summaryrefslogtreecommitdiffstats
path: root/security/src/main/files
Commit message (Collapse)AuthorAgeFilesLines
* merge more modules into luniPeter Hallam2010-04-2758-4532/+0
|
* am 3d82ade7: Merge "Have certimport.sh list certificates in BKS keystore ↵Brian Carlstrom2010-04-021-0/+9
|\ | | | | | | | | | | | | | | | | after importing for verification/debugging" Merge commit '3d82ade7a9b764695bad89d2476a73441118411b' into dalvik-dev * commit '3d82ade7a9b764695bad89d2476a73441118411b': Have certimport.sh list certificates in BKS keystore after importing for verification/debugging
| * Have certimport.sh list certificates in BKS keystore after importing for ↵Brian Carlstrom2010-03-311-0/+9
| | | | | | | | | | | | verification/debugging Change-Id: Ic336f10d96bbf93b1dc5cfd8b64a4c9eaa4f3a68
* | Add some certimport.sh documentionBrian Carlstrom2010-03-161-0/+33
|/ | | | | | | | | hku had some questions about the meaning of the filenames in cacerts. ngm responded so I captured the knowledge in the certimport.sh for future reference so we can continue to follow the convention. Change-Id: I79b4ed333e541f09d60143f785e5b10d3f5e60f4
* Fix certimport.sh to check for Bouncy Castle provider installation (and add ↵Brian Carlstrom2010-03-091-4/+32
| | | | | | | | | | | | | | | | | | | 1.6 JDK to PATH) Now if certimport.sh is run on a machine without the BouncyCastleProvider installed, it will suggest how to apt-get install the proper package. At enh's suggestion, I tried running with out own local Bouncy Castle classes to see what would happen, but the code ended up depending on our NativeCrypto JNI code and there that isn't proper JNI code to be loading into a RI JDK. Also at enh's suggestion, we now prepend a JDK 1.6 bin directory to the path for correctly correct default behavior. I do make sure it exists and warn if it does not. Change-Id: Ic936a6cc69fa3795e917c052ed79d19b2e66b5a1
* Add two TrustCenter roots:Nagendra Modadugu2010-02-043-0/+171
| | | | | - TC TrustCenter Class 2 CA II - TC TrustCenter Universal CA I
* Remove StartCom MD5 root which is no longer in use:Nagendra Modadugu2010-01-212-90/+0
| | | | - Free SSL Certification Authority
* Remove expired root CAs:Nagendra Modadugu2010-01-203-99/+0
| | | | | - IPS SERVIDORES/emailAddress=ips@mail.ips.es - Secure Server Certification Authority
* Add StartCom CA certificates:Nagendra Modadugu2010-01-203-0/+277
| | | | | - StartCom Certification Authority - StartCom Extended Validation Server CA
* Add two Verisign Root CA certificates:Nagendra Modadugu2010-01-203-0/+200
| | | | | - VeriSign Class 3 Extended Validation SSL SGC CA - VeriSign Class 3 Public Primary Certification Authority - G5
* Remove 'GTE CyberTrust Root', which expired on 2/23/06.Nagendra Modadugu2009-11-052-47/+0
|
* Update GlobalSign Root CA to one that expires in 2028.Nagendra Modadugu2009-09-032-32/+31
|
* Add Entrust root and intermediate certs.Nagendra Modadugu2009-09-015-0/+290
|
* Adding:Nagendra Modadugu2009-06-154-0/+365
| | | | | | QuoVadis Root Certification Authority QuoVadis Root CA 2 QuoVadis Root CA 3
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-0350-0/+3396
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-0350-3396/+0
|
* Code drop from //branches/cupcake/...@124589The Android Open Source Project2008-12-175-3/+251
|
* Initial ContributionThe Android Open Source Project2008-10-2147-0/+3148