/libcore/luni/src/test/java/libcore/java/net/ |
OldJarURLConnectionTest.java | 85 Certificate [] certs = juc.getCertificates(); local 86 assertEquals(3, certs.length);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 254 java.security.Certificate[] certs = sub.certificates(); local 256 certs[0], certImpl);
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | 696 private X509Certificate[] certs= new X509Certificate[3]; field in class:CertificateTest [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 45 * Store certs = new JcaCertStore(certList); 55 * gen.addCertificates(certs); 718 if (certs.size() != 0) 720 certificates = CMSUtils.createBerSetFromList(certs);
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 196 // First "Default", then the certs, then "Do not check". 221 // One initial item "None", then the certs. 343 // Client certs only for EAP-TLS 349 // No server CA certs for LEAP [all...] |
/external/chromium/chrome/common/net/ |
x509_certificate_model.h | 77 void GetNicknameStringsFromCertList(const net::CertificateList& certs,
|
/external/chromium/crypto/ |
nss_util.h | 46 // TODO(hclam): Isolate loading default root certs.
|
rsa_private_key_mac.cc | 106 // format when attempting to generate certs, so use PKCS1 instead.
|
/external/chromium/net/base/ |
ssl_config_service.h | 26 // Returns true if |cert| is one of the certs in |allowed_bad_certs|.
|
/external/chromium_org/chrome/browser/browsing_data/ |
browsing_data_server_bound_cert_helper.cc | 31 // Fetch the certs. This must be called in the IO thread.
|
/external/chromium_org/chrome/browser/ |
certificate_manager_model.cc | 42 DVLOG(1) << "refresh listing certs...";
|
/external/chromium_org/chrome/browser/resources/options/ |
certificate_manager.js | 212 OptionsPage.showTab($('personal-certs-nav-tab'));
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model.h | 75 void GetNicknameStringsFromCertList(const net::CertificateList& certs,
|
/external/chromium_org/net/cert/ |
cert_verify_proc_openssl.cc | 218 // correctly verified certs as being from a known root.
|
x509_util_openssl_unittest.cc | 134 // signature_verifier_win and signature_verifier_mac can't handle EC certs.
|
/external/chromium_org/net/test/ |
ct_test_util.cc | 106 // of the test certs here, and is only used to test extracting the extension
|
/external/chromium_org/third_party/openssl/openssl/crypto/ |
cryptlib.h | 84 #define X509_CERT_DIR OPENSSLDIR "/certs"
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509_err.c | 141 {ERR_REASON(X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY),"unable to get certs public key"},
|
/external/openssl/crypto/ |
cryptlib.h | 84 #define X509_CERT_DIR OPENSSLDIR "/certs"
|
/external/openssl/crypto/x509/ |
x509_err.c | 141 {ERR_REASON(X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY),"unable to get certs public key"},
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 810 const gnutls_datum_t *certs; local 857 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 858 if (certs == NULL) { 875 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_8/wpa_supplicant/ |
todo.txt | 71 stores even when there are intermediate CA certs that are not in the
|
/frameworks/base/core/java/android/net/http/ |
CertificateChainValidator.java | 152 * Calls DomainNamevalidator to verify the domain, and TrustManager to verify the certs.
|
/libcore/crypto/src/main/java/org/conscrypt/ |
PinListEntry.java | 93 * If the pin list does not contain the required certs and the enforcing field is true then
|
/packages/apps/CertInstaller/res/values/ |
strings.xml | 25 <!-- message in progress bar when waiting for extracting certs from a pkcs12 package -->
|