/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ocsp/ |
H A D | Signature.java | 18 ASN1Sequence certs; field in class:Signature 31 ASN1Sequence certs) 35 this.certs = certs; 46 certs = ASN1Sequence.getInstance( 85 return certs; 94 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL} 104 if (certs != null) 106 v.add(new DERTaggedObject(true, 0, certs)); 28 Signature( AlgorithmIdentifier signatureAlgorithm, DERBitString signature, ASN1Sequence certs) argument
|
H A D | BasicOCSPResponse.java | 19 private ASN1Sequence certs; field in class:BasicOCSPResponse 25 ASN1Sequence certs) 30 this.certs = certs; 42 this.certs = ASN1Sequence.getInstance((ASN1TaggedObject)seq.getObjectAt(3), true); 85 return certs; 95 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 105 if (certs != null) 107 v.add(new DERTaggedObject(true, 0, certs)); 21 BasicOCSPResponse( ResponseData tbsResponseData, AlgorithmIdentifier signatureAlgorithm, DERBitString signature, ASN1Sequence certs) argument
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
H A D | CertBlacklistTest.java | 91 X509Certificate[] certs = new X509Certificate[collection.size()]; 94 certs[i++] = (X509Certificate) cert; 96 return certs; 111 private static void assertTrusted(X509Certificate[] certs, X509TrustManager tm) argument 113 tm.checkServerTrusted(certs, "RSA"); 116 private static void assertUntrusted(X509Certificate[] certs, X509TrustManager tm) { argument 118 tm.checkServerTrusted(certs, "RSA");
|
/external/boringssl/src/crypto/pkcs7/ |
H A D | pkcs7_x509.c | 176 const STACK_OF(X509) *certs = arg; 186 for (i = 0; i < sk_X509_num(certs); i++) { 187 X509 *x509 = sk_X509_value(certs, i); 201 int PKCS7_bundle_certificates(CBB *out, const STACK_OF(X509) *certs) { argument 202 return pkcs7_bundle(out, pkcs7_bundle_certificates_cb, certs);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
H A D | PKIXCertPath.java | 69 * @param certs 72 List certs) 74 if (certs.size() < 2) 76 return certs; 79 X500Principal issuer = ((X509Certificate)certs.get(0)).getIssuerX500Principal(); 82 for (int i = 1; i != certs.size(); i++) 84 X509Certificate cert = (X509Certificate)certs.get(i); 88 issuer = ((X509Certificate)certs.get(i)).getIssuerX500Principal(); 99 return certs; 103 List retList = new ArrayList(certs 71 sortCerts( List certs) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | SignedData.java | 124 ASN1Set certs, 133 if (certs != null) 135 for (Enumeration en = certs.getObjects(); en.hasMoreElements();) 122 calculateVersion( ASN1ObjectIdentifier contentOid, ASN1Set certs, ASN1Set crls, ASN1Set signerInfs) argument
|
/external/conscrypt/testing/src/main/java/libcore/javax/net/ssl/ |
H A D | TestKeyManager.java | 130 private X509Certificate[] dumpCerts(X509Certificate[] certs) { argument 132 for (X509Certificate cert : certs) { 137 return certs;
|
/external/webrtc/webrtc/base/ |
H A D | fakesslidentity.h | 29 explicit FakeSSLCertificate(const std::vector<std::string>& certs) argument 30 : data_(certs.front()), 34 // Skip certs[0]. 35 for (it = certs.begin() + 1; it != certs.end(); ++it) {
|
H A D | sslidentity.cc | 141 SSLCertChain::SSLCertChain(const std::vector<SSLCertificate*>& certs) { argument 142 ASSERT(!certs.empty()); 143 certs_.resize(certs.size()); 144 std::transform(certs.begin(), certs.end(), certs_.begin(), DupCert);
|
/external/boringssl/src/crypto/x509v3/ |
H A D | pcy_tree.c | 149 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, argument 163 n = sk_X509_num(certs); 194 x = sk_X509_value(certs, i); 260 x = sk_X509_value(certs, i); 736 STACK_OF(X509) *certs, 746 ret = tree_init(&tree, certs, flags); 735 X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags) argument
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedGenerator.java | 86 protected List certs = new ArrayList(); field in class:CMSSignedGenerator 118 certs.add(certificate.toASN1Structure()); 131 certs.addAll(CMSUtils.getCertificatesFromStore(certStore)); 167 certs.add(new DERTaggedObject(false, 2, attrCert.toASN1Structure())); 180 certs.addAll(CMSUtils.getAttributeCertificatesFromStore(attrStore));
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_ocsp.c | 364 struct x509_certificate *certs = NULL, *last_cert = NULL; local 381 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 439 /* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */ 445 "OCSP: Expected [0] EXPLICIT (certs) - found class %d tag 0x%x", 449 wpa_hexdump(MSG_MSGDUMP, "OCSP: certs", 472 last_cert = certs = cert; 628 for (signer = certs; signer; signer = signer->next) { 650 x509_certificate_chain_free(certs); 651 certs = NULL; 669 x509_certificate_chain_free(certs); [all...] |
/external/boringssl/src/crypto/x509/ |
H A D | x509_test.cc | 450 const std::vector<X509 *> &certs) { 455 for (auto cert : certs) { 449 CertsToStack( const std::vector<X509 *> &certs) argument
|
/external/boringssl/src/ssl/ |
