HomeSort by relevance Sort by last modified time
    Searched full:certificate (Results 826 - 850 of 2776) sorted by null

<<31323334353637383940>>

  /device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
SecureBootConfigImpl.c 90 // Possible DER-encoded certificate file suffixes, end with NULL pointer.
101 This code checks if the FileSuffix is one of the possible DER-encoded certificate suffix.
103 @param[in] FileSuffix The suffix of the input certificate file
105 @retval TRUE It's a DER-encoded certificate.
106 @retval FALSE It's NOT a DER-encoded certificate.
188 // variable. So we create EFI_VARIABLE_AUTHENTICATED_2 descriptor without certificate
312 Generate the PK signature list from the X509 Certificate storing file (.cer)
314 @param[in] X509File FileHandle of X509 Certificate storing file.
343 // Allocate space for PK certificate list and initialize it.
366 // Fill the PK database with PKpub data from X509 certificate file.
    [all...]
  /external/autotest/client/cros/scripts/
destination 15 common_args = ['<certificate>', '<public_key>', '<nonce>',
  /external/autotest/client/site_tests/platform_AccurateTime/src/
cert.pem 0 Certificate:
30 OpenSSL Generated Certificate
45 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
  /external/autotest/client/site_tests/security_OpenSSLBlacklist/src/
cert.pem 0 Certificate:
30 OpenSSL Generated Certificate
45 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
  /external/boringssl/src/crypto/x509v3/
pcy_int.h 70 * be kept static and cached with the certificate.
91 * This flag indicates the data doesn't correspond to a policy in Certificate
113 /* This structure is cached with a certificate */
168 * Extra policy data when additional nodes (not from the certificate) are
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
X509CRLEntryObject.java 31 * ReasonCode Hode Instruction Code Invalidity Date Certificate Issuer
53 * has no certificate issuer CRL entry extension
63 * Certificate issuer of the previous CRLEntry.
294 buf.append("Certificate issuer: ").append(GeneralNames.getInstance(dIn.readObject())).append(nl);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
X509CRLEntryObject.java 32 * ReasonCode Hode Instruction Code Invalidity Date Certificate Issuer
54 * has no certificate issuer CRL entry extension
64 * Certificate issuer of the previous CRLEntry.
295 buf.append("Certificate issuer: ").append(GeneralNames.getInstance(dIn.readObject())).append(nl);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
ExtendedPKIXBuilderParameters.java 73 * constraints on the target certificate or attribute
74 * certificate.
96 * A value of 0 implies that the path can only contain a single certificate.
101 * The basic constraints extension of a CA certificate overrides this value
  /external/conscrypt/platform/src/test/java/org/conscrypt/
TrustManagerImplTest.java 21 import java.security.cert.Certificate;
70 // We should ignore duplicate cruft in the certificate chain
172 public Certificate[] getLocalCertificates() {
193 public Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException {
  /external/curl/docs/cmdline-opts/
connect-to.d 13 certificate verification) or for the application protocols. "host" and "port"
  /external/curl/tests/data/
test2034 6 PEM certificate
test2037 6 PEM certificate
test2041 6 PEM certificate
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-plainrsa 10 path certificate "samples" ;
  /external/libcups/cups/
cups-private.h 155 cups_client_cert_cb_t client_cert_cb; /* Client certificate callback */
157 /* Client certificate user data */
158 cups_server_cert_cb_t server_cert_cb; /* Server certificate callback */
160 /* Server certificate user data */
  /external/libese/tools/ese_ls_provision/
README.md 11 the certificate for the signing key. This tool takes those signed, encrypted scripts and sends
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_tests_exp01.sh 29 # Import the combined certificate and key
tpmtoken_import_tests_exp03.sh 29 # Import the combined certificate and key
tpmtoken_import_tests_exp04.sh 29 # Import the combined certificate and key
tpmtoken_import_tests_exp06.sh 29 # Import the combined certificate and key
tpmtoken_import_tests_exp07.sh 29 # Import the certificate
  /external/parameter-framework/upstream/
appveyor.yml 37 wget --no-check-certificate https://01.org/sites/default/files/libxml2-x86_64-3eaedba1b64180668fdab7ad2eba549586017bf3.zip &&
40 wget --no-check-certificate https://01.org/sites/default/files/libxml2-x86_64-debug-3eaedba1b64180668fdab7ad2eba549586017bf3.zip &&
43 wget --no-check-certificate https://01.org/sites/default/files/asio-1.10.6.tar.gz &&
48 wget --no-check-certificate https://raw.github.com/philsquared/Catch/v1.2.1/single_include/catch.hpp --directory-prefix catch )
  /external/webrtc/talk/app/webrtc/
webrtcsessiondescriptionfactory.h 98 // generate a certificate.
107 // |certificate|.
111 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate,
173 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate);
  /external/webrtc/tools/sslroots/
generate_sslroots.py 18 -f Add public key and certificate name. Default is to skip and reduce
35 _CERTIFICATE_ARRAY = 'certificate'
36 _CERTIFICATE_VARIABLE = 'Certificate'
70 elif line.startswith('-----END CERTIFICATE-----'):
  /external/webrtc/webrtc/base/
opensslstreamadapter.h 185 // Our key and certificate, mostly useful in peer-to-peer mode.
187 // in traditional mode, the server name that the server's certificate
190 // The certificate that the peer must present or did present. Initially
193 // In peer-to-peer mode, the digest of the certificate that

Completed in 550 milliseconds

<<31323334353637383940>>