/external/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPath.java | 61 * @param certs 64 List certs) 66 if (certs.size() < 2) 68 return certs; 71 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); 74 for (int i = 1; i != certs.size(); i++) 76 X509Certificate cert = (X509Certificate)certs.get(i); 80 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); 91 return certs; 95 List retList = new ArrayList(certs 63 sortCerts( List certs) argument [all...] |
H A D | JDKPKCS12KeyStore.java | 90 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:JDKPKCS12KeyStore 208 Enumeration e = certs.keys(); 230 return (certs.get(alias) != null || keys.get(alias) != null); 243 Certificate c = (Certificate)certs.remove(alias); 283 Certificate c = (Certificate)certs.get(alias); 307 Enumeration c = certs.elements(); 308 Enumeration k = certs.keys(); 448 if (keys.get(alias) == null && certs.get(alias) == null) { 471 return (certs.get(alias) != null && keys.get(alias) == null); 490 certs [all...] |
H A D | CertPathValidatorUtilities.java | 729 Set certs = new HashSet(); 741 certs.addAll(certStore.getMatches(certSelect)); 757 certs.addAll(certStore.getCertificates(certSelect)); 767 return certs; 775 // Set certs = new HashSet(); 787 // certs.addAll(certStore.getMatches(certSelect)); 798 // return certs; 1294 * @param certs The certification path. 1301 protected static PublicKey getNextWorkingKey(List certs, int index) argument 1304 Certificate cert = (Certificate) certs [all...] |
/external/chromium/net/base/ |
H A D | cert_database_openssl.cc | 39 void CertDatabase::ListCerts(CertificateList* certs) { argument 70 int CertDatabase::ExportToPKCS12(const CertificateList& certs, argument
|
H A D | cert_database_nss_unittest.cc | 70 CertificateList certs = ListCertsInSlot(slot); local 71 for (size_t i = 0; i < certs.size(); ++i) { 72 if (!cert_db.DeleteCertAndKey(certs[i])) 85 bool ReadCertIntoList(const std::string& name, CertificateList* certs) { argument 95 certs->push_back(cert); 145 CertificateList certs; local 146 cert_db_.ListCerts(&certs); 149 EXPECT_LT(0U, certs.size()); 189 CertificateList certs = local 192 ASSERT_EQ(1U, certs 221 CertificateList certs = local 252 CertificateList certs = local 283 CertificateList certs = local 304 CertificateList certs; local 330 CertificateList certs; local 367 CertificateList certs; local 387 CertificateList certs; local 409 CertificateList certs = local 440 CertificateList certs = local 470 CertificateList certs; local [all...] |
H A D | cert_database_nss.cc | 96 void CertDatabase::ListCerts(CertificateList* certs) { argument 97 certs->clear(); 104 certs->push_back(X509Certificate::CreateFromHandle( 170 const CertificateList& certs, 173 return psm::nsPKCS12Blob_Export(output, certs, password); 169 ExportToPKCS12( const CertificateList& certs, const string16& password, std::string* output) const argument
|
H A D | x509_certificate.cc | 92 "Only insert certs with real fingerprints."; 394 bool X509Certificate::HasIntermediateCertificates(const OSCertHandles& certs) { argument 395 for (size_t i = 0; i < certs.size(); ++i) { 396 if (!HasIntermediateCertificate(certs[i]))
|
H A D | x509_certificate_unittest.cc | 26 // turn this on to test EV certs. But leave it turned off for the automated 991 CertificateList certs = CreateCertificateListFromFile( local 993 ASSERT_FALSE(certs.empty()); 994 ASSERT_LE(certs.size(), arraysize(test_data_.chain_fingerprints)); 995 CheckGoogleCert(certs.front(), google_parse_fingerprint, 1003 EXPECT_EQ(i, certs.size()); 1008 ASSERT_LT(i, certs.size()); 1012 const X509Certificate* cert = certs[i];
|
H A D | x509_certificate_nss.cc | 599 CollectCertsCallback(void* arg, SECItem** certs, int num_certs) { argument 606 reinterpret_cast<char*>(certs[i]->data), certs[i]->len);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory_ImplTest.java | 348 private void verifyCertificates(Collection certs) throws Exception { argument 351 for (Iterator it = certs.iterator(); it.hasNext();) { 545 Collection certs = 547 assertNotNull("Factory returned null on correct data", certs); 549 expected_size, certs.size()); 550 verifyCertificates(certs); 577 Collection certs = factory.generateCertificates(bais); 578 assertNotNull("Factory returned null on correct PKCS7 data", certs); 580 2, certs.size()); 583 for (Iterator it = certs [all...] |
/external/chromium/net/socket/ |
H A D | ssl_host_info.h | 69 // certs is a vector of DER encoded X.509 certificates, as the server 71 std::vector<std::string> certs; member in struct:net::SSLHostInfo::State 87 // |state().certs| is still being validated and arranges for the given
|
H A D | ssl_client_socket_mac.cc | 417 CFArrayRef certs; local 418 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs); 419 // SSLCopyPeerCertificates may succeed but return a null |certs| 422 if (status != noErr || !certs) 424 base::mac::ScopedCFTypeRef<CFArrayRef> scoped_certs(certs); 426 DCHECK_GT(CFArrayGetCount(certs), 0); 432 CFIndex certs_length = CFArrayGetCount(certs); 435 const_cast<void*>(CFArrayGetValueAtIndex(certs, i))); 440 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0))); 744 // I'm being asked for available client certs (identitie [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i); 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_vfy.c | 63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 162 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 185 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI 359 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 428 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument [all...] |
H A D | ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i); 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); [all...] |
/external/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 768 STACK_OF(X509) *certs, 778 ret = tree_init(&tree, certs, flags); 767 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/webkit/Source/WebCore/platform/network/curl/ |
H A D | ResourceHandleCurl.cpp | 146 static HashMap<String, RetainPtr<CFDataRef> > certs; local 147 return certs;
|
/external/chromium/chrome/common/net/ |
H A D | x509_certificate_model_openssl.cc | 176 const std::vector<scoped_refptr<net::X509Certificate> >& certs, 175 GetNicknameStringsFromCertList( const std::vector<scoped_refptr<net::X509Certificate> >& certs, const std::string& cert_expired, const std::string& cert_not_yet_valid, std::vector<std::string>* nick_names) argument
|
H A D | x509_certificate_model_nss.cc | 233 const std::vector<scoped_refptr<X509Certificate> >& certs, 238 for (size_t i = 0; i < certs.size(); ++i) { 241 CERT_DupCertificate(certs[i]->os_cert_handle())); 251 static_cast<int>(certs.size())); 232 GetNicknameStringsFromCertList( const std::vector<scoped_refptr<X509Certificate> >& certs, const string& cert_expired, const string& cert_not_yet_valid, std::vector<string>* nick_names) argument
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | TestCertUtils.java | 69 * real chain of certificates, it's just an array of 3 certs. The method 104 Certificate[] certs = new Certificate[howMany]; 106 certs[i] = new TestCertificate(Integer.toString(startID + i)); 108 return new TestCertPath(certs); 155 private Certificate[] certs; field in class:TestCertUtils.TestCertPath 165 certs = getCertChain(); 173 * @param certs 175 public TestCertPath(Certificate[] certs) { argument 177 this.certs = certs; 674 engineGenerateCertPath(List certs) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
H A D | ResourceHandleCFNet.cpp | 116 static HashMap<String, RetainPtr<CFDataRef> > certs; local 117 return certs;
|