/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/ |
H A D | binary_integrity_incident_handlers_unittest.cc | 28 const unsigned char certificates[][5] = { local 32 for (size_t i = 0; i < arraysize(certificates); ++i) { 35 element->set_certificate(certificates[i], arraysize(certificates[i]));
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
H A D | MyCertPath.java | 37 * my certificates list 39 private final Vector certificates; field in class:MyCertPath 58 certificates = new Vector(); 59 certificates.add(new MyCertificate("MyEncoding", encoding)); 65 * @return certificates list 69 return Collections.unmodifiableList(certificates);
|
H A D | MyCertificateFactorySpi.java | 120 public CertPath engineGenerateCertPath(List certificates) argument 122 if (certificates == null) { 124 throw new NullPointerException("certificates is null");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | PKIXCertPath.java | 44 * CertPath implementation for X.509 certificates. 63 private List certificates; field in class:PKIXCertPath 149 // make sure all certificates are accounted for. 158 PKIXCertPath(List certificates) argument 161 this.certificates = sortCerts(new ArrayList(certificates)); 186 certificates = new ArrayList(); 192 certificates.add(0, certFactory.generateCertificate( 199 certificates = new ArrayList(); 204 certificates [all...] |
H A D | CertificateFactory.java | 29 * class for dealing with X509 certificates. 32 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7 225 * Returns a (possibly empty) collection view of the certificates 354 List certificates) 357 Iterator iter = certificates.iterator(); 370 return new PKIXCertPath(certificates); 353 engineGenerateCertPath( List certificates) argument
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsNSSCertificateDB.cpp | 63 const net::CertificateList& certificates, 67 if (!slot || certificates.empty() || !root) 106 // Import additional delivered certificates that can be verified. 112 for (size_t i = 0; i < certificates.size(); i++) { 113 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 173 const net::CertificateList& certificates, 176 if (!slot || certificates.empty()) 179 for (size_t i = 0; i < certificates.size(); ++i) { 180 const scoped_refptr<net::X509Certificate>& cert = certificates[i]; 201 SetCertTrust(certificates[ 62 ImportCACerts(PK11SlotInfo* slot, const net::CertificateList& certificates, net::X509Certificate* root, net::NSSCertDatabase::TrustBits trustBits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument 171 ImportServerCert( PK11SlotInfo* slot, const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trustBits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | SignedData.java | 25 private ASN1Set certificates; field in class:SignedData 55 certificates = _certificates; 84 certificates = ASN1Set.getInstance(tagged, false); 117 return certificates; 137 * certificates 153 if (certificates != null) 155 v.add(new DERTaggedObject(false, 0, certificates));
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | network_configuration_updater.cc | 87 base::ListValue certificates; local 93 &certificates); 95 ImportCertificates(certificates);
|
H A D | network_configuration_updater_unittest.cc | 111 void SetExpectedONCCertificates(const base::ListValue& certificates) { argument 112 expected_onc_certificates_.reset(certificates.DeepCopy()); 125 virtual void ImportCertificates(const base::ListValue& certificates, 132 expected_onc_certificates_.get(), &certificates));
|
H A D | configuration_policy_handler_chromeos.cc | 227 // In any case, don't reject the policy as some networks or certificates 245 base::ListValue certificates; local 252 &certificates); 255 // |global_network_config| and |certificates|.
|
/external/chromium_org/chrome/browser/ui/ash/ |
H A D | session_state_delegate_chromeos_unittest.cc | 186 // Make sure MultiProfile disabled by primary user policy certificates. 202 // Make sure MultiProfile disabled by primary user certificates in memory. 220 net::CertificateList certificates; local 221 certificates.push_back(new net::X509Certificate( 223 service->OnTrustAnchorsChanged(certificates);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | pkcs7.c | 29 certificates; local 72 if (!CBS_get_asn1(&signed_data, &certificates, 79 while (CBS_len(&certificates) > 0) { 84 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { 121 content_info, certificates; local 136 !CBB_add_asn1(&seq, &certificates, 147 !CBB_add_space(&certificates, &buf, len) ||
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLX509CertPath.java | 81 protected OpenSSLX509CertPath(List<? extends X509Certificate> certificates) { argument 84 mCertificates = certificates;
|
H A D | OpenSSLX509CertificateFactory.java | 168 * It wasn't, so just try to keep grabbing certificates until we 327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) argument 329 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size()); 330 for (int i = 0; i < certificates.size(); i++) { 331 final Certificate c = certificates.get(i);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedData.java | 476 * @param certificates the new certificates to be used. 477 * @param attrCerts the new attribute certificates to be used. 484 Store certificates, 500 if (certificates != null || attrCerts != null) 504 if (certificates != null) 506 certs.addAll(CMSUtils.getCertificatesFromStore(certificates)); 482 replaceCertificatesAndCRLs( CMSSignedData signedData, Store certificates, Store attrCerts, Store crls) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | SignedData.java | 27 * certificates [0] IMPLICIT CertificateSet OPTIONAL, 39 * IF ((certificates is present) AND 40 * (any certificates with a type of other are present)) OR 45 * IF (certificates is present) AND 46 * (any version 2 attribute certificates are present) 49 * IF ((certificates is present) AND 50 * (any version 1 attribute certificates are present)) OR 70 private ASN1Set certificates; field in class:SignedData 107 ASN1Set certificates, 111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crl 104 SignedData( ASN1Set digestAlgorithms, ContentInfo contentInfo, ASN1Set certificates, ASN1Set crls, ASN1Set signerInfos) argument [all...] |
