/external/openssl/crypto/ocsp/ |
H A D | ocsp.h | 147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 441 STACK_OF(X509) *certs, 463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 486 STACK_OF(X509) *certs, unsigned long flags); 563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/external/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 768 STACK_OF(X509) *certs, 778 ret = tree_init(&tree, certs, flags); 767 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/openssl/include/openssl/ |
H A D | ocsp.h | 147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 441 STACK_OF(X509) *certs, 463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 486 STACK_OF(X509) *certs, unsigned long flags); 563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
H A D | pkcs7.h | 355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 363 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 365 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
H A D | ts.h | 272 certs SEQUENCE OF ESSCertID, 504 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx 547 /* No additional certs are included in the response by default. */ 548 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 611 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 657 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ 659 STACK_OF(X509) *certs; member in struct:TS_verify_ctx 698 * certs = NULL 740 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStoreTest.java | 155 Certificate certs[] = { 165 kss[i].setKeyEntry(alias, kk, certs); 171 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys/ |
H A D | enterprise_platform_keys_api.cc | 176 scoped_ptr<net::CertificateList> certs, 185 for (net::CertificateList::const_iterator it = certs->begin(); 186 it != certs->end(); 175 OnGotCertificates( scoped_ptr<net::CertificateList> certs, const std::string& error_message) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 116 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi 234 Enumeration e = certs.keys(); 256 return (certs.get(alias) != null || keys.get(alias) != null); 269 Certificate c = (Certificate)certs.remove(alias); 301 Certificate c = (Certificate)certs.get(alias); 325 Enumeration c = certs.elements(); 326 Enumeration k = certs.keys(); 466 if (keys.get(alias) == null && certs.get(alias) == null) 489 return (certs.get(alias) != null && keys.get(alias) == null); 508 certs [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | user_network_configuration_updater.h | 80 // Sets |certs| to the list of Web trusted server and CA certificates from the 82 void GetWebTrustedCertificates(net::CertificateList* certs) const;
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | TrustManagerImplTest.java | 136 List<X509Certificate> certs = tmi.checkServerTrusted(chain2, "RSA", new MySSLSession( 138 assertEquals(Arrays.asList(chain3), certs); 139 certs = tmi.checkServerTrusted(chain1, "RSA", new MySSLSession("purple.com")); 140 assertEquals(Arrays.asList(chain3), certs);
|
H A D | TrustedCertificateStoreTest.java | 647 final List<X509Certificate> certs; 649 certs = future.get(10, TimeUnit.SECONDS); 654 assertEquals(3, certs.size()); 655 assertEquals(getCertLoopEe(), certs.get(0)); 656 assertEquals(getCertLoopCa1(), certs.get(1)); 657 assertEquals(getCertLoopCa2(), certs.get(2));
|
/external/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 363 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 365 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 366 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory4Test.java | 94 Collection certs = fact.generateCertificates(is); 97 + "\" were not parsed correctly", certs);
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustManagerImpl.java | 192 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { argument 193 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); 194 for (X509Certificate cert : certs) { 214 * chain is pinned appropriately for that host. If null, it does not check for pinned certs. 233 * null, it does not check for pinned certs. The return value is a list of 296 // build the cert path from the array of certs sans trust anchors 357 * md2WithRSAEncryption. This also handles removing old certs 358 * after bridge CA certs. 404 // This avoids including "bridge" CA certs that added for legacy compatibility.
|
/external/chromium_org/chrome/browser/resources/net_internals/ |
H A D | log_view_painter.js | 587 var certs = entry.params.certificates.reduce(function(previous, current) { 591 out.writeSpaceIndentedLines(8, certs); 597 var certs = entry.params.verified_cert.certificates.reduce( 602 out.writeSpaceIndentedLines(8, certs);
|
/external/chromium_org/net/ssl/ |
H A D | default_channel_id_store.h | 23 // This class is the system for storing and retrieving server bound certs. 25 // and synchronizes server bound certs to an optional permanent storage that 80 // Deletes all of the certs. Does not delete them from |store_|. 99 // Initializes the backing store and reads existing certs from it. 104 void OnLoaded(scoped_ptr<ScopedVector<ChannelID> > certs);
|
/external/openssl/apps/ |
H A D | CA.sh | 109 mkdir -p ${CATOP}/certs
|
/external/chromium_org/chromeos/network/ |
H A D | network_cert_migrator.cc | 54 // the nickname of each certificate of |certs|. If a match is found, the 68 MigrationTask(const net::CertificateList& certs, argument 70 : certs_(certs), 356 // Maybe there are networks referring to certs that were not loaded before but
|
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | setup.sh | 20 mkdir -p rootCA/certs rootCA/crl rootCA/newcerts rootCA/private 39 mkdir -p demoCA/certs demoCA/crl demoCA/newcerts demoCA/private
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_certificate_unittest.cc | 864 CertificateList certs = CreateCertificateListFromFile( local 866 ASSERT_FALSE(certs.empty()); 867 ASSERT_LE(certs.size(), arraysize(test_data_.chain_fingerprints)); 868 CheckGoogleCert(certs.front(), google_parse_fingerprint, 876 EXPECT_EQ(i, certs.size()); 881 ASSERT_LT(i, certs.size()); 885 const X509Certificate* cert = certs[i].get();
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|