HomeSort by relevance Sort by last modified time
    Searched refs:cert (Results 826 - 850 of 1411) sorted by null

<<31323334353637383940>>

  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/
X509CRLHolder.java 1 package org.bouncycastle.cert;
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
SignerInfoGenerator.java 18 import org.bouncycastle.cert.X509CertificateHolder;
  /external/conscrypt/openjdk/src/test/java/org/conscrypt/
ClientSessionContextTest.java 25 import java.security.cert.Certificate;
  /external/conscrypt/openjdk-benchmarks/src/jmh/java/org/conscrypt/benchmarks/
SslEngineBenchmark.java 50 import java.security.cert.X509Certificate;
  /external/ipsec-tools/src/racoon/
handler.h 163 cert_t *cert; /* CERT minus general header */ member in struct:ph1handle
164 cert_t *cert_p; /* peer's CERT minus general header */
isakmp_agg.c 108 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ]
332 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R
608 * sig: HDR, [ CERT, ] SIG_I
671 if (iph1->cert != NULL && iph1->rmconf->send_cert)
674 /* add CERT payload if there */
677 iph1->cert->pl, ISAKMP_NPTYPE_CERT);
774 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ]
926 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R
1116 if (iph1->cert != NULL && iph1->rmconf->send_cert)
1135 /* add CERT payload if there *
    [all...]
isakmp_base.c 407 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I
493 if (iph1->cert && iph1->rmconf->send_cert)
500 /* add CERT payload if there */
503 iph1->cert->pl, ISAKMP_NPTYPE_CERT);
579 * sig: HDR, KE, [CERT,] SIG_R
1068 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I
1220 * sig: HDR, KE, [CERT,] SIG_R
1314 if (iph1->cert && iph1->rmconf->send_cert)
1321 /* add CERT payload if there */
1324 iph1->cert->pl, ISAKMP_NPTYPE_CERT)
    [all...]
  /external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/
CoverageTransformerTest.java 26 import java.security.cert.Certificate;
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_tests.sh 34 # Set the cert, key and combined cert and key filenames
35 export TPM_CERTFILE="$LTPTMP/tst_tpm.cert"
268 tpmtoken_import -t cert -n $TCID $TPM_KEYFILE 1>$TPM_TMPFILE 2>&1 || RC=$?
271 tst_resm TPASS "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' passed."
274 tst_res TFAIL $TPM_TMPFILE "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' failed."
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
StreamAllocation.java 31 import java.security.cert.CertificateException;
  /external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/
JavaApiConverterTest.java 39 import java.security.cert.Certificate;
40 import java.security.cert.CertificateException;
41 import java.security.cert.CertificateFactory;
42 import java.security.cert.X509Certificate;
68 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \
69 // -newkey rsa:512 -out cert.pem
82 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem
  /external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/
DelegatingHttpsURLConnection.java 28 import java.security.cert.Certificate;
  /external/openssh/
sshkey.h 108 struct sshkey_cert *cert; member in struct:sshkey
  /external/webrtc/webrtc/p2p/base/
dtlstransportchannel.h 142 bool GetRemoteSSLCertificate(rtc::SSLCertificate** cert) const override;
p2ptransportchannel.h 138 bool GetRemoteSSLCertificate(rtc::SSLCertificate** cert) const override {
  /external/webrtc/webrtc/tools/rtcbot/
botmanager.js 72 cert: fs.readFileSync('configurations/cert.crt', 'utf8')
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.h 304 const u8 *cert; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 254 * @cert: Peer certificate
258 const char *cert_hash, const struct wpabuf *cert);
  /external/wpa_supplicant_8/wpa_supplicant/
notify.h 135 const struct wpabuf *cert);
  /frameworks/base/core/java/android/os/
RecoverySystem.java 51 import java.security.cert.CertificateFactory;
52 import java.security.cert.X509Certificate;
246 X509Certificate cert = certificates[0]; local
247 PublicKey signatureKey = cert.getPublicKey();
270 // The signature cert matches a trusted key. Now verify that
271 // the digest in the cert matches the actual file data.
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
KeyProtection.java 29 import java.security.cert.Certificate;
    [all...]
  /frameworks/base/packages/Osu/src/com/android/configparse/
ConfigBuilder.java 22 import java.security.cert.X509Certificate;
46 Log.w(TAG, "Client cert and/or key included with EAP-TTLS profile");
57 Log.i(TAG, "Client/CA cert and/or key included with " +
81 Certificate cert = ks.getCertificate(alias);
83 if (cert instanceof X509Certificate) {
84 X509Certificate x509Certificate = (X509Certificate) cert;
134 throw new IOException("No key and/or cert passed for EAP-TLS");
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
HTTPHandler.java 24 import java.security.cert.X509Certificate;
  /frameworks/base/services/core/java/com/android/server/
SyntheticPasswordCrypto.java 32 import java.security.cert.CertificateException;
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
WifiConfigurationUtil.java 28 import java.security.cert.X509Certificate;

Completed in 1301 milliseconds

<<31323334353637383940>>