/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
/external/smack/asmack-master/lib/ |
H A D | httpclient-4.1.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |
H A D | httpclient-4.0.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
/external/openssl/crypto/cms/ |
H A D | cms_smime.c | 281 STACK_OF(X509) *certs, 289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) 316 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, argument 349 scount += CMS_set1_signers_certs(cms, certs, flags); 357 /* Attempt to verify all signers certs */ 449 STACK_OF(X509) *certs, 454 r = CMS_verify(rcms, certs, store, NULL, NULL, flags); 460 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 476 for (i = 0; i < sk_X509_num(certs); i++) 478 X509 *x = sk_X509_value(certs, 279 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, unsigned int flags) argument 448 CMS_verify_receipt(CMS_ContentInfo *rcms, CMS_ContentInfo *ocms, STACK_OF(X509) *certs, X509_STORE *store, unsigned int flags) argument 501 CMS_sign_receipt(CMS_SignerInfo *si, X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, unsigned int flags) argument [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp.h | 147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 441 STACK_OF(X509) *certs, 463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 486 STACK_OF(X509) *certs, unsigned long flags); 563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
H A D | ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i); 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i); 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_vfy.c | 63 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 65 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 70 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, 75 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 166 static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, argument 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 189 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPI 363 OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags) argument 432 ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, X509_NAME *nm, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, argument 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); [all...] |
/external/openssl/crypto/x509/ |
H A D | x509.h | 548 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
|
/external/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 768 STACK_OF(X509) *certs, 778 ret = tree_init(&tree, certs, flags); 767 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/openssl/include/openssl/ |
H A D | ocsp.h | 147 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 153 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 292 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 315 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 441 STACK_OF(X509) *certs, 463 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 486 STACK_OF(X509) *certs, unsigned long flags); 563 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
H A D | ts.h | 272 certs SEQUENCE OF ESSCertID, 504 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx 547 /* No additional certs are included in the response by default. */ 548 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 611 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 657 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ 659 STACK_OF(X509) *certs; member in struct:TS_verify_ctx 698 * certs = NULL 740 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs,
|
H A D | x509.h | 548 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
|
/external/nist-pkits/src/libcore/java/security/cert/ |
H A D | X509CertificateNistPkitsTest.java | 71 final String fileName = "nist-pkits/certs/" + name; 86 X509Certificate[] certs = new X509Certificate[names.length]; 89 certs[i] = getCertificate(f, names[i]); 92 return certs; 120 X509Certificate[] certs = getCertificates(f, pathCerts); 121 return f.generateCertPath(Arrays.asList(certs)); 126 X509Certificate[] certs = getCertificates(f, pathCerts); 132 certCollection.addAll(Arrays.asList(certs)); 147 private void assertInvalidPath(String trustAnchor, String[] certs, String[] crls) argument 151 PKIXParameters params = getTestPathParams(f, trustAnchor, certs, crl 163 assertValidPath(String trustAnchor, String[] certs, String[] crls) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar | ... long serialVersionUID private java.security.cert.X509Certificate[] certs private String type public void " href="/5.1.0 ... |
H A D | org.eclipse.help.base_3.5.2.v201011171123.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.1.R36x_v20100806.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.osgi_3.6.2.R36x_v20101103.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |