/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_security_types.py | 317 server_ca_cert=None, server_cert=None, server_key=None, argument 341 self.server_cert = server_cert 375 (self.server_cert, self.server_cert_file), 455 server_ca_cert=None, server_cert=None, server_key=None, argument 475 server_ca_cert=server_ca_cert, server_cert=server_cert, 506 server_ca_cert=None, server_cert=None, server_key=None, argument 529 server_ca_cert=server_ca_cert, server_cert=server_cert, 572 def __init__(self, server_ca_cert, server_cert, server_key, argument 591 server_cert=server_cert,
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
D | polochallengeresponsetest.cc | 74 server_cert = PEM_read_bio_X509(server_bio, NULL, NULL, NULL); in SetUp() 81 response = new PoloChallengeResponse(client_cert, server_cert); in SetUp() 88 X509_free(server_cert); in TearDown() 97 X509* server_cert; member in polo::pairing::PoloChallengeResponseTest
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
D | polochallengeresponse.cc | 27 X509* server_cert) in PoloChallengeResponse() argument 29 server_cert(server_cert) { in PoloChallengeResponse() 43 EVP_PKEY* server_pkey = X509_get_pubkey(server_cert); in GetAlpha()
|
D | polochallengeresponse.h | 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 53 X509* server_cert; variable
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
D | control.wifi_check1x_WPA | 31 server_cert=site_eap_certs.server_cert_1, 46 server_cert=site_eap_certs.server_cert_1, 62 server_cert=site_eap_certs.server_cert_1, 78 server_cert=site_eap_certs.server_cert_1, 94 server_cert=site_eap_certs.server_cert_1, 110 server_cert=site_eap_certs.server_expired_cert,
|
D | control.wifi_check1x_WEP | 30 server_cert=site_eap_certs.server_cert_1,
|
/external/curl/lib/vtls/ |
D | openssl.c | 1085 static CURLcode verifyhost(struct connectdata *conn, X509 *server_cert) in verifyhost() argument 1114 altnames = X509_get_ext_d2i(server_cert, NID_subject_alt_name, NULL, NULL); in verifyhost() 1191 X509_NAME *name = X509_get_subject_name(server_cert); in verifyhost() 2071 connssl->server_cert = 0x0; in ossl_connect_step1() 2643 connssl->server_cert = SSL_get_peer_certificate(connssl->handle); in servercert() 2644 if(!connssl->server_cert) { in servercert() 2652 rc = x509_name_oneline(X509_get_subject_name(connssl->server_cert), in servercert() 2656 certdate = X509_get_notBefore(connssl->server_cert); in servercert() 2660 certdate = X509_get_notAfter(connssl->server_cert); in servercert() 2665 result = verifyhost(conn, connssl->server_cert); in servercert() [all …]
|
D | darwinssl.c | 1962 SecCertificateRef server_cert; local 1979 server_cert = SecTrustGetCertificateAtIndex(trust, i); 1980 server_cert_summary = CopyCertSubject(server_cert); 2007 server_cert = SecTrustGetCertificateAtIndex(trust, i); 2008 server_cert_summary = CopyCertSubject(server_cert); 2028 server_cert = (SecCertificateRef)CFArrayGetValueAtIndex(server_certs, 2031 server_cert_summary = CopyCertSubject(server_cert); 2052 server_cert = (SecCertificateRef)CFArrayGetValueAtIndex(server_certs, i); 2053 server_cert_summary = CopyCertSubject(server_cert);
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/ |
D | httpproxy.py | 398 server_cert = self.http_archive_fetch.http_archive.get_server_cert(host) 399 if server_cert in self._server_cert_to_cert_map: 400 cert = self._server_cert_to_cert_map[server_cert] 404 cert = certutils.generate_cert(self._ca_cert_str, server_cert, host) 405 self._server_cert_to_cert_map[server_cert] = cert
|
/external/wpa_supplicant_8/src/ap/ |
D | authsrv.c | 153 (hapd->conf->ca_cert || hapd->conf->server_cert || in authsrv_init() 169 params.client_cert = hapd->conf->server_cert; in authsrv_init()
|
D | ap_config.h | 346 char *server_cert; member
|
D | ap_config.c | 463 os_free(conf->server_cert); in hostapd_config_free_bss()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_read.c | 618 x509_certificate_chain_free(conn->server_cert); in tls_process_certificate() 619 conn->server_cert = chain; in tls_process_certificate() 960 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status() 977 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status() 997 if (conn->server_cert) in tls_process_certificate_status() 999 conn, 0, conn->server_cert, in tls_process_certificate_status()
|
D | tlsv1_client_i.h | 75 struct x509_certificate *server_cert; member
|
D | tlsv1_client_ocsp.c | 782 cert = conn->server_cert; in tls_process_ocsp_response() 795 if (cert == conn->server_cert) in tls_process_ocsp_response()
|
D | tlsv1_client.c | 497 x509_certificate_chain_free(conn->server_cert); in tlsv1_client_deinit()
|
/external/autotest/server/site_tests/network_WiFi_Roam/ |
D | control.wifi_roam1xTLS | 28 server_cert=site_eap_certs.server_cert_1,
|
/external/autotest/server/site_tests/network_WiFi_PMKSACaching/ |
D | network_WiFi_PMKSACaching.py | 65 server_cert=site_eap_certs.server_cert_1,
|
/external/wpa_supplicant_8/hs20/server/ |
D | hs20-osu-server.txt | 153 server_cert=Key/server.pem 195 server_cert=/home/user/hs20-server/ca/server.pem
|
/external/curl/lib/ |
D | urldata.h | 270 X509* server_cert; member
|
/external/wpa_supplicant_8/hostapd/ |
D | config_file.c | 2125 os_free(bss->server_cert); in hostapd_config_fill() 2126 bss->server_cert = os_strdup(pos); in hostapd_config_fill()
|
D | ChangeLog | 234 * changed OpenSSL to read full certificate chain from server_cert file 939 variables: ca_cert, server_cert, private_key, private_key_passwd);
|