/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
DummyTrustManager.java | 24 * A trust manager that accepts all X509 client and server certificates.
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-plainrsa | 21 # This is the trick - use PlainRSA certificates.
|
/external/libweave/examples/provider/ |
curl_http_client.h | 24 // production code as it's blocking and does not validate server certificates.
|
/external/tlsdate/init/ |
tlsdated-cros.conf | 13 GOOGLE_CERTS=/usr/share/chromeos-ca-certificates
|
/external/v8/build/config/ |
crypto.gni | 14 # True when we're using OpenSSL for representing certificates. When targeting
|
/packages/apps/CertInstaller/res/values-en-rAU/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/packages/apps/CertInstaller/res/values-en-rGB/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/packages/apps/CertInstaller/res/values-en-rIN/ |
strings.xml | 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string> 28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string> 32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string> 49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
example_test.go | 41 // First, create the set of root certificates. For this example we only
|
handshake_server.go | 301 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 327 if len(hs.sessionState.certificates) > 0 { 328 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 352 // certificates won't be used. 360 certMsg.certificates = hs.cert.Certificate 428 if len(certMsg.certificates) == 0 { 437 pub, err = hs.processCertsFromClient(certMsg.certificates) 627 certificates: hs.certsFromClient, 656 // processCertsFromClient takes a chain of client certificates either from a 657 // Certificates message or from a sessionState and verifies them. It return [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_darwin_arm_gen.go | 10 // certificates. We could use SecTrustEvaluate to verify that a trust chain 14 // Apple publishes the list of trusted root certificates for iOS on 15 // support.apple.com. So we parse the list and extract the certificates from 135 // fetchCertIDs fetches IDs of iOS X509 certificates from apple.com.
|
x509_test_import.go | 8 // imports can sign certificates without errors resulting from missing hash
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
example_test.go | 41 // First, create the set of root certificates. For this example we only
|
handshake_server.go | 301 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 327 if len(hs.sessionState.certificates) > 0 { 328 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 352 // certificates won't be used. 360 certMsg.certificates = hs.cert.Certificate 428 if len(certMsg.certificates) == 0 { 437 pub, err = hs.processCertsFromClient(certMsg.certificates) 627 certificates: hs.certsFromClient, 656 // processCertsFromClient takes a chain of client certificates either from a 657 // Certificates message or from a sessionState and verifies them. It return [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_darwin_arm_gen.go | 10 // certificates. We could use SecTrustEvaluate to verify that a trust chain 14 // Apple publishes the list of trusted root certificates for iOS on 15 // support.apple.com. So we parse the list and extract the certificates from 135 // fetchCertIDs fetches IDs of iOS X509 certificates from apple.com.
|
x509_test_import.go | 8 // imports can sign certificates without errors resulting from missing hash
|
/system/update_engine/common/ |
platform_constants_chromeos.cc | 30 const char kCACertificatesPath[] = "/usr/share/chromeos-ca-certificates";
|
/libcore/ojluni/src/main/java/sun/security/validator/ |
SimpleValidator.java | 49 * deployed certificates and previous J2SE versions. It will never support 83 * The trusted certificates as: 85 * The list is used because there may be multiple certificates 92 * Set of the trusted certificates. Present only for 141 // create distrusted certificates checker 331 * certificates. 337 // EKU irrelevant in CA certificates
|
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
URICertStore.java | 62 * A <code>CertStore</code> that retrieves <code>Certificates</code> or 67 * For Certificates, this implementation retrieves a single DER encoded CRL or 68 * a collection of Certificates encoded as a PKCS#7 "certs-only" CMS message. 93 // interval between checks for update of cached Certificates/CRLs 258 // Fetch the certificates via LDAP. LDAPCertStore has its own 265 // Return the Certificates for this entry. It returns the cached value 266 // if it is still current and fetches the Certificates otherwise. 271 debug.println("Returning certificates from cache"); 303 debug.println("Downloading new certificates..."); 312 debug.println("Exception fetching certificates:") [all...] |
/build/soong/java/ |
app.go | 37 // paths to extra certificates to sign the apk with 149 certificates := []string{certificate} 151 certificates = append(certificates, filepath.Join(common.PathForSource(ctx).String(), c)) 154 a.outputFile = CreateAppPackage(ctx, aaptPackageFlags, a.outputFile, certificates)
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertStore2Test.java | 216 Collection<? extends Certificate> certificates = certStore.getCertificates(null); local 217 assertNull(certificates); 223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector()); local 224 assertNotNull(certificates); 225 assertTrue(certificates.isEmpty());
|
/libcore/ojluni/src/main/java/java/security/cert/ |
PKIXBuilderParameters.java | 136 * certificates that may exist in a certification path. A certificate 151 * <p> If any of the CA certificates contain the 158 * certificates that may exist in a certification path 174 * certificates that may exist in a certification path. See 177 * @return the maximum number of non-self-issued intermediate certificates
|
/frameworks/base/docs/html-intl/intl/es/training/articles/ |
security-config.jd | 129 <certificates src="@raw/my_ca"/> 164 <certificates src="@raw/trusted_roots"/> 175 <a href="#certificates"><code><certificates></code></a> 198 <certificates src="@raw/extracas"/> 199 <certificates src="system"/> 233 <certificates src="@raw/debug_cas"/> 353 <certificates src="@raw/my_ca"/> 376 <certificates src="..."/> 385 <certificates src="..."/> [all...] |
/frameworks/base/docs/html-intl/intl/pt-br/training/articles/ |
security-config.jd | 129 <certificates src="@raw/my_ca"/> 164 <certificates src="@raw/trusted_roots"/> 175 <a href="#certificates"><code><certificates></code></a> 198 <certificates src="@raw/extracas"/> 199 <certificates src="system"/> 233 <certificates src="@raw/debug_cas"/> 353 <certificates src="@raw/my_ca"/> 376 <certificates src="..."/> 385 <certificates src="..."/> [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
SSLParametersImpl.java | 399 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates) 401 byte[][] principalBytes = new byte[certificates.length][]; 402 for (int i = 0; i < certificates.length; i++) { 403 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded(); 417 OpenSSLX509Certificate[] certificates = new OpenSSLX509Certificate[certificateRefs.length]; local 419 certificates[i] = new OpenSSLX509Certificate(certificateRefs[i]); 421 return certificates; 479 X509Certificate[] certificates = keyManager.getCertificateChain(alias); local 480 if (certificates == null) { 483 PublicKey publicKey = (certificates.length > 0) ? certificates[0].getPublicKey() : null [all...] |