/external/openssl/apps/ |
pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 245 STACK_OF(X509) *certs=NULL; 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert; 263 if (certs != NULL) 267 for (i=0; i<sk_X509_num(certs); i++) 269 x=sk_X509_value(certs,i);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 462 KeyStoreTestSupport.MCertificate certs[] = { local 469 certs); 505 certs.length); 507 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 522 certs.length); 524 assertEquals("Incorrect CertificateChain", cc[t], certs[t]); 730 KeyStoreTestSupport.MCertificate certs[] = { local 746 kss[i].setKeyEntry("ZZZ", null, pwd, certs); 765 kss[i].setKeyEntry(aliases[j], key, pwd, certs); 768 kss[i].setKeyEntry("KeyAlias", key, pwd, certs); 839 KeyStoreTestSupport.MCertificate certs[] = { local 903 KeyStoreTestSupport.MCertificate certs[] = { local [all...] |
/external/chromium/net/base/ |
cert_database_nss.cc | 96 void CertDatabase::ListCerts(CertificateList* certs) { 97 certs->clear(); 104 certs->push_back(X509Certificate::CreateFromHandle( 170 const CertificateList& certs, 173 return psm::nsPKCS12Blob_Export(output, certs, password);
|
/external/chromium_org/chromeos/network/ |
client_cert_util.cc | 53 // Functor to filter out certs that don't have private keys, or are invalid. 64 // Functor to filter out certs that don't have an issuer in the associated 144 // Start with all the certs, and narrow it down from there. 157 // Strip off any certs that don't have the right issuer and/or subject. 176 // Eliminate any certs that don't have private keys associated with
|
network_cert_migrator.cc | 49 // the nickname of each certificate of |certs|. If a match is found, then the 55 MigrationTask(const net::CertificateList& certs, 57 : certs_(certs), 257 VLOG(2) << "Certs not loaded yet."; 272 // Maybe there are networks referring to certs (by NSS nickname) that were not
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertificateTest.java | 110 private static final String CERTS_X509_PEM = "x509/certs.pem"; 112 private static final String CERTS_X509_DER = "x509/certs.der"; 114 private static final String CERTS_PKCS7_PEM = "x509/certs-pk7.pem"; 116 private static final String CERTS_PKCS7_DER = "x509/certs-pk7.der"; 118 /** A list of certs that are all slightly different. */ [all...] |
CertificateFactoryTest.java | 370 List<X509Certificate> certs = new ArrayList<X509Certificate>(); local 371 certs.add(cert3.certificate); 372 certs.add(cert2.certificate); 373 certs.add(cert1.certificate); 375 List<X509Certificate> duplicatedCerts = new ArrayList<X509Certificate>(certs); 397 testCertPathEncoding(cf, certs, null); 401 final Iterator<String> it2 = cf.generateCertPath(certs).getEncodings(); 424 testCertPathEncoding(cf, certs, encoding);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
CertificateFactory_ImplTest.java | 348 private void verifyCertificates(Collection certs) throws Exception { 351 for (Iterator it = certs.iterator(); it.hasNext();) { 545 Collection certs = local 547 assertNotNull("Factory returned null on correct data", certs); 549 expected_size, certs.size()); 550 verifyCertificates(certs); 577 Collection certs = factory.generateCertificates(bais); local 578 assertNotNull("Factory returned null on correct PKCS7 data", certs); 580 2, certs.size()); 583 for (Iterator it = certs.iterator(); it.hasNext();) 736 Collection certs = factory.generateCertificates(bais); local [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedHelper.java | 197 List certs = new ArrayList(certHldrs.size()); local 201 certs.add(new X509V2AttributeCertificate(((X509AttributeCertificateHolder)it.next()).getEncoded())); 205 "AttributeCertificate/" +type, new X509CollectionStoreParameters(certs), provider); 228 // List certs = new ArrayList(certHldrs.size()); 232 // certs.add(converter.getCertificate((X509CertificateHolder)it.next())); 236 // "Certificate/" +type, new X509CollectionStoreParameters(certs), provider);
|
/external/chromium_org/net/tools/quic/test_tools/ |