H A D | ssl_cert.cc | 294 CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, 307 switch (check_leaf_cert_and_privkey(certs[0], privkey)) { 323 if (!sk_CRYPTO_BUFFER_push(certs_sk, certs[i])) { 327 CRYPTO_BUFFER_up_ref(certs[i]); 343 int SSL_set_chain_and_key(SSL *ssl, CRYPTO_BUFFER *const *certs, argument 346 return cert_set_chain_and_key(ssl->cert, certs, num_certs, privkey, 350 int SSL_CTX_set_chain_and_key(SSL_CTX *ctx, CRYPTO_BUFFER *const *certs, argument 353 return cert_set_chain_and_key(ctx->cert, certs, num_certs, privkey, 497 CBB certs; local 498 if (!CBB_add_u24_length_prefixed(cbb, &certs)) { 293 cert_set_chain_and_key( CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, EVP_PKEY *privkey, const SSL_PRIVATE_KEY_METHOD *privkey_method) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 127 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:PKCS12KeyStoreSpi 255 Enumeration e = certs.keys(); 277 return (certs.get(alias) != null || keys.get(alias) != null); 291 Certificate c = (Certificate)certs.remove(alias); 323 Certificate c = (Certificate)certs.get(alias); 347 Enumeration c = certs.elements(); 348 Enumeration k = certs.keys(); 495 if (keys.get(alias) == null && certs.get(alias) == null) 518 return (certs.get(alias) != null && keys.get(alias) == null); 537 certs [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 653 Set certs = new LinkedHashSet(); 666 // certs.addAll(certStore.getMatches(certSelect)); 681 certs.addAll(PKIXCertStoreSelector.getCertificates(certSelect, certStore)); 691 return certs; 1201 * @param certs The certification path. 1208 protected static PublicKey getNextWorkingKey(List certs, int index, JcaJceHelper helper) argument 1211 Certificate cert = (Certificate)certs.get(index); 1222 for (int i = index + 1; i < certs.size(); i++) 1224 X509Certificate parentCert = (X509Certificate)certs.get(i); 1297 Set certs [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
H A D | TrustManagerImpl.java | 255 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { argument 256 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); 257 for (X509Certificate cert : certs) { 326 * Returns the full trusted certificate chain found from {@code certs}. 328 * Throws {@link CertificateException} when no trusted chain can be found from {@code certs}. 330 public List<X509Certificate> getTrustedChainForServer(X509Certificate[] certs, argument 339 return checkTrusted(certs, authType, session, parameters, false /* client auth */); 343 * Returns the full trusted certificate chain found from {@code certs}. 345 * Throws {@link CertificateException} when no trusted chain can be found from {@code certs}. 347 public List<X509Certificate> getTrustedChainForServer(X509Certificate[] certs, argument 396 checkTrusted(X509Certificate[] certs, String authType, SSLSession session, SSLParameters parameters, boolean clientAuth) argument 471 checkTrusted(X509Certificate[] certs, byte[] ocspData, byte[] tlsSctData, String authType, String host, boolean clientAuth) argument 522 checkTrustedRecursive(X509Certificate[] certs, byte[] ocspData, byte[] tlsSctData, String host, boolean clientAuth, ArrayList<X509Certificate> untrustedChain, ArrayList<TrustAnchor> trustAnchorChain, Set<X509Certificate> used) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/libcups/cups/ |
H A D | tls-gnutls.c | 30 /* Auto-create self-signed certs? */ 37 /* Mutex for keychain/certs */ 303 const gnutls_datum_t *certs; /* Certificates */ local 315 certs = gnutls_certificate_get_peers(http->tls, &count); 317 DEBUG_printf(("1httpCopyCredentials: certs=%p, count=%u", certs, count)); 319 if (certs && count) 323 httpAddCredential(*credentials, certs->data, certs->size); 324 certs [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 998 const gnutls_datum_t *certs; local 1055 certs = gnutls_certificate_get_peers(session, &num_certs); 1056 if (certs == NULL || num_certs == 0) { 1137 if (gnutls_x509_crt_import(cert, &certs[i], 1167 cert_buf = wpabuf_alloc_copy(certs[i].data, 1168 certs[i].size); 1172 _addr[0] = certs[i].data; 1173 _len[0] = certs[i].size; 1194 conn, &certs[i], i, buf, 1212 conn, &certs[ [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 998 const gnutls_datum_t *certs; local 1055 certs = gnutls_certificate_get_peers(session, &num_certs); 1056 if (certs == NULL || num_certs == 0) { 1137 if (gnutls_x509_crt_import(cert, &certs[i], 1167 cert_buf = wpabuf_alloc_copy(certs[i].data, 1168 certs[i].size); 1172 _addr[0] = certs[i].data; 1173 _len[0] = certs[i].size; 1194 conn, &certs[i], i, buf, 1212 conn, &certs[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 998 const gnutls_datum_t *certs; local 1055 certs = gnutls_certificate_get_peers(session, &num_certs); 1056 if (certs == NULL || num_certs == 0) { 1137 if (gnutls_x509_crt_import(cert, &certs[i], 1167 cert_buf = wpabuf_alloc_copy(certs[i].data, 1168 certs[i].size); 1172 _addr[0] = certs[i].data; 1173 _len[0] = certs[i].size; 1194 conn, &certs[i], i, buf, 1212 conn, &certs[ [all...] |
/external/curl/lib/vtls/ |
H A D | darwinssl.c | 1275 CFArrayRef certs; local 1296 certs = CFArrayCreate(NULL, (const void **)certs_c, 1L, 1298 err = SSLSetCertificate(connssl->ssl_ctx, certs); 1299 if(certs) 1300 CFRelease(certs);
|