/external/cronet/net/third_party/nist-pkits/ |
D | test_bundle_data.filelist | 7 certs/AllCertificatesNoPoliciesTest2EE.crt 8 certs/AllCertificatesSamePoliciesTest10EE.crt 9 certs/AllCertificatesSamePoliciesTest13EE.crt 10 certs/AllCertificatesanyPolicyTest11EE.crt 11 certs/AnyPolicyTest14EE.crt 12 certs/BadCRLIssuerNameCACert.crt 13 certs/BadCRLSignatureCACert.crt 14 certs/BadSignedCACert.crt 15 certs/BadnotAfterDateCACert.crt 16 certs/BadnotBeforeDateCACert.crt [all …]
|
D | pkits_testcases-inl.h | 23 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", in WRAPPED_TYPED_TEST_P() local 30 this->RunTest(certs, crls, info); in WRAPPED_TYPED_TEST_P() 36 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", in WRAPPED_TYPED_TEST_P() local 43 this->RunTest(certs, crls, info); in WRAPPED_TYPED_TEST_P() 49 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", in WRAPPED_TYPED_TEST_P() local 56 this->RunTest(certs, crls, info); in WRAPPED_TYPED_TEST_P() 62 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", in WRAPPED_TYPED_TEST_P() local 69 this->RunTest(certs, crls, info); in WRAPPED_TYPED_TEST_P() 75 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", in WRAPPED_TYPED_TEST_P() local 84 this->RunTest(certs, crls, info); in WRAPPED_TYPED_TEST_P() [all …]
|
/external/nist-pkits/src/libcore/java/security/cert/ |
D | X509CertificateNistPkitsTest.java | 104 X509Certificate[] certs = new X509Certificate[names.length]; in getCertificates() local 107 certs[i] = getCertificate(f, names[i]); in getCertificates() 110 return certs; in getCertificates() 138 X509Certificate[] certs = getCertificates(f, pathCerts); in getTestPath() local 139 return f.generateCertPath(Arrays.asList(certs)); in getTestPath() 144 X509Certificate[] certs = getCertificates(f, pathCerts); in getTestPathParams() local 150 certCollection.addAll(Arrays.asList(certs)); in getTestPathParams() 170 private void assertInvalidPath(String trustAnchor, String[] certs, String[] crls) in assertInvalidPath() argument 172 assertInvalidPath(trustAnchor, certs, certs, crls); in assertInvalidPath() 175 private void assertInvalidPath(String trustAnchor, String[] path, String[] certs, in assertInvalidPath() argument [all …]
|
/external/conscrypt/repackaged/common/src/test/java/com/android/org/conscrypt/ |
D | HostnameVerifierTest.java | 89 X509Certificate[] certs = {}; in verify() local 90 assertFalse(verifier.verify(certs,"localhost", session)); in verify() 123 X509Certificate[] certs = {}; in verifyCn() local 124 assertFalse(verifier.verify(certs, "foo.com", session)); in verifyCn() 125 assertFalse(verifier.verify(certs, "a.foo.com", session)); in verifyCn() 126 assertFalse(verifier.verify(certs, "bar.com", session)); in verifyCn() 159 X509Certificate[] certs = {}; in verifyNonAsciiCn() local 160 assertFalse(verifier.verify(certs, "\u82b1\u5b50.co.jp", session)); in verifyNonAsciiCn() 161 assertFalse(verifier.verify(certs, "a.\u82b1\u5b50.co.jp", session)); in verifyNonAsciiCn() 193 X509Certificate[] certs = {}; in verifySubjectAlt() local [all …]
|
/external/conscrypt/common/src/test/java/org/conscrypt/ |
D | HostnameVerifierTest.java | 84 X509Certificate[] certs = {}; in verify() local 85 assertFalse(verifier.verify(certs,"localhost", session)); in verify() 118 X509Certificate[] certs = {}; in verifyCn() local 119 assertFalse(verifier.verify(certs, "foo.com", session)); in verifyCn() 120 assertFalse(verifier.verify(certs, "a.foo.com", session)); in verifyCn() 121 assertFalse(verifier.verify(certs, "bar.com", session)); in verifyCn() 154 X509Certificate[] certs = {}; in verifyNonAsciiCn() local 155 assertFalse(verifier.verify(certs, "\u82b1\u5b50.co.jp", session)); in verifyNonAsciiCn() 156 assertFalse(verifier.verify(certs, "a.\u82b1\u5b50.co.jp", session)); in verifyNonAsciiCn() 188 X509Certificate[] certs = {}; in verifySubjectAlt() local [all …]
