/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 34 * captures the served certificates as a byte array. It then verifies each 73 final Certificate[] certificates = bytesToCertificates(encodedCertificates); local 76 return certificates; 83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception { 84 byte[][] result = new byte[certificates.length][]; 85 for (int i = 0, certificatesLength = certificates.length; i < certificatesLength; i++) { 86 result[i] = certificates[i].getEncoded();
|
/libcore/luni/src/main/java/java/security/cert/ |
CertificateFactorySpi.java | 54 * Generates and initializes a collection of certificates from the provided 58 * the stream from where data is read to create the certificates. 59 * @return a collection of certificates. 123 * Generates a {@code CertPath} from the provided list of certificates. The 126 * @param certificates 127 * the list containing certificates in a format supported by the 135 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates)
|
CertificateFactory.java | 104 * the name of the provider providing certificates of the 137 * the name of the provider providing certificates of the 244 * Generates a {@code CertPath} from the provided list of certificates. The 247 * @param certificates 248 * the list containing certificates in a format supported by the 256 public final CertPath generateCertPath(List<? extends Certificate> certificates) 258 return spiImpl.engineGenerateCertPath(certificates); 262 * Generates and initializes a collection of (unrelated) certificates from 268 * @return an initialized collection of certificates.
|
PKIXBuilderParameters.java | 32 * and constraints for the target certificates. 67 * the key store containing trusted certificates. 87 * This is the maximum number of non-self-signed certificates in a 100 * This is the maximum number of non-self-signed certificates in a
|
PKIXCertPathChecker.java | 68 * true} if the certificates are processed in forward direction 73 * instance fails, or if it cannot process certificates in the 89 * Returns the list of extensions of X.509 certificates that this {@code 92 * @return the list of extensions of X.509 certificates that this {@code
|
/external/boringssl/src/crypto/x509/ |
pkcs7.c | 94 CBS signed_data, certificates; local 104 if (!CBS_get_asn1(&signed_data, &certificates, 111 while (CBS_len(&certificates) > 0) { 116 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { 163 /* Even if only CRLs are included, there may be an empty certificates block. 167 !CBS_get_asn1(&signed_data, NULL /* certificates */, 295 CBB certificates; local 298 if (!CBB_add_asn1(out, &certificates, 309 !CBB_add_space(&certificates, &buf, len) ||
|
/packages/apps/KeyChain/res/values/ |
strings.xml | 19 <!-- Dialog title when no certificates were found --> 20 <string name="title_no_certs">No certificates found</string> 32 <string name="install_new_cert_message">You can install certificates from a PKCS#12 file with a %1$s or a %2$s extension located in external storage.</string>
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/ |
CertificateTest.java | 107 assertEquals("The Certificates with equal encoded form should be equal", 113 assertEquals("The Certificates with equal encoded form should be equal", 122 assertFalse("The Certificates with differing encoded form " 124 assertFalse("The Certificates should not be equals to the object "
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
CertificateTest.java | 114 "The Certificates with equal encoded form should be equal", 121 "The Certificates with equal encoded form should be equal", 130 assertFalse("The Certificates with differing encoded form " 132 assertFalse("The Certificates should not be equals to the object "
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
IdentityTest.java | 121 assertSame(c1, i.certificates()[0]); 139 assertSame(c1, i.certificates()[0]); 166 // assertSame(c1, i.certificates()[0]); 168 // assertEquals(0, i.certificates().length); 184 * verify certificates() returns a copy of all certificates for this identity 193 Certificate[] s = i.certificates(); 200 s = i.certificates(); 289 * verify Identity.setPublicKey() removes old key and all identity's certificates 298 assertEquals(2, i.certificates().length) [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 36 * certificates that are not part of the system, it should specify its 40 * TrustManagerFactory} to supply trusted CA certificates. Note that 41 * self-signed certificates are effectively their own CA and can be 44 * <p>For example, to trust a set of certificates specified by a {@code KeyStore}: 78 * <p>For example, to supply client certificates from a {@code KeyStore}: 207 * Returns the list of local certificates used during the handshake. These 208 * certificates were sent to the peer. 210 * @return Returns the list of certificates used during the handshake with 212 * if no certificates were used during the handshake. 219 * Return the list of certificates identifying the peer during th [all...] |
/libcore/luni/src/test/java/tests/java/security/ |
