/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509CRLHolder.java | 1 package org.bouncycastle.cert;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
SignerInfoGenerator.java | 18 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
ClientSessionContextTest.java | 25 import java.security.cert.Certificate;
|
/external/conscrypt/openjdk-benchmarks/src/jmh/java/org/conscrypt/benchmarks/ |
SslEngineBenchmark.java | 50 import java.security.cert.X509Certificate;
|
/external/ipsec-tools/src/racoon/ |
handler.h | 163 cert_t *cert; /* CERT minus general header */ member in struct:ph1handle 164 cert_t *cert_p; /* peer's CERT minus general header */
|
isakmp_agg.c | 108 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] 332 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R 608 * sig: HDR, [ CERT, ] SIG_I 671 if (iph1->cert != NULL && iph1->rmconf->send_cert) 674 /* add CERT payload if there */ 677 iph1->cert->pl, ISAKMP_NPTYPE_CERT); 774 * <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] 926 * sig: HDR, SA, KE, Nr, IDr1, [ CR, ] [ CERT, ] SIG_R 1116 if (iph1->cert != NULL && iph1->rmconf->send_cert) 1135 /* add CERT payload if there * [all...] |
isakmp_base.c | 407 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 493 if (iph1->cert && iph1->rmconf->send_cert) 500 /* add CERT payload if there */ 503 iph1->cert->pl, ISAKMP_NPTYPE_CERT); 579 * sig: HDR, KE, [CERT,] SIG_R 1068 * sig: HDR, KE, [ CR, ] [CERT,] SIG_I 1220 * sig: HDR, KE, [CERT,] SIG_R 1314 if (iph1->cert && iph1->rmconf->send_cert) 1321 /* add CERT payload if there */ 1324 iph1->cert->pl, ISAKMP_NPTYPE_CERT) [all...] |
/external/jacoco/org.jacoco.agent.rt.test/src/org/jacoco/agent/rt/internal/ |
CoverageTransformerTest.java | 26 import java.security.cert.Certificate;
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
tpmtoken_import_tests.sh | 34 # Set the cert, key and combined cert and key filenames 35 export TPM_CERTFILE="$LTPTMP/tst_tpm.cert" 268 tpmtoken_import -t cert -n $TCID $TPM_KEYFILE 1>$TPM_TMPFILE 2>&1 || RC=$? 271 tst_resm TPASS "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' passed." 274 tst_res TFAIL $TPM_TMPFILE "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' failed."
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
StreamAllocation.java | 31 import java.security.cert.CertificateException;
|
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverterTest.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.CertificateException; 41 import java.security.cert.CertificateFactory; 42 import java.security.cert.X509Certificate; 68 // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \ 69 // -newkey rsa:512 -out cert.pem 82 // openssl req -x509 -nodes -days 36500 -subj '/CN=*.0.0.1' -newkey rsa:512 -out cert.pem
|
/external/okhttp/okhttp-urlconnection/src/main/java/com/squareup/okhttp/internal/huc/ |
DelegatingHttpsURLConnection.java | 28 import java.security.cert.Certificate;
|
/external/openssh/ |
sshkey.h | 108 struct sshkey_cert *cert; member in struct:sshkey
|
/external/webrtc/webrtc/p2p/base/ |
dtlstransportchannel.h | 142 bool GetRemoteSSLCertificate(rtc::SSLCertificate** cert) const override;
|
p2ptransportchannel.h | 138 bool GetRemoteSSLCertificate(rtc::SSLCertificate** cert) const override {
|
/external/webrtc/webrtc/tools/rtcbot/ |
botmanager.js | 72 cert: fs.readFileSync('configurations/cert.crt', 'utf8')
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 304 const u8 *cert; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 254 * @cert: Peer certificate 258 const char *cert_hash, const struct wpabuf *cert);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
notify.h | 135 const struct wpabuf *cert);
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 51 import java.security.cert.CertificateFactory; 52 import java.security.cert.X509Certificate; 246 X509Certificate cert = certificates[0]; local 247 PublicKey signatureKey = cert.getPublicKey(); 270 // The signature cert matches a trusted key. Now verify that 271 // the digest in the cert matches the actual file data. [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProtection.java | 29 import java.security.cert.Certificate; [all...] |
/frameworks/base/packages/Osu/src/com/android/configparse/ |
ConfigBuilder.java | 22 import java.security.cert.X509Certificate; 46 Log.w(TAG, "Client cert and/or key included with EAP-TTLS profile"); 57 Log.i(TAG, "Client/CA cert and/or key included with " + 81 Certificate cert = ks.getCertificate(alias); 83 if (cert instanceof X509Certificate) { 84 X509Certificate x509Certificate = (X509Certificate) cert; 134 throw new IOException("No key and/or cert passed for EAP-TLS");
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
HTTPHandler.java | 24 import java.security.cert.X509Certificate;
|
/frameworks/base/services/core/java/com/android/server/ |
SyntheticPasswordCrypto.java | 32 import java.security.cert.CertificateException;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiConfigurationUtil.java | 28 import java.security.cert.X509Certificate;
|