Searched defs:certs (Results 1 - 22 of 22) sorted by relevance

/external/wpa_supplicant/tests/
H A Dtest_x509v3.c28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local
54 if (certs == NULL)
55 certs = cert;
62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_x509v3.c28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local
54 if (certs == NULL)
55 certs = cert;
62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
H A DPKIXCertPath.java61 * @param certs
64 List certs)
66 if (certs.size() < 2)
68 return certs;
71 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal();
74 for (int i = 1; i != certs.size(); i++)
76 X509Certificate cert = (X509Certificate)certs.get(i);
80 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal();
91 return certs;
95 List retList = new ArrayList(certs
63 sortCerts( List certs) argument
[all...]
H A DJDKPKCS12KeyStore.java85 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:JDKPKCS12KeyStore
203 Enumeration e = certs.keys();
225 return (certs.get(alias) != null || keys.get(alias) != null);
238 Certificate c = (Certificate)certs.remove(alias);
278 Certificate c = (Certificate)certs.get(alias);
302 Enumeration c = certs.elements();
303 Enumeration k = certs.keys();
443 if (keys.get(alias) == null && certs.get(alias) == null) {
466 return (certs.get(alias) != null && keys.get(alias) == null);
485 certs
[all...]
H A DCertPathValidatorUtilities.java837 Set certs = new HashSet();
849 certs.addAll(certStore.getMatches(certSelect));
865 certs.addAll(certStore.getCertificates(certSelect));
875 return certs;
883 // Set certs = new HashSet();
895 // certs.addAll(certStore.getMatches(certSelect));
906 // return certs;
1437 * @param certs The certification path.
1444 protected static PublicKey getNextWorkingKey(List certs, int index) argument
1447 Certificate cert = (Certificate) certs
[all...]
/external/openssl/crypto/ocsp/
H A Docsp_srv.c200 if (!resp->certs && !(resp->certs = sk_X509_new_null()))
203 if(!sk_X509_push(resp->certs, cert)) return 0;
210 STACK_OF(X509) *certs, unsigned long flags)
225 for (i = 0; i < sk_X509_num(certs); i++)
227 X509 *tmpcert = sk_X509_value(certs, i);
208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_vfy.c63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id);
70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs,
75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument
82 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs);
162 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument
167 if ((signer = ocsp_find_signer_sk(certs, rid)))
173 (signer = ocsp_find_signer_sk(bs->certs, rid)))
185 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI
359 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument
428 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument
[all...]
H A Docsp_cl.c129 if (!sig->certs && !(sig->certs = sk_X509_new_null()))
132 if(!sk_X509_push(sig->certs, cert)) return 0;
147 STACK_OF(X509) *certs,
171 for (i = 0; i < sk_X509_num(certs); i++)
173 x = sk_X509_value(certs, i);
143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp.h140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
/external/openssl/crypto/pkcs7/
H A Dpk7_smime.c68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument
94 for(i = 0; i < sk_X509_num(certs); i++)
96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i)))
266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument
314 signers = PKCS7_get0_signers(p7, certs, flags);
430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags)
469 if (certs) signer = X509_find_by_issuer_and_serial (certs,
492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
511 for(i = 0; i < sk_X509_num(certs);
[all...]
/external/openssl/crypto/x509v3/
H A Dpcy_tree.c143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument
157 n = sk_X509_num(certs);
188 x = sk_X509_value(certs, i);
256 x = sk_X509_value(certs, i);
769 STACK_OF(X509) *certs,
779 ret = tree_init(&tree, certs, flags);
768 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
/external/webkit/WebCore/platform/network/curl/
H A DResourceHandleCurl.cpp144 static HashMap<String, RetainPtr<CFDataRef> > certs; local
145 return certs;
/external/chromium/net/socket/
H A Dssl_client_socket_mac.cc392 CFArrayRef certs; local
393 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs);
394 // SSLCopyPeerCertificates may succeed but return a null |certs|
397 if (status != noErr || !certs)
399 scoped_cftyperef<CFArrayRef> scoped_certs(certs);
401 DCHECK_GT(CFArrayGetCount(certs), 0);
404 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0)));
417 CFIndex certs_length = CFArrayGetCount(certs);
420 const_cast<void*>(CFArrayGetValueAtIndex(certs, i)));
/external/ipsec-tools/src/racoon/
H A Deaytest.c225 char **certs; local
339 /* get certs */
342 certs = getcerts(certpath);
347 "issuer's certs in your environment.\n\n");
349 certpath = "/usr/local/openssl/certs";
350 certs = getcerts(NULL);
354 "issuer's certs in your environment\nso not doing "
360 while (*certs != NULL) {
368 c.v = *certs;
369 c.l = strlen(*certs);
415 char **certs = NULL, **p; local
[all...]
/external/webkit/WebCore/platform/network/cf/
H A DResourceHandleCFNet.cpp103 static HashMap<String, RetainPtr<CFDataRef> > certs; local
104 return certs;
/external/wpa_supplicant/
H A Dtls_gnutls.c849 const gnutls_datum_t *certs; local
876 certs = gnutls_certificate_get_peers(conn->session, &num_certs);
877 if (certs == NULL) {
892 if (gnutls_x509_crt_import(cert, &certs[i],
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c878 const gnutls_datum_t *certs; local
922 certs = gnutls_certificate_get_peers(conn->session, &num_certs);
923 if (certs == NULL) {
940 if (gnutls_x509_crt_import(cert, &certs[i],
/external/openssl/include/openssl/
H A Docsp.h140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
H A Dts.h275 certs SEQUENCE OF ESSCertID,
507 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx
550 /* No additional certs are included in the response by default. */
551 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs);
614 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs,
660 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */
662 STACK_OF(X509) *certs; member in struct:TS_verify_ctx
701 * certs = NULL
743 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
H A Dx509.h547 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
/external/openssl/crypto/x509/
H A Dx509.h547 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
/external/chromium/net/third_party/nss/ssl/
H A Dssl3con.c700 /* Mark the suites that are backed by real tokens, certs and keys */
2721 /* We need to free up the contexts, keys and certs ! */
5527 * certChain DER-encoded certs, client cert and its signers.
6230 ** has had its server certs configured the same as the previous one.
7124 * EC certs (a requirement if we wish to support both
7337 len += certChain->certs[i].len + 3;
7340 len += certChain->certs[i].len + 3;
7361 rv = ssl3_AppendHandshakeVariable(ss, certChain->certs[i].data,
7362 certChain->certs[i].len, 3);
7365 rv = ssl3_AppendHandshakeVariable(ss, certChain->certs[
7384 ssl3CertNode *certs = (ssl3CertNode *)ss->ssl3.peerCertChain; local
7402 ssl3CertNode * certs = NULL; local
[all...]

Completed in 346 milliseconds