/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 78 List certs = certPath.getCertificates(); local 79 int n = certs.size(); 81 if (certs.isEmpty()) 87 X509Certificate cert = (X509Certificate) certs.get(0); 118 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 123 throw new CertPathValidatorException(e.getMessage(), e, certPath, certs.size() - 1); 257 && !paramsPKIX.getTargetConstraints().match((X509Certificate) certs.get(0))) 275 for (index = certs.size() - 1; index >= 0; index--) 299 cert = (X509Certificate) certs.get(index) [all...] |
X509CRLObject.java | 255 Enumeration certs = c.getRevokedCertificateEnumeration(); local 258 while (certs.hasMoreElements()) 260 TBSCertList.CRLEntry entry = (TBSCertList.CRLEntry)certs.nextElement(); 271 Enumeration certs = c.getRevokedCertificateEnumeration(); local 274 while (certs.hasMoreElements()) 276 TBSCertList.CRLEntry entry = (TBSCertList.CRLEntry)certs.nextElement(); 489 TBSCertList.CRLEntry[] certs = c.getRevokedCertificates(); local 491 if (certs != null) 495 for (int i = 0; i < certs.length; i++) 497 if (certs[i].getUserCertificate().getValue().equals(serial) [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_smime.c | 68 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 94 for(i = 0; i < sk_X509_num(certs); i++) 96 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) 266 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 314 signers = PKCS7_get0_signers(p7, certs, flags); 430 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 492 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, 511 for(i = 0; i < sk_X509_num(certs); i++) [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ClientHandshakeImpl.java | 384 X509Certificate[] certs = null; local 398 certs = ekm.getCertificateChain(alias); 403 certs = km.getCertificateChain(alias); 407 session.localCertificates = certs; 408 clientCert = new CertificateMessage(certs); 423 c.init(Cipher.WRAP_MODE, serverCert.certs[0]); 456 serverPublic = serverCert.certs[0].getPublicKey(); 467 PublicKey client_pk = clientCert.certs[0].getPublicKey(); 468 PublicKey server_pk = serverCert.certs[0].getPublicKey(); 533 parameters.getTrustManager().checkServerTrusted(serverCert.certs, authType) [all...] |
AbstractSessionContext.java | 201 Certificate[] certs = session.getPeerCertificates(); local 202 daos.writeInt(certs.length); 204 for (Certificate cert : certs) { 241 X509CertImpl[] certs = new X509CertImpl[count]; local 246 certs[i] = new X509CertImpl(certData); 249 return new OpenSSLSessionImpl(sessionData, host, port, certs, this);
|
KeyManagerImpl.java | 102 Certificate[] certs = hash.get(alias).getCertificateChain(); local 103 if (certs[0] instanceof X509Certificate) { 104 X509Certificate[] xcerts = new X509Certificate[certs.length]; 105 for (int i = 0; i < certs.length; i++) { 106 xcerts[i] = (X509Certificate) certs[i];
|
ServerHandshakeImpl.java | 139 if (clientCert.certs.length == 0) { 148 clientCert.certs, authType); 153 session.peerCertificates = clientCert.certs; 173 ds.init(clientCert.certs[0]); 235 preMasterSecret = ((DHPublicKey) clientCert.certs[0].getPublicKey()).getY().toByteArray(); 432 X509Certificate[] certs = null; local 450 certs = ekm.getCertificateChain(alias); 455 certs = km.getCertificateChain(alias); 459 if (certs == null) { 463 session.localCertificates = certs; [all...] |
/external/chromium/net/base/ |
cert_database.h | 74 // client certs of each type. 100 void ListCerts(CertificateList* certs); 124 int ExportToPKCS12(const CertificateList& certs, const string16& password, 145 // additional certs should be intermediate/CA certs and will be imported but
|
cert_database_nss.cc | 96 void CertDatabase::ListCerts(CertificateList* certs) { 97 certs->clear(); 104 certs->push_back(X509Certificate::CreateFromHandle( 170 const CertificateList& certs, 173 return psm::nsPKCS12Blob_Export(output, certs, password);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory3Test.java | 90 Certificate[] certs = new Certificate[3]; local 92 certs[i] = certFs[i].generateCertificate(new ByteArrayInputStream( 95 assertEquals(certs[0], certs[1]); 96 assertEquals(certs[0], certs[2]);
