/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CollectionCertStoreParametersTest.java | 87 Vector certificates = new Vector(); local 88 certificates.add(new MyCertificate("TEST", new byte[] { })); 89 new CollectionCertStoreParameters(certificates); 103 Vector certificates = new Vector(); local 104 certificates.add(new String("Not a Certificate")); 105 new CollectionCertStoreParameters(certificates); 112 * This allows the caller to subsequently add or remove Certificates or 113 * CRLs from the Collection, thus changing the set of Certificates or CRLs 118 Vector certificates = new Vector(); local 121 new CollectionCertStoreParameters(certificates); 152 Vector certificates = new Vector(); local 168 Vector certificates = new Vector(); local 211 Vector certificates = new Vector(); local 233 Vector certificates = new Vector(); local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 76 Vector<Certificate> certificates = new Vector<Certificate>(); local 77 certificates.add(new MyCertificate("TEST", new byte[] {})); 78 new CollectionCertStoreParameters(certificates); 89 Vector<String> certificates = new Vector<String>(); local 90 certificates.add(new String("Not a Certificate")); 91 new CollectionCertStoreParameters(certificates); 99 Vector<Certificate> certificates = new Vector<Certificate>(); local 102 new CollectionCertStoreParameters(certificates); 104 assertTrue("isRefUsed_1", certificates == cp.getCollection()); 108 certificates.add(new MyCertificate("TEST", new byte[] {(byte)1})) 130 Vector<Certificate> certificates = new Vector<Certificate>(); local 144 Vector<Certificate> certificates = new Vector<Certificate>(); local 183 Vector<Certificate> certificates = new Vector<Certificate>(); local 203 Vector certificates = new Vector(); local [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 37 * my certificates list 39 private final Vector certificates; field in class:MyCertPath 58 certificates = new Vector(); 59 certificates.add(new MyCertificate("MyEncoding", encoding)); 65 * @return certificates list 69 return Collections.unmodifiableList(certificates);
|
MyCertificateFactorySpi.java | 120 public CertPath engineGenerateCertPath(List certificates) 122 if (certificates == null) { 124 throw new NullPointerException("certificates is null");
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/libcore/luni/src/main/java/java/security/ |
Identity.java | 43 private Vector<Certificate> certificates; field in class:Identity 99 if (certificates == null) { 100 certificates = new Vector<Certificate>(); 102 certificates.add(certificate); 138 if (certificates != null) { 139 if (!certificates.contains(certificate)) { 142 certificates.removeElement(certificate); 150 * Returns the certificates for this {@code Identity}. External 154 * @return the {@code Certificates} for this {@code Identity} 156 public Certificate[] certificates() { method in class:Identity [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer.h | 25 // Import the |certificates|, which must be a list of ONC Certificate objects. 26 // Certificates are only imported with web trust for user imports. If 28 // of certificates that requested the TrustBit "Web". If the "Remove" field of 30 // instead of importing. Returns true if all certificates were imported 33 const base::ListValue& certificates,
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 41 * my certificates list 43 private final Vector<MyCertificate> certificates; field in class:MyCertPath 61 certificates = new Vector<MyCertificate>(); 62 certificates.add(new MyCertificate("MyEncoding", encoding)); 68 * @return certificates list 72 return Collections.unmodifiableList(certificates);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 44 * CertPath implementation for X.509 certificates. 63 private List certificates; field in class:PKIXCertPath 149 // make sure all certificates are accounted for. 158 PKIXCertPath(List certificates) 161 this.certificates = sortCerts(new ArrayList(certificates)); 186 certificates = new ArrayList(); 192 certificates.add(0, certFactory.generateCertificate( 199 certificates = new ArrayList(); 204 certificates.add(cert) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.h | 57 const net::CertificateList& certificates, 64 const net::CertificateList& certificates,
|
nsNSSCertificateDB.cpp | 63 const net::CertificateList& certificates, 67 if (!slot || certificates.empty() || !root) 106 // Import additional delivered certificates that can be verified. 112 for (size_t i = 0; i < certificates.size(); i++) { 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 173 const net::CertificateList& certificates, 176 if (!slot || certificates.empty()) 179 for (size_t i = 0; i < certificates.size(); ++i) { 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 201 SetCertTrust(certificates[0].get(), net::SERVER_CERT, trustBits) [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/pkcs7/ |
