/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 60 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 62 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey 152 serverConfig.Certificates = make([]Certificate, 1) 153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 154 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey 161 serverConfig.Certificates = testConfig.Certificates [all...] |
common.go | 347 // Certificates contains one or more certificate chains to present to 350 // client-authentication may set either Certificates or 352 Certificates []Certificate 355 // Certificates. Note that a certificate name can be of the form 358 // The nil value causes the first element of Certificates to be used 364 // information or if Certificates is empty. 368 // first element of Certificates will be used. 372 // certificate from a client. If set, the contents of Certificates will 408 // receives the raw ASN.1 certificates provided by the peer and also 419 // that clients use when verifying server certificates [all...] |
conn_test.go | 67 Certificates: []Certificate{ 86 for i := range config.Certificates { 87 if c == &config.Certificates[i] {
|
handshake_client_test.go | 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 666 Certificates: testConfig.Certificates, 693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains) 734 Certificates: testConfig.Certificates, [all...] |
tls.go | 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) { 76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config") 175 // may contain intermediate certificates following the leaf certificate to
|
handshake_client.go | 199 // Otherwise, in a full handshake, if we don't have any certificates 202 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) { 267 if !ok || len(certMsg.certificates) == 0 { 275 // (optionally) verify the server's certificates. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 277 for i, asn1Data := range certMsg.certificates { 308 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil { 330 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) { 405 certMsg.certificates = chainToSend.Certificate 737 for i, chain := range c.config.Certificates { [all...] |
handshake_server.go | 325 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 353 if len(hs.sessionState.certificates) > 0 { 354 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 377 // certificates won't be used. 387 certMsg.certificates = hs.cert.Certificate 469 if len(certMsg.certificates) == 0 { 478 pub, err = hs.processCertsFromClient(certMsg.certificates) 672 certificates: hs.certsFromClient, 707 // processCertsFromClient takes a chain of client certificates either from a 708 // Certificates message or from a sessionState and verifies them. It return [all...] |
tls_test.go | 127 t.Fatalf("X509KeyPair didn't return an error when both arguments were certificates") 130 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were certificates, but the error was %q", subStr, err) 593 case "Certificates":
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 53 Certificates: make([]Certificate, 2), 59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 60 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey 61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 62 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey 152 serverConfig.Certificates = make([]Certificate, 1) 153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 154 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey 161 serverConfig.Certificates = testConfig.Certificates [all...] |
common.go | 347 // Certificates contains one or more certificate chains to present to 350 // client-authentication may set either Certificates or 352 Certificates []Certificate 355 // Certificates. Note that a certificate name can be of the form 358 // The nil value causes the first element of Certificates to be used 364 // information or if Certificates is empty. 368 // first element of Certificates will be used. 372 // certificate from a client. If set, the contents of Certificates will 408 // receives the raw ASN.1 certificates provided by the peer and also 419 // that clients use when verifying server certificates [all...] |
conn_test.go | 67 Certificates: []Certificate{ 86 for i := range config.Certificates { 87 if c == &config.Certificates[i] {
|
handshake_client_test.go | 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 666 Certificates: testConfig.Certificates, 693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains) 734 Certificates: testConfig.Certificates, [all...] |
tls.go | 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) { 76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config") 175 // may contain intermediate certificates following the leaf certificate to
|
handshake_client.go | 199 // Otherwise, in a full handshake, if we don't have any certificates 202 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) { 267 if !ok || len(certMsg.certificates) == 0 { 275 // (optionally) verify the server's certificates. 276 certs := make([]*x509.Certificate, len(certMsg.certificates)) 277 for i, asn1Data := range certMsg.certificates { 308 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil { 330 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) { 405 certMsg.certificates = chainToSend.Certificate 737 for i, chain := range c.config.Certificates { [all...] |
handshake_server.go | 325 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 353 if len(hs.sessionState.certificates) > 0 { 354 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 377 // certificates won't be used. 387 certMsg.certificates = hs.cert.Certificate 469 if len(certMsg.certificates) == 0 { 478 pub, err = hs.processCertsFromClient(certMsg.certificates) 672 certificates: hs.certsFromClient, 707 // processCertsFromClient takes a chain of client certificates either from a 708 // Certificates message or from a sessionState and verifies them. It return [all...] |
tls_test.go | 127 t.Fatalf("X509KeyPair didn't return an error when both arguments were certificates") 130 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were certificates, but the error was %q", subStr, err) 593 case "Certificates":
|
/external/boringssl/src/ssl/test/runner/ |
runner.go | 479 if len(config.Certificates) == 0 { 480 config.Certificates = []Certificate{rsaCertificate} 637 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertificate.Certificate)) [all...] |
common.go | 300 // Certificates contains one or more certificate chains 303 Certificates []Certificate 306 // Certificates. Note that a certificate name can be of the form 309 // The nil value causes the first element of Certificates to be used 314 // that clients use when verifying server certificates. 322 // certificates unless InsecureSkipVerify is given. It is also included [all...] |
tls.go | 74 if config == nil || len(config.Certificates) == 0 { 75 return nil, errors.New("tls.Listen: no certificates in configuration")
|
handshake_server.go | 826 certMsg.certificates = append(certMsg.certificates, cert) 861 // Pick up certificates from the session instead. 862 if len(hs.sessionState.certificates) > 0 { 863 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 927 if len(certMsg.certificates) == 0 { 937 for _, cert := range certMsg.certificates { 940 // client certificates. [all...] |
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
server.go | 124 if len(s.TLS.Certificates) == 0 { 125 s.TLS.Certificates = []tls.Certificate{cert}
|
/prebuilts/go/linux-x86/src/net/http/httptest/ |
server.go | 124 if len(s.TLS.Certificates) == 0 { 125 s.TLS.Certificates = []tls.Certificate{cert}
|
/external/pdfium/xfa/fxfa/parser/ |
xfa_basic_data_element_properties.cpp | 158 {XFA_Element::Certificates, 1, 0},
|
/external/pdfium/xfa/fxfa/ |
fxfa_basic.h | 697 Certificates,
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp_test.go | 694 config := &tls.Config{Certificates: []tls.Certificate{keypair}}
|