/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|
/external/chromium_org/net/cert/ |
H A D | cert_verify_proc_nss.cc | 275 std::vector<CERTCertificate*> certs; local 281 certs.push_back(node->cert); 285 certs.push_back(root); 298 for (std::vector<CERTCertificate*>::reverse_iterator i = certs.rbegin(); 299 i != certs.rend(); ++i) {
|
H A D | x509_util_nss.cc | 201 SECItem** certs, 209 reinterpret_cast<char*>(certs[i]->data), certs[i]->len); 200 CollectCertsCallback(void* arg, SECItem** certs, int num_certs) argument
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | network_configuration_updater_unittest.cc | 226 base::ListValue* certs = NULL; variable 228 onc::toplevel_config::kCertificates, &certs); 229 AppendAll(*certs, &fake_certificates_); 375 false /* do not allow trusted certs from policy */, 396 false /* do not allow trusted certs from policy */, 433 true /* allow trusted certs from policy */, 454 true /* allow trusted certs from policy */, 518 true /* allow trusted certs from policy */, 562 false /* do not allow trusted certs from policy */,
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslplatf.c | 81 chain->certs = PORT_ArenaNewArray(arena, SECItem, len); 82 if (!chain->certs) 96 SECITEM_CopyItem(arena, &chain->certs[len], &node->cert->derCert);
|
/external/chromium_org/chrome/common/net/ |
H A D | x509_certificate_model_openssl.cc | 1141 STACK_OF(X509)* certs = sk_X509_new_null(); 1144 sk_X509_push(certs, cert_chain[i]); 1148 CBB_init(&pkcs7, 1024 * sk_X509_num(certs)); 1152 if (!PKCS7_bundle_certificates(&pkcs7, certs) || 1155 sk_X509_free(certs); 1161 sk_X509_free(certs);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KSBuilder_ImplTest.java | 139 Certificate certs[] = { 147 certs);
|
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 98 /* Just initialize SignedData e.g. for certs only structure */ 561 STACK_OF(CMS_CertificateChoices) *certs; 568 certs = sd->certificates; 589 for (j = 0; j < sk_CMS_CertificateChoices_num(certs); j++) 591 cch = sk_CMS_CertificateChoices_value(certs, j);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_vfy.c | 165 STACK_OF(X509) *certs; 168 /* Lookup all certs with matching subject name */ 169 certs = ctx->lookup_certs(ctx, X509_get_subject_name(x)); 170 if (certs == NULL) 173 for (i = 0; i < sk_X509_num(certs); i++) 175 xtmp = sk_X509_value(certs, i); 179 if (i < sk_X509_num(certs)) 183 sk_X509_pop_free(certs, X509_free); 334 /* We now lookup certs from the certificate store */ 671 /* Ignore self issued certs unles [all...] |
H A D | pkcs7_test.c | 336 STACK_OF(X509) *certs = sk_X509_new_null(); 342 if (!PKCS7_get_certificates(certs, &pkcs7)) { 348 if (!PKCS7_bundle_certificates(&cbb, certs) || 360 if (sk_X509_num(certs) != sk_X509_num(certs2)) { 361 fprintf(stderr, "Number of certs in results differ.\n"); 365 for (i = 0; i < sk_X509_num(certs); i++) { 366 X509 *a = sk_X509_value(certs, i); 391 sk_X509_pop_free(certs, X509_free);
|
/external/chromium_org/net/quic/crypto/ |
H A D | quic_crypto_server_config.cc | 1061 const vector<string>* certs; local 1064 params.x509_ecdsa_supported, &certs, 1071 *certs, params.client_common_set_hashes, params.client_cached_cert_hashes, 1133 const vector<string>* certs; local 1136 params->x509_ecdsa_supported, &certs, 1152 *certs, params->client_common_set_hashes,
|
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
H A D | platform_keys_nss.cc | 204 scoped_ptr<net::CertificateList> certs, 207 from, base::Bind(callback_, base::Passed(&certs), error_message)); 434 // Keep only user certificates, i.e. certs for which the private key is 203 CallBack(const tracked_objects::Location& from, scoped_ptr<net::CertificateList> certs, const std::string& error_message) argument
|
/external/chromium_org/content/browser/loader/ |
H A D | resource_loader_unittest.cc | 43 ClientCertStoreStub(const net::CertificateList& certs) argument 44 : response_(certs),
|
/external/chromium_org/net/quic/ |
H A D | quic_client_session.cc | 670 state->certs = cached.certs();
|
H A D | quic_crypto_client_stream.cc | 483 cached->certs(),
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
H A D | __init__.py | 1010 certs = list(self.certificates.iter(authority)) 1011 if scheme == 'https' and certs: 1012 conn = self.connections[conn_key] = connection_type(authority, key_file=certs[0][0], 1013 cert_file=certs[0][1], timeout=self.timeout, proxy_info=self.proxy_info)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.help.base_3.5.2.v201011171123.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_unittest.cc | 2417 // certs from redundant-server-chain.pem. 2469 CertificateList certs = local 2473 ASSERT_EQ(3U, certs.size()); 2476 temp_intermediates.push_back(certs[1]->os_cert_handle()); 2477 temp_intermediates.push_back(certs[2]->os_cert_handle()); 2481 certs[0]->os_cert_handle(), temp_intermediates); 2485 cert_verifier_->AddResultForCert(certs[0].get(), verify_result, OK); 2539 certs[0]->os_cert_handle())); 2541 certs[1]->os_cert_handle())); 2543 certs[ [all...] |
/external/openssl/crypto/x509/ |
H A D | x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/openssl/include/openssl/ |
H A D | x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 167 // (1) do a lookup in a table of trusted certs keyed off of consumer 175 // (1) do a lookup in a table of trusted certs keyed off of consumer
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 107 The X509_STORE has X509_LOOKUPs for looking up certs. 183 /* The following is a cache of trusted certs */ 231 int current_method; /* used when looking up certs */ 576 STACK_OF(X509) *certs,
|