SignedData.java | 44 * certificates 54 private final List<Certificate> certificates; field in class:SignedData 59 List<Certificate> certificates, List<CertificateList> crls, 64 this.certificates = certificates; 70 return certificates; 95 if (certificates != null) { 96 res.append(certificates.toString()); 117 setOptional(3); // certificates is optional 126 values[3] = sd.certificates; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignedData.java | 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL, 39 * IF ((certificates is present) AND 40 * (any certificates with a type of other are present)) OR 45 * IF (certificates is present) AND 46 * (any version 2 attribute certificates are present) 49 * IF ((certificates is present) AND 50 * (any version 1 attribute certificates are present)) OR 70 private ASN1Set certificates; field in class:SignedData 107 ASN1Set certificates, 111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos) [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 46 assertEquals("Missing CA certificates", Collections.EMPTY_SET, expectedCertificates); 56 * adding new certificates should be done sparingly and as a last resort -- never as a first 102 assertEquals("Unknown CA certificates", Collections.EMPTY_SET, deviceCertificates); 111 assertEquals("Blocked CA certificates", Collections.EMPTY_SET, deviceCertificates); 122 Set<String> certificates = new HashSet<String>(); local 130 certificates.add(fingerprint); 132 return certificates; 138 Set<String> certificates = new HashSet<String>(); local 147 certificates.add(getFingerprint(certificate)); 156 return certificates; [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 34 * captures the served certificates as a byte array. It then verifies each 73 final Certificate[] certificates = bytesToCertificates(encodedCertificates); local 76 return certificates; 83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception { 84 byte[][] result = new byte[certificates.length][]; 85 for (int i = 0, certificatesLength = certificates.length; i < certificatesLength; i++) { 86 result[i] = certificates[i].getEncoded();
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater.cc | 87 base::ListValue certificates; local 93 &certificates); 95 ImportCertificates(certificates);
|
/external/chromium_org/net/cert/ |
nss_cert_database.cc | 181 const CertificateList& certificates) const { 182 DCHECK_GT(certificates.size(), 0U); 184 if (certificates.size() == 1) 185 return certificates[0].get(); 187 X509Certificate* cert0 = certificates[0].get(); 188 X509Certificate* cert1 = certificates[1].get(); 189 X509Certificate* certn_2 = certificates[certificates.size() - 2].get(); 190 X509Certificate* certn_1 = certificates[certificates.size() - 1].get() [all...] |
nss_cert_database.h | 42 // Called with |cert| == NULL after importing a list of certificates 50 // Called with |cert| == NULL after importing a list of certificates 106 // Get a list of unique certificates in the certificate database (one 107 // instance of all certificates). 111 // Asynchronously get a list of unique certificates in the certificate 112 // database (one instance of all certificates). Note that the callback may be 116 // Get a list of certificates in the certificate database of the given slot. 147 // Import certificates and private keys from PKCS #12 blob into the module. 159 // Export the given certificates and private keys into a PKCS #12 blob, 161 // Returns the number of certificates successfully exported [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
generate-duplicate-cn-certs.sh | 7 # This script generates two chains of test certificates: 15 # nicknames for both certificates. 89 echo Exporting the certificates to PKCS#12 94 -out ../certificates/duplicate_cn_1.p12 \ 101 -out ../certificates/duplicate_cn_2.p12 \ 104 try cp out/A1.pem ../certificates/duplicate_cn_1.pem 105 try cp out/A2.pem ../certificates/duplicate_cn_2.pem
|
generate-cross-signed-certs.sh | 74 # Generate the leaf certificates 86 -out ../certificates/cross-signed-root-md5.pem 89 -out ../certificates/cross-signed-root-sha1.pem 92 -out ../certificates/cross-signed-leaf.pem
|
/libcore/luni/src/main/java/java/security/cert/ |
CertificateFactorySpi.java | 54 * Generates and initializes a collection of certificates from the provided 58 * the stream from where data is read to create the certificates. 59 * @return a collection of certificates. 123 * Generates a {@code CertPath} from the provided list of certificates. The 126 * @param certificates 127 * the list containing certificates in a format supported by the 135 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates)
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnDialog.java | 307 String[] certificates = mKeyStore.saw(prefix); local 309 if (certificates == null || certificates.length == 0) { 310 certificates = new String[] {first}; 312 String[] array = new String[certificates.length + 1]; 314 System.arraycopy(certificates, 0, array, 1, certificates.length); 315 certificates = array; 319 context, android.R.layout.simple_spinner_item, certificates); 323 for (int i = 1; i < certificates.length; ++i) [all...] |
/external/chromium_org/chrome/browser/ |
certificate_manager_model.h | 71 // Fill |map| with the certificates matching |filter_type|. 78 // Import private keys and certificates from PKCS #12 encoded 85 // Import CA certificates. 86 // Tries to import all the certificates given. The root will be trusted 87 // according to |trust_bits|. Any certificates that could not be imported 91 // |not_imported| should be checked for any certificates that were not 93 bool ImportCACerts(const net::CertificateList& certificates, 100 // Any certificates that could not be imported will be listed in 105 // |not_imported| should be checked for any certificates that were not 108 const net::CertificateList& certificates, [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 76 List<? extends Certificate> certificates = path.getCertificates(); local 77 Certificate certificate = certificates.get(0);
|