/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
D | PKIXCertPath.java | 66 private List certificates; field in PKIXCertPath 161 PKIXCertPath(List certificates) in PKIXCertPath() argument 164 this.certificates = sortCerts(new ArrayList(certificates)); in PKIXCertPath() 189 certificates = new ArrayList(); in PKIXCertPath() 195 certificates.add(0, certFactory.generateCertificate( in PKIXCertPath() 202 certificates = new ArrayList(); in PKIXCertPath() 207 certificates.add(cert); in PKIXCertPath() 224 this.certificates = sortCerts(certificates); in PKIXCertPath() 279 ListIterator iter = certificates.listIterator(certificates.size()); in getEncoded() 292 for (int i = 0; i != certificates.size(); i++) in getEncoded() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
D | SignedData.java | 69 private ASN1Set certificates; field in SignedData 107 ASN1Set certificates, in SignedData() argument 111 … this.version = calculateVersion(contentInfo.getContentType(), certificates, crls, signerInfos); in SignedData() 114 this.certificates = certificates; in SignedData() 118 this.certsBer = certificates instanceof BERSet; in SignedData() 244 certificates = ASN1Set.getInstance(tagged, false); in SignedData() 278 return certificates; in getCertificates() 302 if (certificates != null) in toASN1Primitive() 306 v.add(new BERTaggedObject(false, 0, certificates)); in toASN1Primitive() 310 v.add(new DERTaggedObject(false, 0, certificates)); in toASN1Primitive()
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | FakeSSLSession.java | 27 private final Certificate[] certificates; field in FakeSSLSession 29 public FakeSSLSession(Certificate... certificates) throws Exception { in FakeSSLSession() argument 30 this.certificates = certificates; in FakeSSLSession() 66 if (certificates.length == 0) { in getPeerCertificates() 69 return certificates; in getPeerCertificates()
|
D | CertificateChainCleanerTest.java | 209 List<Certificate> certificates = new ArrayList<>(); in chainMaxLength() local 211 certificates.add(heldCertificate.certificate); in chainMaxLength() 216 assertEquals(certificates, council.clean(certificates)); in chainMaxLength() 217 assertEquals(certificates, council.clean(certificates.subList(0, 9))); in chainMaxLength() 222 List<Certificate> certificates = new ArrayList<>(); in chainTooLong() local 224 certificates.add(heldCertificate.certificate); in chainTooLong() 230 council.clean(certificates); in chainTooLong()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
D | SignedData.java | 25 private ASN1Set certificates; field in SignedData 55 certificates = _certificates; in SignedData() 84 certificates = ASN1Set.getInstance(tagged, false); in SignedData() 117 return certificates; in getCertificates() 153 if (certificates != null) in toASN1Primitive() 155 v.add(new DERTaggedObject(false, 0, certificates)); in toASN1Primitive()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | SSLUtils.java | 234 static byte[][] encodeIssuerX509Principals(X509Certificate[] certificates) in encodeIssuerX509Principals() argument 236 byte[][] principalBytes = new byte[certificates.length][]; in encodeIssuerX509Principals() 237 for (int i = 0; i < certificates.length; i++) { in encodeIssuerX509Principals() 238 principalBytes[i] = certificates[i].getIssuerX500Principal().getEncoded(); in encodeIssuerX509Principals() 246 static javax.security.cert.X509Certificate[] toCertificateChain(X509Certificate[] certificates) in toCertificateChain() argument 250 new javax.security.cert.X509Certificate[certificates.length]; in toCertificateChain() 252 for (int i = 0; i < certificates.length; i++) { in toCertificateChain() 253 byte[] encoded = certificates[i].getEncoded(); in toCertificateChain()
|
D | SslWrapper.java | 223 X509Certificate[] certificates = keyManager.getCertificateChain(alias); in setCertificate() local 224 if (certificates == null) { in setCertificate() 227 PublicKey publicKey = (certificates.length > 0) ? certificates[0].getPublicKey() : null; in setCertificate() 235 OpenSSLX509Certificate[] openSslCerts = new OpenSSLX509Certificate[certificates.length]; in setCertificate() 236 long[] x509refs = new long[certificates.length]; in setCertificate() 237 for (int i = 0; i < certificates.length; i++) { in setCertificate() 239 OpenSSLX509Certificate.fromCertificate(certificates[i]); in setCertificate()
|
