HomeSort by relevance Sort by last modified time
    Searched full:certs (Results 126 - 150 of 450) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/openssl/apps/
pkcs7.c 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n");
245 STACK_OF(X509) *certs=NULL;
252 certs=p7->d.sign->cert;
256 certs=p7->d.signed_and_enveloped->cert;
263 if (certs != NULL)
267 for (i=0; i<sk_X509_num(certs); i++)
269 x=sk_X509_value(certs,i);
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl1Test.java 462 KeyStoreTestSupport.MCertificate certs[] = { local
469 certs);
505 certs.length);
507 assertEquals("Incorrect CertificateChain", cc[t], certs[t]);
522 certs.length);
524 assertEquals("Incorrect CertificateChain", cc[t], certs[t]);
730 KeyStoreTestSupport.MCertificate certs[] = { local
746 kss[i].setKeyEntry("ZZZ", null, pwd, certs);
765 kss[i].setKeyEntry(aliases[j], key, pwd, certs);
768 kss[i].setKeyEntry("KeyAlias", key, pwd, certs);
839 KeyStoreTestSupport.MCertificate certs[] = { local
903 KeyStoreTestSupport.MCertificate certs[] = { local
    [all...]
  /external/chromium/net/base/
cert_database_nss.cc 96 void CertDatabase::ListCerts(CertificateList* certs) {
97 certs->clear();
104 certs->push_back(X509Certificate::CreateFromHandle(
170 const CertificateList& certs,
173 return psm::nsPKCS12Blob_Export(output, certs, password);
  /external/chromium_org/chromeos/network/
client_cert_util.cc 53 // Functor to filter out certs that don't have private keys, or are invalid.
64 // Functor to filter out certs that don't have an issuer in the associated
144 // Start with all the certs, and narrow it down from there.
157 // Strip off any certs that don't have the right issuer and/or subject.
176 // Eliminate any certs that don't have private keys associated with
network_cert_migrator.cc 49 // the nickname of each certificate of |certs|. If a match is found, then the
55 MigrationTask(const net::CertificateList& certs,
57 : certs_(certs),
257 VLOG(2) << "Certs not loaded yet.";
272 // Maybe there are networks referring to certs (by NSS nickname) that were not
  /libcore/luni/src/test/java/libcore/java/security/cert/
X509CertificateTest.java 110 private static final String CERTS_X509_PEM = "x509/certs.pem";
112 private static final String CERTS_X509_DER = "x509/certs.der";
114 private static final String CERTS_PKCS7_PEM = "x509/certs-pk7.pem";
116 private static final String CERTS_PKCS7_DER = "x509/certs-pk7.der";
118 /** A list of certs that are all slightly different. */
    [all...]
CertificateFactoryTest.java 370 List<X509Certificate> certs = new ArrayList<X509Certificate>(); local
371 certs.add(cert3.certificate);
372 certs.add(cert2.certificate);
373 certs.add(cert1.certificate);
375 List<X509Certificate> duplicatedCerts = new ArrayList<X509Certificate>(certs);
397 testCertPathEncoding(cf, certs, null);
401 final Iterator<String> it2 = cf.generateCertPath(certs).getEncodings();
424 testCertPathEncoding(cf, certs, encoding);
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
CertificateFactory_ImplTest.java 348 private void verifyCertificates(Collection certs) throws Exception {
351 for (Iterator it = certs.iterator(); it.hasNext();) {
545 Collection certs = local
547 assertNotNull("Factory returned null on correct data", certs);
549 expected_size, certs.size());
550 verifyCertificates(certs);
577 Collection certs = factory.generateCertificates(bais); local
578 assertNotNull("Factory returned null on correct PKCS7 data", certs);
580 2, certs.size());
583 for (Iterator it = certs.iterator(); it.hasNext();)
736 Collection certs = factory.generateCertificates(bais); local
    [all...]
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 197 List certs = new ArrayList(certHldrs.size()); local
201 certs.add(new X509V2AttributeCertificate(((X509AttributeCertificateHolder)it.next()).getEncoded()));
205 "AttributeCertificate/" +type, new X509CollectionStoreParameters(certs), provider);
228 // List certs = new ArrayList(certHldrs.size());
232 // certs.add(converter.getCertificate((X509CertificateHolder)it.next()));
236 // "Certificate/" +type, new X509CollectionStoreParameters(certs), provider);
  /external/chromium_org/net/tools/quic/test_tools/
quic_test_client.cc 36 const vector<string>& certs,
44 if (certs.empty()) {
48 // Convert certs to X509Certificate.
