Searched refs:certificates (Results 1 – 17 of 17) sorted by relevance
59 private ImmutableList<String> certificates; field in SimulatorService161 public void setCertificatesList(ImmutableList<String> certificates) { in setCertificatesList() argument162 this.certificates = certificates; in setCertificatesList()180 return isCertificateValid(messageDigest.digest(signature.toByteArray()), this.certificates); in hasAccessToService()200 byte[] clientCerfificate, ImmutableList<String> certificates) { in isCertificateValid() argument201 for (String certificate : certificates) { in isCertificateValid()
208 Certificate[] certificates = keyStore.getCertificateChain(alias); in maybeUpdateClientKeyForEAPConfiguration() local209 if (certificates == null) { in maybeUpdateClientKeyForEAPConfiguration()212 if (!isCertificateChainValidType(certificates)) { in maybeUpdateClientKeyForEAPConfiguration()219 (PrivateKey) key, castX509Certificates(certificates)); in maybeUpdateClientKeyForEAPConfiguration()222 private boolean isCertificateChainValidType(Certificate[] certificates) { in isCertificateChainValidType() argument223 return !Arrays.stream(certificates).anyMatch(c -> !(c instanceof X509Certificate)); in isCertificateChainValidType()
397 List<X509Certificate> certificates = new ArrayList<>(); in stopAfterStep() local398 certificates.add(mX509Certificate); in stopAfterStep()399 trustRootCertificates.put(OsuServerConnection.TRUST_CERT_TYPE_AAA, certificates); in stopAfterStep()401 certificates); in stopAfterStep()917 List<X509Certificate> certificates = new ArrayList<>(); in verifyHandlingErrorForAddingPasspointConfiguration() local918 certificates.add(mX509Certificate); in verifyHandlingErrorForAddingPasspointConfiguration()919 trustRootCertificates.put(OsuServerConnection.TRUST_CERT_TYPE_AAA, certificates); in verifyHandlingErrorForAddingPasspointConfiguration()920 trustRootCertificates.put(OsuServerConnection.TRUST_CERT_TYPE_REMEDIATION, certificates); in verifyHandlingErrorForAddingPasspointConfiguration()966 List<X509Certificate> certificates = new ArrayList<>(); in verifyHandlingEmptyRemediationTrustRootCertificateRetrieved() local967 certificates.add(mX509Certificate); in verifyHandlingEmptyRemediationTrustRootCertificateRetrieved()[all …]
305 X509Certificate[] certificates = new X509Certificate[1]; in verifyInitAndConnectCertValidationFailure() local306 certificates[0] = certificateList.get(0); in verifyInitAndConnectCertValidationFailure()312 trustManager.checkServerTrusted(certificates, AUTH_TYPE); in verifyInitAndConnectCertValidationFailure()
75 session.certificates = new Certificate[] {cert}; in parseAndVerify()96 public Certificate[] certificates = new Certificate[0]; field in TokenValidator.StubSSLSession146 return certificates; in getPeerCertificates()
597 List<X509Certificate> certificates = trustRootCertificates.get( in installTrustRootCertificates() local599 if (certificates == null || certificates.isEmpty()) { in installTrustRootCertificates()610 certificates.toArray(new X509Certificate[0])); in installTrustRootCertificates()612 certificates = trustRootCertificates.get( in installTrustRootCertificates()614 if (certificates == null || certificates.isEmpty()) { in installTrustRootCertificates()623 certificates.get(0)); in installTrustRootCertificates()
412 List<X509Certificate> certificates = new ArrayList<>(); in performRetrievingTrustRootCerts() local447 certificates.add(certificate); in performRetrievingTrustRootCerts()449 if (!certificates.isEmpty()) { in performRetrievingTrustRootCerts()450 trustRootCertificates.put(certInfoPerType.getKey(), certificates); in performRetrievingTrustRootCerts() local
177 JSONArray certificates = jsonObj.getJSONArray("certificates"); in doInBackground() local180 for (int i = 0; i < certificates.length(); i++) { in doInBackground()181 JSONObject cert = certificates.getJSONObject(i); in doInBackground()
281 List<X509Certificate> certificates = mDelegate.getX509CertsFromCertHolder(certHolder); in getCertLayout() local282 if (certificates != null) { in getCertLayout()283 for (X509Certificate certificate : certificates) { in getCertLayout()
948 List<X509Certificate> certificates = null; in getX509CertsFromCertHolder() local956 certificates = new ArrayList<X509Certificate>(n); in getX509CertsFromCertHolder()960 certificates.add(certificate); in getX509CertsFromCertHolder()967 return certificates; in getX509CertsFromCertHolder()
571 final Certificate[] certificates = certs.toArray(new Certificate[0]);577 KeyFactory.getInstance(certificates[0].getPublicKey().getAlgorithm());594 keystore.setKeyEntry(alias, privateKey1, null, certificates);596 if (certificates.length > 1) {601 keystore.setCertificateEntry(alias, certificates[0]);
27 header: { x5c: config.certificates.map(cert_to_x5c) }
14 # key and certificates with a self-signed CA
903 // Require valid OCSP stapling response for all not-trusted certificates3498 // The reason code for provisioning failure when failing to retrieve trust root certificates
1dictionary=main:en_gb,locale=en_GB,description=English (UK),date ...
1dictionary=main:en,locale=en,description=English,date=1414726273, ...