|
/external/cronet/net/cert/pki/ |
D | path_builder_unittest.cc | 259 ASSERT_EQ(2U, path.certs.size()); in TEST_F() 260 EXPECT_EQ(a_by_b_, path.certs[0]); in TEST_F() 261 EXPECT_EQ(b_by_f_, path.certs[1]); in TEST_F() 315 ASSERT_EQ(3U, path0.certs.size()); in TEST_F() 316 EXPECT_EQ(b_by_c_, path0.certs[0]); in TEST_F() 317 EXPECT_EQ(c_by_d_, path0.certs[1]); in TEST_F() 318 EXPECT_EQ(d_by_d_, path0.certs[2]); in TEST_F() 340 ASSERT_EQ(2U, path.certs.size()); in TEST_F() 341 EXPECT_EQ(e_by_e_, path.certs[0]); in TEST_F() 342 EXPECT_EQ(e_by_e_, path.certs[1]); in TEST_F() [all …]
|
D | path_builder_pkits_unittest.cc | 53 const ParsedCertificateList& certs = path->certs; in CheckPathAfterVerification() local 54 for (size_t reverse_i = 0; reverse_i < certs.size(); ++reverse_i) { in CheckPathAfterVerification() 55 size_t i = certs.size() - reverse_i - 1; in CheckPathAfterVerification() 75 if (certs[i]->GetExtension(der::Input(kCrlDistributionPointsOid), in CheckPathAfterVerification() 102 CheckCRL(der_crl, certs, i, *cert_dp, verify_time_, max_age_); in CheckPathAfterVerification() 139 ParsedCertificateList certs; in RunTest() local 146 {}, &certs, &errors)) in RunTest() 153 trust_store.AddTrustAnchor(certs[0]); in RunTest() 158 cert_issuer_source.AddCert(certs[i]); in RunTest() 160 std::shared_ptr<const ParsedCertificate> target_cert(certs.back()); in RunTest() [all …]
|
/external/cronet/net/ssl/ |
D | client_cert_identity_unittest.cc | 18 ClientCertIdentityList certs; in TEST() local 33 certs.push_back(std::make_unique<FakeClientCertIdentity>(cert, nullptr)); in TEST() 43 certs.push_back(std::make_unique<FakeClientCertIdentity>(cert, nullptr)); in TEST() 51 certs.push_back(std::make_unique<FakeClientCertIdentity>(cert, nullptr)); in TEST() 59 certs.push_back(std::make_unique<FakeClientCertIdentity>(cert, nullptr)); in TEST() 61 std::sort(certs.begin(), certs.end(), ClientCertIdentitySorter()); in TEST() 63 ASSERT_EQ(4u, certs.size()); in TEST() 64 ASSERT_TRUE(certs[0].get()); in TEST() 65 EXPECT_EQ("newer cert", certs[0]->certificate()->subject().common_name); in TEST() 66 ASSERT_TRUE(certs[1].get()); in TEST() [all …]
|
/external/cronet/net/cert/ |
D | nss_cert_database_unittest.cc | 113 ScopedCERTCertificateList* certs) { in ReadCertIntoList() argument 119 certs->push_back(std::move(cert)); in ReadCertIntoList() 161 ScopedCERTCertificateList certs = future.Take(); in TEST_F() local 164 EXPECT_LT(0U, certs.size()); in TEST_F() 449 ScopedCERTCertificateList certs = CreateCERTCertificateListFromFile( in TEST_F() local 452 ASSERT_EQ(1U, certs.size()); in TEST_F() 453 EXPECT_FALSE(GetCertIsPerm(certs[0].get())); in TEST_F() 457 EXPECT_TRUE(cert_db_->ImportCACerts(certs, NSSCertDatabase::TRUSTED_SSL, in TEST_F() 478 ScopedCERTCertificateList certs = CreateCERTCertificateListFromFile( in TEST_F() local 481 ASSERT_EQ(1U, certs.size()); in TEST_F() [all …]
|
