/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 166 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 189 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI 363 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 432 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument [all...] |
H A D | ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i); 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedGenerator.java | 86 protected List certs = new ArrayList(); field in class:CMSSignedGenerator 118 certs.add(certificate.toASN1Structure()); 131 certs.addAll(CMSUtils.getCertificatesFromStore(certStore)); 167 certs.add(new DERTaggedObject(false, 2, attrCert.toASN1Structure())); 180 certs.addAll(CMSUtils.getAttributeCertificatesFromStore(attrStore));
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | certificate_viewer_webui.cc | 106 const net::X509Certificate::OSCertHandles& certs = local 108 cert_chain.insert(cert_chain.end(), certs.begin(), certs.end()); 256 const net::X509Certificate::OSCertHandles& certs = local 258 cert_chain_.insert(cert_chain_.end(), certs.begin(), certs.end());
|
/external/chromium_org/chromeos/network/ |
H A D | network_cert_migrator.cc | 54 // the nickname of each certificate of |certs|. If a match is found, the 68 MigrationTask(const net::CertificateList& certs, argument 70 : certs_(certs), 356 // Maybe there are networks referring to certs that were not loaded before but
|
H A D | client_cert_resolver.cc | 133 const net::CertificateList& certs) { 134 // Filter all client certs and determines each certificate's issuer, which is 137 for (net::CertificateList::const_iterator it = certs.begin(); 138 it != certs.end(); ++it) { 153 net::X509Certificate::OSCertHandles() /* no intermediate certs */); 171 // Searches for matches between |networks| and |certs| and writes matches to 174 void FindCertificateMatches(const net::CertificateList& certs, argument 177 std::vector<CertAndIssuer> client_certs(CreateSortedCertAndIssuerList(certs)); 272 // Prepare and sort the list of known client certs. 132 CreateSortedCertAndIssuerList( const net::CertificateList& certs) argument
|
/external/chromium_org/net/quic/crypto/ |
H A D | cert_compressor.cc | 175 // efficiently represent |certs| to a peer who has the common sets identified 178 vector<CertEntry> MatchCerts(const vector<string>& certs, argument 183 entries.reserve(certs.size()); 189 for (vector<string>::const_iterator i = certs.begin(); 190 i != certs.end(); ++i) { 286 // |certs| is one-to-one with |entries| and contains the certificates for those 289 const vector<string>& certs) { 292 // The dictionary starts with the common and cached certs in reverse order. 294 for (size_t i = certs.size() - 1; i < certs 288 ZlibDictForEntries(const vector<CertEntry>& entries, const vector<string>& certs) argument 320 HashCerts(const vector<string>& certs) argument 458 CompressChain(const vector<string>& certs, StringPiece client_common_set_hashes, StringPiece client_cached_cert_hashes, const CommonCertSets* common_sets) argument [all...] |
H A D | proof_verifier_chromium.cc | 56 const std::vector<std::string>& certs, 86 // |hostname| specifies the hostname for which |certs| is a valid chain. 118 const vector<string>& certs, 137 if (certs.empty()) { 145 // Convert certs to X509Certificate. 146 vector<StringPiece> cert_pieces(certs.size()); 147 for (unsigned i = 0; i < certs.size(); i++) { 148 cert_pieces[i] = base::StringPiece(certs[i]); 161 if (!VerifySignature(server_config, signature, certs[0])) { 355 const std::vector<std::string>& certs, 115 VerifyProof( const string& hostname, const string& server_config, const vector<string>& certs, const string& signature, std::string* error_details, scoped_ptr<ProofVerifyDetails>* verify_details, ProofVerifierCallback* callback) argument 352 VerifyProof( const std::string& hostname, const std::string& server_config, const std::vector<std::string>& certs, const std::string& signature, const ProofVerifyContext* verify_context, std::string* error_details, scoped_ptr<ProofVerifyDetails>* verify_details, ProofVerifierCallback* callback) argument [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsPKCS12Blob.cpp | 383 // Having already loaded the certs, form them into a blob (loading the keys 392 const net::CertificateList& certs, 420 for (size_t i=0; i<certs.size(); i++) { 421 DCHECK(certs[i].get()); 422 CERTCertificate* nssCert = certs[i]->os_cert_handle(); 391 nsPKCS12Blob_Export(std::string* output, const net::CertificateList& certs, const base::string16& password) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
H A D | pcy_tree.c | 146 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 160 n = sk_X509_num(certs); 191 x = sk_X509_value(certs, i); 259 x = sk_X509_value(certs, i); 772 STACK_OF(X509) *certs, 782 ret = tree_init(&tree, certs, flags); 771 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustManagerImpl.java | 192 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { argument 193 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); 194 for (X509Certificate cert : certs) { 214 * chain is pinned appropriately for that host. If null, it does not check for pinned certs. 233 * null, it does not check for pinned certs. The return value is a list of 296 // build the cert path from the array of certs sans trust anchors 357 * md2WithRSAEncryption. This also handles removing old certs 358 * after bridge CA certs. 404 // This avoids including "bridge" CA certs that added for legacy compatibility.