IdentityTest.java | 128 assertSame(c1, i.certificates()[0]); 145 assertSame(c1, i.certificates()[0]); 171 // assertSame(c1, i.certificates()[0]); 173 // assertEquals(0, i.certificates().length); 189 * verify certificates() returns a copy of all certificates for this identity 198 java.security.Certificate[] s = i.certificates(); 205 s = i.certificates(); 292 * verify Identity.setPublicKey() removes old key and all identity's certificates 302 assertEquals(2, i.certificates().length) [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 32 // contains CA and server certificates 35 // just copy server certificates
|
/packages/apps/KeyChain/res/values-en-rAU/ |
strings.xml | 20 <string name="title_no_certs" msgid="8350009443064722873">"No certificates found"</string> 24 <string name="install_new_cert_message" msgid="4451971501142085495">"You can install certificates from a PKCS#12 file with a %1$s or a %2$s extension located in external storage."</string>
|
/packages/apps/KeyChain/res/values-en-rGB/ |
strings.xml | 20 <string name="title_no_certs" msgid="8350009443064722873">"No certificates found"</string> 24 <string name="install_new_cert_message" msgid="4451971501142085495">"You can install certificates from a PKCS#12 file with a %1$s or a %2$s extension located in external storage."</string>
|
/packages/apps/KeyChain/res/values-en-rIN/ |
strings.xml | 20 <string name="title_no_certs" msgid="8350009443064722873">"No certificates found"</string> 24 <string name="install_new_cert_message" msgid="4451971501142085495">"You can install certificates from a PKCS#12 file with a %1$s or a %2$s extension located in external storage."</string>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
IssuingDistributionPoint.java | 67 * @param onlyContainsUserCerts Covers revocation information for end certificates. 68 * @param onlyContainsCACerts Covers revocation information for CA certificates. 74 * information about certificates ssued by other CAs. 75 * @param onlyContainsAttributeCerts Covers revocation information for attribute certificates. 128 * information about certificates ssued by other CAs. 129 * @param onlyContainsAttributeCerts Covers revocation information for attribute certificates.
|
Holder.java | 147 * Returns 1 for V2 attribute certificates or 0 for V1 attribute 148 * certificates. 157 * Constructs a holder with an entityName for V2 attribute certificates. 167 * Constructs a holder with an entityName for V2 attribute certificates or 168 * with a subjectName for V1 attribute certificates.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedGenerator.java | 122 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message. 124 * @param certStore the store containing the certificates to be included. 125 * @throws CMSException if the certificates cannot be encoded for adding. 158 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message. 160 * @param attrCert the store containing the certificates to be included. 171 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message. 173 * @param attrStore the store containing the certificates to be included.
|
/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
CertInstallerHelper.java | 57 * and install certificates to keystore. 91 // Install certificates and private keys 130 * Extract private keys, user certificates and ca certificates 169 * @param certFile .p12 file which includes certificates 173 // extract private keys, certificates from the provided file 213 Log.e(TAG, "Exception while convert certificates to pem " + e);
|
/external/openssh/ |
PROTOCOL.certkeys | 9 of X.509 certificates and uses raw keys. This approach has some benefits 16 certificates used are not traditional X.509 certificates, with numerous 58 encoding of these certificates is also used for storing them on disk. 133 provide an abbreviated way to refer to certificates from that CA. 134 If a CA does not wish to number its certificates it must set this 146 certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates and 147 usernames for SSH_CERT_TYPE_USER certificates. As a special case, a 167 This ensures that certificates containing unknown restrictions do not 169 enabled via extensions without breaking certificates' backward [all...] |
ssh-keygen.0 | 125 CERTIFICATES section for details). 164 certificate. Please see the CERTIFICATES section for details. 168 the CERTIFICATES section for details. 193 Keys/certificates to be revoked may be specified by public key 223 CERTIFICATES section for details. 227 be specified multiple times. Please see the CERTIFICATES section 228 for details. The options that are valid for user certificates 311 see the CERTIFICATES section for details. 314 file used to revoke certificates directly by key ID or serial 402 CERTIFICATES [all...] |
ssh-keygen.1 | 272 .Sx CERTIFICATES 332 .Sx CERTIFICATES 337 .Sx CERTIFICATES 374 Keys/certificates to be revoked may be specified by public key file or 415 .Sx CERTIFICATES 421 .Sx CERTIFICATES 423 The options that are valid for user certificates are: 513 .Sx CERTIFICATES 518 specifies a path to a CA public key file used to revoke certificates directly 644 .Sh CERTIFICATES [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificateFactorySpi.java | 120 public CertPath engineGenerateCertPath(List certificates) 122 if (certificates == null) { 124 throw new NullPointerException("certificates is null");
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/Windows/ |
README.txt | 24 SSL Certificates with STUNNEL, and so the connection is not only encrypted
28 Certificates (PEM files) for authentication. Click on the "Certs ..."
38 You can use x11vnc to create certificates if you like:
|