Searched defs:certificates (Results 1 - 25 of 38) sorted by relevance

12

/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
H A Dbinary_integrity_incident_handlers_unittest.cc28 const unsigned char certificates[][5] = { local
32 for (size_t i = 0; i < arraysize(certificates); ++i) {
35 element->set_certificate(certificates[i], arraysize(certificates[i]));
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
H A DMyCertPath.java37 * my certificates list
39 private final Vector certificates; field in class:MyCertPath
58 certificates = new Vector();
59 certificates.add(new MyCertificate("MyEncoding", encoding));
65 * @return certificates list
69 return Collections.unmodifiableList(certificates);
H A DMyCertificateFactorySpi.java120 public CertPath engineGenerateCertPath(List certificates) argument
122 if (certificates == null) {
124 throw new NullPointerException("certificates is null");
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
H A DPKIXCertPath.java44 * CertPath implementation for X.509 certificates.
63 private List certificates; field in class:PKIXCertPath
149 // make sure all certificates are accounted for.
158 PKIXCertPath(List certificates) argument
161 this.certificates = sortCerts(new ArrayList(certificates));
186 certificates = new ArrayList();
192 certificates.add(0, certFactory.generateCertificate(
199 certificates = new ArrayList();
204 certificates
[all...]
H A DCertificateFactory.java29 * class for dealing with X509 certificates.
32 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7
225 * Returns a (possibly empty) collection view of the certificates
354 List certificates)
357 Iterator iter = certificates.iterator();
370 return new PKIXCertPath(certificates);
353 engineGenerateCertPath( List certificates) argument
/external/chromium_org/net/third_party/mozilla_security_manager/
H A DnsNSSCertificateDB.cpp63 const net::CertificateList& certificates,
67 if (!slot || certificates.empty() || !root)
106 // Import additional delivered certificates that can be verified.
112 for (size_t i = 0; i < certificates.size(); i++) {
113 const scoped_refptr<net::X509Certificate>& cert = certificates[i];
173 const net::CertificateList& certificates,
176 if (!slot || certificates.empty())
179 for (size_t i = 0; i < certificates.size(); ++i) {
180 const scoped_refptr<net::X509Certificate>& cert = certificates[i];
201 SetCertTrust(certificates[
62 ImportCACerts(PK11SlotInfo* slot, const net::CertificateList& certificates, net::X509Certificate* root, net::NSSCertDatabase::TrustBits trustBits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument
171 ImportServerCert( PK11SlotInfo* slot, const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trustBits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DSignedData.java25 private ASN1Set certificates; field in class:SignedData
55 certificates = _certificates;
84 certificates = ASN1Set.getInstance(tagged, false);
117 return certificates;
137 * certificates
153 if (certificates != null)
155 v.add(new DERTaggedObject(false, 0, certificates));
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dnetwork_configuration_updater.cc87 base::ListValue certificates; local
93 &certificates);
95 ImportCertificates(certificates);
H A Dnetwork_configuration_updater_unittest.cc111 void SetExpectedONCCertificates(const base::ListValue& certificates) { argument
112 expected_onc_certificates_.reset(certificates.DeepCopy());
125 virtual void ImportCertificates(const base::ListValue& certificates,
132 expected_onc_certificates_.get(), &certificates));
H A Dconfiguration_policy_handler_chromeos.cc227 // In any case, don't reject the policy as some networks or certificates
245 base::ListValue certificates; local
252 &certificates);
255 // |global_network_config| and |certificates|.
/external/chromium_org/chrome/browser/ui/ash/
H A Dsession_state_delegate_chromeos_unittest.cc186 // Make sure MultiProfile disabled by primary user policy certificates.
202 // Make sure MultiProfile disabled by primary user certificates in memory.
220 net::CertificateList certificates; local
221 certificates.push_back(new net::X509Certificate(
223 service->OnTrustAnchorsChanged(certificates);
/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dpkcs7.c29 certificates; local
72 if (!CBS_get_asn1(&signed_data, &certificates,
79 while (CBS_len(&certificates) > 0) {
84 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) {
121 content_info, certificates; local
136 !CBB_add_asn1(&seq, &certificates,
147 !CBB_add_space(&certificates, &buf, len) ||
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLX509CertPath.java81 protected OpenSSLX509CertPath(List<? extends X509Certificate> certificates) { argument
84 mCertificates = certificates;
H A DOpenSSLX509CertificateFactory.java168 * It wasn't, so just try to keep grabbing certificates until we
327 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) argument
329 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size());
330 for (int i = 0; i < certificates.size(); i++) {
331 final Certificate c = certificates.get(i);
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
H A DCMSSignedData.java476 * @param certificates the new certificates to be used.
477 * @param attrCerts the new attribute certificates to be used.
484 Store certificates,
500 if (certificates != null || attrCerts != null)
504 if (certificates != null)
506 certs.addAll(CMSUtils.getCertificatesFromStore(certificates));
482 replaceCertificatesAndCRLs( CMSSignedData signedData, Store certificates, Store attrCerts, Store crls) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
H A DSignedData.java27 * certificates [0] IMPLICIT CertificateSet OPTIONAL,