D | nss_cert_database_chromeos_unittest.cc | 252 ScopedCERTCertificateList certs; in TEST_F() local 253 db_1_->ListCerts(base::BindOnce(&SwapCertLists, base::Unretained(&certs))); in TEST_F() 255 EXPECT_TRUE(IsCertInCertificateList(cert_1.get(), certs)); in TEST_F() 256 EXPECT_TRUE(IsCertInCertificateList(cert_2.get(), certs)); in TEST_F() 271 ScopedCERTCertificateList certs; in TEST_F() local 272 db_2_->ListCerts(base::BindOnce(&SwapCertLists, base::Unretained(&certs))); in TEST_F() 274 EXPECT_TRUE(IsCertInCertificateList(cert_1.get(), certs)); in TEST_F() 275 EXPECT_FALSE(IsCertInCertificateList(cert_2.get(), certs)); in TEST_F() 281 ScopedCERTCertificateList certs = CreateCERTCertificateListFromFile( in TEST_F() local 284 ASSERT_EQ(1U, certs.size()); in TEST_F() [all …]
|
/external/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 474 bssl::UniquePtr<STACK_OF(X509)> certs(sk_X509_new_null()); in TestCertReparse() local 475 ASSERT_TRUE(certs); in TestCertReparse() 483 ASSERT_TRUE(PKCS7_get_certificates(certs.get(), &pkcs7)); in TestCertReparse() 488 ASSERT_TRUE(PKCS7_bundle_certificates(cbb.get(), certs.get())); in TestCertReparse() 499 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs2.get())); in TestCertReparse() 500 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 501 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() 521 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs3)); in TestCertReparse() 522 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 523 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() [all …]
|
/external/cronet/third_party/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 474 bssl::UniquePtr<STACK_OF(X509)> certs(sk_X509_new_null()); in TestCertReparse() local 475 ASSERT_TRUE(certs); in TestCertReparse() 483 ASSERT_TRUE(PKCS7_get_certificates(certs.get(), &pkcs7)); in TestCertReparse() 488 ASSERT_TRUE(PKCS7_bundle_certificates(cbb.get(), certs.get())); in TestCertReparse() 499 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs2.get())); in TestCertReparse() 500 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 501 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() 521 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs3)); in TestCertReparse() 522 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 523 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() [all …]
|
/external/python/cryptography/vectors/cryptography_vectors/x509/PKITS_data/ |
D | pkits.ldif | 9 cACertificate;binary:< file:///tmp/certs/TrustAnchorRootCertificate.crt 115 cACertificate;binary:< file:///tmp/certs/GoodCACert.crt 128 userCertificate;binary:< file:///tmp/certs/ValidCertificatePathTest1EE.crt 134 cACertificate;binary:< file:///tmp/certs/BadSignedCACert.crt 142 userCertificate;binary:< file:///tmp/certs/InvalidCASignatureTest2EE.crt 148 userCertificate;binary:< file:///tmp/certs/InvalidEESignatureTest3EE.crt 154 cACertificate;binary:< file:///tmp/certs/BadnotBeforeDateCACert.crt 162 userCertificate;binary:< file:///tmp/certs/InvalidCAnotBeforeDateTest1EE.crt 168 userCertificate;binary:< file:///tmp/certs/InvalidEEnotBeforeDateTest2EE.crt 174 userCertificate;binary:< file:///tmp/certs/Validpre2000UTCnotBeforeDateTest3EE.crt [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
D | PKIXCertPath.java | 69 List certs) in sortCerts() argument 71 if (certs.size() < 2) in sortCerts() 73 return certs; in sortCerts() 76 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); in sortCerts() 79 for (int i = 1; i != certs.size(); i++) in sortCerts() 81 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() 85 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); in sortCerts() 96 return certs; in sortCerts() 100 List retList = new ArrayList(certs.size()); in sortCerts() 101 List orig = new ArrayList(certs); in sortCerts() [all …]
