HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 1001 - 1025 of 1381) sorted by null

<<41424344454647484950>>

  /external/libvncserver/x11vnc/
RELEASE-NOTES 236 The -sslScripts option prints out the SSL certificate management
326 special certificate names. The -sslverify and -sslCRL
567 Anonymous Diffie-Hellman key exchange (-ssl ANON) and Certificate
588 the generated certificate is saved and reused in
839 is set to the clients certificate. Set X11VNC_SSLPEER_CN
840 to use the Common Name instead of the certificate email
872 a Client SSL certificate to be provided by the authenticating
    [all...]
ssltools.h 100 "certificate = $dir/cacert.pem # The CA certificate\n"
109 "cert_opt = ca_default # Certificate field options\n"
146 "# req_extensions = v3_req # The extensions to add to a certificate request\n"
183 "nsComment = \"OpenSSL Generated Certificate\"\n"
257 "echo \"Generating your x11vnc CA (certificate authority) key and certificate:\"\n"
298 "printf \"Press Enter to print the cacert.pem certificate to the screen: \"\n"
372 " echo \"Creating new x11vnc certificate and key for name: $type $name0\"\n"
488 " echo \"Your x11vnc $type certificate request is:\"\n
    [all...]
help.c     [all...]
x11vnc.1     [all...]
  /external/openssh/
sshkey.c     [all...]
  /external/wpa_supplicant_8/hostapd/
hostapd.conf 737 # CA certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
740 # Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
743 # Private key matching with the server certificate for EAP-TLS/PEAP/TTLS
744 # This may point to the same file as server_cert if both certificate and key
761 # This can be done by using PEM format for CA certificate and CRL and
765 # 1 = check the CRL of the user certificate
766 # 2 = check all CRLs in the certificate path
770 # If set, this file is sent as a certificate status response by the EAP server
771 # if the EAP peer requests certificate status in the ClientHello message.
    [all...]
  /external/wpa_supplicant_8/hs20/server/
spp_server.c 739 debug_print(ctx, 1, "Certificate credential - no need for DB "
    [all...]
  /prebuilts/sdk/current/
android.jar 
  /prebuilts/sdk/system_current/
android.jar 
  /hardware/libhardware/include/hardware/
gps.h 395 * Name of the Supl Certificate interface.
397 #define SUPL_CERTIFICATE_INTERFACE "supl-certificate"
810 /** Error codes associated with certificate operations */
815 /** A data structure that represents an X.509 certificate using DER encoding */
823 * The Fingerprint is a digest of the DER Certificate that uniquely identifies it.
829 /** AGPS Interface to handle SUPL certificate operations */
    [all...]
  /packages/apps/Browser/src/com/android/browser/
Tab.java 118 // The page's main resource uses SSL and the certificate is good. The
121 // The page's main resource uses SSL and the certificate is good, but
126 // certificate.
569 * Displays client certificate request to the user.
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 497 wpa_printf(MSG_INFO, "IKEV2: No Certificate received");
513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
515 /* TODO: validate certificate */
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 565 wpa_printf(MSG_INFO, "IKEV2: No Certificate received");
581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
583 /* TODO: validate certificate */
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 42 import java.security.cert.Certificate;
696 Certificate[] serverCertificates = connection.getServerCertificates();
697 Certificate[] localCertificates = request.getSslLocalCertificates();
    [all...]
  /packages/apps/Settings/res/values-ro/
arrays.xml 514 <item msgid="4725504331295252103">"L2TP/IPSec VPN cu certificate"</item>
516 <item msgid="8064740940687465039">"IPSec VPN cu certificate ?i autentificare Xauth"</item>
517 <item msgid="4946199982372391490">"IPSec VPN cu certificate ?i autentificare hibrid?"</item>
  /packages/apps/Settings/res/values-tl/
arrays.xml 514 <item msgid="4725504331295252103">"L2TP/IPSec VPN na may mga certificate"</item>
516 <item msgid="8064740940687465039">"IPSec VPN na may mga certificate at pagpapatotoo ng Xauth"</item>
517 <item msgid="4946199982372391490">"IPSec VPN na may mga certificate at hybrid na pagpapatotoo"</item>
  /external/boringssl/src/crypto/asn1/
a_strnid.c 118 * corresponding OID. For example certificates and certificate requests.
  /external/boringssl/src/crypto/pem/
pem_info.c 388 /* if we have a certificate then write it out now */
  /external/boringssl/src/crypto/x509v3/
v3_lib.c 210 * due to a badly encoded certificate so if idx is NULL we
  /external/boringssl/src/ssl/test/runner/
conn.go 42 peerCertificates []*x509.Certificate
43 // verifiedChains contains the certificate chains that we built, as
45 verifiedChains [][]*x509.Certificate
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
OperatorHelper.java 369 throw new OpCertificateException("cannot get encoded form of certificate: " + e.getMessage(), e);
  /external/conscrypt/src/test/java/org/conscrypt/
NativeCryptoTest.java 33 import java.security.cert.Certificate;
142 X509Certificate certificate = (X509Certificate) ks.getCertificate(caCertAlias); local
143 X500Principal principal = certificate.getIssuerX500Principal();
159 private static OpenSSLX509Certificate[] encodeCertificateList(Certificate[] chain)
423 // neither private or certificate set
438 // first certificate, then private
457 // first private, then certificate
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.api.tools.ee.jre11_1.0.0.200901281111/org/eclipse/pde/api/tools/internal/api_stubs/
JRE-1.1.zip 
  /external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/
ssvnc 101 Set the default Certificate Revocation List to be
  /external/v8/tools/
test-server.py 206 print("Added certificate %s to trusted certificates." % response)

Completed in 475 milliseconds

<<41424344454647484950>>