HomeSort by relevance Sort by last modified time
    Searched refs:certificates (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CollectionCertStoreParametersTest.java 87 Vector certificates = new Vector(); local
88 certificates.add(new MyCertificate("TEST", new byte[] { }));
89 new CollectionCertStoreParameters(certificates);
103 Vector certificates = new Vector(); local
104 certificates.add(new String("Not a Certificate"));
105 new CollectionCertStoreParameters(certificates);
112 * This allows the caller to subsequently add or remove Certificates or
113 * CRLs from the Collection, thus changing the set of Certificates or CRLs
118 Vector certificates = new Vector(); local
121 new CollectionCertStoreParameters(certificates);
152 Vector certificates = new Vector(); local
168 Vector certificates = new Vector(); local
211 Vector certificates = new Vector(); local
233 Vector certificates = new Vector(); local
    [all...]
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
MyCertPath.java 37 * my certificates list
39 private final Vector certificates; field in class:MyCertPath
58 certificates = new Vector();
59 certificates.add(new MyCertificate("MyEncoding", encoding));
65 * @return certificates list
69 return Collections.unmodifiableList(certificates);
MyCertificateFactorySpi.java 120 public CertPath engineGenerateCertPath(List certificates)
122 if (certificates == null) {
124 throw new NullPointerException("certificates is null");
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
FakeSSLSession.java 27 private final Certificate[] certificates; field in class:FakeSSLSession
29 public FakeSSLSession(Certificate... certificates) throws Exception {
30 this.certificates = certificates;
66 if (certificates.length == 0) {
69 return certificates;
  /external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
binary_integrity_incident_handlers_unittest.cc 28 const unsigned char certificates[][5] = { local
32 for (size_t i = 0; i < arraysize(certificates); ++i) {
35 element->set_certificate(certificates[i], arraysize(certificates[i]));
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer.h 30 // Import |certificates|, which must be a list of ONC Certificate objects.
31 // Certificates are only imported with web trust for user imports. If the
35 // equal to true if all certificates were imported successfully.
36 // |onc_trusted_certificates| will contain the list of certificates that
39 virtual void ImportCertificates(const base::ListValue& certificates,
onc_certificate_importer_impl.h 37 // imports) into a certificate store. The GUID of Client certificates is stored
39 // certificates are identified by their PEM and not by GUID.
41 // certificates. http://crbug.com/252119
51 virtual void ImportCertificates(const base::ListValue& certificates,
64 base::ListValue* certificates,
67 // Lists the certificates that have the string |label| as their certificate
105 // The certificate database to which certificates are imported.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
PKIXCertPath.java 44 * CertPath implementation for X.509 certificates.
63 private List certificates; field in class:PKIXCertPath
149 // make sure all certificates are accounted for.
158 PKIXCertPath(List certificates)
161 this.certificates = sortCerts(new ArrayList(certificates));
186 certificates = new ArrayList();
192 certificates.add(0, certFactory.generateCertificate(
199 certificates = new ArrayList();
204 certificates.add(cert)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
SignedData.java 25 private ASN1Set certificates; field in class:SignedData
55 certificates = _certificates;
84 certificates = ASN1Set.getInstance(tagged, false);
117 return certificates;
137 * certificates
153 if (certificates != null)
155 v.add(new DERTaggedObject(false, 0, certificates));
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsNSSCertificateDB.h 57 const net::CertificateList& certificates,
64 const net::CertificateList& certificates,
nsNSSCertificateDB.cpp 63 const net::CertificateList& certificates,
67 if (!slot || certificates.empty() || !root)
106 // Import additional delivered certificates that can be verified.
112 for (size_t i = 0; i < certificates.size(); i++) {
113 const scoped_refptr<net::X509Certificate>& cert = certificates[i];
173 const net::CertificateList& certificates,
176 if (!slot || certificates.empty())
179 for (size_t i = 0; i < certificates.size(); ++i) {
180 const scoped_refptr<net::X509Certificate>& cert = certificates[i];
201 SetCertTrust(certificates[0].get(), net::SERVER_CERT, trustBits)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
SignedData.java 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL,
39 * IF ((certificates is present) AND
40 * (any certificates with a type of other are present)) OR
45 * IF (certificates is present) AND
46 * (any version 2 attribute certificates are present)
49 * IF ((certificates is present) AND
50 * (any version 1 attribute certificates are present)) OR
70 private ASN1Set certificates; field in class:SignedData
107 ASN1Set certificates,
111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos)
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
pkcs7.c 29 certificates; local
72 if (!CBS_get_asn1(&signed_data, &certificates,
79 while (CBS_len(&certificates) > 0) {
84 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) {
121 content_info, certificates; local
136 !CBB_add_asn1(&seq, &certificates,
147 !CBB_add_space(&certificates, &buf, len) ||
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 46 assertEquals("Missing CA certificates", Collections.EMPTY_SET, expectedCertificates);
56 * adding new certificates should be done sparingly and as a last resort -- never as a first
102 assertEquals("Unknown CA certificates", Collections.EMPTY_SET, deviceCertificates);
111 assertEquals("Blocked CA certificates", Collections.EMPTY_SET, deviceCertificates);
122 Set<String> certificates = new HashSet<String>(); local
130 certificates.add(fingerprint);
132 return certificates;
138 Set<String> certificates = new HashSet<String>(); local
147 certificates.add(getFingerprint(certificate));
156 return certificates;
    [all...]
