Searched
full:certificate (Results
1726 -
1750 of
2776) sorted by null
<<61626364656667686970>>
/external/boringssl/src/crypto/x509v3/ |
v3_bitst.c | 84 {5, "Certificate Sign", "keyCertSign"},
|
v3_enum.c | 73 {CRL_REASON_CERTIFICATE_HOLD, "Certificate Hold", "certificateHold"},
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 33 * Handles NetScape certificate request (KEYGEN), these are constructed as:
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustedCertificateIndex.java | 78 // Avoid indexing the same certificate multiple times
|
/external/curl/ |
RELEASE-NOTES | 42 o darwinssl: fix SSL client certificate not found on MacOS Sierra [17]
|
/external/curl/docs/libcurl/opts/ |
CURLOPT_CONNECT_TO.3 | 61 (e.g. SNI, certificate verification) or for the application protocols.
|
/external/curl/lib/vtls/ |
polarssl.c | 214 /* Load the client certificate */ 471 failf(data, "Failed due to missing peer certificate"); 486 failf(data, "Failed copying peer certificate"); 495 failf(data, "Failed copying public key from peer certificate");
|
vtls.c | 635 /* Free any previous certificate information structures */ 638 /* Allocate the required certificate information structures */ 877 * if the size of our certificate is bigger than the file 914 * if the size of our certificate doesn't match the size of
|
vtls.h | 98 /* Certificate information list handling. */
|
/external/ipsec-tools/src/racoon/ |
oakley.c | [all...] |
oakley.h | 166 /* certificate holder */
|
/external/libmicrohttpd/doc/examples/ |
tlsauthentication.c | 245 printf ("The key/certificate files could not be read.\n");
|
/external/libmicrohttpd/src/microspdy/ |
io.h | 80 * certificate and key file are used for tls.
|
/external/nist-pkits/ |
extract-pkits-tests.pl | 145 if ($_ =~ /^\s*4\.8 Certificate Policies\s*$/) {
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/ |
ConnectionSpecSelector.java | 120 // e.g. a certificate pinning error.
|
/external/openssh/ |
PROTOCOL.agent | 180 string certificate 204 string certificate 222 string certificate 250 string certificate
|
ssh-add.0 | 16 corresponding certificate information from the filename obtained by
|
/external/openssh/regress/ |
principals-command.sh | 17 # Create a CA key and a user certificate.
|
/external/webrtc/webrtc/base/ |
messagedigest.cc | 62 // and thus also MUST use it to calculate certificate fingerprints."
|
/external/webrtc/webrtc/p2p/base/ |
transportchannel.h | 131 // Gets a copy of the remote side's SSL certificate, owned by the caller.
|
transportcontroller_unittest.cc | 285 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(), 286 returned_certificate->identity()->certificate().ToPEMString()); 297 EXPECT_EQ(certificate1->identity()->certificate().ToPEMString(), 298 returned_certificate->identity()->certificate().ToPEMString());
|
/external/wpa_supplicant_8/hostapd/ |
eap_testing.txt | 75 1) EAP-TLS itself worked, but peer certificate validation failed at
|
hostapd.eap_user | 27 # avoid having to configure every certificate for EAP-TLS authentication. The
|
/external/wpa_supplicant_8/hs20/client/ |
spp_client.c | 481 wpa_printf(MSG_INFO, "Client certificate enrollment"); 489 "Certificate enrollment completed" : 490 "Certificate enrollment failed"); 498 debug_dump_node(ctx, "Received response to certificate enrollment "
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
eapol_test.sgml | 147 <listitem><para>Location to write out server certificate.
|
Completed in 310 milliseconds
<<61626364656667686970>>