39 * IF ((certificates is present) AND
40 * (any certificates with a type of other are present)) OR
45 * IF (certificates is present) AND
46 * (any version 2 attribute certificates are present)
49 * IF ((certificates is present) AND
50 * (any version 1 attribute certificates are present)) OR
70 private ASN1Set certificates; field in class:SignedData
107 ASN1Set certificates,
111 this.version = calculateVersion(contentInfo.getContentType(), certificates, crl
104 SignedData( ASN1Set digestAlgorithms, ContentInfo contentInfo, ASN1Set certificates, ASN1Set crls, ASN1Set signerInfos) argument
[all...]
/external/chromium_org/chrome/browser/
H A Dcertificate_manager_model.cc170 const net::CertificateList& certificates,
173 bool result = cert_db_->ImportCACerts(certificates, trust_bits, not_imported);
174 if (result && not_imported->size() != certificates.size())
180 const net::CertificateList& certificates,
183 bool result = cert_db_->ImportServerCert(certificates, trust_bits,
185 if (result && not_imported->size() != certificates.size())
169 ImportCACerts( const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trust_bits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument
179 ImportServerCert( const net::CertificateList& certificates, net::NSSCertDatabase::TrustBits trust_bits, net::NSSCertDatabase::ImportCertFailureList* not_imported) argument
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
H A DFakeSSLSession.java27 private final Certificate[] certificates; field in class:FakeSSLSession
29 public FakeSSLSession(Certificate... certificates) throws Exception { argument
30 this.certificates = certificates;
66 if (certificates.length == 0) {
69 return certificates;
/external/chromium_org/chrome/browser/chromeos/login/users/
H A Dmulti_profile_user_controller_unittest.cc404 // Verifies that if a user is signed-in and has policy certificates installed
428 net::CertificateList certificates; local
429 certificates.push_back(new net::X509Certificate(
431 service->OnTrustAnchorsChanged(certificates);
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl.cc59 const base::ListValue& certificates,
62 VLOG(2) << "ONC file has " << certificates.GetSize() << " certificates";
77 // This is the actual function that imports the certificates.
82 base::Owned(certificates.DeepCopy()),
93 base::ListValue* certificates,
95 // Web trust is only granted to certificates imported by the user.
99 for (size_t i = 0; i < certificates->GetSize(); ++i) {
101 certificates->GetDictionary(i, &certificate);
379 LOG(WARNING) << "PKCS12 data contains no importable certificates
58 ImportCertificates( const base::ListValue& certificates, ::onc::ONCSource source, const DoneCallback& done_callback) argument
90 ParseAndStoreCertificates( ::onc::ONCSource source, const DoneCallback& done_callback, base::ListValue* certificates, net::NSSCertDatabase* nssdb) argument
[all...]
H A Donc_certificate_importer_impl_unittest.cc104 base::ListValue* certificates = NULL; local
107 certificates_value.release()->GetAsList(&certificates);
108 onc_certificates_.reset(certificates);
113 *certificates,
H A Donc_utils.cc291 // The PEM block header used for DER certificates
294 // This is an older PEM marker for DER certificates.
318 const base::ListValue& certificates) {
320 for (base::ListValue::const_iterator it = certificates.begin();
321 it != certificates.end(); ++it) {
356 base::ListValue* certificates) {
359 certificates->Clear();
420 certificates->Swap(validated_certs);
427 GetServerAndCACertsByGUID(*certificates);
317 GetServerAndCACertsByGUID( const base::ListValue& certificates) argument
351 ParseAndValidateOncForImport(const std::string& onc_blob, ONCSource onc_source, const std::string& passphrase, base::ListValue* network_configs, base::DictionaryValue* global_network_config, base::ListValue* certificates) argument
/external/chromium_org/net/cert/
H A Dnss_cert_database.cc209 const CertificateList& certificates) const {
210 DCHECK_GT(certificates.size(), 0U);
212 if (certificates.size() == 1)
213 return certificates[0].get();
215 X509Certificate* cert0 = certificates[0].get();
216 X509Certificate* cert1 = certificates[1].get();
217 X509Certificate* certn_2 = certificates[certificates.size() - 2].get();
218 X509Certificate* certn_1 = certificates[certificates
231 ImportCACerts(const CertificateList& certificates, TrustBits trust_bits, ImportCertFailureList* not_imported) argument
244 ImportServerCert(const CertificateList& certificates, TrustBits trust_bits, ImportCertFailureList* not_imported) argument
[all...]
H A Dx509_certificate.cc43 // The PEM block header used for DER certificates
139 // Two certificates don't match, due to a SHA1 hash collision. Given
350 // certificates in a chain; in practice, more than a dozen or so is
397 OSCertHandles certificates; local
420 // also be DER encoded certificates wrapped inside of PEM blocks.
422 certificates.push_back(handle);
430 for (size_t i = 0; certificates.empty() &&
433 certificates = CreateOSCertHandlesFromBytes(decoded.c_str(),
440 // PEM-encoded DER certificates. The case of FORMAT_PEM_CERT_SEQUENCE
449 for (size_t i = 0; certificates
[all...]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
H A DHttpResponseCache.java437 * is the length of the peer certificate chain. These certificates are
440 * certificates are also base64-encoded and appear each on their own
537 private void writeCertArray(Writer writer, List<Certificate> certificates) throws IOException { argument
539 writer.write(Integer.toString(certificates.size()) + '\n');
540 for (int i = 0, size = certificates.size(); i < size; i++) {
541 byte[] bytes = certificates.get(i).getEncoded();

Completed in 446 milliseconds

12