/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/jar/ |
JarFileTest.java | 469 "No certificates found during signed jar test for jar \"" 598 assertNull("found certificates", entry.getCertificates()); 648 // JAR with certificates that loop 711 "No certificates found during signed jar test for jar \"" 716 public Certificate[] certificates; field in class:JarFileTest.Results 739 results.certificates = certs; 754 assertEquals(Arrays.deepToString(result.certificates), 3, result.certificates.length); 757 assertEquals("CN=fake-chain", ((X509Certificate) result.certificates[0]).getSubjectDN().toString()); 758 assertEquals("CN=intermediate1", ((X509Certificate) result.certificates[1]).getSubjectDN().toString()) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 243 * java.security.Identity#certificates() 254 java.security.Certificate[] certs = sub.certificates(); 262 @AndroidOnly("Spec says: Removing unknown certificates throw an exception. " 263 + "The RI ignores unknown certificates.") 280 1, sub.certificates().length); 284 0, sub.certificates().length);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLSessionImpl.java | 185 * native method supports only RSA certificates. 186 * @return an array of certificates (the local one first and then eventually 200 * @return an array of X509 certificates (the peer's one first and then 204 * was used (i.e. Kerberos certificates) or the peer could not 248 * @return an array of X509 certificates (the peer's one first and then 252 * was used (i.e. Kerberos certificates) or the peer could not 266 throw new SSLPeerUnverifiedException("No peer certificates"); 276 * was used (i.e. Kerberos certificates) or the peer does not exist.
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Handshake.java | 81 /** Returns a possibly-empty list of certificates that identify the remote peer. */ 93 /** Returns a possibly-empty list of certificates that identify this peer. */
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 76 List<? extends Certificate> certificates = path.getCertificates(); local 77 Certificate certificate = certificates.get(0);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
CertPathReviewerMessages.properties | 94 CertPathReviewer.totalPathLength.text = The total path length without self-signed certificates is {0}. 95 CertPathReviewer.totalPathLength.summary = The total path length without self-signed certificates is {0}. 96 CertPathReviewer.totalPathLength.details = The total path length without self-signed certificates, as defined in RFC 3280, is {0}. 155 # {1} number of trusted root certificates (trustanchors) provided 238 CertPathReviewer.noCertSign.title = Key not usable for signing certificates 239 CertPathReviewer.noCertSign.text = The key usage constraint does not allow the use of this certificate key for signing certificates. 240 CertPathReviewer.noCertSign.summary = The certificate key can not be used for signing certificates. 241 CertPathReviewer.noCertSign.details = The key usage constraint does not allow the use of this certificate key for signing certificates. 255 CertPathReviewer.trustKeyUsage.text = The trust anchor is not alloed to sign certificates. 256 CertPathReviewer.trustKeyUsage.summary = The trust anchor is not alloed to sign certificates [all...] |
/docs/source.android.com/src/devices/tech/security/enhancements/ |
enhancements44.jd | 39 certificates used in secure SSL/TLS communications.</li>
|
/external/boringssl/src/ssl/test/runner/ |
handshake_server.go | 305 if len(config.Certificates) == 0 { 307 return false, errors.New("tls: no certificates configured") 309 hs.cert = &config.Certificates[0] 439 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 470 if len(hs.sessionState.certificates) > 0 { 471 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 519 certMsg.certificates = hs.cert.Certificate 605 if len(certMsg.certificates) == 0 { 614 pub, err = hs.processCertsFromClient(certMsg.certificates) 838 certificates: hs.certsFromClient [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
AttCertIssuer.java | 54 * Use it for v1 attribute certificates only.
|
Extension.java | 163 * Audit identity extension in attribute certificates. 168 * NoRevAvail extension in attribute certificates. 173 * TargetInformation extension in attribute certificates.
|
X509Extension.java | 158 * Audit identity extension in attribute certificates. 163 * NoRevAvail extension in attribute certificates. 168 * TargetInformation extension in attribute certificates.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
PrincipalUtil.java | 15 * a utility class that will extract X509Principal objects from X.509 certificates.
|
/external/bouncycastle/patches/ |
README | 29 - Blacklist fraudulent Comodo certificates in PKIXCertPathValidatorSpi
|
/external/conscrypt/src/stub/java/com/android/org/conscrypt/ |
NativeCrypto.java | 28 * @param asn1DerEncodedCertificateChain A chain of ASN.1 DER encoded certificates
|
/external/conscrypt/src/stub/java/org/apache/harmony/xnet/xnet/provider/jsse/ |
NativeCrypto.java | 28 * @param asn1DerEncodedCertificateChain A chain of ASN.1 DER encoded certificates
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingcontext.h | 28 // the certificates but they must remain valid for as long as this context
|
polochallengeresponse.h | 32 // Creates a new challenge response with the given certificates. This does not
|
/external/ksoap2/ksoap2-j2se/src/main/java/org/ksoap2/transport/ |
KeepAliveHttpsTransportSE.java | 14 * KeepAliveHttpsTransport deals with the problems with the Android ssl libraries having trouble with certificates and
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 29 /** Rejects otherwise-trusted certificates. */
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 200 <title>Certificates</title> 203 certificates. EAP-TLS uses both server side and client 204 certificates whereas EAP-PEAP and EAP-TTLS only require the server 210 <para>wpa_supplicant supports X.509 certificates in PEM and DER
|
/packages/apps/CertInstaller/res/values/ |
strings.xml | 35 <string name="credential_password">Type the password to extract the certificates.</string> 37 <string name="p12_description">Certificates in PKCS12 keystore.</string> 46 <string name="n_cacrts">%d CA certificates</string> 76 <string name="only_primary_user_allowed">Only the owner of this device may install certificates.</string>
|
/packages/apps/Nfc/etc/ |
sample_nfcee_access.xml | 15 See Debug section to generate hex encoded certificates.
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 104 * Assertion: throws IllegalArgumentException when chain contains certificates 111 fail("IllegalArgumentException must be thrown when chain contains certificates of different types"); 145 * array of the Certificates corresponding to chain
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 190 ASN1Set certificates = null; local 194 certificates = CMSUtils.createBerSetFromList(certs); 209 certificates,
|
/external/openssh/ |
ssh-add.0 | 40 default identities and their corresponding certificates will be 43 certificates to be removed from the agent. If no public key is 55 plain private keys only and skip certificates.
|