|
/external/openssl/apps/ |
pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 245 STACK_OF(X509) *certs=NULL; 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert; 263 if (certs != NULL) 267 for (i=0; i<sk_X509_num(certs); i++) 269 x=sk_X509_value(certs,i);
|
openssl.cnf | 43 certs = $dir/certs # Where the issued certs are kept 48 new_certs_dir = $dir/newcerts # default place for new certs. 335 certs = $dir/cacert.pem # Certificate chain to include in reply
|
/external/openssl/crypto/ocsp/ |
ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i);
|
ocsp_prn.c | 170 for (i=0; i<sk_X509_num(sig->certs); i++) 172 X509_print(bp, sk_X509_value(sig->certs,i)); 173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i)); 280 for (i=0; i<sk_X509_num(br->certs); i++) 282 X509_print(bp, sk_X509_value(br->certs,i)); 283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
|
ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory3Test.java | 89 Certificate[] certs = new Certificate[3]; local 91 certs[i] = certFs[i].generateCertificate(new ByteArrayInputStream( 94 assertEquals(certs[0], certs[1]); 95 assertEquals(certs[0], certs[2]);
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 103 ArrayList<byte[]> certs = new ArrayList<byte[]>(mCaCerts.size() + 1); local 105 certs.add(mUserCert.getEncoded()); 108 certs.add(cert.getEncoded()); 110 outStates.putByteArray(CERTS_KEY, Util.toBytes(certs)); 124 ArrayList<byte[]> certs = Util.fromBytes(savedStates.getByteArray(CERTS_KEY)); local 125 for (byte[] cert : certs) { 340 Certificate[] certs = entry.getCertificateChain(); local 341 Log.d(TAG, "# certs extracted = " + certs.length); 342 mCaCerts = new ArrayList<X509Certificate>(certs.length) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 348 private void verifyCertificates(Collection certs) throws Exception { 351 for (Iterator it = certs.iterator(); it.hasNext();) { 545 Collection certs = local 547 assertNotNull("Factory returned null on correct data", certs); 549 expected_size, certs.size()); 550 verifyCertificates(certs); 577 Collection certs = factory.generateCertificates(bais); local 578 assertNotNull("Factory returned null on correct PKCS7 data", certs); 580 2, certs.size()); 583 for (Iterator it = certs.iterator(); it.hasNext();) 736 Collection certs = factory.generateCertificates(bais); local [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 462 KeyStoreTestSupport.MCertificate certs[] = { local 469 certs); 505 certs.length); 507 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 522 certs.length); 524 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 730 KeyStoreTestSupport.MCertificate certs[] = { local 746 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 765 kss[i].setKeyEntry(aliases[j], key, pwd, certs); 768 kss[i].setKeyEntry("KeyAlias", key, pwd, certs); 839 KeyStoreTestSupport.MCertificate certs[] = { local 903 KeyStoreTestSupport.MCertificate certs[] = { local [all...] |
KeyStore_Impl3Test.java | 109 Certificate certs[] = { local 113 KeyStore.PrivateKeyEntry pKey = new KeyStore.PrivateKeyEntry(pk, certs); 134 kss[i].setKeyEntry(aliases[3], pk, pwd, certs); 135 kss[i].setCertificateEntry(aliases[4], certs[0]);
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/libcore/luni/src/test/java/libcore/java/util/zip/ |
OldAndroidZipStressTest.java | 50 Certificate[] certs = je != null ? je.getCertificates() : null; local 54 if (certs == null) { 57 System.out.println("We have " + certs.length + " certificates");
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 69 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; local 72 new KeyStore.PrivateKeyEntry(pk, certs);
|
Identity2Test.java | 223 java.security.Certificate[] certs = sub.certificates(); local 225 certs[0], certImpl); 255 java.security.Certificate[] certs = sub.certificates(); local 256 assertEquals("Certificate not removed", 0, certs.length);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 63 Certificate[] certs = new MyCertificate[1];//new Certificate[1]; local 66 new KeyStore.PrivateKeyEntry(pk, certs);
|