/frameworks/opt/net/wifi/tests/wifitests/assets/ |
ruckus.PerProviderSubscription.conf | 32 7:CertURL=2a:http://www.r2-testbed.wi-fi.org/cacert.der
|
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 501 X509Certificate caCert; 505 caCert = null; 509 caCert = (X509Certificate)signer.getCertificate(); 564 X500Principal issuer = ((caCert != null) 565 ? caCert.getSubjectX500Principal() [all...] |
/external/curl/lib/vtls/ |
nss.c | 342 const char *filename, bool cacert) 350 CURLcode result = (cacert) 354 const int slot_id = (cacert) ? 0 : 1; 370 CK_BBOOL *pval = (cacert) ? (&cktrue) : (&ckfalse); 384 if(!cacert && CKO_CERTIFICATE == obj_class) 410 const char *filename, PRBool cacert) 412 CURLcode result = (cacert) 419 result = nss_create_object(ssl, CKO_CERTIFICATE, filename, cacert); 421 if(!result && !cacert) { [all...] |
polarssl.c | 181 memset(&connssl->cacert, 0, sizeof(x509_crt)); 184 ret = x509_crt_parse_file(&connssl->cacert, 200 ret = x509_crt_parse_path(&connssl->cacert, 340 &connssl->cacert, 554 x509_crt_free(&conn->ssl[sockindex].cacert);
|
darwinssl.c | 1662 SecCertificateRef cacert = local [all...] |
/external/tlsdate/src/ |
tlsdate-helper-plan9.c | 833 x509_cert cacert; local 839 memset (&cacert, 0, sizeof(x509_cert)); 853 if (0 > x509parse_crtfile(&cacert, ca_cert_container)) 857 if (0 > x509parse_crtpath(&cacert, ca_cert_container)) 879 ssl_set_ca_chain (&ssl, &cacert, NULL, hostname_to_verify); 956 x509_free (&cacert); [all...] |
tlsdate-helper.c | 973 x509_cert cacert; local 979 memset (&cacert, 0, sizeof(x509_cert)); 993 if (0 > x509parse_crtfile(&cacert, ca_cert_container)) 997 if (0 > x509parse_crtpath(&cacert, ca_cert_container)) 1019 ssl_set_ca_chain (&ssl, &cacert, NULL, hostname_to_verify); 1096 x509_free (&cacert); [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AndroidKeyStoreTest.java | 83 * openssl req -new -x509 -days 3650 -extensions v3_ca -keyout cakey.pem -out cacert.pem 88 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 94 * openssl x509 -outform d -in cacert.pem | xxd -i | sed 's/0x/(byte) 0x/g' [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyStoreTest.java | 90 * openssl req -new -x509 -days 3650 -extensions v3_ca -keyout cakey.pem -out cacert.pem 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 101 * openssl x509 -outform d -in cacert.pem | xxd -i | sed 's/0x/(byte) 0x/g' [all...] |
/external/autotest/client/cros/scripts/ |
wifi | 17 'EAP.CACert': unicode,
|
/external/curl/docs/examples/ |
cacertinmem.c | 48 char * mypem = /* www.cacert.org */
|
usercertinmem.c | 50 const char *mypem = /* www.cacert.org */
|
/external/curl/src/ |
tool_cfgable.h | 110 char *cacert; member in struct:OperationConfig
|
tool_operate.c | 106 " using the --cacert option.\n" 242 if(!config->cacert && 248 config->cacert = strdup(env); 249 if(!config->cacert) { 270 config->cacert = strdup(env); 271 if(!config->cacert) { [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
openssl.cnf | 26 certificate = $dir/cacert.pem # The CA certificate
|
/prebuilts/sdk/tools/ |
jack | 128 --cacert "${JACK_HOME}/server.pem" \
|
/system/connectivity/shill/test-scripts/ |
connect-vpn | 96 params["OpenVPN.CACert"] = args[4]
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 539 String caCert = (String) mEapCaCertSpinner.getSelectedItem(); 543 if (caCert.equals(mUnspecifiedCertString) 544 || caCert.equals(mDoNotValidateEapServerString)) { 546 } else if (caCert.equals(mUseSystemCertsString)) { 548 } else if (caCert.equals(mMultipleCertSetString)) { 561 config.enterpriseConfig.setCaCertificateAliases(new String[] {caCert}); [all...] |
/external/autotest/site_utils/chromeos_proxy/ |
swarming_bots.py | 22 | |-- 092b5bd4562f579711823f61e311de37247c853a-cacert.pem 28 |-- 092b5bd4562f579711823f61e311de37247c853a-cacert.pem
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CRLTest.java | 186 X509Certificate caCert = getCertificate(f, CERT_CRL_CA); 187 crlRsa.verify(caCert.getPublicKey());
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
ReverseBuilder.java | 404 boolean caCert = (cert.getBasicConstraints() != -1 ? true : false); 410 if (!caCert)
|
/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 139 exec("openssl x509 -req -in $req_pem -CAkey $cadir/cakey.pem -out $cert_pem -CA $cadir/cacert.pem -CAserial $cadir/serial -days 365 -text");
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiManagerFacade.java | 469 X509Certificate caCert = strToX509Cert(certString); 470 caCert.getEncoded(); 473 out.writeObject(caCert); [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
FakeKeys.java | 24 * openssl req -new -x509 -days 3650 -extensions v3_ca -keyout cakey.pem -out cacert.pem 29 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 149 * openssl x509 -outform d -in cacert.pem | xxd -i | sed 's/0x/(byte) 0x/g' 279 * openssl req -new -x509 -days 3650 -extensions v3_ca -keyout cakey.pem -out cacert.pem 285 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 355 * openssl x509 -outform d -in cacert.pem | xxd -i | sed 's/0x/(byte) 0x/g' [all...] |
/frameworks/base/services/core/java/com/android/server/connectivity/ |
Vpn.java | [all...] |