HomeSort by relevance Sort by last modified time
    Searched refs:certificates (Results 26 - 50 of 70) sorted by null

12 3

  /external/chromium_org/net/cert/
nss_cert_database.h 42 // Called with |cert| == NULL after importing a list of certificates
50 // Called with |cert| == NULL after importing a list of certificates
104 // certificates and trust records) in |public_slot|, and private information
116 // Get a list of unique certificates in the certificate database (one
117 // instance of all certificates).
121 // Asynchronously get a list of unique certificates in the certificate
122 // database (one instance of all certificates). Note that the callback may be
126 // Get a list of certificates in the certificate database of the given slot.
168 // Import certificates and private keys from PKCS #12 blob into the module.
180 // Export the given certificates and private keys into a PKCS #12 blob
    [all...]
x509_certificate.cc 43 // The PEM block header used for DER certificates
83 // A single entry in the cache. Certificates will be keyed by their SHA1
139 // Two certificates don't match, due to a SHA1 hash collision. Given
350 // certificates in a chain; in practice, more than a dozen or so is
397 OSCertHandles certificates; local
420 // also be DER encoded certificates wrapped inside of PEM blocks.
422 certificates.push_back(handle);
430 for (size_t i = 0; certificates.empty() &&
433 certificates = CreateOSCertHandlesFromBytes(decoded.c_str(),
440 // PEM-encoded DER certificates. The case of FORMAT_PEM_CERT_SEQUENC
    [all...]
  /external/chromium_org/net/data/ssl/scripts/
generate-aia-certs.sh 8 # certificates that can be used to test fetching of an intermediate via AIA.
95 try cp out/aia-test-cert.pem ../certificates/aia-cert.pem
99 -out ../certificates/aia-intermediate.der
100 try cp out/aia-test-root.pem ../certificates/aia-root.pem
generate-bad-eku-certs.sh 82 try cp "out/$eku_test_root.pem" ../certificates/eku-test-root.pem
84 > ../certificates/crit-codeSigning-chain.pem"
86 > ../certificates/non-crit-codeSigning-chain.pem"
generate-redundant-test-chains.sh 7 # This script generates two chains of test certificates:
140 > ../certificates/redundant-server-chain.pem"
144 > ../certificates/redundant-validated-chain.pem"
147 try cp out/C2.pem ../certificates/redundant-validated-chain-root.pem
generate-weak-test-chains.sh 8 # certificates with (weak, strong), (RSA, DSA, ECDSA) key pairs.
172 try cp out/*root*pem out/*intermediate*pem ../certificates
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer_impl.cc 59 const base::ListValue& certificates,
62 VLOG(2) << "ONC file has " << certificates.GetSize() << " certificates";
77 // This is the actual function that imports the certificates.
82 base::Owned(certificates.DeepCopy()),
93 base::ListValue* certificates,
95 // Web trust is only granted to certificates imported by the user.
99 for (size_t i = 0; i < certificates->GetSize(); ++i) {
101 certificates->GetDictionary(i, &certificate);
379 LOG(WARNING) << "PKCS12 data contains no importable certificates."
    [all...]
onc_certificate_importer_impl_unittest.cc 104 base::ListValue* certificates = NULL; local
107 certificates_value.release()->GetAsList(&certificates);
108 onc_certificates_.reset(certificates);
113 *certificates,
149 // Certificates and the NSSCertDatabase depend on these test DBs. Destroy them
onc_utils.h 33 // A valid but empty (no networks and no certificates) and unencrypted
95 // |global_network_config| and |certificates| and fills them with the validated
96 // NetworkConfigurations, GlobalNetworkConfiguration and Certificates of
106 base::ListValue* certificates);
onc_utils.cc 41 "\"Certificates\":[]}";
291 // The PEM block header used for DER certificates
294 // This is an older PEM marker for DER certificates.
318 const base::ListValue& certificates) {
320 for (base::ListValue::const_iterator it = certificates.begin();
321 it != certificates.end(); ++it) {
356 base::ListValue* certificates) {
359 certificates->Clear();
420 certificates->Swap(validated_certs);
427 GetServerAndCACertsByGUID(*certificates);
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
CaCertManagementTest.java 69 private static boolean containsCertificate(List<byte[]> certificates, byte [] toMatch)
72 for (byte[] certBuffer : certificates) {
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLX509CertificateFactory.java 60 * The code for X509 Certificates and CRL is pretty much the same. We use
168 * It wasn't, so just try to keep grabbing certificates until we
327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates)
