/external/openssl/apps/ |
nseq.c | 133 seq->certs = sk_X509_new_null(); 135 sk_X509_push(seq->certs,x509); 137 if(!sk_X509_num(seq->certs)) 139 BIO_printf (bio_err, "Error reading certs file %s\n", infile); 154 for(i = 0; i < sk_X509_num(seq->certs); i++) { 155 x509 = sk_X509_value(seq->certs, i);
|
/libcore/crypto/src/main/java/org/conscrypt/ |
AbstractSessionContext.java | 206 Certificate[] certs = session.getPeerCertificates(); local 207 daos.writeInt(certs.length); 209 for (Certificate cert : certs) { 246 X509Certificate[] certs = new X509Certificate[count]; local 251 certs[i] = OpenSSLX509Certificate.fromX509Der(certData); 254 return new OpenSSLSessionImpl(sessionData, host, port, certs, this);
|
ServerHandshakeImpl.java | 138 if (clientCert.certs.length == 0) { 147 clientCert.certs, authType); 152 session.peerCertificates = clientCert.certs; 172 ds.init(clientCert.certs[0]); 234 preMasterSecret = ((DHPublicKey) clientCert.certs[0].getPublicKey()).getY().toByteArray(); 431 X509Certificate[] certs = null; local 449 certs = ekm.getCertificateChain(alias); 454 certs = km.getCertificateChain(alias); 458 if (certs == null) { 462 session.localCertificates = certs; [all...] |
KeyManagerImpl.java | 102 Certificate[] certs = hash.get(alias).getCertificateChain(); local 103 if (certs[0] instanceof X509Certificate) { 104 X509Certificate[] xcerts = new X509Certificate[certs.length]; 105 for (int i = 0; i < certs.length; i++) { 106 xcerts[i] = (X509Certificate) certs[i];
|
ClientHandshakeImpl.java | 383 X509Certificate[] certs = null; local 397 certs = ekm.getCertificateChain(alias); 402 certs = km.getCertificateChain(alias); 406 session.localCertificates = certs; 407 clientCert = new CertificateMessage(certs); 421 ds.init(serverCert.certs[0]); 432 c.init(Cipher.WRAP_MODE, serverCert.certs[0]); 472 ds.init(serverCert.certs[0]); 514 if (clientCert != null && clientCert.certs.length > 0 && !clientKeyExchange.isEmpty()) { 554 tm.checkServerTrusted(serverCert.certs, authType, hostname) [all...] |
OpenSSLX509CRL.java | 83 final List<OpenSSLX509CRL> certs = new ArrayList<OpenSSLX509CRL>(certRefs.length); local 88 certs.add(new OpenSSLX509CRL(certRefs[i])); 90 return certs; 123 final List<OpenSSLX509CRL> certs = new ArrayList<OpenSSLX509CRL>(certRefs.length); local 128 certs.add(new OpenSSLX509CRL(certRefs[i])); 130 return certs;
|
/libcore/luni/src/test/java/tests/security/cert/ |
CertificateFactory3Test.java | 89 Certificate[] certs = new Certificate[3]; local 91 certs[i] = certFs[i].generateCertificate(new ByteArrayInputStream( 94 assertEquals(certs[0], certs[1]); 95 assertEquals(certs[0], certs[2]);
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 70 * real chain of certificates, it's just an array of 3 certs. The method 105 Certificate[] certs = new Certificate[howMany]; local 107 certs[i] = new TestCertificate(Integer.toString(startID + i)); 109 return new TestCertPath(certs); 156 private Certificate[] certs; field in class:TestCertUtils.TestCertPath 166 certs = getCertChain(); 174 * @param certs 176 public TestCertPath(Certificate[] certs) { 178 this.certs = certs; [all...] |
/external/chromium_org/net/ssl/ |
default_server_bound_cert_store_unittest.cc | 93 certs(new ScopedVector<DefaultServerBoundCertStore::ServerBoundCert>()); 97 certs->push_back( 102 FROM_HERE, base::Bind(loaded_callback, base::Passed(&certs))); 137 // Make sure certs load properly. 451 ServerBoundCertStore::ServerBoundCertList certs; local 452 store.GetAllServerBoundCerts(base::Bind(GetAllCallback, &certs)); 453 EXPECT_EQ(4u, certs.size()); 489 ServerBoundCertStore::ServerBoundCertList certs; local 490 store.GetAllServerBoundCerts(base::Bind(GetAllCallback, &certs)); 491 ASSERT_EQ(3u, certs.size()) 538 ServerBoundCertStore::ServerBoundCertList certs; local [all...] |
server_bound_cert_service.h | 31 // A class for creating and fetching server bound certs. These certs are used 34 // As a result although certs are set to be invalid after one year, we don't 35 // actually expire them. Once generated, certs are valid as long as the users 36 // want. Users can delete existing certs, and new certs will be generated
|
/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 232 Certificate[] certs = getServerCertificates(); local 233 if (certs == null || certs.length == 0 || (!(certs[0] instanceof X509Certificate))) { 236 return ((X509Certificate) certs[0]).getSubjectX500Principal(); 248 Certificate[] certs = getLocalCertificates(); local 249 if (certs == null || certs.length == 0 || (!(certs[0] instanceof X509Certificate))) { 252 return ((X509Certificate) certs[0]).getSubjectX500Principal() [all...] |
/external/chromium_org/net/quic/crypto/ |