quic_test_client.cc | 36 const vector<string>& certs, 44 if (certs.empty()) { 48 // Convert certs to X509Certificate. 49 vector<StringPiece> cert_pieces(certs.size()); 50 for (unsigned i = 0; i < certs.size(); i++) { 51 cert_pieces[i] = StringPiece(certs[i]);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
nssidentity.cc | 111 std::vector<SSLCertificate*> certs; local 113 certs.push_back(new NSSCertificate(node->cert)); 116 if (!certs.empty()) 117 chain_.reset(new SSLCertChain(certs)); 121 std::for_each(certs.begin(), certs.end(), DeleteCert);
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i);
|
ocsp_prn.c | 170 for (i=0; i<sk_X509_num(sig->certs); i++) 172 X509_print(bp, sk_X509_value(sig->certs,i)); 173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i)); 280 for (i=0; i<sk_X509_num(br->certs); i++) 282 X509_print(bp, sk_X509_value(br->certs,i)); 283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
|
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/external/openssl/crypto/ocsp/ |
ocsp_cl.c | 129 if (!sig->certs && !(sig->certs = sk_X509_new_null())) 132 if(!sk_X509_push(sig->certs, cert)) return 0; 147 STACK_OF(X509) *certs, 171 for (i = 0; i < sk_X509_num(certs); i++) 173 x = sk_X509_value(certs, i);
|
ocsp_prn.c | 170 for (i=0; i<sk_X509_num(sig->certs); i++) 172 X509_print(bp, sk_X509_value(sig->certs,i)); 173 PEM_write_bio_X509(bp,sk_X509_value(sig->certs,i)); 280 for (i=0; i<sk_X509_num(br->certs); i++) 282 X509_print(bp, sk_X509_value(br->certs,i)); 283 PEM_write_bio_X509(bp,sk_X509_value(br->certs,i));
|
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 103 final List<OpenSSLX509Certificate> certs = new ArrayList<OpenSSLX509Certificate>( local 109 certs.add(new OpenSSLX509Certificate(certRefs[i])); 111 return certs; 147 final List<OpenSSLX509Certificate> certs = new ArrayList<OpenSSLX509Certificate>( local 153 certs.add(new OpenSSLX509Certificate(certRefs[i])); 155 return certs;
|
TrustManagerImpl.java | 177 private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { 178 Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); 179 for (X509Certificate cert : certs) { 197 * chain is pinned appropriately for that host. If null, it does not check for pinned certs. 260 // build the cert path from the array of certs sans trust anchors 321 * md2WithRSAEncryption. This also handles removing old certs 322 * after bridge CA certs. 368 // This avoids including "bridge" CA certs that added for legacy compatibility.
|
/external/chromium_org/chrome/browser/net/ |
sqlite_server_bound_cert_store.cc | 66 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs); 147 // Initializes the certs table, returning true on success. 173 certs(new ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>( 176 certs.get(); 181 base::Bind(loaded_callback, base::Passed(&certs))); 185 ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs) { 193 // Ensure the parent directory for storing certs is created before reading 230 // Slurp all the certs into the out-vector. 258 certs->push_back(cert.release()); 261 UMA_HISTOGRAM_COUNTS_10000("DomainBoundCerts.DBLoadedCount", certs->size()) [all...] |
/external/chromium_org/chrome/browser/browsing_data/ |
browsing_data_server_bound_cert_helper_unittest.cc | 50 const net::ServerBoundCertStore::ServerBoundCertList& certs) { 52 server_bound_cert_list_ = certs;
|
/external/chromium_org/content/browser/ssl/ |
ssl_client_auth_handler.cc | 68 // Request may have cancelled while we were getting client certs. 77 // No need to query the user if there are no certs to choose from.
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsPKCS12Blob.h | 62 // certs that were imported. 74 const net::CertificateList& certs,
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|
/external/openssl/include/openssl/ |
ocsp.h | 140 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 146 STACK_OF(X509) *certs; member in struct:ocsp_signature_st 285 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 308 STACK_OF(X509) *certs; member in struct:ocsp_basic_response_st 434 STACK_OF(X509) *certs, 456 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); 479 STACK_OF(X509) *certs, unsigned long flags); 556 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
|