/external/chromium_org/net/cert/ |
nss_cert_database.h | 42 // Called with |cert| == NULL after importing a list of certificates 50 // Called with |cert| == NULL after importing a list of certificates 104 // certificates and trust records) in |public_slot|, and private information 116 // Get a list of unique certificates in the certificate database (one 117 // instance of all certificates). 121 // Asynchronously get a list of unique certificates in the certificate 122 // database (one instance of all certificates). Note that the callback may be 126 // Get a list of certificates in the certificate database of the given slot. 168 // Import certificates and private keys from PKCS #12 blob into the module. 180 // Export the given certificates and private keys into a PKCS #12 blob [all...] |
x509_certificate.cc | 43 // The PEM block header used for DER certificates 83 // A single entry in the cache. Certificates will be keyed by their SHA1 139 // Two certificates don't match, due to a SHA1 hash collision. Given 350 // certificates in a chain; in practice, more than a dozen or so is 397 OSCertHandles certificates; local 420 // also be DER encoded certificates wrapped inside of PEM blocks. 422 certificates.push_back(handle); 430 for (size_t i = 0; certificates.empty() && 433 certificates = CreateOSCertHandlesFromBytes(decoded.c_str(), 440 // PEM-encoded DER certificates. The case of FORMAT_PEM_CERT_SEQUENC [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
generate-aia-certs.sh | 8 # certificates that can be used to test fetching of an intermediate via AIA. 95 try cp out/aia-test-cert.pem ../certificates/aia-cert.pem 99 -out ../certificates/aia-intermediate.der 100 try cp out/aia-test-root.pem ../certificates/aia-root.pem
|
generate-bad-eku-certs.sh | 82 try cp "out/$eku_test_root.pem" ../certificates/eku-test-root.pem 84 > ../certificates/crit-codeSigning-chain.pem" 86 > ../certificates/non-crit-codeSigning-chain.pem"
|
generate-redundant-test-chains.sh | 7 # This script generates two chains of test certificates: 140 > ../certificates/redundant-server-chain.pem" 144 > ../certificates/redundant-validated-chain.pem" 147 try cp out/C2.pem ../certificates/redundant-validated-chain-root.pem
|
generate-weak-test-chains.sh | 8 # certificates with (weak, strong), (RSA, DSA, ECDSA) key pairs. 172 try cp out/*root*pem out/*intermediate*pem ../certificates
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl.cc | 59 const base::ListValue& certificates, 62 VLOG(2) << "ONC file has " << certificates.GetSize() << " certificates"; 77 // This is the actual function that imports the certificates. 82 base::Owned(certificates.DeepCopy()), 93 base::ListValue* certificates, 95 // Web trust is only granted to certificates imported by the user. 99 for (size_t i = 0; i < certificates->GetSize(); ++i) { 101 certificates->GetDictionary(i, &certificate); 379 LOG(WARNING) << "PKCS12 data contains no importable certificates." [all...] |
onc_certificate_importer_impl_unittest.cc | 104 base::ListValue* certificates = NULL; local 107 certificates_value.release()->GetAsList(&certificates); 108 onc_certificates_.reset(certificates); 113 *certificates, 149 // Certificates and the NSSCertDatabase depend on these test DBs. Destroy them
|
onc_utils.h | 33 // A valid but empty (no networks and no certificates) and unencrypted 95 // |global_network_config| and |certificates| and fills them with the validated 96 // NetworkConfigurations, GlobalNetworkConfiguration and Certificates of 106 base::ListValue* certificates);
|
onc_utils.cc | 41 "\"Certificates\":[]}"; 291 // The PEM block header used for DER certificates 294 // This is an older PEM marker for DER certificates. 318 const base::ListValue& certificates) { 320 for (base::ListValue::const_iterator it = certificates.begin(); 321 it != certificates.end(); ++it) { 356 base::ListValue* certificates) { 359 certificates->Clear(); 420 certificates->Swap(validated_certs); 427 GetServerAndCACertsByGUID(*certificates); [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
CaCertManagementTest.java | 69 private static boolean containsCertificate(List<byte[]> certificates, byte [] toMatch) 72 for (byte[] certBuffer : certificates) {
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLX509CertificateFactory.java | 60 * The code for X509 Certificates and CRL is pretty much the same. We use 168 * It wasn't, so just try to keep grabbing certificates until we 327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) 329 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size()); 330 for (int i = 0; i < certificates.size(); i++) { 331 final Certificate c = certificates.get(i);
