/frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/ |
TrustedRootCertificatesTest.java | 40 Map<String, X509Certificate> certificates = getRootCertificates(); local 42 assertTrue(certificates.containsKey(GOOGLE_CLOUD_KEY_VAULT_SERVICE_V1_ALIAS));
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
TrustedRootCertificates.java | 29 * Trusted root certificates for use by the 30 * {@link android.security.keystore.recovery.RecoveryController}. These certificates are used to 147 * Returns all available root certificates, keyed by alias. 164 ArrayMap<String, X509Certificate> certificates = local 166 certificates.put( 169 return certificates;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 41 * my certificates list 43 private final Vector<MyCertificate> certificates; field in class:MyCertPath 61 certificates = new Vector<MyCertificate>(); 62 certificates.add(new MyCertificate("MyEncoding", encoding)); 68 * @return certificates list 72 return Collections.unmodifiableList(certificates);
|
/libcore/luni/src/main/java/libcore/util/ |
RecoverySystem.java | 36 * that specified in {@code blockStream}. The public key of the certificates specified 46 X509Certificate[] certificates = block.getCertificates(); local 47 if (certificates == null || certificates.length == 0) { 48 throw new SignatureException("signature contains no certificates"); 50 X509Certificate cert = certificates[0];
|
/tools/apksig/src/main/java/com/android/apksig/internal/pkcs7/ |
SignedData.java | 47 public List<Asn1OpaqueObject> certificates; field in class:SignedData
|
/frameworks/base/core/java/android/security/net/config/ |
ResourceCertificateSource.java | 34 * {@link CertificateSource} based on certificates contained in an application resource file. 55 Set<X509Certificate> certificates = new ArraySet<X509Certificate>(); local 70 certificates.add((X509Certificate) cert); 73 mCertificates = certificates;
|
KeyStoreCertificateSource.java | 31 * {@link CertificateSource} which provides certificates from trusted certificate entries of a 58 Set<X509Certificate> certificates = new ArraySet<>(mKeyStore.size()); local 63 certificates.add(cert); 68 mCertificates = certificates; 70 throw new RuntimeException("Failed to load certificates from KeyStore", e);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 76 Vector<Certificate> certificates = new Vector<Certificate>(); local 77 certificates.add(new MyCertificate("TEST", new byte[] {})); 78 new CollectionCertStoreParameters(certificates); 89 Vector<String> certificates = new Vector<String>(); local 90 certificates.add(new String("Not a Certificate")); 91 new CollectionCertStoreParameters(certificates); 99 Vector<Certificate> certificates = new Vector<Certificate>(); local 102 new CollectionCertStoreParameters(certificates); 104 assertTrue("isRefUsed_1", certificates == cp.getCollection()); 108 certificates.add(new MyCertificate("TEST", new byte[] {(byte)1})) 130 Vector<Certificate> certificates = new Vector<Certificate>(); local 144 Vector<Certificate> certificates = new Vector<Certificate>(); local 183 Vector<Certificate> certificates = new Vector<Certificate>(); local 203 Vector certificates = new Vector(); local [all...] |
CertStore2Test.java | 216 Collection<? extends Certificate> certificates = certStore.getCertificates(null); local 217 assertNull(certificates); 223 Collection<? extends Certificate> certificates = certStore.getCertificates(new MyCertSelector()); local 224 assertNotNull(certificates); 225 assertTrue(certificates.isEmpty());
|
/external/boringssl/src/crypto/pkcs7/ |
pkcs7.c | 97 CBS signed_data, certificates; local 107 if (!CBS_get_asn1(&signed_data, &certificates, 113 while (CBS_len(&certificates) > 0) { 115 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) {
|
pkcs7_x509.c | 76 // Even if only CRLs are included, there may be an empty certificates block. 80 !CBS_get_asn1(&signed_data, NULL /* certificates */, 178 CBB certificates; local 181 if (!CBB_add_asn1(out, &certificates, 192 !CBB_add_space(&certificates, &buf, len) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 63 Certificate[] certificates = session.getPeerCertificates(); local 64 return verify(host, (X509Certificate) certificates[0]); 183 // yet absolute. This is needed because server certificates do not normally contain absolute
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 70 List<? extends Certificate> certificates = path.getCertificates(); local 74 assertEquals(2, certificates.size()); 76 Certificate endEntityCert = certificates.get(0);
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
