/external/okhttp/okhttp-android-support/src/main/java/com/squareup/okhttp/internal/huc/ |
JavaApiConverter.java | 304 List<Certificate> certificates = handshake.localCertificates(); 305 return certificates.size() > 0 ? certificates : null; 312 List<Certificate> certificates = handshake.peerCertificates(); 313 return certificates.size() > 0 ? certificates : null;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory1Test.java | 567 * Test for <code>generateCertPath(List certificates)</code> method 568 * Assertion: throw NullPointerException certificates is null 588 * Test for <code>generateCertPath(List certificates)</code> method 589 * Assertion: returns empty CertPath if certificates is empty 607 * Test for <code>generateCertPath(List certificates)</code> method 608 * Assertion: throws CertificateException when certificates contains
|
CertificateFactorySpiTest.java | 336 * initializes it with a <code>List</code> of <code>Certificates</code> 362 * initializes it with a <code>List</code> of <code>Certificates</code>
|
/external/boringssl/src/crypto/x509/ |
x509_vfy.c | 290 * certificates. We now need to add at least one trusted one, 518 -1: we accept both CA and non-CA certificates, to allow direct 519 use of self-signed certificates (which are marked as CA). 520 0: we only accept non-CA certificates. This is currently not 522 1: we only accept CA certificates. This is currently used for 523 all certificates in the chain except the leaf certificate. 544 /* Check all untrusted certificates */ 665 /* Check name constraints for all certificates */ 672 /* Check against constraints for all certificates higher in 751 /* Check all trusted certificates in chain * [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 172 // trusted certificates). 232 Log.w(NAME, "Couldn't parse certificates in keystore", e); 369 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 374 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 390 * alias as concatenated DER-encoded certificates. These can be 397 * so we only need the certificates starting at index 1. [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 141 * Lazily create shared test certificates. 192 * Return an root CA that can be used to issue new certificates. 200 * Return an intermediate CA that can be used to issue new certificates. 208 * Return an intermediate CA that can be used to issue new certificates. [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 75 // *.ks1 - keystore containing untrusted certificates only 76 // *.ks2 - keystore containing trusted certificates only 77 // *.ks3 - keystore containing both trusted and untrusted certificates 149 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 150 * 2 - <code>KeyStore</code> with trusted certificates only<br> 151 * 3 - <code>KeyStore</code> with both trusted and untrusted certificates [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 103 * @ca_path: Path to CA certificates (OpenSSL specific) 110 * wildcard certificates. Each domain name label must have a full match. 144 * Certificates and private key can be configured either as a reference name 250 * tls_connection_init() or setting certificates etc. again. The new 297 * 2 = verify CRL for all certificates
|
tls_internal.c | 227 "certificates"); 290 "certificates");
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
KeyChainTest.java | 293 * the server trusts only the certificates installed in the credential storage of this 320 * trusts only certificates installed in the credential storage of this user/profile. This 390 log("Returned " + certificateChain.length + " certificates in chain");
|
/docs/source.android.com/src/devices/tech/ota/ |
sign_builds.jd | 39 <h2 id="certificates-keys">Certificates and keys</h2> 213 <li>Certificates of the keys you want this build to accept.</li>
|
/external/boringssl/src/crypto/x509v3/ |
v3_crld.c | 545 BIO_printf(out, "%*sOnly User Certificates\n", indent, ""); 547 BIO_printf(out, "%*sOnly CA Certificates\n", indent, ""); 554 BIO_printf(out, "%*sOnly Attribute Certificates\n", indent, "");
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
CertificatesToPlayWith.java | 35 * Some X509 certificates to test against. 37 * Note: some of these certificates have Japanese Kanji in the "subjectAlt" 389 * Below is the private key for all the server certificates above (but
|
HandshakeCompletedEventTest.java | 332 * client authentication and checks the certificates afterwards (not in the 333 * usual sense, we just make sure that we got the expected certificates, 334 * because our self-signed test certificates are not valid.)
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
CertificateFactoryTest.java | 385 // Duplicate certificates can cause an exception. 391 fail("duplicate certificates should cause failure: " + p.getName()); 395 fail("duplicate certificates should pass: " + p.getName());
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
ssl.py | 42 CERT_NONE - no certificates from the other side are required (or will 44 CERT_OPTIONAL - certificates are not required, but if provided will be 47 CERT_REQUIRED - certificates are required, and will be validated, and
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
ssl.py | 42 CERT_NONE - no certificates from the other side are required (or will 44 CERT_OPTIONAL - certificates are not required, but if provided will be 47 CERT_REQUIRED - certificates are required, and will be validated, and
|
/developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 112 Log.w(TAG, "Error occurred while loading certificates", e); 126 Log.w(TAG, "Error occurred while loading certificates", e);
|
/developers/samples/android/security/keystore/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 112 Log.w(TAG, "Error occurred while loading certificates", e); 126 Log.w(TAG, "Error occurred while loading certificates", e);
|
/development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 112 Log.w(TAG, "Error occurred while loading certificates", e); 126 Log.w(TAG, "Error occurred while loading certificates", e);
|
/external/boringssl/src/ssl/test/runner/ |
tls.go | 74 if config == nil || len(config.Certificates) == 0 { 75 return nil, errors.New("tls.Listen: no certificates in configuration")
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
SslUtil.java | 152 // For self-signed certificates, OpenSSL 0.9.6 has specific requirements 155 // In OpenSSL 0.9.6 and later all certificates whose subject name matches
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
SocketConnector.java | 116 // Verify that the socket's certificates are acceptable for the target host. 127 // Check that the certificate pinner is satisfied by the certificates presented.
|
/frameworks/base/core/java/android/content/pm/ |
Signature.java | 260 * cases, certificates can have slightly malformed encoding which causes 263 * To identify effective equality, we bounce the certificates through an
|
/libcore/luni/src/main/files/cacerts/ |
1676090a.0 | 30 Issuer: C=CN, O=China Internet Network Information Center, CN=China Internet Network Information Center EV Certificates Root 34 Subject: C=CN, O=China Internet Network Information Center, CN=China Internet Network Information Center EV Certificates Root
|