/external/webkit/Source/WebKit2/Shared/API/c/win/ |
H A D | WKCertificateInfoWin.cpp | 34 WKCertificateInfoRef WKCertificateInfoCreateWithCertificate(PCCERT_CONTEXT certificate) argument 36 return toAPI(WebCertificateInfo::create(PlatformCertificateInfo(certificate)).leakRef());
|
/external/chromium/net/base/ |
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) {
|
H A D | asn1_util.cc | 91 base::StringPiece certificate; local 92 if (!asn1::GetElement(&cert, asn1::kSEQUENCE, &certificate)) 96 if (!asn1::GetElement(&certificate, asn1::kSEQUENCE, &tbs_certificate))
|
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
|
H A D | cert_database.h | 26 // certificate store. 30 // certificate store. 35 // A CertDatabase::Observer will be notified on certificate database changes. 36 // The change could be either a new user certificate is added or trust on 37 // a certificate is changed. Observers can register themselves 44 // Will be called when a new user certificate is added. 48 // Will be called when a certificate's trust is changed. 59 // Stores per-certificate error codes for import failures. 65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure 70 // Constants that define which usages a certificate i [all...] |
H A D | test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 21 // Creates a new TrustEntry by incrementing the reference to |certificate| 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 26 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 30 // The temporary root certificate. 40 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 42 : certificate_(CERT_DupCertificate(certificate)), 50 bool TestRootCerts::Add(X509Certificate* certificate) { argument 52 // the certificate is removed. 54 SECStatus rv = CERT_GetCertTrust(certificate [all...] |
H A D | test_root_certs_mac.cc | 46 // rather than checking if they were the same (logical) certificate, so a 58 bool TestRootCerts::Add(X509Certificate* certificate) { argument 61 certificate->os_cert_handle())) 63 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
|
H A D | test_root_certs_win.cc | 31 // certificate stores before the one provided internally by Crypt32.dll. 125 // Attempting to add an individual certificate to |memory_store| causes 129 // trust the certificate. However, appending a store to the collection 132 // searched to see if a certificate is in the Root store, all the 133 // underlying stores in the collection will be searched, and any certificate 141 bool TestRootCerts::Add(X509Certificate* certificate) { argument 143 // If a test certificate is never added, then no interception should 148 temporary_roots_, certificate->os_cert_handle(), 151 // If the certificate is already added, return successfully. 178 // various caches are flushed, when at least one certificate i [all...] |
/external/webkit/Source/WebCore/platform/cf/win/ |
H A D | CertificateCFWin.cpp | 45 RetainPtr<CFDataRef> copyCertificateToData(PCCERT_CONTEXT certificate) argument 48 PCCERT_CONTEXT certificateCopy = CertDuplicateCertificateContext(certificate);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | IssuerAndSerialNumber.java | 45 Certificate certificate) 47 this.name = certificate.getIssuer(); 48 this.serialNumber = certificate.getSerialNumber(); 52 X509CertificateStructure certificate) 54 this.name = certificate.getIssuer(); 55 this.serialNumber = certificate.getSerialNumber(); 44 IssuerAndSerialNumber( Certificate certificate) argument 51 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
H A D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate 64 fromCertificate( X509Certificate certificate) argument 132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoGeneratorBuilder.java | 63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument 66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
H A D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) argument 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
H A D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) argument 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/chromium/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 53 X509Certificate* certificate, 52 CreateSSLServerSocket(Socket* socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.h | 70 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 101 // Holds a keypair and certificate together, and a method to generate 109 virtual OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity 118 // Configure an SSL context object to use our key and certificate. 123 OpenSSLCertificate* certificate) 124 : key_pair_(key_pair), certificate_(certificate) { 126 ASSERT(certificate != NULL); 122 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument
|
H A D | opensslidentity.cc | 49 // Random bits for certificate serial number 87 // Generate a self-signed certificate, with the public key from the 90 LOG(LS_INFO) << "Making certificate for " << common_name; 115 // (through the secure XMPP channel), and so the certificate 117 // arbitrary common_name. Note that this certificate goes out in 136 LOG(LS_INFO) << "Returning certificate"; 174 // Print a certificate to the log, for debugging. 198 LogSSLErrors("Generating certificate"); 254 OpenSSLCertificate *certificate = local 256 if (certificate) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertPathImplTest.java | 45 private X509Certificate certificate; field in class:X509CertPathImplTest 50 certificate = test.certificate; 61 certList.add(certificate);
|
H A D | X509CertImplTest.java | 86 // The values of certificate's fields: 252 public X509Certificate certificate; field in class:X509CertImplTest 261 * Creates the master certificate on the base of which 313 certificate = new X509CertImpl(cert); 318 certificate = new X509CertImpl(bis); 326 certificate.checkValidity(); 339 certificate.checkValidity(new Date(3000000000L)); 346 certificate.checkValidity(new Date(100000000L)); 353 certificate.checkValidity(new Date(1000000000L)); 354 certificate [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
H A D | ResourceErrorCF.cpp | 49 ResourceError::ResourceError(const String& domain, int errorCode, const String& failingURL, const String& localizedDescription, CFDataRef certificate) argument 52 , m_certificate(certificate) 56 PCCERT_CONTEXT ResourceError::certificate() const function in class:WebCore::ResourceError
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaContentVerifierProviderBuilder.java | 55 public ContentVerifierProvider build(final X509Certificate certificate) argument 62 certHolder = new JcaX509CertificateHolder(certificate); 66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 90 sig.initVerify(certificate.getPublicKey()); 99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | Identity2Test.java | 85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 123 certArray = new ByteArrayInputStream(certificate
|
H A D | KeyStore3Test.java | 52 private Certificate certificate; field in class:KeyStore3Test 83 certificate = cf.generateCertificate(certArray); 113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate}); 134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate}); 144 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate}); 152 mockKeyStore.setCertificateEntry(null, certificate);
|
H A D | KeyStore2Test.java | 70 // creating a certificate 71 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 87 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 239 assertTrue("the public key of the certificate from getCertificate() " 240 + "did not equal the original certificate", certRes 246 // testing for a certificate chain 248 assertTrue("the certificate for alias2 is supposed to exist", 267 // certificate entry 270 assertTrue("certificate entry - the alias returned for this " 271 + "certificate wa [all...] |
/external/webkit/Source/WebKit2/Shared/cf/ |
H A D | ArgumentCodersCF.cpp | 195 RetainPtr<SecCertificateRef> certificate; local 196 if (!decode(decoder, certificate)) 198 result.adoptCF(certificate.leakRef()); 484 void encode(ArgumentEncoder* encoder, SecCertificateRef certificate) argument 486 RetainPtr<CFDataRef> data(AdoptCF, SecCertificateCopyData(certificate));
|