/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CollectionCertStoreParametersTest.java | 87 Vector certificates = new Vector(); local 88 certificates.add(new MyCertificate("TEST", new byte[] { })); 89 new CollectionCertStoreParameters(certificates); 103 Vector certificates = new Vector(); local 104 certificates.add(new String("Not a Certificate")); 105 new CollectionCertStoreParameters(certificates); 112 * This allows the caller to subsequently add or remove Certificates or 113 * CRLs from the Collection, thus changing the set of Certificates or CRLs 118 Vector certificates = new Vector(); local 121 new CollectionCertStoreParameters(certificates); 152 Vector certificates = new Vector(); local 168 Vector certificates = new Vector(); local 211 Vector certificates = new Vector(); local 233 Vector certificates = new Vector(); local [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
MyCertPath.java | 37 * my certificates list 39 private final Vector certificates; field in class:MyCertPath 58 certificates = new Vector(); 59 certificates.add(new MyCertificate("MyEncoding", encoding)); 65 * @return certificates list 69 return Collections.unmodifiableList(certificates);
|
MyCertificateFactorySpi.java | 120 public CertPath engineGenerateCertPath(List certificates) 122 if (certificates == null) { 124 throw new NullPointerException("certificates is null");
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/ |
binary_integrity_incident_handlers_unittest.cc | 28 const unsigned char certificates[][5] = { local 32 for (size_t i = 0; i < arraysize(certificates); ++i) { 35 element->set_certificate(certificates[i], arraysize(certificates[i]));
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer.h | 30 // Import |certificates|, which must be a list of ONC Certificate objects. 31 // Certificates are only imported with web trust for user imports. If the 35 // equal to true if all certificates were imported successfully. 36 // |onc_trusted_certificates| will contain the list of certificates that 39 virtual void ImportCertificates(const base::ListValue& certificates,
|
onc_certificate_importer_impl.h | 37 // imports) into a certificate store. The GUID of Client certificates is stored 39 // certificates are identified by their PEM and not by GUID. 41 // certificates. http://crbug.com/252119 51 virtual void ImportCertificates(const base::ListValue& certificates, 64 base::ListValue* certificates, 67 // Lists the certificates that have the string |label| as their certificate 105 // The certificate database to which certificates are imported.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
PKIXCertPath.java | 44 * CertPath implementation for X.509 certificates. 63 private List certificates; field in class:PKIXCertPath 149 // make sure all certificates are accounted for. 158 PKIXCertPath(List certificates) 161 this.certificates = sortCerts(new ArrayList(certificates)); 186 certificates = new ArrayList(); 192 certificates.add(0, certFactory.generateCertificate( 199 certificates = new ArrayList(); 204 certificates.add(cert) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.h | 57 const net::CertificateList& certificates, 64 const net::CertificateList& certificates,
|
nsNSSCertificateDB.cpp | 63 const net::CertificateList& certificates, 67 if (!slot || certificates.empty() || !root) 106 // Import additional delivered certificates that can be verified. 112 for (size_t i = 0; i < certificates.size(); i++) { 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 173 const net::CertificateList& certificates, 176 if (!slot || certificates.empty()) 179 for (size_t i = 0; i < certificates.size(); ++i) { 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 201 SetCertTrust(certificates[0].get(), net::SERVER_CERT, trustBits) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
SignedData.java | 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL, 39 * IF ((certificates is present) AND 40 * (any certificates with a type of other are present)) OR 45 * IF (certificates is present) AND 46 * (any version 2 attribute certificates are present) 49 * IF ((certificates is present) AND 50 * (any version 1 attribute certificates are present)) OR 70 private ASN1Set certificates; field in class:SignedData 107 ASN1Set certificates, 111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
pkcs7.c | 29 certificates; local 72 if (!CBS_get_asn1(&signed_data, &certificates, 79 while (CBS_len(&certificates) > 0) { 84 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { 121 content_info, certificates; local 136 !CBB_add_asn1(&seq, &certificates, 147 !CBB_add_space(&certificates, &buf, len) ||
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 46 assertEquals("Missing CA certificates", Collections.EMPTY_SET, expectedCertificates); 56 * adding new certificates should be done sparingly and as a last resort -- never as a first 102 assertEquals("Unknown CA certificates", Collections.EMPTY_SET, deviceCertificates); 111 assertEquals("Blocked CA certificates", Collections.EMPTY_SET, deviceCertificates); 122 Set<String> certificates = new HashSet<String>(); local 130 certificates.add(fingerprint); 132 return certificates; 138 Set<String> certificates = new HashSet<String>(); local 147 certificates.add(getFingerprint(certificate)); 156 return certificates; [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
