/prebuilts/go/darwin-x86/src/net/http/ |
server.go | [all...] |
/prebuilts/go/linux-x86/src/net/http/ |
server.go | [all...] |
/prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/0.13.2/ |
grpc-okhttp-0.13.2.jar | |
/prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/1.0.1/ |
grpc-okhttp-1.0.1.jar | |
/prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/1.0.3/ |
grpc-okhttp-1.0.3.jar | |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
tls_test.go | 24 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 74 -----END CERTIFICATE----- 127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 148 t.Error("Load of RSA certificate succeeded with ECDSA private key") 151 t.Error("Load of ECDSA certificate succeeded with RSA private key") 630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) { 634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) { 642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error [all...] |
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer") 309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) [all...] |
handshake_server_test.go | 55 Certificates: make([]Certificate, 2), 61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 158 serverConfig.Certificates = make([]Certificate, 1) 159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 188 serverConfig.Certificates = make([]Certificate, 1) 189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 383 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 385 Certificates: []Certificate{{ 386 Certificate: [][]byte{testRSACertificate} [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
tls_test.go | 24 var rsaCertPEM = `-----BEGIN CERTIFICATE----- 35 -----END CERTIFICATE----- 62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE----- 74 -----END CERTIFICATE----- 127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) { 148 t.Error("Load of RSA certificate succeeded with ECDSA private key") 151 t.Error("Load of ECDSA certificate succeeded with RSA private key") 630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) { 634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) { 642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error [all...] |
key_agreement.go | 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter") 65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) { 199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) { 267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer") 309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) { 342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error { 432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) [all...] |
handshake_server_test.go | 55 Certificates: make([]Certificate, 2), 61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 158 serverConfig.Certificates = make([]Certificate, 1) 159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 188 serverConfig.Certificates = make([]Certificate, 1) 189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 383 expected := [][]byte{[]byte("certificate"), []byte("transparency")} 385 Certificates: []Certificate{{ 386 Certificate: [][]byte{testRSACertificate} [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/build/ |
BuildHelper.java | 361 info != null ? info.key : null, info != null ? info.certificate : null, resMarker); 387 PrivateKey key, X509Certificate certificate, ResourceMarker resMarker) 393 key, certificate, [all...] |
/build/make/core/ |
product_config.mk | 333 only 1 certificate is allowed.)
|
/external/apache-http/android/src/android/net/http/ |
Connection.java | 58 * The server SSL certificate associated with this connection 60 * It would be nice to store the whole certificate chain, but 132 * @return The server SSL certificate associated with this 222 * know of any associated certificate, 225 req.mEventHandler.certificate(mCertificate); 352 // reset the certificate to null before opening a connection
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/ |
CertUtilsTest.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
/build/soong/java/ |
androidmk.go | 214 fmt.Fprintln(w, "LOCAL_CERTIFICATE :=", app.certificate.pem.String())
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
TestUtils.java | 45 import java.security.cert.Certificate; 162 Certificate cert; 174 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(), 184 "Public key used to sign certificate should have the same algorithm as in KeyPair", 187 Certificate[] chain = privEntry.getCertificateChain(); 189 fail("Empty certificate chain"); 424 Certificate certificate, 429 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate}) [all...] |
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 55 "-----BEGIN CERTIFICATE-----\n" 65 "-----END CERTIFICATE-----\n"; 335 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 348 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 1028 // Test getting the remote certificate. [all...] |
/frameworks/base/core/java/android/webkit/ |
WebView.java | 740 * Gets the SSL certificate for the main top-level page or {@code null} if there is 741 * no certificate (the site is not secure). 743 * @return the SSL certificate for the main top-level page 752 * Sets the SSL certificate for the main top-level page. 758 public void setCertificate(SslCertificate certificate) { 760 mProvider.setCertificate(certificate); [all...] |
/frameworks/base/test-mock/src/android/test/mock/ |
MockPackageManager.java | [all...] |
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
XmlConfigTests.java | 349 if (anchor.certificate.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) { 369 if (anchor.certificate.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) {
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/ |
Credential.java | 119 * and Accounting) server's certificate during EAP (Extensible Authentication 471 * Certificate based credential. This is used for EAP-TLS. 476 * Supported certificate types. 482 * Certificate SHA-256 fingerprint length. 487 * Certificate type. 491 * Set the certificate type associated with this certificate credential. 493 * @param certType The certificate type to set to 499 * Get the certificate type associated with this certificate credential [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 40 import java.security.cert.Certificate; 76 // creating a certificate 77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 91 + "-----END CERTIFICATE-----\n"; 93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes()); 95 String certificate2 = "-----BEGIN CERTIFICATE-----\n" 109 + "-----END CERTIFICATE-----\n"; 113 String certificate3 = "-----BEGIN CERTIFICATE-----\n" 132 + "-----END CERTIFICATE-----\n" [all...] |
/packages/apps/Settings/src/com/android/settings/ |
TrustedCredentialsSettings.java | 415 * Called when the switch on a system certificate is clicked. This will toggle whether it 713 // Saving the connection for later use on the certificate dialog. 959 X509Certificate certificate = KeyChain.toCertificate(encodedCertificate); local [all...] |
/tools/apksig/src/main/java/com/android/apksig/internal/apk/ |
ApkSigningBlockUtils.java | 567 for (X509Certificate certificate : certificates) { 568 result.add(certificate.getEncoded()); [all...] |