D | OpenSSLX509CertificateFactory.java | 333 public CertPath engineGenerateCertPath(List<? extends Certificate> certificates) in engineGenerateCertPath() argument 335 final List<X509Certificate> filtered = new ArrayList<X509Certificate>(certificates.size()); in engineGenerateCertPath() 336 for (int i = 0; i < certificates.size(); i++) { in engineGenerateCertPath() 337 final Certificate c = certificates.get(i); in engineGenerateCertPath()
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
D | TestSessionBuilder.java | 33 private ArrayList<byte[]> certificates = new ArrayList<>(); field in TestSessionBuilder 66 certificates.add(certificate); in addCertificate() 68 certificatesLength = certificates.size(); in addCertificate() 138 for (int i = 0; i < certificates.size(); i++) { in build() 140 buf.put(certificates.get(i)); in build()
|
/external/boringssl/src/ssl/test/runner/ |
D | ticket.go | 26 certificates [][]byte member 43 msg.addU16(uint16(len(s.certificates))) 44 for _, cert := range s.certificates { 104 s.certificates = make([][]byte, numCerts) 105 for i := range s.certificates { 117 s.certificates[i] = data[:certLen]
|
D | handshake_server.go | 834 certMsg.certificates = append(certMsg.certificates, cert) 870 if len(hs.sessionState.certificates) > 0 { 871 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 954 if len(certMsg.certificates) == 0 { 964 for _, cert := range certMsg.certificates { 1370 sessionHasClientCerts := len(hs.sessionState.certificates) != 0 1411 if len(hs.sessionState.certificates) > 0 { 1412 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil { 1470 certMsg.certificates = append(certMsg.certificates, certificateEntry{ 1557 var certificates [][]byte [all …]
|
/external/openssh/ |
D | PROTOCOL.certkeys | 9 of X.509 certificates and uses raw keys. This approach has some benefits 16 certificates used are not traditional X.509 certificates, with numerous 58 encoding of these certificates is also used for storing them on disk. 153 provide an abbreviated way to refer to certificates from that CA. 154 If a CA does not wish to number its certificates it must set this 166 certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates and 167 usernames for SSH_CERT_TYPE_USER certificates. As a special case, a 187 This ensures that certificates containing unknown restrictions do not 189 enabled via extensions without breaking certificates' backwards 198 certificates, where the signature key type is a certificate type itself [all …]
|
D | PROTOCOL.krl | 42 These sections use type KRL_SECTION_CERTIFICATES to revoke certificates by 44 certificates to be revoked and a reserved field whose contents is currently 70 certificates by listing their serial numbers. The cert_section_data in this 81 a range of serial numbers of certificates: 86 All certificates in the range serial_min <= serial <= serial_max are 107 ID" strings. This may be useful in revoking all certificates 119 (not certificates). They are less space efficient than serial numbers, 133 plain keys (i.e. not certificates) by listing their SHA1 hashes:
|
/external/boringssl/src/crypto/pkcs7/ |
D | pkcs7.c | 97 CBS signed_data, certificates; in PKCS7_get_raw_certificates() local 107 if (!CBS_get_asn1(&signed_data, &certificates, in PKCS7_get_raw_certificates() 113 while (CBS_len(&certificates) > 0) { in PKCS7_get_raw_certificates() 115 if (!CBS_get_asn1_element(&certificates, &cert, CBS_ASN1_SEQUENCE)) { in PKCS7_get_raw_certificates()
|
D | pkcs7_x509.c | 178 CBB certificates; in pkcs7_bundle_certificates_cb() local 181 if (!CBB_add_asn1(out, &certificates, in pkcs7_bundle_certificates_cb() 192 !CBB_add_space(&certificates, &buf, len) || in pkcs7_bundle_certificates_cb()
|
/external/curl/docs/ |
D | SSLCERTS.md | 16 certificates. If you're not sure, then run "curl -V" and read the results. If 25 server certificates you see are valid. They're signed by one of the CAs you 42 certificates that are signed by CAs present in the store, you can be sure 67 certificates need to be concatenated in PEM format into this file. 70 certificates need to be stored as individual PEM files in this directory. 125 certificate that isn't signed by one of the certificates in the installed CA 154 use the certificates that are built into the OS. These are the same 155 certificates that appear in the Internet Options control panel (under Windows) 157 certificates will be honored. 159 Schannel will run CRL checks on certificates unless peer verification is [all …]