|
OpenSSLX509CertPath.java | 81 protected OpenSSLX509CertPath(List<? extends X509Certificate> certificates) { 84 mCertificates = certificates;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 53 * Certificates and CRLs. 102 * Base64 encoded PkiPath object containing 2 X.509 certificates. 208 * The public key to verify generated Certificates and CRLs. 466 * Generates Certificates on the base of consequent 490 { -2, pem_pkcs, pem_x509 }, // 2 Certificates are expected 565 * Generates CRLs/Certificates on the base of PEM PKCS7 encoding. 640 List certificates; local 645 certificates = factory.generateCertPath(bais).getCertificates(); 647 2, certificates.size()); 651 for (Iterator it = certificates.iterator(); it.hasNext(); ) [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
JavaApiConverter.java | 192 List<Certificate> certificates = handshake.localCertificates(); 193 return certificates.size() > 0 ? certificates : null; 200 List<Certificate> certificates = handshake.peerCertificates(); 201 return certificates.size() > 0 ? certificates : null;
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
googlecorpindividualattest.js | 12 * individual certificates for corp accounts.
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 63 Certificate[] certificates = session.getPeerCertificates(); local 64 return verify(host, (X509Certificate) certificates[0]);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedData.java | 476 * @param certificates the new certificates to be used. 477 * @param attrCerts the new attribute certificates to be used. 484 Store certificates, 500 if (certificates != null || attrCerts != null) 504 if (certificates != null) 506 certs.addAll(CMSUtils.getCertificatesFromStore(certificates));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
CertificateFactory.java | 29 * class for dealing with X509 certificates. 32 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7 225 * Returns a (possibly empty) collection view of the certificates 354 List certificates) 357 Iterator iter = certificates.iterator(); 370 return new PKIXCertPath(certificates);
|
/external/chromium_org/chrome/browser/ui/ash/ |
session_state_delegate_chromeos_unittest.cc | 186 // Make sure MultiProfile disabled by primary user policy certificates. 202 // Make sure MultiProfile disabled by primary user certificates in memory. 220 net::CertificateList certificates; local 221 certificates.push_back(new net::X509Certificate( 223 service->OnTrustAnchorsChanged(certificates);
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
HttpResponseCache.java | 437 * is the length of the peer certificate chain. These certificates are 440 * certificates are also base64-encoded and appear each on their own 537 private void writeCertArray(Writer writer, List<Certificate> certificates) throws IOException { 539 writer.write(Integer.toString(certificates.size()) + '\n'); 540 for (int i = 0, size = certificates.size(); i < size; i++) { 541 byte[] bytes = certificates.get(i).getEncoded();
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
Identity2Test.java | 213 * @tests java.security.Identity#certificates() 224 java.security.Certificate[] certs = sub.certificates(); 256 java.security.Certificate[] certs = sub.certificates();
|
/external/chromium_org/chrome/browser/resources/chromeos/ |
certificate_manager_dialog.js | 56 PageManager.showPageByName('certificates', false);
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
multi_profile_user_controller_unittest.cc | 404 // Verifies that if a user is signed-in and has policy certificates installed 428 net::CertificateList certificates; local 429 certificates.push_back(new net::X509Certificate( 431 service->OnTrustAnchorsChanged(certificates);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater_unittest.cc | 111 void SetExpectedONCCertificates(const base::ListValue& certificates) { 112 expected_onc_certificates_.reset(certificates.DeepCopy()); 125 virtual void ImportCertificates(const base::ListValue& certificates, 132 expected_onc_certificates_.get(), &certificates)); 160 " \"Certificates\": [" 400 // Certificates with the "Web" trust flag set should not be forwarded to 439 // Certificates with the "Web" trust flag set will be returned. 491 // Certificates with the "Web" trust flag set will be returned and forwarded
|