  /external/chromium_org/net/data/ssl/scripts/
generate-test-certs.sh 8 # certificates that can be used to test fetching of an intermediate via AIA.
55 # Generate the leaf certificates
96 > ../certificates/ok_cert.pem"
98 > ../certificates/expired_cert.pem"
100 > ../certificates/root_ca_cert.pem"
102 > ../certificates/name_constraint_bad.pem"
104 > ../certificates/name_constraint_good.pem"
116 -out ../certificates/spdy_pooling.pem
121 -out ../certificates/subjectAltName_sanity_check.pem
127 -out ../certificates/punycodetest.pe
    [all...]
generate-client-certificates.sh 7 # This script generates certificates that can be used to test SSL client
9 # net/data/ssl/certificates, but may be re-generated for manual testing.
11 # This script generates two chains of test client certificates:
17 # certificates share the same root, but are issued by different
164 try cp out/A.pem ../certificates/client_1.pem
165 try cp out/A.key ../certificates/client_1.key
166 try cp out/A.pk8 ../certificates/client_1.pk8
167 try cp out/B.pem ../certificates/client_1_ca.pem
169 try cp out/D.pem ../certificates/client_2.pem
170 try cp out/D.key ../certificates/client_2.ke
    [all...]
generate-duplicate-cn-certs.sh 7 # This script generates two chains of test certificates:
15 # nicknames for both certificates.
89 echo Exporting the certificates to PKCS#12
94 -out ../certificates/duplicate_cn_1.p12 \
101 -out ../certificates/duplicate_cn_2.p12 \
104 try cp out/A1.pem ../certificates/duplicate_cn_1.pem
105 try cp out/A2.pem ../certificates/duplicate_cn_2.pem
generate-cross-signed-certs.sh 74 # Generate the leaf certificates
86 -out ../certificates/cross-signed-root-md5.pem
89 -out ../certificates/cross-signed-root-sha1.pem
92 -out ../certificates/cross-signed-leaf.pem
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater.cc 87 base::ListValue certificates; local
93 &certificates);
95 ImportCertificates(certificates);
  /external/chromium_org/net/cert/
nss_cert_database.cc 209 const CertificateList& certificates) const {
210 DCHECK_GT(certificates.size(), 0U);
212 if (certificates.size() == 1)
213 return certificates[0].get();
215 X509Certificate* cert0 = certificates[0].get();
216 X509Certificate* cert1 = certificates[1].get();
217 X509Certificate* certn_2 = certificates[certificates.size() - 2].get();
218 X509Certificate* certn_1 = certificates[certificates.size() - 1].get()
    [all...]
  /external/chromium_org/chrome/browser/
certificate_manager_model.h 71 // Fill |map| with the certificates matching |filter_type|.
78 // Import private keys and certificates from PKCS #12 encoded
85 // Import CA certificates.
86 // Tries to import all the certificates given. The root will be trusted
87 // according to |trust_bits|. Any certificates that could not be imported
91 // |not_imported| should be checked for any certificates that were not
93 bool ImportCACerts(const net::CertificateList& certificates,
100 // Any certificates that could not be imported will be listed in
105 // |not_imported| should be checked for any certificates that were not
108 const net::CertificateList& certificates,
    [all...]
certificate_manager_model.cc 170 const net::CertificateList& certificates,
173 bool result = cert_db_->ImportCACerts(certificates, trust_bits, not_imported);
174 if (result && not_imported->size() != certificates.size())
180 const net::CertificateList& certificates,
183 bool result = cert_db_->ImportServerCert(certificates, trust_bits,
185 if (result && not_imported->size() != certificates.size())
  /external/apache-harmony/security/src/test/api/java.injected/java/security/
IdentityTest.java 121 assertSame(c1, i.certificates()[0]);
139 assertSame(c1, i.certificates()[0]);
166 // assertSame(c1, i.certificates()[0]);
168 // assertEquals(0, i.certificates().length);
184 * verify certificates() returns a copy of all certificates for this identity
193 Certificate[] s = i.certificates();
200 s = i.certificates();
289 * verify Identity.setPublicKey() removes old key and all identity's certificates
298 assertEquals(2, i.certificates().length)
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
SSLParametersImpl.java 344 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates)
346 byte[][] principalBytes = new byte[certificates.length][];
347 for (int i = 0; i < certificates.length; i++) {
348 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded();
362 OpenSSLX509Certificate[] certificates = new OpenSSLX509Certificate[certificateRefs.length]; local
364 certificates[i] = new OpenSSLX509Certificate(certificateRefs[i]);
366 return certificates;
416 X509Certificate[] certificates = keyManager.getCertificateChain(alias); local
417 if (certificates == null) {
427 OpenSSLX509Certificate[] openSslCerts = new OpenSSLX509Certificate[certificates.length]
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedDataGenerator.java 190 ASN1Set certificates = null; local
194 certificates = CMSUtils.createBerSetFromList(certs);
209 certificates,

Completed in 830 milliseconds

1 2 3