/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ocsp/ |
H A D | Signature.java | 18 ASN1Sequence certs; field in class:Signature 31 ASN1Sequence certs) 35 this.certs = certs; 46 certs = ASN1Sequence.getInstance( 85 return certs; 94 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL} 104 if (certs != null) 106 v.add(new DERTaggedObject(true, 0, certs)); 28 Signature( AlgorithmIdentifier signatureAlgorithm, DERBitString signature, ASN1Sequence certs) argument
|
H A D | BasicOCSPResponse.java | 19 private ASN1Sequence certs; field in class:BasicOCSPResponse 25 ASN1Sequence certs) 30 this.certs = certs; 42 this.certs = ASN1Sequence.getInstance((ASN1TaggedObject)seq.getObjectAt(3), true); 85 return certs; 95 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 105 if (certs != null) 107 v.add(new DERTaggedObject(true, 0, certs)); 21 BasicOCSPResponse( ResponseData tbsResponseData, AlgorithmIdentifier signatureAlgorithm, DERBitString signature, ASN1Sequence certs) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | PKIXCertPath.java | 69 * @param certs 72 List certs) 74 if (certs.size() < 2) 76 return certs; 79 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); 82 for (int i = 1; i != certs.size(); i++) 84 X509Certificate cert = (X509Certificate)certs.get(i); 88 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); 99 return certs; 103 List retList = new ArrayList(certs 71 sortCerts( List certs) argument [all...] |
/external/jetty/src/java/org/eclipse/jetty/server/ssl/ |
H A D | SslCertificates.java | 113 X509Certificate[] certs; 120 certs=cachedInfo.getCerts(); 126 certs=SslCertificates.getCertChain(sslSession); 129 cachedInfo=new CachedInfo(keySize,certs,idStr); 133 if (certs!=null) 134 request.setAttribute("javax.servlet.request.X509Certificate",certs); 159 CachedInfo(Integer keySize, X509Certificate[] certs,String idStr) argument 162 this._certs=certs;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertificateFactory_ImplTest.java | 353 private void verifyCertificates(Collection certs) throws Exception { argument 356 for (Iterator it = certs.iterator(); it.hasNext(); ) { 554 Collection certs = 556 assertNotNull("Factory returned null on correct data", certs); 558 expected_size, certs.size()); 559 verifyCertificates(certs); 586 Collection certs = factory.generateCertificates(bais); 587 assertNotNull("Factory returned null on correct PKCS7 data", certs); 589 2, certs.size()); 592 for (Iterator it = certs [all...] |
/external/boringssl/src/crypto/x509/ |
H A D | pkcs7.c | 296 const STACK_OF(X509) *certs = arg; 306 for (i = 0; i < sk_X509_num(certs); i++) { 307 X509 *x509 = sk_X509_value(certs, i); 321 int PKCS7_bundle_certificates(CBB *out, const STACK_OF(X509) *certs) { argument 322 return pkcs7_bundle(out, pkcs7_bundle_certificates_cb, certs);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | SignedData.java | 124 ASN1Set certs, 133 if (certs != null) 135 for (Enumeration en = certs.getObjects(); en.hasMoreElements();) 122 calculateVersion( ASN1ObjectIdentifier contentOid, ASN1Set certs, ASN1Set crls, ASN1Set signerInfs) argument
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.ssl_1.0.0.v20100529-0735.jar | ... long serialVersionUID private java.security.cert.X509Certificate[] certs private String type public void " href="/7.1.1 ... |
/external/webrtc/webrtc/base/ |
H A D | fakesslidentity.h | 29 explicit FakeSSLCertificate(const std::vector<std::string>& certs) argument 30 : data_(certs.front()), 34 // Skip certs[0]. 35 for (it = certs.begin() + 1; it != certs.end(); ++it) {
|
H A D | sslidentity.cc | 141 SSLCertChain::SSLCertChain(const std::vector<SSLCertificate*>& certs) { argument 142 ASSERT(!certs.empty()); 143 certs_.resize(certs.size()); 144 std::transform(certs.begin(), certs.end(), certs_.begin(), DupCert);
|
/external/boringssl/src/crypto/x509v3/ |
H A D | pcy_tree.c | 148 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 162 n = sk_X509_num(certs); 193 x = sk_X509_value(certs, i); 261 x = sk_X509_value(certs, i); 772 STACK_OF(X509) *certs, 782 ret = tree_init(&tree, certs, flags); 771 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedGenerator.java | 86 protected List certs = new ArrayList(); field in class:CMSSignedGenerator 118 certs.add(certificate.toASN1Structure()); 131 certs.addAll(CMSUtils.getCertificatesFromStore(certStore)); 167 certs.add(new DERTaggedObject(false, 2, attrCert.toASN1Structure())); 180 certs.addAll(CMSUtils.getAttributeCertificatesFromStore(attrStore));
