/external/chromium/net/socket/ |
ssl_host_info.h | 69 // certs is a vector of DER encoded X.509 certificates, as the server 71 std::vector<std::string> certs; member in struct:net::SSLHostInfo::State 87 // |state().certs| is still being validated and arranges for the given
|
ssl_client_socket_nss.cc | 299 void DestroyCertificates(CERTCertificate** certs, unsigned len) { 301 CERT_DestroyCertificate(certs[i]); [all...] |
ssl_client_socket_mac.cc | 417 CFArrayRef certs; local 418 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs); 419 // SSLCopyPeerCertificates may succeed but return a null |certs| 422 if (status != noErr || !certs) 424 base::mac::ScopedCFTypeRef<CFArrayRef> scoped_certs(certs); 426 DCHECK_GT(CFArrayGetCount(certs), 0); 432 CFIndex certs_length = CFArrayGetCount(certs); 435 const_cast<void*>(CFArrayGetValueAtIndex(certs, i))); 440 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0))); 744 // I'm being asked for available client certs (identities) [all...] |
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestKeyManager.java | 129 private X509Certificate[] dumpCerts(X509Certificate[] certs) { 131 for (X509Certificate cert : certs) { 136 return certs;
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 729 Set certs = new HashSet(); local 741 certs.addAll(certStore.getMatches(certSelect)); 757 certs.addAll(certStore.getCertificates(certSelect)); 767 return certs; 775 // Set certs = new HashSet(); 787 // certs.addAll(certStore.getMatches(certSelect)); 798 // return certs; 1363 Set certs = new HashSet(); local [all...] |
/external/openssl/apps/ |
openssl.cnf | 43 certs = $dir/certs # Where the issued certs are kept 48 new_certs_dir = $dir/newcerts # default place for new certs. 335 certs = $dir/cacert.pem # Certificate chain to include in reply
|
/external/chromium/net/base/ |
x509_certificate_openssl.cc | 43 STACK_OF(X509)* certs = NULL; 46 certs = pkcs7_cert.get()->d.sign->cert; 48 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert; 51 if (certs) { 52 for (int i = 0; i < sk_X509_num(certs); ++i) { 54 X509Certificate::DupOSCertHandle(sk_X509_value(certs, i)); 486 // correctly verified certs as being from a known root. TODO(joth): if the
|
/external/openssl/include/openssl/ |
ts.h | 275 certs SEQUENCE OF ESSCertID, 507 STACK_OF(X509) *certs; /* Certs to include in signed data. */ member in struct:TS_resp_ctx 550 /* No additional certs are included in the response by default. */ 551 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); 614 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 660 /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ 662 STACK_OF(X509) *certs; member in struct:TS_verify_ctx 701 * certs = NULL 743 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs, [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
DefaultHostnameVerifier.java | 61 Certificate[] certs; local 63 certs = session.getPeerCertificates(); 68 X509Certificate x509 = (X509Certificate) certs[0];
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 93 Certificate[] certs = session.getPeerCertificates(); local 94 X509Certificate x509 = (X509Certificate) certs[0]; 100 Certificate[] certs = session.getPeerCertificates(); local 101 X509Certificate x509 = (X509Certificate) certs[0];
|
/external/chromium/chrome/common/net/ |
x509_certificate_model_nss.cc | 233 const std::vector<scoped_refptr<X509Certificate> >& certs, 238 for (size_t i = 0; i < certs.size(); ++i) { 241 CERT_DupCertificate(certs[i]->os_cert_handle())); 251 static_cast<int>(certs.size()));
|
/external/openssl/ssl/ |
ssl_cert.c | 646 * Load CA certs from a file into a ::STACK. Note that it is somewhat misnamed; 650 * \param file the file containing one or more certs. 651 * \return a ::STACK containing the certs. 715 * Add a file of certs to a stack. 717 * \param file the file to add from. All certs in this file that are not 720 * certs may have been added to \c stack. 776 * Add a directory of certs to a stack. 779 * examined as potential certs. Any that are acceptable to 783 * certs may have been added to \c stack.
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 688 String[] certs = KeyStore.getInstance().saw(prefix); local 689 if (certs == null || certs.length == 0) { 690 certs = new String[] {unspecified}; 692 final String[] array = new String[certs.length + 1]; 694 System.arraycopy(certs, 0, array, 1, certs.length); 695 certs = array; 699 context, android.R.layout.simple_spinner_item, certs);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 69 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; local 72 new KeyStore.PrivateKeyEntry(pk, certs);
|
KeyStoreTest.java | 156 Certificate certs[] = { local 166 kss[i].setKeyEntry(alias, kk, certs); 172 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_model.cc | 127 // The list of user certs is small, so just test each one. 160 // List of server certs is small, so just test each one.
|
/external/chromium/chrome/browser/ui/webui/options/ |
certificate_manager_handler.h | 97 // 3. read completes -> ImportServerFileRead -> parse certs -> attempt import 107 // 3. read completes -> ImportCAFileRead -> parse certs ->
|
/external/openssl/crypto/ocsp/ |
ocsp_asn.c | 65 ASN1_EXP_SEQUENCE_OF_OPT(OCSP_SIGNATURE, certs, X509, 0) 164 ASN1_EXP_SEQUENCE_OF_OPT(OCSP_BASICRESP, certs, X509, 0)
|
/external/webkit/Source/WebCore/platform/network/curl/ |
ResourceHandleCurl.cpp | 146 static HashMap<String, RetainPtr<CFDataRef> > certs; local 147 return certs;
|
/libcore/luni/src/main/files/cacerts/ |
ddc328ff.0 | 25 Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com 29 Subject: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 146 // RI de-duplicates certs from TrustedCertificateEntry and PrivateKeyEntry 215 // test proper validation even if there are extra certs after
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 63 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; local 66 new KeyStore.PrivateKeyEntry(pk, certs);
|
KeyStoreTest.java | 155 Certificate certs[] = { local 165 kss[i].setKeyEntry(alias, kk, certs); 171 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 175 ArrayList<Certificate> certs = new ArrayList<Certificate>(); local 183 certs.addAll(getSignerCertificates(signatureFile, certificates)); 188 if (certs.isEmpty()) { 191 Certificate[] certificatesArray = certs.toArray(new Certificate[certs.size()]);
|
/external/chromium/chrome/browser/ssl/ |
ssl_client_auth_handler.h | 67 // The certs to choose from.
|