/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsPKCS12Blob.cpp | 381 // Having already loaded the certs, form them into a blob (loading the keys 390 const net::CertificateList& certs, 418 for (size_t i=0; i<certs.size(); i++) { 419 DCHECK(certs[i].get()); 420 CERTCertificate* nssCert = certs[i]->os_cert_handle();
|
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 185 ArrayList<Certificate> certs = new ArrayList<Certificate>(); local 193 certs.addAll(getSignerCertificates(signatureFile, certificates)); 198 if (certs.isEmpty()) { 201 Certificate[] certificatesArray = certs.toArray(new Certificate[certs.size()]);
|
/external/chromium/net/socket/ |
ssl_client_socket_mac.cc | 417 CFArrayRef certs; local 418 OSStatus status = SSLCopyPeerCertificates(ssl_context, &certs); 419 // SSLCopyPeerCertificates may succeed but return a null |certs| 422 if (status != noErr || !certs) 424 base::mac::ScopedCFTypeRef<CFArrayRef> scoped_certs(certs); 426 DCHECK_GT(CFArrayGetCount(certs), 0); 432 CFIndex certs_length = CFArrayGetCount(certs); 435 const_cast<void*>(CFArrayGetValueAtIndex(certs, i))); 440 const_cast<void*>(CFArrayGetValueAtIndex(certs, 0))); 744 // I'm being asked for available client certs (identities) [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 827 String[] certs = KeyStore.getInstance().saw(prefix, android.os.Process.WIFI_UID); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 156 Certificate certs[] = { local 166 kss[i].setKeyEntry(alias, kk, certs); 172 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
/external/chromium_org/chrome/browser/browsing_data/ |
browsing_data_remover.h | 312 // Invoked on the IO thread to delete server bound certs. 316 // Callback on IO Thread when server bound certs have been deleted. Clears SSL 321 // Callback for when server bound certs have been deleted. Invokes
|
/external/chromium_org/third_party/openssl/ |
README.chromium | 157 Ensure the library can find the right files under /etc/ssl/certs when 160 There are many symbolic links under /etc/ssl/certs created by using 165 that use the old /etc/ssl/certs layout (e.g. Ubuntu Lucid).
|
/external/openssh/regress/ |
cert-hostkey.sh | 37 # v00 ecdsa certs do not exist 190 # v00 ecdsa certs do not exist. 229 # v00 ecdsa certs do not exist.
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 155 Certificate certs[] = { local 165 kss[i].setKeyEntry(alias, kk, certs); 171 assertEquals(kss[i].getCertificateChain(alias).length, certs.length);
|
/external/chromium/chrome/browser/ssl/ |
ssl_client_auth_handler.h | 67 // The certs to choose from.
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_service.cc | 55 // Certs are forwarded to |cert_verifier_|, thus register here after
|
/external/chromium_org/chromeos/network/ |
certificate_pattern.h | 79 // all certs). Ignores enrollment_uri_;
|
/external/chromium_org/net/cert/ |
ct_objects_extractor_nss.cc | 385 // certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 452 // generate precerts for certs without the extension. For now, just a sanity 466 // This can happen when the issuer and leaf certs share the same serial 468 // (but happened with bad test certs).
|
/external/chromium_org/net/ssl/ |
client_cert_store_nss.cc | 92 // It is ok for a user not to have any client certs.
|
default_server_bound_cert_store.cc | 337 scoped_ptr<ScopedVector<ServerBoundCert> > certs) { 340 for (std::vector<ServerBoundCert*>::const_iterator it = certs->begin(); 341 it != certs->end(); ++it) { 346 certs->weak_clear();
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
nsseq.c | 80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 64 # With NAT-T you shouldn't use PSK. Let's go on with certs.
|
/external/openssl/crypto/asn1/ |
nsseq.c | 80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|
/external/openssl/crypto/x509/ |
x509_vfy.h | 112 The X509_STORE has X509_LOOKUPs for looking up certs. 185 /* The following is a cache of trusted certs */ 233 int current_method; /* used when looking up certs */ 536 STACK_OF(X509) *certs,
|
/external/openssl/include/openssl/ |
pkcs7.h | 359 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 367 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 369 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 370 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
|