|
/external/python/cpython2/Doc/library/ |
D | ssl.rst | 41 general information about TLS, SSL, and certificates, the reader is referred to 52 helps manage settings and certificates, which can then be inherited 158 connection. See the discussion of :ref:`ssl-certificates` for more 167 (certificates ignored), :const:`CERT_OPTIONAL` (not required, but validated 170 parameter must point to a file of CA certificates. 173 authority" certificates, which are used to validate certificates passed from 175 :ref:`ssl-certificates` for more information about how to arrange the 176 certificates in this file. 242 *cafile*, *capath*, *cadata* represent optional CA certificates to 246 CA certificates instead. [all …]
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
D | SslContextBuilder.java | 96 Certificate[] certificates = new Certificate[chain.length]; in build() local 98 certificates[i] = chain[i].certificate; in build() 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates); in build()
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
D | CustomTrust.java | 162 Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in); in sslContextForTrustedCertificates() local 163 if (certificates.isEmpty()) { in sslContextForTrustedCertificates() 171 for (Certificate certificate : certificates) { in sslContextForTrustedCertificates()
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
D | CMSSignedDataGenerator.java | 190 ASN1Set certificates = null; in generate() local 194 certificates = CMSUtils.createBerSetFromList(certs); in generate() 209 certificates, in generate()
|
D | CMSSignedData.java | 555 Store certificates, in replaceCertificatesAndCRLs() argument 571 if (certificates != null || attrCerts != null) in replaceCertificatesAndCRLs() 575 if (certificates != null) in replaceCertificatesAndCRLs() 577 certs.addAll(CMSUtils.getCertificatesFromStore(certificates)); in replaceCertificatesAndCRLs()
|
/external/curl/docs/cmdline-opts/ |
D | capath.d | 8 \&"path1:path2:path3"). The certificates must be in PEM format, and if curl is 12 --cacert if the --cacert file contains many CA certificates.
|
D | cacert.d | 7 may contain multiple CA certificates. The certificate(s) must be in PEM 25 certificates in the system and user Keychain to verify the peer, which is the
|
/external/python/cpython2/Mac/BuildScript/resources/ |
D | ReadMe.rtf | 112 …certificates presented by servers over secure (TLS) connections. The verification is performed by… 122 \b0 use the certificates from the system security framework, even when used on newer versions of O… 128 …g the problems this causes is the inability to verify higher-security certificates now used by pyt… 136 …certificates yourself when you use this Python variant and, with certificate verification now enab… 137 \f1 py2app}}, you may now need to bundle CA certificates in them or otherwise supply non-default SS… 143 …ional feature: if a certificate cannot be verified using the manually administered certificates in 145 \f0 , the certificates managed by the system security framework In the user and system keychains ar… 147 … OpenSSL 0.9.8 since it was felt that the loss of the system-provided certificates and management …
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 94 CertPathReviewer.totalPathLength.text = The total path length without self-signed certificates is {… 95 CertPathReviewer.totalPathLength.summary = The total path length without self-signed certificates i… 96 CertPathReviewer.totalPathLength.details = The total path length without self-signed certificates, … 155 # {1} number of trusted root certificates (trustanchors) provided 238 CertPathReviewer.noCertSign.title = Key not usable for signing certificates 239 …= The key usage constraint does not allow the use of this certificate key for signing certificates. 240 CertPathReviewer.noCertSign.summary = The certificate key can not be used for signing certificates. 241 …= The key usage constraint does not allow the use of this certificate key for signing certificates. 255 CertPathReviewer.trustKeyUsage.text = The trust anchor is not alloed to sign certificates. 256 CertPathReviewer.trustKeyUsage.summary = The trust anchor is not alloed to sign certificates. [all …]
|