/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CollectionCertStoreParametersTest.java | 87 Vector certificates = new Vector(); local 88 certificates.add(new MyCertificate("TEST", new byte[] { })); 89 new CollectionCertStoreParameters(certificates); 103 Vector certificates = new Vector(); local 104 certificates.add(new String("Not a Certificate")); 105 new CollectionCertStoreParameters(certificates); 112 * This allows the caller to subsequently add or remove Certificates or 113 * CRLs from the Collection, thus changing the set of Certificates or CRLs 118 Vector certificates = new Vector(); local 121 new CollectionCertStoreParameters(certificates); 152 Vector certificates = new Vector(); local 168 Vector certificates = new Vector(); local 211 Vector certificates = new Vector(); local 233 Vector certificates = new Vector(); local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 76 Vector<Certificate> certificates = new Vector<Certificate>(); local 77 certificates.add(new MyCertificate("TEST", new byte[] {})); 78 new CollectionCertStoreParameters(certificates); 89 Vector<String> certificates = new Vector<String>(); local 90 certificates.add(new String("Not a Certificate")); 91 new CollectionCertStoreParameters(certificates); 99 Vector<Certificate> certificates = new Vector<Certificate>(); local 102 new CollectionCertStoreParameters(certificates); 104 assertTrue("isRefUsed_1", certificates == cp.getCollection()); 108 certificates.add(new MyCertificate("TEST", new byte[] {(byte)1})) 130 Vector<Certificate> certificates = new Vector<Certificate>(); local 144 Vector<Certificate> certificates = new Vector<Certificate>(); local 183 Vector<Certificate> certificates = new Vector<Certificate>(); local 203 Vector certificates = new Vector(); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignedData.java | 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL, 39 * IF ((certificates is present) AND 40 * (any certificates with a type of other are present)) OR 45 * IF (certificates is present) AND 46 * (any version 2 attribute certificates are present) 49 * IF ((certificates is present) AND 50 * (any version 1 attribute certificates are present)) OR 70 private ASN1Set certificates; field in class:SignedData 107 ASN1Set certificates, 111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/libcore/luni/src/main/java/javax/net/ssl/ |
HandshakeCompletedEvent.java | 66 * Returns the list of local certificates used during the handshake. These 67 * certificates were sent to the peer. 69 * @return Returns the list of certificates used during the handshake with 71 * if no certificates were used during the handshake. 78 * Return the list of certificates identifying the peer during the 81 * @return the list of certificates identifying the peer with the peer's 91 * Returns the list of certificates identifying the peer. The peer's 93 * certificates. 97 * @return the list of certificates identifying the peer
|
SSLSession.java | 68 * Returns the list of certificates that were used to identify the local 71 * @return the list of certificates, ordered from local certificate to 72 * CA's certificates. 92 * Returns the list of certificates the peer used to identify itself during 98 * @return the list of certificates, ordered from the identity certificate to 99 * the CA's certificates 106 * Returns the list of certificates the peer used to identify itself during 109 * @return the list of certificates, ordered from the identity certificate to 110 * the CA's certificates.
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 37 * my certificates list 39 private final Vector certificates; field in class:MyCertPath 58 certificates = new Vector(); 59 certificates.add(new MyCertificate("MyEncoding", encoding)); 65 * @return certificates list 69 return Collections.unmodifiableList(certificates);
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 67 // PEM files for root certificates of Comodo and Entrust. These two CAs are sufficient to view 141 * Returns a SSL context that trusts {@code certificates} and none other. HTTPS services whose 142 * certificates have not been signed by these certificates will fail with a {@code 145 * <p>This can be used to replace the host platform's built-in trusted certificates with a custom 146 * set. This is useful in development where certificate authority-trusted certificates aren't 149 * <p>See also {@link CertificatePinner}, which can limit trusted certificates while still using 152 * <h3>Warning: Customizing Trusted Certificates is Dangerous!</h3> 153 * Relying on your own trusted certificates limits your server team's ability to update their TLS 154 * certificates. By installing a specific set of trusted certificates, you take on additiona 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in); local [all...] |
/external/boringssl/src/ssl/test/runner/ |
ticket.go | 25 certificates [][]byte 43 if len(s.certificates) != len(s1.certificates) { 47 for i := range s.certificates { 48 if !bytes.Equal(s.certificates[i], s1.certificates[i]) { 58 for _, cert := range s.certificates { 81 x[0] = byte(len(s.certificates) >> 8) 82 x[1] = byte(len(s.certificates)) 85 for _, cert := range s.certificates { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedBuilderParameters.java | 38 * Adds excluded certificates which are not used for building a 43 * @param excludedCerts The excluded certificates to set. 53 * Sets the maximum number of intermediate non-self-issued certificates in a 66 * certificates in the certification path 107 * Excluded certificates are not used for building a certification path. 111 * @return Returns the excluded certificates. 120 * certificates in the certification path. 122 * @return the maximum number of non-self-issued intermediate certificates
|
/libcore/luni/src/main/java/java/security/cert/ |
package.html | 9 X.509 certificates. 19 The functionality to check the different entries and extension fields of X.509 certificates are also provided.
