HomeSort by relevance Sort by last modified time
    Searched refs:Certificates (Results 1 - 25 of 38) sorted by null

1 2

  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
60 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
62 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey
152 serverConfig.Certificates = make([]Certificate, 1)
153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
154 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
161 serverConfig.Certificates = testConfig.Certificates
    [all...]
common.go 347 // Certificates contains one or more certificate chains to present to
350 // client-authentication may set either Certificates or
352 Certificates []Certificate
355 // Certificates. Note that a certificate name can be of the form
358 // The nil value causes the first element of Certificates to be used
364 // information or if Certificates is empty.
368 // first element of Certificates will be used.
372 // certificate from a client. If set, the contents of Certificates will
408 // receives the raw ASN.1 certificates provided by the peer and also
419 // that clients use when verifying server certificates
    [all...]
conn_test.go 67 Certificates: []Certificate{
86 for i := range config.Certificates {
87 if c == &config.Certificates[i] {
handshake_client_test.go 604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
666 Certificates: testConfig.Certificates,
693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains)
734 Certificates: testConfig.Certificates,
    [all...]
tls.go 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) {
76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config")
175 // may contain intermediate certificates following the leaf certificate to
handshake_client.go 199 // Otherwise, in a full handshake, if we don't have any certificates
202 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
267 if !ok || len(certMsg.certificates) == 0 {
275 // (optionally) verify the server's certificates.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
277 for i, asn1Data := range certMsg.certificates {
308 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil {
330 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) {
405 certMsg.certificates = chainToSend.Certificate
737 for i, chain := range c.config.Certificates {
    [all...]
handshake_server.go 325 sessionHasClientCerts := len(hs.sessionState.certificates) != 0
353 if len(hs.sessionState.certificates) > 0 {
354 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
377 // certificates won't be used.
387 certMsg.certificates = hs.cert.Certificate
469 if len(certMsg.certificates) == 0 {
478 pub, err = hs.processCertsFromClient(certMsg.certificates)
672 certificates: hs.certsFromClient,
707 // processCertsFromClient takes a chain of client certificates either from a
708 // Certificates message or from a sessionState and verifies them. It return
    [all...]
tls_test.go 127 t.Fatalf("X509KeyPair didn't return an error when both arguments were certificates")
130 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were certificates, but the error was %q", subStr, err)
593 case "Certificates":
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server_test.go 53 Certificates: make([]Certificate, 2),
59 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
60 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey
61 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate}
62 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey
152 serverConfig.Certificates = make([]Certificate, 1)
153 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
154 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
161 serverConfig.Certificates = testConfig.Certificates
    [all...]
common.go 347 // Certificates contains one or more certificate chains to present to
350 // client-authentication may set either Certificates or
352 Certificates []Certificate
355 // Certificates. Note that a certificate name can be of the form
358 // The nil value causes the first element of Certificates to be used
364 // information or if Certificates is empty.
368 // first element of Certificates will be used.
372 // certificate from a client. If set, the contents of Certificates will
408 // receives the raw ASN.1 certificates provided by the peer and also
419 // that clients use when verifying server certificates
    [all...]
conn_test.go 67 Certificates: []Certificate{
86 for i := range config.Certificates {
87 if c == &config.Certificates[i] {
handshake_client_test.go 604 config.Certificates = []Certificate{cert}
640 config.Certificates = []Certificate{cert}
666 Certificates: testConfig.Certificates,
693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains)
734 Certificates: testConfig.Certificates,
    [all...]
tls.go 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) {
76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config")
175 // may contain intermediate certificates following the leaf certificate to
handshake_client.go 199 // Otherwise, in a full handshake, if we don't have any certificates
202 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
267 if !ok || len(certMsg.certificates) == 0 {
275 // (optionally) verify the server's certificates.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
277 for i, asn1Data := range certMsg.certificates {
308 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil {
330 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) {
405 certMsg.certificates = chainToSend.Certificate
737 for i, chain := range c.config.Certificates {
    [all...]
handshake_server.go 325 sessionHasClientCerts := len(hs.sessionState.certificates) != 0
353 if len(hs.sessionState.certificates) > 0 {
354 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
377 // certificates won't be used.
387 certMsg.certificates = hs.cert.Certificate
469 if len(certMsg.certificates) == 0 {
478 pub, err = hs.processCertsFromClient(certMsg.certificates)
672 certificates: hs.certsFromClient,
707 // processCertsFromClient takes a chain of client certificates either from a
708 // Certificates message or from a sessionState and verifies them. It return
    [all...]
tls_test.go 127 t.Fatalf("X509KeyPair didn't return an error when both arguments were certificates")
130 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were certificates, but the error was %q", subStr, err)
593 case "Certificates":
  /external/boringssl/src/ssl/test/runner/
runner.go 479 if len(config.Certificates) == 0 {
480 config.Certificates = []Certificate{rsaCertificate}
637 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertificate.Certificate))
    [all...]
common.go 300 // Certificates contains one or more certificate chains
303 Certificates []Certificate
306 // Certificates. Note that a certificate name can be of the form
309 // The nil value causes the first element of Certificates to be used
314 // that clients use when verifying server certificates.
322 // certificates unless InsecureSkipVerify is given. It is also included
    [all...]
tls.go 74 if config == nil || len(config.Certificates) == 0 {
75 return nil, errors.New("tls.Listen: no certificates in configuration")
handshake_server.go 826 certMsg.certificates = append(certMsg.certificates, cert)
861 // Pick up certificates from the session instead.
862 if len(hs.sessionState.certificates) > 0 {
863 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
927 if len(certMsg.certificates) == 0 {
937 for _, cert := range certMsg.certificates {
940 // client certificates.
    [all...]
  /prebuilts/go/darwin-x86/src/net/http/httptest/
server.go 124 if len(s.TLS.Certificates) == 0 {
125 s.TLS.Certificates = []tls.Certificate{cert}
  /prebuilts/go/linux-x86/src/net/http/httptest/
server.go 124 if len(s.TLS.Certificates) == 0 {
125 s.TLS.Certificates = []tls.Certificate{cert}
  /external/pdfium/xfa/fxfa/parser/
xfa_basic_data_element_properties.cpp 158 {XFA_Element::Certificates, 1, 0},
  /external/pdfium/xfa/fxfa/
fxfa_basic.h 697 Certificates,
  /prebuilts/go/darwin-x86/src/net/smtp/
smtp_test.go 694 config := &tls.Config{Certificates: []tls.Certificate{keypair}}

Completed in 539 milliseconds

1 2