|
/external/cronet/net/third_party/quiche/src/quiche/quic/core/crypto/ |
D | proof_source.cc | 19 ProofSource::Chain::Chain(const std::vector<std::string>& certs) in Chain() argument 20 : certs(certs) {} in Chain() 26 crypto_buffers.value.reserve(certs.size()); in ToCryptoBuffers() 27 for (size_t i = 0; i < certs.size(); i++) { in ToCryptoBuffers() 29 CRYPTO_BUFFER_new(reinterpret_cast<const uint8_t*>(certs[i].data()), in ToCryptoBuffers() 30 certs[i].length(), nullptr)); in ToCryptoBuffers() 38 if (chain.get() == nullptr || chain->certs.empty()) { in ValidateCertAndKey() 44 CertificateView::ParseSingleCertificate(chain->certs[0]); in ValidateCertAndKey()
|
D | cert_compressor.cc | 177 std::vector<CertEntry> MatchCerts(const std::vector<std::string>& certs, in MatchCerts() argument 180 entries.reserve(certs.size()); in MatchCerts() 186 for (auto i = certs.begin(); i != certs.end(); ++i) { in MatchCerts() 266 const std::vector<std::string>& certs) { in ZlibDictForEntries() argument 271 for (size_t i = certs.size() - 1; i < certs.size(); i--) { in ZlibDictForEntries() 273 zlib_dict_size += certs[i].size(); in ZlibDictForEntries() 282 for (size_t i = certs.size() - 1; i < certs.size(); i--) { in ZlibDictForEntries() 284 zlib_dict += certs[i]; in ZlibDictForEntries() 297 std::vector<uint64_t> HashCerts(const std::vector<std::string>& certs) { in HashCerts() argument 299 ret.reserve(certs.size()); in HashCerts() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
D | PKIXCertPath.java | 71 List certs) in sortCerts() argument 73 if (certs.size() < 2) in sortCerts() 75 return certs; in sortCerts() 78 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); in sortCerts() 81 for (int i = 1; i != certs.size(); i++) in sortCerts() 83 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() 87 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); in sortCerts() 98 return certs; in sortCerts() 102 List retList = new ArrayList(certs.size()); in sortCerts() 103 List orig = new ArrayList(certs); in sortCerts() [all …]
|
/external/grpc-grpc/src/ruby/spec/ |
D | channel_credentials_spec.rb | 34 certs = load_test_certs 35 expect { ChannelCredentials.new(*certs) }.not_to raise_error 57 certs = load_test_certs 58 channel_creds = ChannelCredentials.new(*certs) 65 certs = load_test_certs 66 channel_creds = ChannelCredentials.new(*certs) 76 certs = load_test_certs 77 channel_creds1 = ChannelCredentials.new(*certs) 78 channel_creds2 = ChannelCredentials.new(*certs)
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
D | PKIXCertPath.java | 71 List certs) in sortCerts() argument 73 if (certs.size() < 2) in sortCerts() 75 return certs; in sortCerts() 78 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); in sortCerts() 81 for (int i = 1; i != certs.size(); i++) in sortCerts() 83 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() 87 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); in sortCerts() 98 return certs; in sortCerts() 102 List retList = new ArrayList(certs.size()); in sortCerts() 103 List orig = new ArrayList(certs); in sortCerts() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 474 bssl::UniquePtr<STACK_OF(X509)> certs(sk_X509_new_null()); in TestCertReparse() local 475 ASSERT_TRUE(certs); in TestCertReparse() 483 ASSERT_TRUE(PKCS7_get_certificates(certs.get(), &pkcs7)); in TestCertReparse() 488 ASSERT_TRUE(PKCS7_bundle_certificates(cbb.get(), certs.get())); in TestCertReparse() 499 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs2.get())); in TestCertReparse() 500 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 501 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() 521 ASSERT_EQ(sk_X509_num(certs.get()), sk_X509_num(certs3)); in TestCertReparse() 522 for (size_t i = 0; i < sk_X509_num(certs.get()); i++) { in TestCertReparse() 523 X509 *a = sk_X509_value(certs.get(), i); in TestCertReparse() [all …]
