/external/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPath.java | 61 * @param certs 64 List certs) 66 if (certs.size() < 2) 68 return certs; 71 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); 74 for (int i = 1; i != certs.size(); i++) 76 X509Certificate cert = (X509Certificate)certs.get(i); 80 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); 91 return certs; 95 List retList = new ArrayList(certs 63 sortCerts( List certs) argument [all...] |
H A D | JDKPKCS12KeyStore.java | 85 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:JDKPKCS12KeyStore 203 Enumeration e = certs.keys(); 225 return (certs.get(alias) != null || keys.get(alias) != null); 238 Certificate c = (Certificate)certs.remove(alias); 278 Certificate c = (Certificate)certs.get(alias); 302 Enumeration c = certs.elements(); 303 Enumeration k = certs.keys(); 443 if (keys.get(alias) == null && certs.get(alias) == null) { 466 return (certs.get(alias) != null && keys.get(alias) == null); 485 certs [all...] |
H A D | CertPathValidatorUtilities.java | 837 Set certs = new HashSet(); 849 certs.addAll(certStore.getMatches(certSelect)); 865 certs.addAll(certStore.getCertificates(certSelect)); 875 return certs; 883 // Set certs = new HashSet(); 895 // certs.addAll(certStore.getMatches(certSelect)); 906 // return certs; 1437 * @param certs The certification path. 1444 protected static PublicKey getNextWorkingKey(List certs, int index) argument 1447 Certificate cert = (Certificate) certs [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i); 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_vfy.c | 63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 162 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 185 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI 359 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 428 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument [all...] |
H A D | ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i); 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); [all...] |
/external/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 769 STACK_OF(X509) *certs, 779 ret = tree_init(&tree, certs, flags); 768 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/webkit/WebCore/platform/network/curl/ |
H A D | ResourceHandleCurl.cpp | 144 static HashMap<String, RetainPtr<CFDataRef> > certs; local 145 return certs;
|
/external/chromium/net/socket/ |
H A D | ssl_client_socket_mac.cc | 392 CFArrayRef certs; local 393 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs); 394 // SSLCopyPeerCertificates may succeed but return a null |certs| 397 if (status != noErr || !certs) 399 scoped_cftyperef<CFArrayRef> scoped_certs(certs); 401 DCHECK_GT(CFArrayGetCount(certs), 0); 404 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0))); 417 CFIndex certs_length = CFArrayGetCount(certs); 420 const_cast<void*>(CFArrayGetValueAtIndex(certs, i)));
|
/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/webkit/WebCore/platform/network/cf/ |
H A D | ResourceHandleCFNet.cpp | 103 static HashMap<String, RetainPtr<CFDataRef> > certs; local 104 return certs;
|
/external/wpa_supplicant/ |
H A D | tls_gnutls.c | 849 const gnutls_datum_t *certs; local 876 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 877 if (certs == NULL) { 892 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 878 const gnutls_datum_t *certs; local 922 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 923 if (certs == NULL) { 940 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/openssl/include/openssl/ |
H A D | ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
H A D | ts.h | 275 certs SEQUENCE OF ESSCertID, 507 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx 550 /* No additional certs are included in the response by default. */ 551 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 614 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 660 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ 662 STACK_OF(X509) *certs; member in struct:TS_verify_ctx 701 * certs = NULL 743 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
|
H A D | x509.h | 547 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 547 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
|
/external/chromium/net/third_party/nss/ssl/ |
H A D | ssl3con.c | 700 /* Mark the suites that are backed by real tokens, certs and keys */ 2721 /* We need to free up the contexts, keys and certs ! */ 5527 * certChain DER-encoded certs, client cert and its signers. 6230 ** has had its server certs configured the same as the previous one. 7124 * EC certs (a requirement if we wish to support both 7337 len += certChain->certs[i].len + 3; 7340 len += certChain->certs[i].len + 3; 7361 rv = ssl3_AppendHandshakeVariable(ss, certChain->certs[i].data, 7362 certChain->certs[i].len, 3); 7365 rv = ssl3_AppendHandshakeVariable(ss, certChain->certs[ 7384 ssl3CertNode *certs = (ssl3CertNode *)ss->ssl3.peerCertChain; local 7402 ssl3CertNode * certs = NULL; local [all...] |