49 vector<StringPiece> cert_pieces(certs.size());
50 for (unsigned i = 0; i < certs.size(); i++) {
51 cert_pieces[i] = StringPiece(certs[i]);
  /external/chromium_org/third_party/libjingle/source/talk/base/
nssidentity.cc 111 std::vector<SSLCertificate*> certs; local
113 certs.push_back(new NSSCertificate(node->cert));
116 if (!certs.empty())
117 chain_.reset(new SSLCertChain(certs));
121 std::for_each(certs.begin(), certs.end(), DeleteCert);
  /external/chromium_org/third_party/openssl/openssl/crypto/ocsp/
ocsp_cl.c 129 if (!sig->certs && !(sig->certs = sk_X509_new_null()))
132 if(!sk_X509_push(sig->certs, cert)) return 0;
147 STACK_OF(X509) *certs,
171 for (i = 0; i < sk_X509_num(certs); i++)
173 x = sk_X509_value(certs, i);
ocsp_prn.c 170 for (i=0; i<sk_X509_num(sig->certs); i++)
172 X509_print(bp, sk_X509_value(sig->certs,i));
173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i));
280 for (i=0; i<sk_X509_num(br->certs); i++)
282 X509_print(bp, sk_X509_value(br->certs,i));
283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
ocsp.h 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
  /external/openssl/crypto/ocsp/
ocsp_cl.c 129 if (!sig->certs && !(sig->certs = sk_X509_new_null()))
132 if(!sk_X509_push(sig->certs, cert)) return 0;
147 STACK_OF(X509) *certs,
171 for (i = 0; i < sk_X509_num(certs); i++)
173 x = sk_X509_value(certs, i);
ocsp_prn.c 170 for (i=0; i<sk_X509_num(sig->certs); i++)
172 X509_print(bp, sk_X509_value(sig->certs,i));
173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i));
280 for (i=0; i<sk_X509_num(br->certs); i++)
282 X509_print(bp, sk_X509_value(br->certs,i));
283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
ocsp.h 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
  /libcore/crypto/src/main/java/org/conscrypt/
OpenSSLX509Certificate.java 103 final List<OpenSSLX509Certificate> certs = new ArrayList<OpenSSLX509Certificate>( local
109 certs.add(new OpenSSLX509Certificate(certRefs[i]));
111 return certs;
147 final List<OpenSSLX509Certificate> certs = new ArrayList<OpenSSLX509Certificate>( local
153 certs.add(new OpenSSLX509Certificate(certRefs[i]));
155 return certs;
TrustManagerImpl.java 177 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) {
178 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length);
179 for (X509Certificate cert : certs) {
197 * chain is pinned appropriately for that host. If null, it does not check for pinned certs.
260 // build the cert path from the array of certs sans trust anchors
321 * md2WithRSAEncryption. This also handles removing old certs
322 * after bridge CA certs.
368 // This avoids including "bridge" CA certs that added for legacy compatibility.
  /external/chromium_org/chrome/browser/net/
sqlite_server_bound_cert_store.cc 66 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs);
147 // Initializes the certs table, returning true on success.
173 certs(new ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>(
176 certs.get();
181 base::Bind(loaded_callback, base::Passed(&certs)));
185 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs) {
193 // Ensure the parent directory for storing certs is created before reading
230 // Slurp all the certs into the out-vector.
258 certs->push_back(cert.release());
261 UMA_HISTOGRAM_COUNTS_10000("DomainBoundCerts.DBLoadedCount", certs->size())
    [all...]
  /external/chromium_org/chrome/browser/browsing_data/
browsing_data_server_bound_cert_helper_unittest.cc 50 const net::ServerBoundCertStore::ServerBoundCertList& certs) {
52 server_bound_cert_list_ = certs;
  /external/chromium_org/content/browser/ssl/
ssl_client_auth_handler.cc 68 // Request may have cancelled while we were getting client certs.
77 // No need to query the user if there are no certs to choose from.
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsPKCS12Blob.h 62 // certs that were imported.
74 const net::CertificateList& certs,
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
ocsp.h 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
  /external/openssl/include/openssl/
ocsp.h 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st
285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st
434 STACK_OF(X509) *certs,
456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
479 STACK_OF(X509) *certs, unsigned long flags);
556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,

Completed in 945 milliseconds

1 2 3 4 56 7 8 91011>>