/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertificateFactorySpi.java | 124 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) { 125 if (certificates == null) { 127 throw new NullPointerException("certificates is null");
|
/external/apache-http/android/src/android/net/http/ |
CertificateChainValidator.java | 67 * @return The singleton instance of the certificates chain validator 99 * Performs the handshake and server certificates validation 117 // retrieve the chain of the server peer certificates 123 sslSocket, "failed to retrieve peer certificates"); 140 * @param certChain The bytes for certificates in ASN.1 DER encoded certificates format.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 29 * class for dealing with X509 certificates. 32 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7 225 * Returns a (possibly empty) collection view of the certificates 354 List certificates) 357 Iterator iter = certificates.iterator(); 370 return new PKIXCertPath(certificates);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509CertificateFactory.java | 60 * The code for X509 Certificates and CRL is pretty much the same. We use 168 * It wasn't, so just try to keep grabbing certificates until we 327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) 329 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size()); 330 for (int i = 0; i < certificates.size(); i++) { 331 final Certificate c = certificates.get(i);
|
SSLParametersImpl.java | 347 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates) 349 byte[][] principalBytes = new byte[certificates.length][]; 350 for (int i = 0; i < certificates.length; i++) { 351 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded(); 365 OpenSSLX509Certificate[] certificates = new OpenSSLX509Certificate[certificateRefs.length]; local 367 certificates[i] = new OpenSSLX509Certificate(certificateRefs[i]); 369 return certificates; 419 X509Certificate[] certificates = keyManager.getCertificateChain(alias); local 420 if (certificates == null) { 423 PublicKey publicKey = (certificates.length > 0) ? certificates[0].getPublicKey() : null [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
CaCertManagementTest.java | 69 private static boolean containsCertificate(List<byte[]> certificates, byte [] toMatch) 72 for (byte[] certBuffer : certificates) {
|
/frameworks/base/core/java/android/net/http/ |
X509TrustManagerExtensions.java | 74 * chain up to user-added CA certificates, this method can be used to perform additional 75 * policies for user-added CA certificates.
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
ConfigDialog.java | 338 String[] certificates = mKeyStore.list(prefix); local 340 if (certificates == null || certificates.length == 0) { 341 certificates = new String[] {first}; 343 String[] array = new String[certificates.length + 1]; 345 System.arraycopy(certificates, 0, array, 1, certificates.length); 346 certificates = array; 350 context, android.R.layout.simple_spinner_item, certificates); 354 for (int i = 1; i < certificates.length; ++i) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 53 * Certificates and CRLs. 102 * Base64 encoded PkiPath object containing 2 X.509 certificates. 208 * The public key to verify generated Certificates and CRLs. 466 * Generates Certificates on the base of consequent 490 { -2, pem_pkcs, pem_x509 }, // 2 Certificates are expected 565 * Generates CRLs/Certificates on the base of PEM PKCS7 encoding. 640 List certificates; local 645 certificates = factory.generateCertPath(bais).getCertificates(); 647 2, certificates.size()); 651 for (Iterator it = certificates.iterator(); it.hasNext(); ) [all...] |
/device/sample/overlays/location/frameworks/base/core/res/res/values/ |
config.xml | 28 Sets the package names whose certificates should be used to
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
JcaCertStore.java | 15 * Class for storing Certificates for later lookup.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/isismtt/ |
ISISMTTObjectIdentifiers.java | 59 * be used in new certificates in place of the extension/attribute 61 * compatibility with certificates already in use, SigG conforming 116 * of certificates, which MAY optionally be provided by certificate 201 * usability of the PKC too. Attribute certificates with restricting content
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXCertStoreSelector.java | 12 * This class is a Selector implementation for certificates.
|
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
DummySSLServerSocketFactory.java | 29 * certificates; ie, is all-trusting.
|
DummySSLSocketFactory.java | 29 * certificates; ie, is all-trusting.
|
DummyTrustManager.java | 24 * A trust manager that accepts all X509 client and server certificates.
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-plainrsa | 21 # This is the trick - use PlainRSA certificates.
|
/libcore/ |
Android.mk | 38 # Include the definitions for the Certificate Authority (CA) certificates
|
/packages/apps/CertInstaller/res/values-en-rAU/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 50 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/packages/apps/CertInstaller/res/values-en-rGB/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 50 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/packages/apps/CertInstaller/res/values-en-rIN/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 50 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/libcore/luni/src/main/java/java/security/cert/ |
PKIXParameters.java | 46 // List of cert stores that used to find certificates and CRLs 65 // Indicates whether certificates that include policy 93 * the key store containing trusted certificates. 253 * Returns the list of certificate stores that are used to find certificates 276 * Set the list of certificate stores that are used to find certificates and 296 * to find certificates and CRLs. 426 * Returns whether certificates are rejected that include policy 429 * @return {@code true} if the certificates should be rejected, otherwise 437 * Sets whether certificates should be rejected that include policy 441 * {@code true} if the certificates should be rejected, otherwis [all...] |
CertPath.java | 29 * An immutable certificate path that can be validated. All certificates in the 35 * When a {@code List} of the certificates is obtained it must be immutable. 44 // Standard name of the type of certificates in this path 69 * type and the lists are equal (and by implication the certificates 186 // Standard name of the type of certificates in this path
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertStore2Test.java | 216 Collection<? extends Certificate> certificates = certStore.getCertificates(null); local 217 assertNull(certificates); 223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector()); local 224 assertNotNull(certificates); 225 assertTrue(certificates.isEmpty());
|
/frameworks/base/docs/html/training/articles/ |
security-ssl.jd | 2 page.tags=network,certificates 13 <li><a href="#CommonProblems">Common Problems Verifying Server Certificates</a> 24 <li><a href="#ClientCert">Client Certificates</a></li> 59 have a set of one or more certificates it trusts. If the certificate is not in the set, the 70 <p>In order to address these downsides, servers are typically configured with certificates 82 certificates for many servers, you still need some way to make sure you are talking to the 93 about certificates according to the <a 126 and so on. But in terms of the details for verifying certificates and hostnames, the Android 132 <h2 id="CommonProblems">Common Problems Verifying Server Certificates</h2> 177 uses to validate certificates from the serve [all...] |