|
/libcore/luni/src/main/java/java/security/ |
package.html | 9 and defining services such as {@link java.security.Certificate Certificates},
|
Identity.java | 43 private Vector<Certificate> certificates; field in class:Identity 99 if (certificates == null) { 100 certificates = new Vector<Certificate>(); 102 certificates.add(certificate); 138 if (certificates != null) { 139 if (!certificates.contains(certificate)) { 142 certificates.removeElement(certificate); 150 * Returns the certificates for this {@code Identity}. External 154 * @return the {@code Certificates} for this {@code Identity} 156 public Certificate[] certificates() { method in class:Identity [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 45 * CertPath implementation for X.509 certificates. 66 private List certificates; field in class:PKIXCertPath 152 // make sure all certificates are accounted for. 161 PKIXCertPath(List certificates) 164 this.certificates = sortCerts(new ArrayList(certificates)); 189 certificates = new ArrayList(); 195 certificates.add(0, certFactory.generateCertificate( 202 certificates = new ArrayList(); 207 certificates.add(cert) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
CertificatePinner.java | 32 * Constrains which certificates are trusted. Pinning certificates defends 40 * href="http://goo.gl/XDh6je">static certificates</a>. See Chromium's <a 75 * Pinned certificates for publicobject.com: 98 * Pinning certificates limits your server team's abilities to update their TLS 99 * certificates. By pinning certificates, you take on additional operational 104 * <h4>Note about self-signed certificates</h4> 121 * Confirms that at least one of the certificates pinned for {@code hostname} 122 * is in {@code peerCertificates}. Does nothing if there are no certificates [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/pkcs7/ |
SignedData.java | 44 * certificates 54 private final List<Certificate> certificates; field in class:SignedData 59 List<Certificate> certificates, List<CertificateList> crls, 64 this.certificates = certificates; 70 return certificates; 95 if (certificates != null) { 96 res.append(certificates.toString()); 117 setOptional(3); // certificates is optional 126 values[3] = sd.certificates; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 145 * verifies that all involved certificates must have been valid at the 147 * certificates were valid at the signing time. Both are indirectly choosen 149 * methods sets the Date when <em>all</em> certificates must have been 223 * Sets the Bouncy Castle Stores for finding CRLs, certificates, attribute 224 * certificates or cross certificates. 255 * Adds a Bouncy Castle {@link Store} to find CRLs, certificates, attribute 256 * certificates or cross certificates. 277 * Adds an additional Bouncy Castle {@link Store} to find CRLs, certificates, [all...] |
ExtendedPKIXBuilderParameters.java | 30 * Excluded certificates are not used for building a certification path. 34 * @return Returns the excluded certificates. 42 * Sets the excluded certificates which are not used for building a 48 * @param excludedCerts The excluded certificates to set. 92 * Sets the maximum number of intermediate non-self-issued certificates in a 105 * certificates in the certification path 124 * certificates in the certification path. 126 * @return the maximum number of non-self-issued intermediate certificates
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 41 * my certificates list 43 private final Vector<MyCertificate> certificates; field in class:MyCertPath 61 certificates = new Vector<MyCertificate>(); 62 certificates.add(new MyCertificate("MyEncoding", encoding)); 68 * @return certificates list 72 return Collections.unmodifiableList(certificates);
|
/external/openssh/ |
PROTOCOL.krl | 42 These sections use type KRL_SECTION_CERTIFICATES to revoke certificates by 44 certificates to be revoked and a reserved field whose contents is currently 70 certificates by listing their serial numbers. The cert_section_data in this 81 a range of serial numbers of certificates: 86 All certificates in the range serial_min <= serial <= serial_max are 107 ID" strings. This may be useful in revoking all certificates 119 (not certificates). They are less space efficient than serial numbers, 133 plain keys (i.e. not certificates) by listing their SHA1 hashes:
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 1 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and 32 # select the private key and certificates based on ID (see pkcs11-tool
|
/packages/apps/Exchange/src/com/android/exchange/ |
EasCertificateRequestor.java | 31 * certificates for EAS accounts, requests for certificates must be delegated by an Activity in this
|
/packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
VpnInfo.java | 27 // Certificate file in PC12 format for user certificates and private keys 29 // Password to extract certificates from the file
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 46 assertEquals("Missing CA certificates", Collections.EMPTY_SET, expectedCertificates); 56 * adding new certificates should be done sparingly and as a last resort -- never as a first 102 assertEquals("Unknown CA certificates", Collections.EMPTY_SET, deviceCertificates); 111 assertEquals("Blocked CA certificates", Collections.EMPTY_SET, deviceCertificates); 122 Set<String> certificates = new HashSet<String>(); local 130 certificates.add(fingerprint); 132 return certificates; 138 Set<String> certificates = new HashSet<String>(); local 147 certificates.add(getFingerprint(certificate)); 156 return certificates; [all...] |