HomeSort by relevance Sort by last modified time
    Searched full:certificates (Results 126 - 150 of 1008) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/
DummyTrustManager.java 24 * A trust manager that accepts all X509 client and server certificates.
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-plainrsa 21 # This is the trick - use PlainRSA certificates.
  /external/libweave/examples/provider/
curl_http_client.h 24 // production code as it's blocking and does not validate server certificates.
  /external/tlsdate/init/
tlsdated-cros.conf 13 GOOGLE_CERTS=/usr/share/chromeos-ca-certificates
  /external/v8/build/config/
crypto.gni 14 # True when we're using OpenSSL for representing certificates. When targeting
  /packages/apps/CertInstaller/res/values-en-rAU/
strings.xml 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string>
28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string>
32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string>
49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
  /packages/apps/CertInstaller/res/values-en-rGB/
strings.xml 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string>
28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string>
32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string>
49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
  /packages/apps/CertInstaller/res/values-en-rIN/
strings.xml 26 <string name="credential_password" msgid="3520176519550993326">"Enter the password to extract the certificates."</string>
28 <string name="p12_description" msgid="4128352087331630024">"Certificates in PKCS12 keystore."</string>
32 <string name="n_cacrts" msgid="2141498640685639208">"%d CA certificates"</string>
49 <string name="only_primary_user_allowed" msgid="4005084935023047716">"Only the owner of this device may install certificates."</string>
  /prebuilts/go/darwin-x86/src/crypto/tls/
example_test.go 41 // First, create the set of root certificates. For this example we only
handshake_server.go 301 sessionHasClientCerts := len(hs.sessionState.certificates) != 0
327 if len(hs.sessionState.certificates) > 0 {
328 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
352 // certificates won't be used.
360 certMsg.certificates = hs.cert.Certificate
428 if len(certMsg.certificates) == 0 {
437 pub, err = hs.processCertsFromClient(certMsg.certificates)
627 certificates: hs.certsFromClient,
656 // processCertsFromClient takes a chain of client certificates either from a
657 // Certificates message or from a sessionState and verifies them. It return
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
root_darwin_arm_gen.go 10 // certificates. We could use SecTrustEvaluate to verify that a trust chain
14 // Apple publishes the list of trusted root certificates for iOS on
15 // support.apple.com. So we parse the list and extract the certificates from
135 // fetchCertIDs fetches IDs of iOS X509 certificates from apple.com.
x509_test_import.go 8 // imports can sign certificates without errors resulting from missing hash
  /prebuilts/go/linux-x86/src/crypto/tls/
example_test.go 41 // First, create the set of root certificates. For this example we only
handshake_server.go 301 sessionHasClientCerts := len(hs.sessionState.certificates) != 0
327 if len(hs.sessionState.certificates) > 0 {
328 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
352 // certificates won't be used.
360 certMsg.certificates = hs.cert.Certificate
428 if len(certMsg.certificates) == 0 {
437 pub, err = hs.processCertsFromClient(certMsg.certificates)
627 certificates: hs.certsFromClient,
656 // processCertsFromClient takes a chain of client certificates either from a
657 // Certificates message or from a sessionState and verifies them. It return
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
root_darwin_arm_gen.go 10 // certificates. We could use SecTrustEvaluate to verify that a trust chain
14 // Apple publishes the list of trusted root certificates for iOS on
15 // support.apple.com. So we parse the list and extract the certificates from
135 // fetchCertIDs fetches IDs of iOS X509 certificates from apple.com.
x509_test_import.go 8 // imports can sign certificates without errors resulting from missing hash
  /system/update_engine/common/
platform_constants_chromeos.cc 30 const char kCACertificatesPath[] = "/usr/share/chromeos-ca-certificates";
  /libcore/ojluni/src/main/java/sun/security/validator/
SimpleValidator.java 49 * deployed certificates and previous J2SE versions. It will never support
83 * The trusted certificates as:
85 * The list is used because there may be multiple certificates
92 * Set of the trusted certificates. Present only for
141 // create distrusted certificates checker
331 * certificates.
