/libcore/ojluni/src/main/java/sun/security/x509/ |
DistributionPoint.java | 66 * dNSName [2] IA5String,
|
GeneralSubtrees.java | 257 newName = new GeneralName(new DNSName(""));
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 112 * @suffix_match: String to suffix match in the dNSName or CN of the peer 115 * @domain_match: String to match in the dNSName or CN of the peer
|
tls_openssl.c | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 178 * server certificate in SubjectAltName dNSName element(s). If a 179 * matching dNSName is found, this constraint is met. If no dNSName [all...] |
wpa_supplicant.conf | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ec2/elb/ |
loadbalancer.py | 166 elif name == 'DNSName':
|
/external/iputils/ninfod/ |
ninfod_core.c | 201 .name = "DnsName",
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 879 /* dNSName IA5String */ 880 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len); 888 "embedded NUL byte in dNSName (%s[NUL])", 965 * dNSName [2] IA5String, [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
OSUSocketFactory.java | 172 if (name.size() >= SPVerifier.DNSName &&
|
/libcore/ojluni/src/main/java/java/security/cert/ |
TrustAnchor.java | 102 * dNSName [2] IA5String,
|
X509CertSelector.java | [all...] |
X509Certificate.java | 554 * dNSName [2] IA5String,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchorTest.java | 393 * dNSName [2] IA5String,
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 586 * dNSName [2] IA5String,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 886 case GeneralName.dNSName:
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 908 case GeneralName.dNSName:
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ec2/ |
instance.py | 332 elif name == 'dnsName' or name == 'publicDnsName':
|
/libcore/luni/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 605 * dNSName [2] IA5String,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
ntsecapi.h | 414 LSA_UNICODE_STRING DnsName; [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_client.go | 261 DNSName: c.config.ServerName,
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_client.go | 261 DNSName: c.config.ServerName,
|
/external/boringssl/src/crypto/x509v3/ |
v3_utl.c | 948 cstr = gen->d.dNSName;
|
/external/boringssl/src/ssl/test/runner/ |
handshake_client.go | 411 DNSName: c.config.ServerName,
|
/external/curl/lib/vtls/ |
openssl.c | 1066 If a subjectAltName extension of type dNSName is present, that MUST 1070 Certification Authorities are encouraged to use the dNSName instead. 1074 the certificate (e.g., more than one dNSName name, a match in any one [all...] |