Searched refs:certs (Results 51 - 75 of 79) sorted by relevance

1234

/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c2079 STACK_OF(X509) *certs;
2085 certs = NULL;
2086 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
2121 if (certs) {
2122 while ((cert = sk_X509_pop(certs)) != NULL) {
2136 sk_X509_free(certs);
3273 STACK_OF(X509) *certs = NULL;
3312 certs = sk_X509_new_null();
3313 if (certs) {
3316 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c2079 STACK_OF(X509) *certs;
2085 certs = NULL;
2086 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
2121 if (certs) {
2122 while ((cert = sk_X509_pop(certs)) != NULL) {
2136 sk_X509_free(certs);
3273 STACK_OF(X509) *certs = NULL;
3312 certs = sk_X509_new_null();
3313 if (certs) {
3316 if (cert && !sk_X509_push(certs, cer
[all...]
/external/conscrypt/src/test/java/org/conscrypt/
H A DTrustedCertificateStoreTest.java653 final List<X509Certificate> certs;
655 certs = future.get(10, TimeUnit.SECONDS);
660 assertEquals(3, certs.size());
661 assertEquals(getCertLoopEe(), certs.get(0));
662 assertEquals(getCertLoopCa1(), certs.get(1));
663 assertEquals(getCertLoopCa2(), certs.get(2));
716 // Assert that all files corresponding to all system certs/aliases known to the store are
H A DNativeCryptoTest.java151 private static long[] getCertificateReferences(OpenSSLX509Certificate[] certs) { argument
152 final long[] certRefs = new long[certs.length];
153 for (int i = 0; i < certs.length; i++) {
154 certRefs[i] = certs[i].getContext();
1113 * does not request client certs until after the initial
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp_curl.c1046 STACK_OF(X509) *certs = NULL;
1092 certs = sk_X509_new_null();
1093 if (certs) {
1096 if (cert && !sk_X509_push(certs, cert)) {
1101 sk_X509_free(certs);
1102 certs = NULL;
1104 if (certs && ctx->peer_issuer_issuer) {
1106 if (cert && !sk_X509_push(certs, cert)) {
1116 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1117 sk_X509_pop_free(certs, X509_fre
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dhttp_curl.c1046 STACK_OF(X509) *certs = NULL;
1092 certs = sk_X509_new_null();
1093 if (certs) {
1096 if (cert && !sk_X509_push(certs, cert)) {
1101 sk_X509_free(certs);
1102 certs = NULL;
1104 if (certs && ctx->peer_issuer_issuer) {
1106 if (cert && !sk_X509_push(certs, cert)) {
1116 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1117 sk_X509_pop_free(certs, X509_fre
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dhttp_curl.c1046 STACK_OF(X509) *certs = NULL;
1092 certs = sk_X509_new_null();
1093 if (certs) {
1096 if (cert && !sk_X509_push(certs, cert)) {
1101 sk_X509_free(certs);
1102 certs = NULL;
1104 if (certs && ctx->peer_issuer_issuer) {
1106 if (cert && !sk_X509_push(certs, cert)) {
1116 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1117 sk_X509_pop_free(certs, X509_fre
[all...]
/external/boringssl/src/crypto/x509/
H A Dpkcs7_test.c473 STACK_OF(X509) *certs = sk_X509_new_null();
479 if (!PKCS7_get_certificates(certs, &pkcs7)) {
485 if (!PKCS7_bundle_certificates(&cbb, certs) ||
497 if (sk_X509_num(certs) != sk_X509_num(certs2)) {
498 fprintf(stderr, "Number of certs in results differ.\n");
502 for (i = 0; i < sk_X509_num(certs); i++) {
503 X509 *a = sk_X509_value(certs, i);
528 sk_X509_pop_free(certs, X509_free);
600 STACK_OF(X509) *certs = sk_X509_new_null();
602 if (!PKCS7_get_PEM_certificates(certs, bi
[all...]
H A Dx509_vfy.c171 STACK_OF(X509) *certs;
174 /* Lookup all certs with matching subject name */
175 certs = ctx->lookup_certs(ctx, X509_get_subject_name(x));
176 if (certs == NULL)
179 for (i = 0; i < sk_X509_num(certs); i++)
181 xtmp = sk_X509_value(certs, i);
185 if (i < sk_X509_num(certs))
189 sk_X509_pop_free(certs, X509_free);
340 /* We now lookup certs from the certificate store */
669 /* Ignore self issued certs unles
[all...]
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
H A DKSBuilder_ImplTest.java139 Certificate certs[] = {
