HomeSort by relevance Sort by last modified time
    Searched full:certificates (Results 76 - 100 of 580) sorted by null

1 2 34 5 6 7 8 91011>>

  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/
JarFileTest.java 469 "No certificates found during signed jar test for jar \""
598 assertNull("found certificates", entry.getCertificates());
648 // JAR with certificates that loop
711 "No certificates found during signed jar test for jar \""
716 public Certificate[] certificates; field in class:JarFileTest.Results
739 results.certificates = certs;
754 assertEquals(Arrays.deepToString(result.certificates), 3, result.certificates.length);
757 assertEquals("CN=fake-chain", ((X509Certificate) result.certificates[0]).getSubjectDN().toString());
758 assertEquals("CN=intermediate1", ((X509Certificate) result.certificates[1]).getSubjectDN().toString())
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
Identity2Test.java 243 * java.security.Identity#certificates()
254 java.security.Certificate[] certs = sub.certificates();
262 @AndroidOnly("Spec says: Removing unknown certificates throw an exception. "
263 + "The RI ignores unknown certificates.")
280 1, sub.certificates().length);
284 0, sub.certificates().length);
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLSessionImpl.java 185 * native method supports only RSA certificates.
186 * @return an array of certificates (the local one first and then eventually
200 * @return an array of X509 certificates (the peer's one first and then
204 * was used (i.e. Kerberos certificates) or the peer could not
248 * @return an array of X509 certificates (the peer's one first and then
252 * was used (i.e. Kerberos certificates) or the peer could not
266 throw new SSLPeerUnverifiedException("No peer certificates");
276 * was used (i.e. Kerberos certificates) or the peer does not exist.
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
Handshake.java 81 /** Returns a possibly-empty list of certificates that identify the remote peer. */
93 /** Returns a possibly-empty list of certificates that identify this peer. */
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertPathBuilderTestPKIX.java 76 List<? extends Certificate> certificates = path.getCertificates(); local
77 Certificate certificate = certificates.get(0);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
CertPathReviewerMessages.properties 94 CertPathReviewer.totalPathLength.text = The total path length without self-signed certificates is {0}.
95 CertPathReviewer.totalPathLength.summary = The total path length without self-signed certificates is {0}.
96 CertPathReviewer.totalPathLength.details = The total path length without self-signed certificates, as defined in RFC 3280, is {0}.
155 # {1} number of trusted root certificates (trustanchors) provided
238 CertPathReviewer.noCertSign.title = Key not usable for signing certificates
239 CertPathReviewer.noCertSign.text = The key usage constraint does not allow the use of this certificate key for signing certificates.
240 CertPathReviewer.noCertSign.summary = The certificate key can not be used for signing certificates.
241 CertPathReviewer.noCertSign.details = The key usage constraint does not allow the use of this certificate key for signing certificates.
255 CertPathReviewer.trustKeyUsage.text = The trust anchor is not alloed to sign certificates.
256 CertPathReviewer.trustKeyUsage.summary = The trust anchor is not alloed to sign certificates
    [all...]
  /docs/source.android.com/src/devices/tech/security/enhancements/
enhancements44.jd 39 certificates used in secure SSL/TLS communications.</li>
  /external/boringssl/src/ssl/test/runner/
handshake_server.go 305 if len(config.Certificates) == 0 {
307 return false, errors.New("tls: no certificates configured")
309 hs.cert = &config.Certificates[0]
439 sessionHasClientCerts := len(hs.sessionState.certificates) != 0
470 if len(hs.sessionState.certificates) > 0 {
471 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
519 certMsg.certificates = hs.cert.Certificate
605 if len(certMsg.certificates) == 0 {
614 pub, err = hs.processCertsFromClient(certMsg.certificates)
838 certificates: hs.certsFromClient
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
AttCertIssuer.java 54 * Use it for v1 attribute certificates only.
Extension.java 163 * Audit identity extension in attribute certificates.
168 * NoRevAvail extension in attribute certificates.
173 * TargetInformation extension in attribute certificates.
X509Extension.java 158 * Audit identity extension in attribute certificates.
163 * NoRevAvail extension in attribute certificates.
168 * TargetInformation extension in attribute certificates.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/
PrincipalUtil.java 15 * a utility class that will extract X509Principal objects from X.509 certificates.
  /external/bouncycastle/patches/
README 29 - Blacklist fraudulent Comodo certificates in PKIXCertPathValidatorSpi
  /external/conscrypt/src/stub/java/com/android/org/conscrypt/
NativeCrypto.java 28 * @param asn1DerEncodedCertificateChain A chain of ASN.1 DER encoded certificates
  /external/conscrypt/src/stub/java/org/apache/harmony/xnet/xnet/provider/jsse/
NativeCrypto.java 28 * @param asn1DerEncodedCertificateChain A chain of ASN.1 DER encoded certificates
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingcontext.h 28 // the certificates but they must remain valid for as long as this context
polochallengeresponse.h 32 // Creates a new challenge response with the given certificates. This does not
  /external/ksoap2/ksoap2-j2se/src/main/java/org/ksoap2/transport/
KeepAliveHttpsTransportSE.java 14 * KeepAliveHttpsTransport deals with the problems with the Android ssl libraries having trouble with certificates and
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CheckHandshake.java 29 /** Rejects otherwise-trusted certificates. */
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 200 <title>Certificates</title>
203 certificates. EAP-TLS uses both server side and client
204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
210 <para>wpa_supplicant supports X.509 certificates in PEM and DER
  /packages/apps/CertInstaller/res/values/
strings.xml 35 <string name="credential_password">Type the password to extract the certificates.</string>
37 <string name="p12_description">Certificates in PKCS12 keystore.</string>
46 <string name="n_cacrts">%d CA certificates</string>
76 <string name="only_primary_user_allowed">Only the owner of this device may install certificates.</string>
  /packages/apps/Nfc/etc/
sample_nfcee_access.xml 15 See Debug section to generate hex encoded certificates.
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KSPrivateKeyEntryTest.java 104 * Assertion: throws IllegalArgumentException when chain contains certificates
111 fail("IllegalArgumentException must be thrown when chain contains certificates of different types");
145 * array of the Certificates corresponding to chain
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedDataGenerator.java 190 ASN1Set certificates = null; local
194 certificates = CMSUtils.createBerSetFromList(certs);
209 certificates,
  /external/openssh/
ssh-add.0 40 default identities and their corresponding certificates will be
43 certificates to be removed from the agent. If no public key is
55 plain private keys only and skip certificates.

Completed in 332 milliseconds

1 2 34 5 6 7 8 91011>>