/external/pdfium/xfa/fxfa/parser/ |
cxfa_certificates.cpp | 28 constexpr wchar_t kName[] = L"certificates"; 37 XFA_Element::Certificates,
|
cxfa_filter.cpp | 15 {XFA_Element::Mdp, 1, 0}, {XFA_Element::Certificates, 1, 0},
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 55 Certificates: make([]Certificate, 2), 61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 62 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey 63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 64 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey 158 serverConfig.Certificates = make([]Certificate, 1) 159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 160 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey 167 serverConfig.Certificates = testConfig.Certificates [all...] |
common.go | 342 // Certificates contains one or more certificate chains to present to 345 // client-authentication may set either Certificates or 347 Certificates []Certificate 350 // Certificates. Note that a certificate name can be of the form 353 // The nil value causes the first element of Certificates to be used 359 // information or if Certificates is empty. 363 // first element of Certificates will be used. 367 // certificate from a client. If set, the contents of Certificates will 403 // receives the raw ASN.1 certificates provided by the peer and also 415 // that clients use when verifying server certificates [all...] |
conn_test.go | 79 Certificates: []Certificate{ 98 for i := range config.Certificates { 99 if c == &config.Certificates[i] {
|
tls.go | 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) { 76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config") 175 // may contain intermediate certificates following the leaf certificate to
|
handshake_client_test.go | 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 666 Certificates: testConfig.Certificates, 693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains) 734 Certificates: testConfig.Certificates, [all...] |
handshake_client.go | 218 // Otherwise, in a full handshake, if we don't have any certificates 221 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) { 306 if !ok || len(certMsg.certificates) == 0 { 314 // (optionally) verify the server's certificates. 315 certs := make([]*x509.Certificate, len(certMsg.certificates)) 316 for i, asn1Data := range certMsg.certificates { 347 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil { 369 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) { 452 certMsg.certificates = chainToSend.Certificate 784 for i, chain := range c.config.Certificates { [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 55 Certificates: make([]Certificate, 2), 61 testConfig.Certificates[0].Certificate = [][]byte{testRSACertificate} 62 testConfig.Certificates[0].PrivateKey = testRSAPrivateKey 63 testConfig.Certificates[1].Certificate = [][]byte{testSNICertificate} 64 testConfig.Certificates[1].PrivateKey = testRSAPrivateKey 158 serverConfig.Certificates = make([]Certificate, 1) 159 serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate} 160 serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey 167 serverConfig.Certificates = testConfig.Certificates [all...] |
common.go | 342 // Certificates contains one or more certificate chains to present to 345 // client-authentication may set either Certificates or 347 Certificates []Certificate 350 // Certificates. Note that a certificate name can be of the form 353 // The nil value causes the first element of Certificates to be used 359 // information or if Certificates is empty. 363 // first element of Certificates will be used. 367 // certificate from a client. If set, the contents of Certificates will 403 // receives the raw ASN.1 certificates provided by the peer and also 415 // that clients use when verifying server certificates [all...] |
conn_test.go | 79 Certificates: []Certificate{ 98 for i := range config.Certificates { 99 if c == &config.Certificates[i] {
|
tls.go | 75 if config == nil || (len(config.Certificates) == 0 && config.GetCertificate == nil) { 76 return nil, errors.New("tls: neither Certificates nor GetCertificate set in Config") 175 // may contain intermediate certificates following the leaf certificate to
|
handshake_client_test.go | 604 config.Certificates = []Certificate{cert} 640 config.Certificates = []Certificate{cert} 666 Certificates: testConfig.Certificates, 693 t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains) 734 Certificates: testConfig.Certificates, [all...] |
handshake_client.go | 218 // Otherwise, in a full handshake, if we don't have any certificates 221 if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) { 306 if !ok || len(certMsg.certificates) == 0 { 314 // (optionally) verify the server's certificates. 315 certs := make([]*x509.Certificate, len(certMsg.certificates)) 316 for i, asn1Data := range certMsg.certificates { 347 if err := c.config.VerifyPeerCertificate(certMsg.certificates, c.verifiedChains); err != nil { 369 if !bytes.Equal(c.peerCertificates[0].Raw, certMsg.certificates[0]) { 452 certMsg.certificates = chainToSend.Certificate 784 for i, chain := range c.config.Certificates { [all...] |
/prebuilts/go/darwin-x86/src/net/http/httptest/ |
server.go | 138 if len(s.TLS.Certificates) == 0 { 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0])
|
/prebuilts/go/linux-x86/src/net/http/httptest/ |
server.go | 138 if len(s.TLS.Certificates) == 0 { 139 s.TLS.Certificates = []tls.Certificate{cert} 141 s.certificate, err = x509.ParseCertificate(s.TLS.Certificates[0].Certificate[0])
|
/external/boringssl/src/ssl/test/runner/ |
runner.go | 536 if len(config.Certificates) == 0 { 537 config.Certificates = []Certificate{rsaCertificate} 711 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertificate.Certificate)) [all...] |
common.go | 343 // Certificates contains one or more certificate chains 346 Certificates []Certificate 349 // Certificates. Note that a certificate name can be of the form 352 // The nil value causes the first element of Certificates to be used 357 // that clients use when verifying server certificates. 365 // certificates unless InsecureSkipVerify is given. It is also included [all...] |
tls.go | 77 if config == nil || len(config.Certificates) == 0 { 78 return nil, errors.New("tls.Listen: no certificates in configuration")
|
handshake_client.go | 858 for i, cert := range certMsg.certificates { 877 c.ocspResponse = certMsg.certificates[0].ocspResponse 878 c.sctList = certMsg.certificates[0].sctList 993 certMsg.certificates = append(certMsg.certificates, certificateEntry{ [all...] |
/external/pdfium/xfa/fxfa/ |
fxfa_basic.h | 698 Certificates,
|
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp_test.go | 382 config := tls.Config{Certificates: []tls.Certificate{cert}} 785 config := &tls.Config{Certificates: []tls.Certificate{keypair}}
|
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp_test.go | 382 config := tls.Config{Certificates: []tls.Certificate{cert}} 785 config := &tls.Config{Certificates: []tls.Certificate{keypair}}
|
/prebuilts/go/darwin-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/ |
fetch_test.go | 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}}
|
/prebuilts/go/linux-x86/src/cmd/vendor/github.com/google/pprof/internal/driver/ |
fetch_test.go | 382 tlsConfig := &tls.Config{Certificates: []tls.Certificate{selfSignedCert(t)}}
|