/external/chromium_org/chrome/browser/ |
H A D | certificate_manager_model.cc | 170 const net::CertificateList& certificates, 173 bool result = cert_db_->ImportCACerts(certificates, trust_bits, not_imported); 174 if (result && not_imported->size() != certificates.size()) 180 const net::CertificateList& certificates, 183 bool result = cert_db_->ImportServerCert(certificates, trust_bits, 185 if (result && not_imported->size() != certificates.size()) 169 ImportCACerts( const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trust_bits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument 179 ImportServerCert( const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trust_bits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | FakeSSLSession.java | 27 private final Certificate[] certificates; field in class:FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { argument 30 this.certificates = certificates; 66 if (certificates.length == 0) { 69 return certificates;
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
H A D | multi_profile_user_controller_unittest.cc | 404 // Verifies that if a user is signed-in and has policy certificates installed 428 net::CertificateList certificates; local 429 certificates.push_back(new net::X509Certificate( 431 service->OnTrustAnchorsChanged(certificates);
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.cc | 59 const base::ListValue& certificates, 62 VLOG(2) << "ONC file has " << certificates.GetSize() << " certificates"; 77 // This is the actual function that imports the certificates. 82 base::Owned(certificates.DeepCopy()), 93 base::ListValue* certificates, 95 // Web trust is only granted to certificates imported by the user. 99 for (size_t i = 0; i < certificates->GetSize(); ++i) { 101 certificates->GetDictionary(i, &certificate); 379 LOG(WARNING) << "PKCS12 data contains no importable certificates 58 ImportCertificates( const base::ListValue& certificates, ::onc::ONCSource source, const DoneCallback& done_callback) argument 90 ParseAndStoreCertificates( ::onc::ONCSource source, const DoneCallback& done_callback, base::ListValue* certificates, net::NSSCertDatabase* nssdb) argument [all...] |
H A D | onc_certificate_importer_impl_unittest.cc | 104 base::ListValue* certificates = NULL; local 107 certificates_value.release()->GetAsList(&certificates); 108 onc_certificates_.reset(certificates); 113 *certificates,
|
H A D | onc_utils.cc | 291 // The PEM block header used for DER certificates 294 // This is an older PEM marker for DER certificates. 318 const base::ListValue& certificates) { 320 for (base::ListValue::const_iterator it = certificates.begin(); 321 it != certificates.end(); ++it) { 356 base::ListValue* certificates) { 359 certificates->Clear(); 420 certificates->Swap(validated_certs); 427 GetServerAndCACertsByGUID(*certificates); 317 GetServerAndCACertsByGUID( const base::ListValue& certificates) argument 351 ParseAndValidateOncForImport(const std::string& onc_blob, ONCSource onc_source, const std::string& passphrase, base::ListValue* network_configs, base::DictionaryValue* global_network_config, base::ListValue* certificates) argument
|
/external/chromium_org/net/cert/ |
H A D | nss_cert_database.cc | 209 const CertificateList& certificates) const { 210 DCHECK_GT(certificates.size(), 0U); 212 if (certificates.size() == 1) 213 return certificates[0].get(); 215 X509Certificate* cert0 = certificates[0].get(); 216 X509Certificate* cert1 = certificates[1].get(); 217 X509Certificate* certn_2 = certificates[certificates.size() - 2].get(); 218 X509Certificate* certn_1 = certificates[certificates 231 ImportCACerts(const CertificateList& certificates, TrustBits trust_bits, ImportCertFailureList* not_imported) argument 244 ImportServerCert(const CertificateList& certificates, TrustBits trust_bits, ImportCertFailureList* not_imported) argument [all...] |
H A D | x509_certificate.cc | 43 // The PEM block header used for DER certificates 139 // Two certificates don't match, due to a SHA1 hash collision. Given 350 // certificates in a chain; in practice, more than a dozen or so is 397 OSCertHandles certificates; local 420 // also be DER encoded certificates wrapped inside of PEM blocks. 422 certificates.push_back(handle); 430 for (size_t i = 0; certificates.empty() && 433 certificates = CreateOSCertHandlesFromBytes(decoded.c_str(), 440 // PEM-encoded DER certificates. The case of FORMAT_PEM_CERT_SEQUENCE 449 for (size_t i = 0; certificates [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
H A D | HttpResponseCache.java | 437 * is the length of the peer certificate chain. These certificates are 440 * certificates are also base64-encoded and appear each on their own 537 private void writeCertArray(Writer writer, List<Certificate> certificates) throws IOException { argument 539 writer.write(Integer.toString(certificates.size()) + '\n'); 540 for (int i = 0, size = certificates.size(); i < size; i++) { 541 byte[] bytes = certificates.get(i).getEncoded();
|