329 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size());
330 for (int i = 0; i < certificates.size(); i++) {
331 final Certificate c = certificates.get(i);
OpenSSLX509CertPath.java 81 protected OpenSSLX509CertPath(List<? extends X509Certificate> certificates) {
84 mCertificates = certificates;
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory_ImplTest.java 53 * Certificates and CRLs.
102 * Base64 encoded PkiPath object containing 2 X.509 certificates.
208 * The public key to verify generated Certificates and CRLs.
466 * Generates Certificates on the base of consequent
490 { -2, pem_pkcs, pem_x509 }, // 2 Certificates are expected
565 * Generates CRLs/Certificates on the base of PEM PKCS7 encoding.
640 List certificates; local
645 certificates = factory.generateCertPath(bais).getCertificates();
647 2, certificates.size());
651 for (Iterator it = certificates.iterator(); it.hasNext(); )
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
JavaApiConverter.java 192 List<Certificate> certificates = handshake.localCertificates();
193 return certificates.size() > 0 ? certificates : null;
200 List<Certificate> certificates = handshake.peerCertificates();
201 return certificates.size() > 0 ? certificates : null;
  /external/chromium_org/chrome/browser/resources/cryptotoken/
googlecorpindividualattest.js 12 * individual certificates for corp accounts.
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
OkHostnameVerifier.java 63 Certificate[] certificates = session.getPeerCertificates(); local
64 return verify(host, (X509Certificate) certificates[0]);
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedData.java 476 * @param certificates the new certificates to be used.
477 * @param attrCerts the new attribute certificates to be used.
484 Store certificates,
500 if (certificates != null || attrCerts != null)
504 if (certificates != null)
506 certs.addAll(CMSUtils.getCertificatesFromStore(certificates));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
CertificateFactory.java 29 * class for dealing with X509 certificates.
32 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7
225 * Returns a (possibly empty) collection view of the certificates
354 List certificates)
357 Iterator iter = certificates.iterator();
370 return new PKIXCertPath(certificates);
  /external/chromium_org/chrome/browser/ui/ash/
session_state_delegate_chromeos_unittest.cc 186 // Make sure MultiProfile disabled by primary user policy certificates.
202 // Make sure MultiProfile disabled by primary user certificates in memory.
220 net::CertificateList certificates; local
221 certificates.push_back(new net::X509Certificate(
223 service->OnTrustAnchorsChanged(certificates);
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
HttpResponseCache.java 437 * is the length of the peer certificate chain. These certificates are
440 * certificates are also base64-encoded and appear each on their own
537 private void writeCertArray(Writer writer, List<Certificate> certificates) throws IOException {
539 writer.write(Integer.toString(certificates.size()) + '\n');
540 for (int i = 0, size = certificates.size(); i < size; i++) {
541 byte[] bytes = certificates.get(i).getEncoded();
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
Identity2Test.java 213 * @tests java.security.Identity#certificates()
224 java.security.Certificate[] certs = sub.certificates();
256 java.security.Certificate[] certs = sub.certificates();
  /external/chromium_org/chrome/browser/resources/chromeos/
certificate_manager_dialog.js 56 PageManager.showPageByName('certificates', false);
  /external/chromium_org/chrome/browser/chromeos/login/users/
multi_profile_user_controller_unittest.cc 404 // Verifies that if a user is signed-in and has policy certificates installed
428 net::CertificateList certificates; local
429 certificates.push_back(new net::X509Certificate(
431 service->OnTrustAnchorsChanged(certificates);
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_unittest.cc 111 void SetExpectedONCCertificates(const base::ListValue& certificates) {
112 expected_onc_certificates_.reset(certificates.DeepCopy());
125 virtual void ImportCertificates(const base::ListValue& certificates,
132 expected_onc_certificates_.get(), &certificates));
160 " \"Certificates\": ["
400 // Certificates with the "Web" trust flag set should not be forwarded to
439 // Certificates with the "Web" trust flag set will be returned.
491 // Certificates with the "Web" trust flag set will be returned and forwarded

Completed in 1996 milliseconds

12 3