HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 276 - 300 of 832) sorted by null

<<11121314151617181920>>

  /prebuilts/go/darwin-x86/src/net/http/
server.go     [all...]
  /prebuilts/go/linux-x86/src/net/http/
server.go     [all...]
  /prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/0.13.2/
grpc-okhttp-0.13.2.jar 
  /prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/1.0.1/
grpc-okhttp-1.0.1.jar 
  /prebuilts/tools/common/m2/repository/io/grpc/grpc-okhttp/1.0.3/
grpc-okhttp-1.0.3.jar 
  /prebuilts/go/darwin-x86/src/crypto/tls/
tls_test.go 24 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
74 -----END CERTIFICATE-----
127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
148 t.Error("Load of RSA certificate succeeded with ECDSA private key")
151 t.Error("Load of ECDSA certificate succeeded with RSA private key")
630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) {
634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) {
642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
    [all...]
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
    [all...]
handshake_server_test.go 55 Certificates: make([]Certificate, 2),
61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
158 serverConfig.Certificates = make([]Certificate, 1)
159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
188 serverConfig.Certificates = make([]Certificate, 1)
189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
383 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
385 Certificates: []Certificate{{
386 Certificate: [][]byte{testRSACertificate}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
tls_test.go 24 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
35 -----END CERTIFICATE-----
62 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
74 -----END CERTIFICATE-----
127 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
148 t.Error("Load of RSA certificate succeeded with ECDSA private key")
151 t.Error("Load of ECDSA certificate succeeded with RSA private key")
630 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) {
634 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) {
642 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
    [all...]
key_agreement.go 30 func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
34 func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
49 return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
65 func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
69 func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
199 func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
267 return nil, errors.New("tls: certificate private key does not implement crypto.Signer")
309 func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
342 func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
432 func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
    [all...]
handshake_server_test.go 55 Certificates: make([]Certificate, 2),
61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
158 serverConfig.Certificates = make([]Certificate, 1)
159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
188 serverConfig.Certificates = make([]Certificate, 1)
189 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
383 expected := [][]byte{[]byte("certificate"), []byte("transparency")}
385 Certificates: []Certificate{{
386 Certificate: [][]byte{testRSACertificate}
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/build/
BuildHelper.java 361 info != null ? info.key : null, info != null ? info.certificate : null, resMarker);
387 PrivateKey key, X509Certificate certificate, ResourceMarker resMarker)
393 key, certificate,
    [all...]
  /build/make/core/
product_config.mk 333 only 1 certificate is allowed.)
  /external/apache-http/android/src/android/net/http/
Connection.java 58 * The server SSL certificate associated with this connection
60 * It would be nice to store the whole certificate chain, but
132 * @return The server SSL certificate associated with this
222 * know of any associated certificate,
225 req.mEventHandler.certificate(mCertificate);
352 // reset the certificate to null before opening a connection
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/
CertUtilsTest.java 17 package com.android.server.locksettings.recoverablekeystore.certificate;
  /build/soong/java/
androidmk.go 214 fmt.Fprintln(w, "LOCAL_CERTIFICATE :=", app.certificate.pem.String())
  /cts/tests/tests/keystore/src/android/keystore/cts/
TestUtils.java 45 import java.security.cert.Certificate;
162 Certificate cert;
174 assertTrue("Certificate must be an X.509 certificate: " + cert.getClass(),
184 "Public key used to sign certificate should have the same algorithm as in KeyPair",
187 Certificate[] chain = privEntry.getCertificateChain();
189 fail("Empty certificate chain");
424 Certificate certificate,
429 new KeyStore.PrivateKeyEntry(privateKey, new Certificate[] {certificate})
    [all...]
  /external/webrtc/webrtc/base/
sslstreamadapter_unittest.cc 55 "-----BEGIN CERTIFICATE-----\n"
65 "-----END CERTIFICATE-----\n";
335 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
348 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
1028 // Test getting the remote certificate.
    [all...]
  /frameworks/base/core/java/android/webkit/
WebView.java 740 * Gets the SSL certificate for the main top-level page or {@code null} if there is
741 * no certificate (the site is not secure).
743 * @return the SSL certificate for the main top-level page
752 * Sets the SSL certificate for the main top-level page.
758 public void setCertificate(SslCertificate certificate) {
760 mProvider.setCertificate(certificate);
    [all...]
  /frameworks/base/test-mock/src/android/test/mock/
MockPackageManager.java     [all...]
  /frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
XmlConfigTests.java 349 if (anchor.certificate.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) {
369 if (anchor.certificate.getSubjectDN().toString().equals(DEBUG_CA_SUBJ)) {
  /frameworks/base/wifi/java/android/net/wifi/hotspot2/pps/
Credential.java 119 * and Accounting) server's certificate during EAP (Extensible Authentication
471 * Certificate based credential. This is used for EAP-TLS.
476 * Supported certificate types.
482 * Certificate SHA-256 fingerprint length.
487 * Certificate type.
491 * Set the certificate type associated with this certificate credential.
493 * @param certType The certificate type to set to
499 * Get the certificate type associated with this certificate credential
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore2Test.java 40 import java.security.cert.Certificate;
76 // creating a certificate
77 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
91 + "-----END CERTIFICATE-----\n";
93 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate.getBytes());
95 String certificate2 = "-----BEGIN CERTIFICATE-----\n"
109 + "-----END CERTIFICATE-----\n";
113 String certificate3 = "-----BEGIN CERTIFICATE-----\n"
132 + "-----END CERTIFICATE-----\n"
    [all...]
  /packages/apps/Settings/src/com/android/settings/
TrustedCredentialsSettings.java 415 * Called when the switch on a system certificate is clicked. This will toggle whether it
713 // Saving the connection for later use on the certificate dialog.
959 X509Certificate certificate = KeyChain.toCertificate(encodedCertificate); local
    [all...]
  /tools/apksig/src/main/java/com/android/apksig/internal/apk/
ApkSigningBlockUtils.java 567 for (X509Certificate certificate : certificates) {
568 result.add(certificate.getEncoded());
    [all...]

Completed in 1061 milliseconds

<<11121314151617181920>>