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | TrustManagerImpl.java | 222 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { argument 223 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); 224 for (X509Certificate cert : certs) { 291 * Returns the full trusted certificate chain found from {@code certs}. 293 * Throws {@link CertificateException} when no trusted chain can be found from {@code certs}. 295 public List<X509Certificate> getTrustedChainForServer(X509Certificate[] certs, argument 304 return checkTrusted(certs, authType, session, parameters, false /* client auth */); 308 * Returns the full trusted certificate chain found from {@code certs}. 310 * Throws {@link CertificateException} when no trusted chain can be found from {@code certs}. 312 public List<X509Certificate> getTrustedChainForServer(X509Certificate[] certs, argument 361 checkTrusted(X509Certificate[] certs, String authType, SSLSession session, SSLParameters parameters, boolean clientAuth) argument 378 checkTrusted(X509Certificate[] certs, String authType, String host, boolean clientAuth) argument 427 checkTrustedRecursive(X509Certificate[] certs, String host, boolean clientAuth, ArrayList<X509Certificate> untrustedChain, ArrayList<TrustAnchor> trustAnchorChain, Set<X509Certificate> used) argument [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | TestCertUtils.java | 68 * real chain of certificates, it's just an array of 3 certs. The method 103 Certificate[] certs = new Certificate[howMany]; 105 certs[i] = new TestCertificate(Integer.toString(startID + i)); 107 return new TestCertPath(certs); 153 private Certificate[] certs; field in class:TestCertUtils.TestCertPath 163 certs = getCertChain(); 171 * @param certs 174 public TestCertPath(Certificate[] certs) { argument 176 this.certs = certs; 670 engineGenerateCertPath(List certs) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 124 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi 252 Enumeration e = certs.keys(); 274 return (certs.get(alias) != null || keys.get(alias) != null); 288 Certificate c = (Certificate)certs.remove(alias); 320 Certificate c = (Certificate)certs.get(alias); 344 Enumeration c = certs.elements(); 345 Enumeration k = certs.keys(); 492 if (keys.get(alias) == null && certs.get(alias) == null) 515 return (certs.get(alias) != null && keys.get(alias) == null); 534 certs [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 653 Set certs = new LinkedHashSet(); 666 // certs.addAll(certStore.getMatches(certSelect)); 681 certs.addAll(PKIXCertStoreSelector.getCertificates(certSelect, certStore)); 691 return certs; 1201 * @param certs The certification path. 1208 protected static PublicKey getNextWorkingKey(List certs, int index, JcaJceHelper helper) argument 1211 Certificate cert = (Certificate)certs.get(index); 1222 for (int i = index + 1; i < certs.size(); i++) 1224 X509Certificate parentCert = (X509Certificate)certs.get(i); 1297 Set certs [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 991 const gnutls_datum_t *certs; local 1048 certs = gnutls_certificate_get_peers(session, &num_certs); 1049 if (certs == NULL || num_certs == 0) { 1130 if (gnutls_x509_crt_import(cert, &certs[i], 1160 cert_buf = wpabuf_alloc_copy(certs[i].data, 1161 certs[i].size); 1165 _addr[0] = certs[i].data; 1166 _len[0] = certs[i].size; 1187 conn, &certs[i], i, buf, 1205 conn, &certs[ [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 991 const gnutls_datum_t *certs; local 1048 certs = gnutls_certificate_get_peers(session, &num_certs); 1049 if (certs == NULL || num_certs == 0) { 1130 if (gnutls_x509_crt_import(cert, &certs[i], 1160 cert_buf = wpabuf_alloc_copy(certs[i].data, 1161 certs[i].size); 1165 _addr[0] = certs[i].data; 1166 _len[0] = certs[i].size; 1187 conn, &certs[i], i, buf, 1205 conn, &certs[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 991 const gnutls_datum_t *certs; local 1048 certs = gnutls_certificate_get_peers(session, &num_certs); 1049 if (certs == NULL || num_certs == 0) { 1130 if (gnutls_x509_crt_import(cert, &certs[i], 1160 cert_buf = wpabuf_alloc_copy(certs[i].data, 1161 certs[i].size); 1165 _addr[0] = certs[i].data; 1166 _len[0] = certs[i].size; 1187 conn, &certs[i], i, buf, 1205 conn, &certs[ [all...] |
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 154 private static long[] getCertificateReferences(OpenSSLX509Certificate[] certs) { argument 155 final long[] certRefs = new long[certs.length]; 156 for (int i = 0; i < certs.length; i++) { 157 certRefs[i] = certs[i].getContext(); 1123 * does not request client certs until after the initial
|
/external/curl/lib/vtls/ |
H A D | darwinssl.c | 1215 CFArrayRef certs; local 1236 certs = CFArrayCreate(NULL, (const void **)certs_c, 1L, 1238 err = SSLSetCertificate(connssl->ssl_ctx, certs); 1239 if(certs) 1240 CFRelease(certs);
|