/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CollectionCertStoreParametersTest.java | 87 Vector certificates = new Vector(); local 88 certificates.add(new MyCertificate("TEST", new byte[] {})); 89 new CollectionCertStoreParameters(certificates); 103 Vector certificates = new Vector(); local 104 certificates.add(new String("Not a Certificate")); 105 new CollectionCertStoreParameters(certificates); 112 * This allows the caller to subsequently add or remove Certificates or 113 * CRLs from the Collection, thus changing the set of Certificates or CRLs 118 Vector certificates = new Vector(); local 121 new CollectionCertStoreParameters(certificates); 152 Vector certificates = new Vector(); local 168 Vector certificates = new Vector(); local 211 Vector certificates = new Vector(); local 233 Vector certificates = new Vector(); local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CollectionCertStoreParametersTest.java | 76 Vector<Certificate> certificates = new Vector<Certificate>(); local 77 certificates.add(new MyCertificate("TEST", new byte[] {})); 78 new CollectionCertStoreParameters(certificates); 89 Vector<String> certificates = new Vector<String>(); local 90 certificates.add(new String("Not a Certificate")); 91 new CollectionCertStoreParameters(certificates); 99 Vector<Certificate> certificates = new Vector<Certificate>(); local 102 new CollectionCertStoreParameters(certificates); 104 assertTrue("isRefUsed_1", certificates == cp.getCollection()); 108 certificates.add(new MyCertificate("TEST", new byte[] {(byte)1})) 130 Vector<Certificate> certificates = new Vector<Certificate>(); local 144 Vector<Certificate> certificates = new Vector<Certificate>(); local 183 Vector<Certificate> certificates = new Vector<Certificate>(); local 203 Vector certificates = new Vector(); local [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 38 * my certificates list 40 private final Vector certificates; field in class:MyCertPath 59 certificates = new Vector(); 60 certificates.add(new MyCertificate("MyEncoding", encoding)); 66 * @return certificates list 70 return Collections.unmodifiableList(certificates);
|
/external/okhttp/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/libcore/luni/src/main/java/java/security/ |
Identity.java | 43 private Vector<Certificate> certificates; field in class:Identity 99 if (certificates == null) { 100 certificates = new Vector<Certificate>(); 102 certificates.add(certificate); 138 if (certificates != null) { 139 if (!certificates.contains(certificate)) { 142 certificates.removeElement(certificate); 150 * Returns the certificates for this {@code Identity}. External 154 * @return the {@code Certificates} for this {@code Identity} 156 public Certificate[] certificates() { method in class:Identity [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.h | 55 bool ImportCACerts(const net::CertificateList& certificates, 61 const net::CertificateList& certificates,
|
nsNSSCertificateDB.cpp | 64 bool ImportCACerts(const net::CertificateList& certificates, 68 if (certificates.empty() || !root) 113 // Import additional delivered certificates that can be verified. 119 for (size_t i = 0; i < certificates.size(); i++) { 120 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 179 const net::CertificateList& certificates, 182 if (certificates.empty()) 191 for (size_t i = 0; i < certificates.size(); ++i) { 192 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 213 SetCertTrust(certificates[0].get(), net::SERVER_CERT, trustBits) [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer.h | 25 // Import the |certificates|, which must be a list of ONC Certificate objects. 26 // Certificates are only imported with web trust for user imports. If 28 // of certificates that requested the TrustBit "Web". If the "Remove" field of 30 // instead of importing. Returns true if all certificates were imported 33 const base::ListValue& certificates,
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 41 * my certificates list 43 private final Vector<MyCertificate> certificates; field in class:MyCertPath 61 certificates = new Vector<MyCertificate>(); 62 certificates.add(new MyCertificate("MyEncoding", encoding)); 68 * @return certificates list 72 return Collections.unmodifiableList(certificates);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 44 * CertPath implementation for X.509 certificates. 63 private List certificates; field in class:PKIXCertPath 149 // make sure all certificates are accounted for. 158 PKIXCertPath(List certificates) 161 this.certificates = sortCerts(new ArrayList(certificates)); 186 certificates = new ArrayList(); 192 certificates.add(0, certFactory.generateCertificate( 199 certificates = new ArrayList(); 204 certificates.add(cert) [all...] |
/external/chromium/net/base/ |
cert_database_nss.cc | 177 const CertificateList& certificates) const { 178 DCHECK_GT(certificates.size(), 0U); 180 if (certificates.size() == 1) 181 return certificates[0].get(); 183 X509Certificate* cert0 = certificates[0]; 184 X509Certificate* cert1 = certificates[1]; 185 X509Certificate* certn_2 = certificates[certificates.size() - 2]; 186 X509Certificate* certn_1 = certificates[certificates.size() - 1] [all...] |
cert_database.h | 98 // Get a list of unique certificates in the certificate database. (One 99 // instance of all certificates.) 114 // Import certificates and private keys from PKCS #12 blob into the module. 121 // Export the given certificates and private keys into a PKCS #12 blob, 123 // Returns the number of certificates successfully exported. 131 X509Certificate* FindRootInList(const CertificateList& certificates) const; 133 // Import CA certificates. 134 // Tries to import all the certificates given. The root will be trusted 135 // according to |trust_bits|. Any certificates that could not be imported 138 // |not_imported| should be checked for any certificates that were no [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/libcore/luni/src/main/java/org/apache/harmony/security/pkcs7/ |
