/external/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 54 if (certs == NULL) 55 certs = cert; 62 if (x509_certificate_chain_validate(last, certs, &reason) < 0) {
|
/external/chromium/net/base/ |
H A D | cert_database_nss_unittest.cc | 70 CertificateList certs = ListCertsInSlot(slot); local 71 for (size_t i = 0; i < certs.size(); ++i) { 72 if (!cert_db.DeleteCertAndKey(certs[i])) 85 bool ReadCertIntoList(const std::string& name, CertificateList* certs) { argument 95 certs->push_back(cert); 145 CertificateList certs; local 146 cert_db_.ListCerts(&certs); 149 EXPECT_LT(0U, certs.size()); 189 CertificateList certs = local 192 ASSERT_EQ(1U, certs 221 CertificateList certs = local 252 CertificateList certs = local 283 CertificateList certs = local 304 CertificateList certs; local 330 CertificateList certs; local 367 CertificateList certs; local 387 CertificateList certs; local 409 CertificateList certs = local 440 CertificateList certs = local 470 CertificateList certs; local [all...] |
H A D | cert_database_openssl.cc | 39 void CertDatabase::ListCerts(CertificateList* certs) { argument 70 int CertDatabase::ExportToPKCS12(const CertificateList& certs, argument
|
H A D | cert_database.h | 74 // client certs of each type. 100 void ListCerts(CertificateList* certs); 124 int ExportToPKCS12(const CertificateList& certs, const string16& password, 145 // additional certs should be intermediate/CA certs and will be imported but
|
H A D | cert_database_nss.cc | 96 void CertDatabase::ListCerts(CertificateList* certs) { argument 97 certs->clear(); 104 certs->push_back(X509Certificate::CreateFromHandle( 170 const CertificateList& certs, 173 return psm::nsPKCS12Blob_Export(output, certs, password); 169 ExportToPKCS12( const CertificateList& certs, const string16& password, std::string* output) const argument
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPath.java | 61 * @param certs 64 List certs) 66 if (certs.size() < 2) 68 return certs; 71 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); 74 for (int i = 1; i != certs.size(); i++) 76 X509Certificate cert = (X509Certificate)certs.get(i); 80 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); 91 return certs; 95 List retList = new ArrayList(certs 63 sortCerts( List certs) argument [all...] |
H A D | RFC3280CertPathUtilities.java | 459 // get CRL signing certs 519 List certs = builder.build(params).getCertPath().getCertificates(); 521 validKeys.add(CertPathValidatorUtilities.getNextWorkingKey(certs, 0)); 867 List certs = certPath.getCertificates(); 868 X509Certificate cert = (X509Certificate)certs.get(index); 869 int n = certs.size(); 1051 List certs = certPath.getCertificates(); 1052 X509Certificate cert = (X509Certificate)certs.get(index); 1127 List certs = certPath.getCertificates(); 1128 X509Certificate cert = (X509Certificate)certs [all...] |
H A D | X509CRLObject.java | 255 Enumeration certs = c.getRevokedCertificateEnumeration(); 258 while (certs.hasMoreElements()) 260 TBSCertList.CRLEntry entry = (TBSCertList.CRLEntry)certs.nextElement(); 271 Enumeration certs = c.getRevokedCertificateEnumeration(); 274 while (certs.hasMoreElements()) 276 TBSCertList.CRLEntry entry = (TBSCertList.CRLEntry)certs.nextElement(); 489 TBSCertList.CRLEntry[] certs = c.getRevokedCertificates(); 491 if (certs != null) 495 for (int i = 0; i < certs.length; i++) 497 if (certs[ [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | CertificateMessageTest.java | 64 assertEquals("incorrect message", 0, message.certs.length); 76 assertEquals("incorrect message_2", 0, message_2.certs.length); 93 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0] 104 assertEquals("Incorrect message decoding", message.certs.length, message_2.certs.length); 105 assertTrue("incorrect cert encoding", Arrays.equals(message.certs[0] 106 .getEncoded(), message_2.certs[0].getEncoded()));
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 162 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 185 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI 359 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 428 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument [all...] |
