/cts/tests/appsecurity-tests/test-apps/UsePermissionDiffCert/ |
Android.mk | 28 LOCAL_CERTIFICATE := cts/tests/appsecurity-tests/certs/cts-testkey2
|
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | 392 CFArrayRef certs; local 393 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs); 394 // SSLCopyPeerCertificates may succeed but return a null |certs| 397 if (status != noErr || !certs) 399 scoped_cftyperef<CFArrayRef> scoped_certs(certs); 401 DCHECK_GT(CFArrayGetCount(certs), 0); 404 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0))); 417 CFIndex certs_length = CFArrayGetCount(certs); 420 const_cast<void*>(CFArrayGetValueAtIndex(certs, i))); [all...] |
/external/webkit/WebCore/platform/network/curl/ |
ResourceHandleCurl.cpp | 144 static HashMap<String, RetainPtr<CFDataRef> > certs; local 145 return certs;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 76 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; local 79 new KeyStore.PrivateKeyEntry(pk, certs);
|
KeyStoreTest.java | 173 Certificate certs[] = { local 183 kss[i].setKeyEntry(alias, kk, certs); 189 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
CodeSourceTest.java | 141 // ... and certs[] does not affect it 284 Certificate[] certs = (Certificate[]) cpath.getCertificates().toArray(); local 290 assertTrue(presented(certs, got)); 291 assertTrue(presented(got, certs)); 747 // 'thiz' has set of certs, while 'that' has no certs. URL-s are the
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 85 private IgnoresCaseHashtable certs = new IgnoresCaseHashtable(); field in class:JDKPKCS12KeyStore 203 Enumeration e = certs.keys(); 225 return (certs.get(alias) != null || keys.get(alias) != null); 238 Certificate c = (Certificate)certs.remove(alias); 278 Certificate c = (Certificate)certs.get(alias); 302 Enumeration c = certs.elements(); 303 Enumeration k = certs.keys(); 443 if (keys.get(alias) == null && certs.get(alias) == null) { 466 return (certs.get(alias) != null && keys.get(alias) == null); 485 certs.put(alias, cert) [all...] |
JDKX509CertificateFactory.java | 33 * base 64 encoded certs, as well as the BER binaries of certificates and some classes of PKCS#7 236 List certs = new ArrayList(); local 240 certs.add(cert); 243 return certs;
|
CertPathValidatorUtilities.java | 837 Set certs = new HashSet(); local 849 certs.addAll(certStore.getMatches(certSelect)); 865 certs.addAll(certStore.getCertificates(certSelect)); 875 return certs; 883 // Set certs = new HashSet(); 895 // certs.addAll(certStore.getMatches(certSelect)); 906 // return certs; 1506 Set certs = new HashSet(); local [all...] |
/external/openssl/crypto/ocsp/ |
ocsp_asn.c | 65 ASN1_EXP_SEQUENCE_OF_OPT(OCSP_SIGNATURE, certs, X509, 0) 164 ASN1_EXP_SEQUENCE_OF_OPT(OCSP_BASICRESP, certs, X509, 0)
|
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/external/openssl/apps/ |
pkcs12.c | 283 BIO_printf (bio_err, "-certfile f add all certs in f\n"); 424 STACK_OF(X509) *certs=NULL; 452 CRYPTO_push_info("reading certs from input"); 455 /* Load in all certs in input file */ 458 certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e, 460 if (!certs) 466 for(i = 0; i < sk_X509_num(certs); i++) 468 x = sk_X509_value(certs, i); 476 (void)sk_X509_delete(certs, i); 491 CRYPTO_push_info("reading certs from input 2") [all...] |
CA.sh | 109 mkdir -p ${CATOP}/certs
|
/external/openssl/crypto/x509v3/ |
pcy_tree.c | 143 static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, 157 n = sk_X509_num(certs); 188 x = sk_X509_value(certs, i); 256 x = sk_X509_value(certs, i); 769 STACK_OF(X509) *certs, 779 ret = tree_init(&tree, certs, flags);
|
/external/openssl/include/openssl/ |
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
ts.h | 275 certs SEQUENCE OF ESSCertID, 507 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx 550 /* No additional certs are included in the response by default. */ 551 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 614 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 660 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ 662 STACK_OF(X509) *certs; member in struct:TS_verify_ctx 701 * certs = NULL 743 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs, [all...] |
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
/libcore/luni/src/main/java/org/apache/harmony/security/fortress/ |
DefaultPolicyParser.java | 390 Collection<Certificate> certs = new HashSet<Certificate>(); local 393 //XXX cache found certs ?? 394 certs.add(ks.getCertificate(snt.nextToken().trim())); 396 return certs.toArray(new Certificate[certs.size()]); 416 //XXX cache found certs ??
|
/frameworks/base/core/java/android/net/ |
SSLCertificateSocketFactory.java | 89 public void checkClientTrusted(X509Certificate[] certs, String authType) { } 90 public void checkServerTrusted(X509Certificate[] certs, String authType) { }
|
/frameworks/base/core/java/android/net/http/ |
HttpsConnection.java | 92 X509Certificate[] certs, String authType) { 96 X509Certificate[] certs, String authType) {
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory4Test.java | 112 Collection<? extends Certificate> certs = fact.generateCertificates(is); local 115 + "\" were not parsed correctly", certs); [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
MiscRegressionTest.java | 186 Certificate[] certs = je != null ? je.getCertificates() : null; local 190 if (certs == null) { 193 android.util.Log.d("TestHarness", "We have " + certs.length + " certificates");
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CertFactoryImpl.java | 213 List certs = data.getCertificates(); local 214 if (certs != null) { 215 for (int i = 0; i < certs.size(); i++) { 218 certs.get(i))); [all...] |
/frameworks/base/core/java/android/content/pm/ |
PackageParser.java | 477 Certificate[] certs = null; local 485 certs = loadCertificates(jarFile, jarEntry, readBuffer); 486 if (certs == null) { 496 + " certs=" + (certs != null ? certs.length : 0)); 497 if (certs != null) { 498 final int N = certs.length; 501 + certs[i].getPublicKey().getEncoded() 502 + " " + certs[i].getPublicKey()) [all...] |