cert_compressor.cc | 175 // efficiently represent |certs| to a peer who has the common sets identified 178 vector<CertEntry> MatchCerts(const vector<string>& certs, 183 entries.reserve(certs.size()); 189 for (vector<string>::const_iterator i = certs.begin(); 190 i != certs.end(); ++i) { 286 // |certs| is one-to-one with |entries| and contains the certificates for those 289 const vector<string>& certs) { 292 // The dictionary starts with the common and cached certs in reverse order. 294 for (size_t i = certs.size() - 1; i < certs.size(); i--) [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedGenerator.java | 111 protected List certs = new ArrayList(); field in class:CMSSignedGenerator 212 certs.addAll(CMSUtils.getCertificatesFromStore(certStore)); 226 certs.add(certificate.toASN1Structure()); 239 certs.addAll(CMSUtils.getCertificatesFromStore(certStore)); 275 certs.add(new DERTaggedObject(false, 2, attrCert.toASN1Structure())); 288 certs.addAll(CMSUtils.getAttributeCertificatesFromStore(attrStore)); 337 certs.add(new DERTaggedObject(false, 2, 343 throw new CMSException("error processing attribute certs", e); 347 throw new CMSException("error processing attribute certs", e);
|
/external/chromium/net/base/ |
cert_database.h | 74 // client certs of each type. 100 void ListCerts(CertificateList* certs); 124 int ExportToPKCS12(const CertificateList& certs, const string16& password, 145 // additional certs should be intermediate/CA certs and will be imported but
|
/external/chromium_org/chrome/browser/ |
certificate_manager_model.h | 19 // Map from the subject organization name to the list of certs from that 36 // list of certs, diff against past list, and then notify of the changes? 46 // Trigger a refresh of the list of certs, unlock any slots if necessary. 79 // additional certs should be intermediate/CA certs and will be imported but
|
/external/chromium_org/chrome/browser/chromeos/login/ |
profile_auth_data.cc | 44 const net::ServerBoundCertStore::ServerBoundCertList& certs); 102 // If both cookies and server bound certs have been retrieved, see if we need to 181 const net::ServerBoundCertStore::ServerBoundCertList& certs) { 183 certs_to_transfer_ = certs; 188 // Retrieves server bound certs of |from_context_|.
|
/external/chromium_org/net/third_party/nss/patches/ |
cachecerts.patch | 37 + ssl3CertNode *certs = NULL; 52 + certs = c; 56 + ss->ssl3.peerCertChain = certs; 60 +ssl3_CopyPeerCertsToSID(ssl3CertNode *certs, sslSessionID *sid) 63 + ssl3CertNode *c = certs;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslidentity.h | 96 explicit SSLCertChain(const std::vector<SSLCertificate*>& certs) { 97 ASSERT(!certs.empty()); 98 certs_.resize(certs.size()); 99 std::transform(certs.begin(), certs.end(), certs_.begin(), DupCert);
|
/external/chromium_org/chrome/browser/ui/webui/options/ |
certificate_manager_browsertest.cc | 43 // Setup the policy provider for injecting certs through ONC policy. 127 ClickElement("#ca-certs-nav-tab"); 140 ClickElement("#ca-certs-nav-tab");
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
README | 32 to install a server certificate and key in /etc/openssl/certs/server.crt 33 and /etc/openssl/certs/server.key 45 /etc/openssl/certs/root-ca.crt
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/cert/ |
X509CertPathImpl.java | 128 public X509CertPathImpl(List<? extends java.security.cert.Certificate> certs) 132 final int size = certs.size(); 136 final java.security.cert.Certificate cert = certs.get(i); 146 * Creates an X.509 CertPath over the specified {@code certs}. The 147 * {@code certs} should be sorted correctly when calling into the 151 private X509CertPathImpl(List<X509Certificate> certs, Encoding type) { 154 certificates = certs; 167 List<Certificate> certs = sd.getCertificates(); local 168 if (certs == null) { 169 certs = Collections.emptyList() [all...] |
/external/chromium_org/net/cert/ |
nss_cert_database.h | 70 // client certs of each type. 96 void ListCerts(CertificateList* certs); 126 // of certs that were imported. 136 int ExportToPKCS12(const CertificateList& certs, 158 // additional certs should be intermediate/CA certs and will be imported but
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i);
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 225 char **certs; local 339 /* get certs */ 342 certs = getcerts(certpath); 347 "issuer's certs in your environment.\n\n"); 349 certpath = "/usr/local/openssl/certs"; 350 certs = getcerts(NULL); 354 "issuer's certs in your environment\nso not doing " 360 while (*certs != NULL) { 368 c.v = *certs; 369 c.l = strlen(*certs); 415 char **certs = NULL, **p; local [all...] |
/external/openssl/crypto/ocsp/ |
ocsp_srv.c | 200 if (!resp->certs && !(resp->certs = sk_X509_new_null())) 203 if(!sk_X509_push(resp->certs, cert)) return 0; 210 STACK_OF(X509) *certs, unsigned long flags) 225 for (i = 0; i < sk_X509_num(certs); i++) 227 X509 *tmpcert = sk_X509_value(certs, i);
|