generate-test-certs.sh | 8 # certificates that can be used to test fetching of an intermediate via AIA. 55 # Generate the leaf certificates 96 > ../certificates/ok_cert.pem" 98 > ../certificates/expired_cert.pem" 100 > ../certificates/root_ca_cert.pem" 102 > ../certificates/name_constraint_bad.pem" 104 > ../certificates/name_constraint_good.pem" 116 -out ../certificates/spdy_pooling.pem 121 -out ../certificates/subjectAltName_sanity_check.pem 127 -out ../certificates/punycodetest.pe [all...] |
generate-client-certificates.sh | 7 # This script generates certificates that can be used to test SSL client 9 # net/data/ssl/certificates, but may be re-generated for manual testing. 11 # This script generates two chains of test client certificates: 17 # certificates share the same root, but are issued by different 164 try cp out/A.pem ../certificates/client_1.pem 165 try cp out/A.key ../certificates/client_1.key 166 try cp out/A.pk8 ../certificates/client_1.pk8 167 try cp out/B.pem ../certificates/client_1_ca.pem 169 try cp out/D.pem ../certificates/client_2.pem 170 try cp out/D.key ../certificates/client_2.ke [all...] |
generate-duplicate-cn-certs.sh | 7 # This script generates two chains of test certificates: 15 # nicknames for both certificates. 89 echo Exporting the certificates to PKCS#12 94 -out ../certificates/duplicate_cn_1.p12 \ 101 -out ../certificates/duplicate_cn_2.p12 \ 104 try cp out/A1.pem ../certificates/duplicate_cn_1.pem 105 try cp out/A2.pem ../certificates/duplicate_cn_2.pem
|
generate-cross-signed-certs.sh | 74 # Generate the leaf certificates 86 -out ../certificates/cross-signed-root-md5.pem 89 -out ../certificates/cross-signed-root-sha1.pem 92 -out ../certificates/cross-signed-leaf.pem
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater.cc | 87 base::ListValue certificates; local 93 &certificates); 95 ImportCertificates(certificates);
|
/external/chromium_org/net/cert/ |
nss_cert_database.cc | 209 const CertificateList& certificates) const { 210 DCHECK_GT(certificates.size(), 0U); 212 if (certificates.size() == 1) 213 return certificates[0].get(); 215 X509Certificate* cert0 = certificates[0].get(); 216 X509Certificate* cert1 = certificates[1].get(); 217 X509Certificate* certn_2 = certificates[certificates.size() - 2].get(); 218 X509Certificate* certn_1 = certificates[certificates.size() - 1].get() [all...] |
/external/chromium_org/chrome/browser/ |
certificate_manager_model.h | 71 // Fill |map| with the certificates matching |filter_type|. 78 // Import private keys and certificates from PKCS #12 encoded 85 // Import CA certificates. 86 // Tries to import all the certificates given. The root will be trusted 87 // according to |trust_bits|. Any certificates that could not be imported 91 // |not_imported| should be checked for any certificates that were not 93 bool ImportCACerts(const net::CertificateList& certificates, 100 // Any certificates that could not be imported will be listed in 105 // |not_imported| should be checked for any certificates that were not 108 const net::CertificateList& certificates, [all...] |
certificate_manager_model.cc | 170 const net::CertificateList& certificates, 173 bool result = cert_db_->ImportCACerts(certificates, trust_bits, not_imported); 174 if (result && not_imported->size() != certificates.size()) 180 const net::CertificateList& certificates, 183 bool result = cert_db_->ImportServerCert(certificates, trust_bits, 185 if (result && not_imported->size() != certificates.size())
|
/external/apache-harmony/security/src/test/api/java.injected/java/security/ |
IdentityTest.java | 121 assertSame(c1, i.certificates()[0]); 139 assertSame(c1, i.certificates()[0]); 166 // assertSame(c1, i.certificates()[0]); 168 // assertEquals(0, i.certificates().length); 184 * verify certificates() returns a copy of all certificates for this identity 193 Certificate[] s = i.certificates(); 200 s = i.certificates(); 289 * verify Identity.setPublicKey() removes old key and all identity's certificates 298 assertEquals(2, i.certificates().length) [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
SSLParametersImpl.java | 344 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates) 346 byte[][] principalBytes = new byte[certificates.length][]; 347 for (int i = 0; i < certificates.length; i++) { 348 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded(); 362 OpenSSLX509Certificate[] certificates = new OpenSSLX509Certificate[certificateRefs.length]; local 364 certificates[i] = new OpenSSLX509Certificate(certificateRefs[i]); 366 return certificates; 416 X509Certificate[] certificates = keyManager.getCertificateChain(alias); local 417 if (certificates == null) { 427 OpenSSLX509Certificate[] openSslCerts = new OpenSSLX509Certificate[certificates.length] [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 190 ASN1Set certificates = null; local 194 certificates = CMSUtils.createBerSetFromList(certs); 209 certificates,
|