H A D | ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i); 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_prn.c | 170 for (i=0; i<sk_X509_num(sig->certs); i++) 172 X509_print(bp, sk_X509_value(sig->certs,i)); 173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i)); 280 for (i=0; i<sk_X509_num(br->certs); i++) 282 X509_print(bp, sk_X509_value(br->certs,i)); 283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
|
H A D | ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i); 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/chromium/net/socket/ |
H A D | ssl_host_info.cc | 23 certs.clear(); 94 state->certs.push_back(der_cert); 113 if (!state->certs.empty()) { 114 std::vector<base::StringPiece> der_certs(state->certs.size()); 115 for (size_t i = 0; i < state->certs.size(); i++) 116 der_certs[i] = state->certs[i]; 147 i = state_.certs.begin(); i != state_.certs.end(); i++) { 155 if (!p.WriteInt(state_.certs.size())) 159 i = state_.certs [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | TestCertUtils.java | 69 * real chain of certificates, it's just an array of 3 certs. The method 104 Certificate[] certs = new Certificate[howMany]; 106 certs[i] = new TestCertificate(Integer.toString(startID + i)); 108 return new TestCertPath(certs); 155 private Certificate[] certs; field in class:TestCertUtils.TestCertPath 165 certs = getCertChain(); 173 * @param certs 175 public TestCertPath(Certificate[] certs) { argument 177 this.certs = certs; 674 engineGenerateCertPath(List certs) argument [all...] |
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
H A D | HandshakeCompletedEventTest.java | 101 Certificate[] certs = event.getLocalCertificates(); 103 if (certs == null && ses_certs == null) { 106 if (certs == null || ses_certs == null) { 109 for (int i = 0; i < certs.length; i++) { 110 if (certs[i] != ses_certs[i]) {
|
/external/openssl/apps/ |
H A D | nseq.c | 133 seq->certs = sk_X509_new_null(); 135 sk_X509_push(seq->certs,x509); 137 if(!sk_X509_num(seq->certs)) 139 BIO_printf (bio_err, "Error reading certs file %s\n", infile); 154 for(i = 0; i < sk_X509_num(seq->certs); i++) { 155 x509 = sk_X509_value(seq->certs, i);
|
H A D | pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 245 STACK_OF(X509) *certs=NULL; 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert; 263 if (certs != NULL) 267 for (i=0; i<sk_X509_num(certs); i++) 269 x=sk_X509_value(certs,i);
|
/external/openssl/crypto/asn1/ |
H A D | nsseq.c | 80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
|
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 35 certs = $dir/certs # Where the issued certs are kept 40 new_certs_dir = $dir/newcerts # default place for new certs.
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory3Test.java | 90 Certificate[] certs = new Certificate[3]; 92 certs[i] = certFs[i].generateCertificate(new ByteArrayInputStream( 95 assertEquals(certs[0], certs[1]); 96 assertEquals(certs[0], certs[2]);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory_ImplTest.java | 348 private void verifyCertificates(Collection certs) throws Exception { argument 351 for (Iterator it = certs.iterator(); it.hasNext();) { 545 Collection certs = 547 assertNotNull("Factory returned null on correct data", certs); 549 expected_size, certs.size()); 550 verifyCertificates(certs); 577 Collection certs = factory.generateCertificates(bais); 578 assertNotNull("Factory returned null on correct PKCS7 data", certs); 580 2, certs.size()); 583 for (Iterator it = certs [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore_Impl1Test.java | 462 KeyStoreTestSupport.MCertificate certs[] = { 469 certs); 505 certs.length); 507 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 522 certs.length); 524 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 730 KeyStoreTestSupport.MCertificate certs[] = { 746 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 765 kss[i].setKeyEntry(aliases[j], key, pwd, certs); 768 kss[i].setKeyEntry("KeyAlias", key, pwd, certs); [all...] |