/external/libvncserver/x11vnc/ |
RELEASE-NOTES | 236 The -sslScripts option prints out the SSL certificate management 326 special certificate names. The -sslverify and -sslCRL 567 Anonymous Diffie-Hellman key exchange (-ssl ANON) and Certificate 588 the generated certificate is saved and reused in 839 is set to the clients certificate. Set X11VNC_SSLPEER_CN 840 to use the Common Name instead of the certificate email 872 a Client SSL certificate to be provided by the authenticating [all...] |
ssltools.h | 100 "certificate = $dir/cacert.pem # The CA certificate\n" 109 "cert_opt = ca_default # Certificate field options\n" 146 "# req_extensions = v3_req # The extensions to add to a certificate request\n" 183 "nsComment = \"OpenSSL Generated Certificate\"\n" 257 "echo \"Generating your x11vnc CA (certificate authority) key and certificate:\"\n" 298 "printf \"Press Enter to print the cacert.pem certificate to the screen: \"\n" 372 " echo \"Creating new x11vnc certificate and key for name: $type $name0\"\n" 488 " echo \"Your x11vnc $type certificate request is:\"\n [all...] |
help.c | [all...] |
x11vnc.1 | [all...] |
/external/openssh/ |
sshkey.c | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hostapd.conf | 737 # CA certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS 740 # Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS 743 # Private key matching with the server certificate for EAP-TLS/PEAP/TTLS 744 # This may point to the same file as server_cert if both certificate and key 761 # This can be done by using PEM format for CA certificate and CRL and 765 # 1 = check the CRL of the user certificate 766 # 2 = check all CRLs in the certificate path 770 # If set, this file is sent as a certificate status response by the EAP server 771 # if the EAP peer requests certificate status in the ClientHello message. [all...] |
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 739 debug_print(ctx, 1, "Certificate credential - no need for DB " [all...] |
/prebuilts/sdk/current/ |
android.jar | |
/prebuilts/sdk/system_current/ |
android.jar | |
/hardware/libhardware/include/hardware/ |
gps.h | 395 * Name of the Supl Certificate interface. 397 #define SUPL_CERTIFICATE_INTERFACE "supl-certificate" 810 /** Error codes associated with certificate operations */ 815 /** A data structure that represents an X.509 certificate using DER encoding */ 823 * The Fingerprint is a digest of the DER Certificate that uniquely identifies it. 829 /** AGPS Interface to handle SUPL certificate operations */ [all...] |
/packages/apps/Browser/src/com/android/browser/ |
Tab.java | 118 // The page's main resource uses SSL and the certificate is good. The 121 // The page's main resource uses SSL and the certificate is good, but 126 // certificate. 569 * Displays client certificate request to the user. [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 497 wpa_printf(MSG_INFO, "IKEV2: No Certificate received"); 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 515 /* TODO: validate certificate */
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 565 wpa_printf(MSG_INFO, "IKEV2: No Certificate received"); 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 583 /* TODO: validate certificate */
|
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 42 import java.security.cert.Certificate; 696 Certificate[] serverCertificates = connection.getServerCertificates(); 697 Certificate[] localCertificates = request.getSslLocalCertificates(); [all...] |
/packages/apps/Settings/res/values-ro/ |
arrays.xml | 514 <item msgid="4725504331295252103">"L2TP/IPSec VPN cu certificate"</item> 516 <item msgid="8064740940687465039">"IPSec VPN cu certificate ?i autentificare Xauth"</item> 517 <item msgid="4946199982372391490">"IPSec VPN cu certificate ?i autentificare hibrid?"</item>
|
/packages/apps/Settings/res/values-tl/ |
arrays.xml | 514 <item msgid="4725504331295252103">"L2TP/IPSec VPN na may mga certificate"</item> 516 <item msgid="8064740940687465039">"IPSec VPN na may mga certificate at pagpapatotoo ng Xauth"</item> 517 <item msgid="4946199982372391490">"IPSec VPN na may mga certificate at hybrid na pagpapatotoo"</item>
|
/external/boringssl/src/crypto/asn1/ |
a_strnid.c | 118 * corresponding OID. For example certificates and certificate requests.
|
/external/boringssl/src/crypto/pem/ |
pem_info.c | 388 /* if we have a certificate then write it out now */
|
/external/boringssl/src/crypto/x509v3/ |
v3_lib.c | 210 * due to a badly encoded certificate so if idx is NULL we
|
/external/boringssl/src/ssl/test/runner/ |
conn.go | 42 peerCertificates []*x509.Certificate 43 // verifiedChains contains the certificate chains that we built, as 45 verifiedChains [][]*x509.Certificate [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
OperatorHelper.java | 369 throw new OpCertificateException("cannot get encoded form of certificate: " + e.getMessage(), e);
|
/external/conscrypt/src/test/java/org/conscrypt/ |
NativeCryptoTest.java | 33 import java.security.cert.Certificate; 142 X509Certificate certificate = (X509Certificate) ks.getCertificate(caCertAlias); local 143 X500Principal principal = certificate.getIssuerX500Principal(); 159 private static OpenSSLX509Certificate[] encodeCertificateList(Certificate[] chain) 423 // neither private or certificate set 438 // first certificate, then private 457 // first private, then certificate [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.api.tools.ee.jre11_1.0.0.200901281111/org/eclipse/pde/api/tools/internal/api_stubs/ |
JRE-1.1.zip | |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/ |
ssvnc | 101 Set the default Certificate Revocation List to be
|
/external/v8/tools/ |
test-server.py | 206 print("Added certificate %s to trusted certificates." % response)
|