SignedData.java | 44 * certificates 54 private final List<Certificate> certificates; field in class:SignedData 59 List<Certificate> certificates, List<CertificateList> crls, 64 this.certificates = certificates; 70 return certificates; 95 if (certificates != null) { 96 res.append(certificates.toString()); 117 setOptional(3); // certificates is optional 126 values[3] = sd.certificates; [all...] |
/external/chromium_org/net/cert/ |
nss_cert_database.cc | 142 const CertificateList& certificates) const { 143 DCHECK_GT(certificates.size(), 0U); 145 if (certificates.size() == 1) 146 return certificates[0].get(); 148 X509Certificate* cert0 = certificates[0].get(); 149 X509Certificate* cert1 = certificates[1].get(); 150 X509Certificate* certn_2 = certificates[certificates.size() - 2].get(); 151 X509Certificate* certn_1 = certificates[certificates.size() - 1].get() [all...] |
nss_cert_database.h | 35 // Called with |cert| == NULL after importing a list of certificates 43 // Called with |cert| == NULL after importing a list of certificates 93 // Get a list of unique certificates in the certificate database (one 94 // instance of all certificates). 109 // Import certificates and private keys from PKCS #12 blob into the module. 121 // Export the given certificates and private keys into a PKCS #12 blob, 123 // Returns the number of certificates successfully exported. 132 X509Certificate* FindRootInList(const CertificateList& certificates) const; 134 // Import CA certificates. 135 // Tries to import all the certificates given. The root will be truste [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignedData.java | 32 private ASN1Set certificates; field in class:SignedData 56 ASN1Set certificates, 60 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos); 63 this.certificates = certificates; 67 this.certsBer = certificates instanceof BERSet; 72 // IF ((certificates is present) AND 73 // (any certificates with a type of other are present)) OR 78 // IF (certificates is present) AND 79 // (any version 2 attribute certificates are present [all...] |
/external/chromium_org/chrome/browser/ |
certificate_manager_model.cc | 123 const net::CertificateList& certificates, 126 bool result = cert_db_->ImportCACerts(certificates, trust_bits, not_imported); 127 if (result && not_imported->size() != certificates.size()) 133 const net::CertificateList& certificates, 136 bool result = cert_db_->ImportServerCert(certificates, trust_bits, 138 if (result && not_imported->size() != certificates.size())
|
certificate_manager_model.h | 52 // Fill |map| with the certificates matching |filter_type|. 59 // Import private keys and certificates from PKCS #12 encoded 66 // Import CA certificates. 67 // Tries to import all the certificates given. The root will be trusted 68 // according to |trust_bits|. Any certificates that could not be imported 72 // |not_imported| should be checked for any certificates that were not 74 bool ImportCACerts(const net::CertificateList& certificates, 81 // Any certificates that could not be imported will be listed in 86 // |not_imported| should be checked for any certificates that were not 89 const net::CertificateList& certificates, [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
HostnameVerifierBenchmark.java | 34 * captures the served certificates as a byte array. It then verifies each 73 final Certificate[] certificates = bytesToCertificates(encodedCertificates); local 76 return certificates; 83 private byte[][] certificatesToBytes(Certificate[] certificates) throws Exception { 84 byte[][] result = new byte[certificates.length][]; 85 for (int i = 0, certificatesLength = certificates.length; i < certificatesLength; i++) { 86 result[i] = certificates[i].getEncoded();
|
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 74 private final Hashtable<String, Certificate[]> certificates = new Hashtable<String, Certificate[]>( field in class:JarVerifier 93 private Certificate[] certificates; field in class:JarVerifier.VerifierEntry 96 Certificate[] certificates) { 100 this.certificates = certificates; 135 verifiedEntries.put(name, certificates); 162 * which contains the certificates used to sign the entry and its hash value 193 certs.addAll(getSignerCertificates(signatureFile, certificates)); 304 certificates.put(signatureFile, signerCertChain); 382 return certificates.size() > 0 [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CertPathImpl.java | 55 * 1. It can be created over the list of X.509 certificates 68 * certificates presented in <code>certificates</code> field of the SignedData 112 /** The list of certificates in the order of target toward trust anchor. */ 113 private final List<X509Certificate> certificates; field in class:X509CertPathImpl 123 * certificates. 133 certificates = new ArrayList<X509Certificate>(size); 141 certificates.add((X509Certificate) cert); 154 certificates = certs; 277 return Collections.unmodifiableList(certificates); [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
generate-duplicate-cn-certs.sh | 7 # This script generates two chains of test certificates: 15 # nicknames for both certificates. 116 echo Exporting the certificates to PKCS#12 121 -out ../certificates/duplicate_cn_1.p12 \ 128 -out ../certificates/duplicate_cn_2.p12 \ 131 cp out/A1.pem ../certificates/duplicate_cn_1.pem 132 cp out/A2.pem ../certificates/duplicate_cn_2.pem
|
generate-cross-signed-certs.sh | 74 # Generate the leaf certificates 86 -out ../certificates/cross-signed-root-md5.pem 89 -out ../certificates/cross-signed-root-sha1.pem 92 -out ../certificates/cross-signed-leaf.pem
|
generate-test-certs.sh | 8 # certificates that can be used to test fetching of an intermediate via AIA. 55 # Generate the leaf certificates 76 > ../certificates/ok_cert.pem 78 > ../certificates/expired_cert.pem 80 > ../certificates/root_ca_cert.pem
|