|
/external/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 768 STACK_OF(X509) *certs, 778 ret = tree_init(&tree, certs, flags); 767 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | network_configuration_updater_unittest.cc | 226 base::ListValue* certs = NULL; variable 228 onc::toplevel_config::kCertificates, &certs); 229 AppendAll(*certs, &fake_certificates_); 375 false /* do not allow trusted certs from policy */, 396 false /* do not allow trusted certs from policy */, 433 true /* allow trusted certs from policy */, 454 true /* allow trusted certs from policy */, 518 true /* allow trusted certs from policy */, 562 false /* do not allow trusted certs from policy */,
|
/external/chromium_org/net/cert/ |
H A D | nss_cert_database.cc | 99 void NSSCertDatabase::ListCertsSync(CertificateList* certs) { argument 100 ListCertsImpl(crypto::ScopedPK11Slot(), certs); local 104 const base::Callback<void(scoped_ptr<CertificateList> certs)>& callback) { 105 scoped_ptr<CertificateList> certs(new CertificateList()); 107 // base::Passed will NULL out |certs|, so cache the underlying pointer here. 108 CertificateList* raw_certs = certs.get(); 114 base::Bind(callback, base::Passed(&certs))); 120 scoped_ptr<CertificateList> certs(new CertificateList()); 122 // base::Passed will NULL out |certs|, so cache the underlying pointer here. 123 CertificateList* raw_certs = certs 201 ExportToPKCS12( const CertificateList& certs, const base::string16& password, std::string* output) const argument 406 ListCertsImpl(crypto::ScopedPK11Slot slot, CertificateList* certs) argument [all...] |
H A D | cert_verify_proc_nss.cc | 275 std::vector<CERTCertificate*> certs; local 281 certs.push_back(node->cert); 285 certs.push_back(root); 298 for (std::vector<CERTCertificate*>::reverse_iterator i = certs.rbegin(); 299 i != certs.rend(); ++i) {
|
H A D | x509_util_nss.cc | 201 SECItem** certs, 209 reinterpret_cast<char*>(certs[i]->data), certs[i]->len); 200 CollectCertsCallback(void* arg, SECItem** certs, int num_certs) argument
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssidentity.cc | 100 std::vector<SSLCertificate*> certs; local 102 certs.push_back(new NSSCertificate(node->cert)); 105 if (!certs.empty()) 106 chain_.reset(new SSLCertChain(certs)); 110 std::for_each(certs.begin(), certs.end(), DeleteCert);
|
/external/openssl/crypto/cms/ |
H A D | cms_smime.c | 281 STACK_OF(X509) *certs, 289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) 316 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, argument 349 scount += CMS_set1_signers_certs(cms, certs, flags); 357 /* Attempt to verify all signers certs */ 449 STACK_OF(X509) *certs, 454 r = CMS_verify(rcms, certs, store, NULL, NULL, flags); 460 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 476 for (i = 0; i < sk_X509_num(certs); i++) 478 X509 *x = sk_X509_value(certs, 279 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, unsigned int flags) argument 448 CMS_verify_receipt(CMS_ContentInfo *rcms, CMS_ContentInfo *ocms, STACK_OF(X509) *certs, X509_STORE *store, unsigned int flags) argument 501 CMS_sign_receipt(CMS_SignerInfo *si, X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, unsigned int flags) argument [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | TestCertUtils.java | 68 * real chain of certificates, it's just an array of 3 certs. The method 103 Certificate[] certs = new Certificate[howMany]; 105 certs[i] = new TestCertificate(Integer.toString(startID + i)); 107 return new TestCertPath(certs); 153 private Certificate[] certs; field in class:TestCertUtils.TestCertPath 163 certs = getCertChain(); 171 * @param certs 174 public TestCertPath(Certificate[] certs) { argument 176 this.certs = certs; 670 engineGenerateCertPath(List certs) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 116 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi 234 Enumeration e = certs.keys(); 256 return (certs.get(alias) != null || keys.get(alias) != null); 269 Certificate c = (Certificate)certs.remove(alias); 301 Certificate c = (Certificate)certs.get(alias); 325 Enumeration c = certs.elements(); 326 Enumeration k = certs.keys(); 466 if (keys.get(alias) == null && certs.get(alias) == null) 489 return (certs.get(alias) != null && keys.get(alias) == null); 508 certs [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 724 Set certs = new HashSet(); 737 // certs.addAll(certStore.getMatches(certSelect)); 752 certs.addAll(certStore.getCertificates(certSelect)); 762 return certs; 770 // Set certs = new HashSet(); 782 // certs.addAll(certStore.getMatches(certSelect)); 791 // return certs; 1320 * @param certs The certification path. 1327 protected static PublicKey getNextWorkingKey(List certs, int index) argument 1330 Certificate cert = (Certificate)certs [all...] |
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
H A D | platform_keys_nss.cc | 204 scoped_ptr<net::CertificateList> certs, 207 from, base::Bind(callback_, base::Passed(&certs), error_message)); 434 // Keep only user certificates, i.e. certs for which the private key is 203 CallBack(const tracked_objects::Location& from, scoped_ptr<net::CertificateList> certs, const std::string& error_message) argument
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service_unittest.cc | 295 net::CertificateList certs = local 300 return certs.empty() ? NULL : certs[0]; 1510 // used to sign the certs below. GetCertificateWhitelistStirngs doesn't care
|
/external/chromium_org/content/browser/loader/ |
H A D | resource_loader_unittest.cc | 43 ClientCertStoreStub(const net::CertificateList& certs) argument 44 : response_(certs),
|