TestSessionBuilder.java | 33 private ArrayList<byte[]> certificates = new ArrayList<byte[]>(); field in class:TestSessionBuilder 66 certificates.add(certificate); 68 certificatesLength = certificates.size(); 138 for (int i = 0; i < certificates.size(); i++) { 140 buf.put(certificates.get(i));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 190 ASN1Set certificates = null; local 194 certificates = CMSUtils.createBerSetFromList(certs); 209 certificates,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignedData.java | 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL, 39 * IF ((certificates is present) AND 40 * (any certificates with a type of other are present)) OR 45 * IF (certificates is present) AND 46 * (any version 2 attribute certificates are present) 49 * IF ((certificates is present) AND 50 * (any version 1 attribute certificates are present)) OR 69 private ASN1Set certificates; field in class:SignedData 107 ASN1Set certificates, 111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 44 * CertPath implementation for X.509 certificates. 64 private List certificates; field in class:PKIXCertPath 150 // make sure all certificates are accounted for. 159 PKIXCertPath(List certificates) 162 this.certificates = sortCerts(new ArrayList(certificates)); 187 certificates = new ArrayList(); 193 certificates.add(0, certFactory.generateCertificate( 200 certificates = new ArrayList(); 205 certificates.add(cert) [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 73 * in this chain is the server's certificate, further certificates are included in the handshake 96 Certificate[] certificates = new Certificate[chain.length]; local 98 certificates[i] = chain[i].certificate; 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates);
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
CertificateChainCleanerTest.java | 209 List<Certificate> certificates = new ArrayList<>(); local 211 certificates.add(heldCertificate.certificate); 216 assertEquals(certificates, council.clean(certificates)); 217 assertEquals(certificates, council.clean(certificates.subList(0, 9))); 222 List<Certificate> certificates = new ArrayList<>(); local 224 certificates.add(heldCertificate.certificate); 230 council.clean(certificates);
|
FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 67 // PEM files for root certificates of Comodo and Entrust. These two CAs are sufficient to view 141 * Returns a SSL context that trusts {@code certificates} and none other. HTTPS services whose 142 * certificates have not been signed by these certificates will fail with a {@code 145 * <p>This can be used to replace the host platform's built-in trusted certificates with a custom 146 * set. This is useful in development where certificate authority-trusted certificates aren't 149 * <p>See also {@link CertificatePinner}, which can limit trusted certificates while still using 152 * <h3>Warning: Customizing Trusted Certificates is Dangerous!</h3> 153 * Relying on your own trusted certificates limits your server team's ability to update their TLS 154 * certificates. By installing a specific set of trusted certificates, you take on additiona 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in); local [all...] |
/libcore/ojluni/src/main/java/java/security/ |
Identity.java | 43 * <p>An Identity also has a set of certificates (all certifying its own 44 * public key). The Principal names specified in these certificates need 95 * The certificates for this identity. 99 Vector<Certificate> certificates; field in class:Identity 166 * identity's certificates are removed by this operation. 189 certificates = new Vector<Certificate>(); 251 if (certificates == null) { 252 certificates = new Vector<Certificate>(); 262 certificates.addElement(certificate); 299 if (certificates != null) 314 public Certificate[] certificates() { method in class:Identity [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
PKIXCertPathValidator.java | 91 List<X509Certificate> certList = params.certificates(); 163 // Android-removed: Android doesn't use this mechanism for checking untrusted certificates. 171 int certPathLen = params.certificates().size(); 176 // Android-removed: Android doesn't use this mechanism for checking untrusted certificates. 223 params.certificates(),
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
V2SchemeSigner.java | 191 if (signerConfig.certificates.isEmpty()) { 192 throw new SignatureException("No certificates configured for signer"); 194 PublicKey publicKey = signerConfig.certificates.get(0).getPublicKey(); 200 signedData.certificates = encodeCertificates(signerConfig.certificates); 202 throw new SignatureException("Failed to encode certificates", e); 226 // * length-prefixed sequence of certificates: 234 encodeAsSequenceOfLengthPrefixedElements(signedData.certificates), 288 public List<byte[]> certificates; field in class:V2SchemeSigner.V2SignatureSchemeBlock.SignedData
|