Searched refs:certs (Results 101 - 125 of 173) sorted by relevance

1234567

/external/openssl/crypto/ocsp/
H A Docsp.h147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
441 STACK_OF(X509) *certs,
463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
486 STACK_OF(X509) *certs, unsigned long flags);
563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
/external/openssl/crypto/x509v3/
H A Dpcy_tree.c143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument
157 n = sk_X509_num(certs);
188 x = sk_X509_value(certs, i);
256 x = sk_X509_value(certs, i);
768 STACK_OF(X509) *certs,
778 ret = tree_init(&tree, certs, flags);
767 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
/external/openssl/include/openssl/
H A Docsp.h147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
441 STACK_OF(X509) *certs,
463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
486 STACK_OF(X509) *certs, unsigned long flags);
563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
H A Dpkcs7.h355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
363 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
365 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
H A Dts.h272 certs SEQUENCE OF ESSCertID,
504 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx
547 /* No additional certs are included in the response by default. */
548 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs);
611 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs,
657 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */
659 STACK_OF(X509) *certs; member in struct:TS_verify_ctx
698 * certs = NULL
740 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStoreTest.java155 Certificate certs[] = {
165 kss[i].setKeyEntry(alias, kk, certs);
171 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys/
H A Denterprise_platform_keys_api.cc176 scoped_ptr<net::CertificateList> certs,
185 for (net::CertificateList::const_iterator it = certs->begin();
186 it != certs->end();
175 OnGotCertificates( scoped_ptr<net::CertificateList> certs, const std::string& error_message) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
H A DPKCS12KeyStoreSpi.java116 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi
234 Enumeration e = certs.keys();
256 return (certs.get(alias) != null || keys.get(alias) != null);
269 Certificate c = (Certificate)certs.remove(alias);
301 Certificate c = (Certificate)certs.get(alias);
325 Enumeration c = certs.elements();
326 Enumeration k = certs.keys();
466 if (keys.get(alias) == null && certs.get(alias) == null)
489 return (certs.get(alias) != null && keys.get(alias) == null);
508 certs
[all...]
/external/chromium_org/chrome/browser/chromeos/policy/
H A Duser_network_configuration_updater.h80 // Sets |certs| to the list of Web trusted server and CA certificates from the
82 void GetWebTrustedCertificates(net::CertificateList* certs) const;
/external/conscrypt/src/test/java/org/conscrypt/
H A DTrustManagerImplTest.java136 List<X509Certificate> certs = tmi.checkServerTrusted(chain2, "RSA", new MySSLSession(
138 assertEquals(Arrays.asList(chain3), certs);
139 certs = tmi.checkServerTrusted(chain1, "RSA", new MySSLSession("purple.com"));
140 assertEquals(Arrays.asList(chain3), certs);
H A DTrustedCertificateStoreTest.java647 final List<X509Certificate> certs;
649 certs = future.get(10, TimeUnit.SECONDS);
654 assertEquals(3, certs.size());
655 assertEquals(getCertLoopEe(), certs.get(0));
656 assertEquals(getCertLoopCa1(), certs.get(1));
657 assertEquals(getCertLoopCa2(), certs.get(2));
/external/openssl/crypto/pkcs7/
H A Dpkcs7.h355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
363 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store,
365 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags);
366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
H A DCertificateFactory4Test.java94 Collection certs = fact.generateCertificates(is);
97 + "\" were not parsed correctly", certs);
/external/conscrypt/src/platform/java/org/conscrypt/
H A DTrustManagerImpl.java192 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { argument
193 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length);
194 for (X509Certificate cert : certs) {
214 * chain is pinned appropriately for that host. If null, it does not check for pinned certs.
233 * null, it does not check for pinned certs. The return value is a list of
296 // build the cert path from the array of certs sans trust anchors
357 * md2WithRSAEncryption. This also handles removing old certs
358 * after bridge CA certs.
404 // This avoids including "bridge" CA certs that added for legacy compatibility.
/external/chromium_org/chrome/browser/resources/net_internals/
H A Dlog_view_painter.js587 var certs = entry.params.certificates.reduce(function(previous, current) {
591 out.writeSpaceIndentedLines(8, certs);
597 var certs = entry.params.verified_cert.certificates.reduce(
602 out.writeSpaceIndentedLines(8, certs);
/external/chromium_org/net/ssl/
H A Ddefault_channel_id_store.h23 // This class is the system for storing and retrieving server bound certs.
25 // and synchronizes server bound certs to an optional permanent storage that
80 // Deletes all of the certs. Does not delete them from |store_|.
99 // Initializes the backing store and reads existing certs from it.
104 void OnLoaded(scoped_ptr<ScopedVector<ChannelID> > certs);
/external/openssl/apps/
H A DCA.sh109 mkdir -p ${CATOP}/certs
/external/chromium_org/chromeos/network/
H A Dnetwork_cert_migrator.cc54 // the nickname of each certificate of |certs|. If a match is found, the
68 MigrationTask(const net::CertificateList& certs, argument
70 : certs_(certs),
356 // Maybe there are networks referring to certs that were not loaded before but
/external/wpa_supplicant_8/hs20/server/ca/
H A Dsetup.sh20 mkdir -p rootCA/certs rootCA/crl rootCA/newcerts rootCA/private
39 mkdir -p demoCA/certs demoCA/crl demoCA/newcerts demoCA/private
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/chromium_org/net/cert/
H A Dx509_certificate_unittest.cc864 CertificateList certs = CreateCertificateListFromFile( local
866 ASSERT_FALSE(certs.empty());
867 ASSERT_LE(certs.size(), arraysize(test_data_.chain_fingerprints));
868 CheckGoogleCert(certs.front(), google_parse_fingerprint,
876 EXPECT_EQ(i, certs.size());
881 ASSERT_LT(i, certs.size());
885 const X509Certificate* cert = certs[i].get();
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp_curl.c1043 STACK_OF(X509) *certs = NULL;
1089 certs = sk_X509_new_null();
1090 if (certs) {
1093 if (cert && !sk_X509_push(certs, cert)) {
1098 sk_X509_free(certs);
1099 certs = NULL;
1103 if (cert && !sk_X509_push(certs, cert)) {
1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1114 sk_X509_pop_free(certs, X509_free);
/external/wpa_supplicant_8/src/utils/
H A Dhttp_curl.c1043 STACK_OF(X509) *certs = NULL;
1089 certs = sk_X509_new_null();
1090 if (certs) {
1093 if (cert && !sk_X509_push(certs, cert)) {
1098 sk_X509_free(certs);
1099 certs = NULL;
1103 if (cert && !sk_X509_push(certs, cert)) {
1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1114 sk_X509_pop_free(certs, X509_free);

Completed in 840 milliseconds

1234567