/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | AndroidKeyStoreTest.java | 1622 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() local 1623 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1624 chain[1] = caCert; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1627 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1642 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Unencrypted_Success() local 1643 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1644 chain[1] = caCert; in testKeyStore_SetKeyEntry_Unencrypted_Success() 1646 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, null, chain); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1670 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() local 1671 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() [all …]
|
D | TestUtils.java | 168 Certificate[] chain = privEntry.getCertificateChain(); in assertKeyStoreKeyPair() local 169 if (chain.length == 0) { in assertKeyStoreKeyPair() 173 assertEquals(cert, chain[0]); in assertKeyStoreKeyPair()
|
D | KeyPairGeneratorTest.java | 1424 private final X509Certificate[] chain; field in KeyPairGeneratorTest.MyKeyManager 1428 this.chain = certChain; in MyKeyManager() 1443 return chain; in getCertificateChain()
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
D | KeyChainTest.java | 200 final Certificate[] chain = new Certificate[2]; in doInBackground() local 224 chain[0] = f.generateCertificate(res.openRawResource(R.raw.usercert)); in doInBackground() 225 chain[1] = f.generateCertificate(res.openRawResource(R.raw.cacert)); in doInBackground() 235 ks.setKeyEntry("alias", privKey, KEYSTORE_PASSWORD, chain); in doInBackground()
|
/cts/libs/testserver/src/android/webkit/cts/ |
D | TestWebServer.java | 351 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 356 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
D | CtsTestServer.java | 304 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 308 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
D | WebViewSslTest.java | 856 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 860 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/security/src/android/security/cts/ |
D | OpenSSLHeartbleedTest.java | 925 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 930 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument
|
/cts/tests/tests/media/src/android/media/cts/ |
D | AdaptivePlaybackTest.java | 119 return chain(H264(ALL), HEVC(ALL), VP8(ALL), VP9(ALL), Mpeg4(ALL), H263(ALL)); in AllCodecs() 123 return chain(H264(SW), HEVC(SW), VP8(SW), VP9(SW), Mpeg4(SW), H263(SW)); in SWCodecs() 127 return chain(H264(HW), HEVC(HW), VP8(HW), VP9(HW), Mpeg4(HW), H263(HW)); in HWCodecs() 828 static <E> Iterable<E> chain(Iterable<E> ... iterables) {
|
/cts/tools/dex-tools/dex/ |
D | classes0.out.dex | 32598 private java.security.cert.Certificate[] chain
|