147 certs);
/external/wpa_supplicant_8/hs20/server/ca/
H A Dsetup.sh99 mkdir -p rootCA/certs rootCA/crl rootCA/newcerts rootCA/private
120 mkdir -p demoCA/certs demoCA/crl demoCA/newcerts demoCA/private
/external/ipsec-tools/src/racoon/
H A Doakley.c2151 STACK_OF(X509) *certs=NULL;
2198 STACK_OF(X509) *certs = sk_X509_new_null();
2212 if (!PKCS7_get_certificates(certs, &cbs)) {
2215 sk_X509_pop_free(certs, X509_free);
2219 if (sk_X509_num(certs) == 0) {
2221 "CERT PKCS#7 bundle contains no certs.\n");
2222 sk_X509_pop_free(certs, X509_free);
2243 certs=p7->d.sign->cert;
2246 certs=p7->d.signed_and_enveloped->cert;
2252 if (!certs) {
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.help.base_3.5.2.v201011171123.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.osgi_3.6.1.R36x_v20100806.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.osgi_3.6.2.R36x_v20101103.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.mortbay.jetty.server_6.1.23.v201004211559.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/jetty/src/java/org/eclipse/jetty/util/ssl/
H A DSslContextFactory.java83 public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType)
87 public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType)
173 /** Maximum certification path length (n - number of intermediate certs, -1 for unlimited) */
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp6508 ScopedLongArrayRO certs(env, certsArray);
6509 for (size_t i = 0; i < certs.size(); i++) {
6510 X509* item = reinterpret_cast<X509*>(certs[i]);
6517 JNI_TRACE("i2d_PKCS7(%p) => %zd certs", certsArray, certs.size());
6522 ScopedLongArrayRO certs(env, certsArray);
6523 for (size_t i = 0; i < certs.size(); i++) {
6524 X509* item = reinterpret_cast<X509*>(certs[i]);
6533 CBB_init(&out, 1024 * certs.size());
6698 JNI_TRACE("d2i_PKCS7_bio(%p, %d) => error reading certs", bi
[all...]
/external/boringssl/include/openssl/
H A Dx509_vfy.h108 The X509_STORE has X509_LOOKUPs for looking up certs.
184 /* The following is a cache of trusted certs */
232 int current_method; /* used when looking up certs */
581 STACK_OF(X509) *certs,
H A Dx509.h500 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
1164 * |certs| to |out|. It returns one on success and zero on error. */
1166 CBB *out, const STACK_OF(X509) *certs);
/external/boringssl/src/include/openssl/
H A Dx509_vfy.h108 The X509_STORE has X509_LOOKUPs for looking up certs.
184 /* The following is a cache of trusted certs */
232 int current_method; /* used when looking up certs */
581 STACK_OF(X509) *certs,
H A Dx509.h500 STACK_OF(X509) *certs; member in struct:Netscape_certificate_sequence
1164 * |certs| to |out|. It returns one on success and zero on error. */
1166 CBB *out, const STACK_OF(X509) *certs);
/external/boringssl/src/crypto/pkcs8/
H A Dpkcs12_test.cc685 ScopedX509Stack certs(sk_X509_new_null());
686 if (!certs) {
693 if (!PKCS12_get_key_and_certs(&key, certs.get(), &pkcs12, "foo")) {
700 if (sk_X509_num(certs.get()) != 1 || key == nullptr) {
/external/conscrypt/src/main/java/org/conscrypt/
H A DNativeCrypto.java485 public static native byte[] i2d_PKCS7(long[] certs); argument
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/
H A Dssvnc.tcl1519 to "file". If file does not exist ~/.vnc/certs/file is used.
1522 to "file". If file does not exist ~/.vnc/certs/file is used. If
1523 file is "CA" then ~/.vnc/certs/CA/cacert.pem is used.
1526 to "file". If file does not exist ~/.vnc/certs/file is used.
1618 and certs. So they follow the drive this way. If you run like
2098 to check unrecognized server certs, and so the first time you connect to
2139 not all of the Server certs.
2162 Server certs can be specified in one of two ways:
2205 to be able to revoke individual certs (so that a new CA cert does not need to
2237 in the ~/.ssvncrc file. If "file" does not exist, then ~/.vnc/certs i
[all...]

Completed in 609 milliseconds

1234