonymous ciphersuites 512 /* never request cert in Kerberos ciphersuites */ 518 /* no cert request */ 600 /* could be sent for a DH cert, even if we 647 * a client cert, it can be verified */ 1046 CERT *cert; local [all...] |
/external/chromium_org/third_party/webrtc/base/ |
opensslstreamadapter.h | 71 virtual bool GetPeerCertificate(SSLCertificate** cert) const;
|
/external/conscrypt/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 28 import java.security.cert.CertificateException;
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
PairingContext.java | 24 import java.security.cert.Certificate;
|
PoloUtil.java | 22 import java.security.cert.Certificate;
|
/external/openssl/apps/ |
s_apps.h | 157 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
/external/openssl/crypto/x509v3/ |
pcy_int.h | 146 /* Cert for this level */ 147 X509 *cert; member in struct:X509_POLICY_LEVEL_st
|
/external/openssl/ssl/ |
d1_srvr.c | 183 if (s->cert == NULL) 479 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 481 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 500 if (/* don't request cert unless asked for it: */ 503 * don't request cert during re-negotiation: */ 506 /* never request cert in anonymous ciphersuites 513 /* never request cert in Kerberos ciphersuites */ 519 /* no cert request */ 601 /* could be sent for a DH cert, even if we 648 * a client cert, it can be verified */ 1057 CERT *cert; local [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
spp.php | 81 $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"];
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
X509ExtendedKeyManagerTest.java | 23 import java.security.cert.X509Certificate;
|
/libcore/luni/src/main/java/java/net/ |
JarURLConnection.java | 22 import java.security.cert.Certificate;
|
/libcore/luni/src/main/java/java/security/cert/ |
CertPath.java | 18 package java.security.cert; 115 sb.append(" Cert Path, len="); 188 // cert path data 192 // for cert path data 225 throw new NotSerializableException("Could not resolve cert path: " + t);
|
CertPathBuilder.java | 18 package java.security.cert;
|
CertPathValidator.java | 18 package java.security.cert;
|
Certificate.java | 18 package java.security.cert;
|
X509CRL.java | 18 package java.security.cert;
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.CertificateException; 41 import java.security.cert.CertificateFactory; 42 import java.security.cert.X509Certificate; 75 // We must load the server cert manually (the ContentCache won't handle blobs 264 LogUtils.i(TAG, "TrackingKeyManager: requesting a client cert alias for " 274 LogUtils.i(TAG, "TrackingKeyManager: returning a null cert chain"); 360 LogUtils.i(TAG, "Requesting a client cert alias for " + Arrays.toString(keyTypes));
|