337 // EKU irrelevant in CA certificates
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
URICertStore.java 62 * A <code>CertStore</code> that retrieves <code>Certificates</code> or
67 * For Certificates, this implementation retrieves a single DER encoded CRL or
68 * a collection of Certificates encoded as a PKCS#7 "certs-only" CMS message.
93 // interval between checks for update of cached Certificates/CRLs
258 // Fetch the certificates via LDAP. LDAPCertStore has its own
265 // Return the Certificates for this entry. It returns the cached value
266 // if it is still current and fetches the Certificates otherwise.
271 debug.println("Returning certificates from cache");
303 debug.println("Downloading new certificates...");
312 debug.println("Exception fetching certificates:")
    [all...]
  /build/soong/java/
app.go 37 // paths to extra certificates to sign the apk with
149 certificates := []string{certificate}
151 certificates = append(certificates, filepath.Join(common.PathForSource(ctx).String(), c))
154 a.outputFile = CreateAppPackage(ctx, aaptPackageFlags, a.outputFile, certificates)
  /libcore/luni/src/test/java/tests/security/cert/
CertStore2Test.java 216 Collection<? extends Certificate> certificates = certStore.getCertificates(null); local
217 assertNull(certificates);
223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector()); local
224 assertNotNull(certificates);
225 assertTrue(certificates.isEmpty());
  /libcore/ojluni/src/main/java/java/security/cert/
PKIXBuilderParameters.java 136 * certificates that may exist in a certification path. A certificate
151 * <p> If any of the CA certificates contain the
158 * certificates that may exist in a certification path
174 * certificates that may exist in a certification path. See
177 * @return the maximum number of non-self-issued intermediate certificates
  /frameworks/base/docs/html-intl/intl/es/training/articles/
security-config.jd 129 &lt;certificates src="@raw/my_ca"/&gt;
164 &lt;certificates src="@raw/trusted_roots"/&gt;
175 <a href="#certificates"><code>&lt;certificates&gt;</code></a>
198 &lt;certificates src="@raw/extracas"/&gt;
199 &lt;certificates src="system"/&gt;
233 &lt;certificates src="@raw/debug_cas"/&gt;
353 &lt;certificates src="@raw/my_ca"/&gt;
376 &lt;certificates src="..."/&gt;
385 &lt;certificates src="..."/&gt
    [all...]
  /frameworks/base/docs/html-intl/intl/pt-br/training/articles/
security-config.jd 129 &lt;certificates src="@raw/my_ca"/&gt;
164 &lt;certificates src="@raw/trusted_roots"/&gt;
175 <a href="#certificates"><code>&lt;certificates&gt;</code></a>
198 &lt;certificates src="@raw/extracas"/&gt;
199 &lt;certificates src="system"/&gt;
233 &lt;certificates src="@raw/debug_cas"/&gt;
353 &lt;certificates src="@raw/my_ca"/&gt;
376 &lt;certificates src="..."/&gt;
385 &lt;certificates src="..."/&gt
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
SSLParametersImpl.java 399 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates)
401 byte[][] principalBytes = new byte[certificates.length][];
402 for (int i = 0; i < certificates.length; i++) {
403 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded();
417 OpenSSLX509Certificate[] certificates = new OpenSSLX509Certificate[certificateRefs.length]; local
419 certificates[i] = new OpenSSLX509Certificate(certificateRefs[i]);
421 return certificates;
479 X509Certificate[] certificates = keyManager.getCertificateChain(alias); local
480 if (certificates == null) {
483 PublicKey publicKey = (certificates.length > 0) ? certificates[0].getPublicKey() : null
    [all...]

Completed in 1289 milliseconds

1 2 3 4 56 7 8 91011>>