|
/external/cronet/net/cert/internal/ |
D | revocation_checker.cc | 37 bool CheckCertRevocation(const ParsedCertificateList& certs, in CheckCertRevocation() argument 46 DCHECK_LT(target_cert_index, certs.size()); in CheckCertRevocation() 47 const ParsedCertificate* cert = certs[target_cert_index].get(); in CheckCertRevocation() 49 target_cert_index + 1 < certs.size() ? certs[target_cert_index + 1].get() in CheckCertRevocation() 232 certs, target_cert_index, distribution_point, in CheckCertRevocation() 278 const ParsedCertificateList& certs, in CheckValidatedChainRevocation() argument 291 for (size_t reverse_i = 0; reverse_i < certs.size(); ++reverse_i) { in CheckValidatedChainRevocation() 292 size_t i = certs.size() - reverse_i - 1; in CheckValidatedChainRevocation() 315 certs, i, policy, deadline, stapled_ocsp, max_age_seconds, net_fetcher, in CheckValidatedChainRevocation() 332 const ParsedCertificateList& certs, in CheckChainRevocationUsingCRLSet() argument [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ocsp/ |
D | Signature.java | 18 ASN1Sequence certs; field in Signature 31 ASN1Sequence certs) in Signature() argument 35 this.certs = certs; in Signature() 46 certs = ASN1Sequence.getInstance( in Signature() 85 return certs; in getCerts() 104 if (certs != null) in toASN1Primitive() 106 v.add(new DERTaggedObject(true, 0, certs)); in toASN1Primitive()
|
D | BasicOCSPResponse.java | 29 private ASN1Sequence certs; field in BasicOCSPResponse 35 ASN1Sequence certs) in BasicOCSPResponse() argument 40 this.certs = certs; in BasicOCSPResponse() 52 this.certs = ASN1Sequence.getInstance((ASN1TaggedObject)seq.getObjectAt(3), true); in BasicOCSPResponse() 95 return certs; in getCerts() 115 if (certs != null) in toASN1Primitive() 117 v.add(new DERTaggedObject(true, 0, certs)); in toASN1Primitive()
|
/external/python/httplib2/tests/ |
D | test_cacerts_from_env.py | 35 assert httplib2.certs.where() == CA_CERTS_BUILTIN 42 assert httplib2.certs.where() == ca_certs_tmpfile 45 httplib2.certs.where() 47 assert httplib2.certs.where() == CA_CERTS_BUILTIN 54 assert httplib2.certs.where() == CERTIFI_CERTS_FILE 61 assert httplib2.certs.where() == CUSTOM_CA_CERTS 70 assert httplib2.certs.where() == ca_certs_tmpfile 72 assert httplib2.certs.where() == CA_CERTS_BUILTIN
|
/external/openscreen/cast/receiver/channel/testing/ |
D | device_auth_test_helpers.cc | 25 std::vector<std::string> certs = ReadCertificatesFromPemFile(chain_filename); in InitStaticCredentialsFromFiles() local 26 ASSERT_GT(certs.size(), 1u); in InitStaticCredentialsFromFiles() 29 auto* data = reinterpret_cast<const uint8_t*>(certs.back().data()); in InitStaticCredentialsFromFiles() 31 bssl::UniquePtr<X509>(d2i_X509(nullptr, &data, certs.back().size())); in InitStaticCredentialsFromFiles() 33 certs.pop_back(); in InitStaticCredentialsFromFiles() 35 fake_trust_store->certs.emplace_back(fake_root.release()); in InitStaticCredentialsFromFiles() 39 std::move(certs), std::move(private_key), std::string()}; in InitStaticCredentialsFromFiles()
|