Searched defs:certificate (Results 1 - 25 of 29) sorted by relevance

12

/external/webkit/Source/WebKit2/Shared/API/c/win/
H A DWKCertificateInfoWin.cpp34 WKCertificateInfoRef WKCertificateInfoCreateWithCertificate(PCCERT_CONTEXT certificate) argument
36 return toAPI(WebCertificateInfo::create(PlatformCertificateInfo(certificate)).leakRef());
/external/chromium/net/base/
H A Dtest_root_certs_openssl.cc17 bool TestRootCerts::Add(X509Certificate* certificate) { argument
19 certificate->os_cert_handle())) {
H A Dasn1_util.cc91 base::StringPiece certificate; local
92 if (!asn1::GetElement(&cert, asn1::kSEQUENCE, &certificate))
96 if (!asn1::GetElement(&certificate, asn1::kSEQUENCE, &tbs_certificate))
H A Dssl_client_auth_cache.cc22 scoped_refptr<X509Certificate>* certificate) {
23 DCHECK(certificate);
29 *certificate = iter->second;
20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
H A Dcert_database.h26 // certificate store.
30 // certificate store.
35 // A CertDatabase::Observer will be notified on certificate database changes.
36 // The change could be either a new user certificate is added or trust on
37 // a certificate is changed. Observers can register themselves
44 // Will be called when a new user certificate is added.
48 // Will be called when a certificate's trust is changed.
59 // Stores per-certificate error codes for import failures.
65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure
70 // Constants that define which usages a certificate i
[all...]
H A Dtest_root_certs_nss.cc17 // for a certificate whose trust status has been changed by the
21 // Creates a new TrustEntry by incrementing the reference to |certificate|
23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust);
26 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry
30 // The temporary root certificate.
40 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument
42 : certificate_(CERT_DupCertificate(certificate)),
50 bool TestRootCerts::Add(X509Certificate* certificate) { argument
52 // the certificate is removed.
54 SECStatus rv = CERT_GetCertTrust(certificate
[all...]
H A Dtest_root_certs_mac.cc46 // rather than checking if they were the same (logical) certificate, so a
58 bool TestRootCerts::Add(X509Certificate* certificate) { argument
61 certificate->os_cert_handle()))
63 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
H A Dtest_root_certs_win.cc31 // certificate stores before the one provided internally by Crypt32.dll.
125 // Attempting to add an individual certificate to |memory_store| causes
129 // trust the certificate. However, appending a store to the collection
132 // searched to see if a certificate is in the Root store, all the
133 // underlying stores in the collection will be searched, and any certificate
141 bool TestRootCerts::Add(X509Certificate* certificate) { argument
143 // If a test certificate is never added, then no interception should
148 temporary_roots_, certificate->os_cert_handle(),
151 // If the certificate is already added, return successfully.
178 // various caches are flushed, when at least one certificate i
[all...]
/external/webkit/Source/WebCore/platform/cf/win/
H A DCertificateCFWin.cpp45 RetainPtr<CFDataRef> copyCertificateToData(PCCERT_CONTEXT certificate) argument
48 PCCERT_CONTEXT certificateCopy = CertDuplicateCertificateContext(certificate);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
H A DIssuerAndSerialNumber.java45 Certificate certificate)
47 this.name = certificate.getIssuer();
48 this.serialNumber = certificate.getSerialNumber();
52 X509CertificateStructure certificate)
54 this.name = certificate.getIssuer();
55 this.serialNumber = certificate.getSerialNumber();
44 IssuerAndSerialNumber( Certificate certificate) argument
51 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
H A DAuthorityKeyIdentifierStructure.java65 X509Certificate certificate)
70 if (certificate.getVersion() != 3)
72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId());
90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
98 info, new GeneralNames(genName), certificate
64 fromCertificate( X509Certificate certificate) argument
132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
H A DJcaSignerInfoGeneratorBuilder.java63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument
66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
H A DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) argument
45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider());
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
65 return new JcaContentVerifierProviderBuilder().build(certificate);
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
H A DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) argument
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
/external/chromium/net/socket/
H A Dssl_server_socket_openssl.cc53 X509Certificate* certificate,
52 CreateSSLServerSocket(Socket* socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
/external/chromium/third_party/libjingle/source/talk/base/
H A Dopensslidentity.h70 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object,
101 // Holds a keypair and certificate together, and a method to generate
109 virtual OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity
118 // Configure an SSL context object to use our key and certificate.
123 OpenSSLCertificate* certificate)
124 : key_pair_(key_pair), certificate_(certificate) {
126 ASSERT(certificate != NULL);
122 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument
H A Dopensslidentity.cc49 // Random bits for certificate serial number
87 // Generate a self-signed certificate, with the public key from the
90 LOG(LS_INFO) << "Making certificate for " << common_name;
115 // (through the secure XMPP channel), and so the certificate
117 // arbitrary common_name. Note that this certificate goes out in
136 LOG(LS_INFO) << "Returning certificate";
174 // Print a certificate to the log, for debugging.
198 LogSSLErrors("Generating certificate");
254 OpenSSLCertificate *certificate = local
256 if (certificate)
[all...]
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
H A DX509CertPathImplTest.java45 private X509Certificate certificate; field in class:X509CertPathImplTest
50 certificate = test.certificate;
61 certList.add(certificate);
H A DX509CertImplTest.java86 // The values of certificate's fields:
252 public X509Certificate certificate; field in class:X509CertImplTest
261 * Creates the master certificate on the base of which
313 certificate = new X509CertImpl(cert);
318 certificate = new X509CertImpl(bis);
326 certificate.checkValidity();
339 certificate.checkValidity(new Date(3000000000L));
346 certificate.checkValidity(new Date(100000000L));
353 certificate.checkValidity(new Date(1000000000L));
354 certificate
[all...]
/external/webkit/Source/WebCore/platform/network/cf/
H A DResourceErrorCF.cpp49 ResourceError::ResourceError(const String& domain, int errorCode, const String& failingURL, const String& localizedDescription, CFDataRef certificate) argument
52 , m_certificate(certificate)
56 PCCERT_CONTEXT ResourceError::certificate() const function in class:WebCore::ResourceError
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java55 public ContentVerifierProvider build(final X509Certificate certificate) argument
62 certHolder = new JcaX509CertificateHolder(certificate);
66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
90 sig.initVerify(certificate.getPublicKey());
99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DIdentity2Test.java85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
123 certArray = new ByteArrayInputStream(certificate
H A DKeyStore3Test.java52 private Certificate certificate; field in class:KeyStore3Test
83 certificate = cf.generateCertificate(certArray);
113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate});
134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate});
144 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate});
152 mockKeyStore.setCertificateEntry(null, certificate);
H A DKeyStore2Test.java70 // creating a certificate
71 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
87 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
239 assertTrue("the public key of the certificate from getCertificate() "
240 + "did not equal the original certificate", certRes
246 // testing for a certificate chain
248 assertTrue("the certificate for alias2 is supposed to exist",
267 // certificate entry
270 assertTrue("certificate entry - the alias returned for this "
271 + "certificate wa
[all...]
/external/webkit/Source/WebKit2/Shared/cf/
H A DArgumentCodersCF.cpp195 RetainPtr<SecCertificateRef> certificate; local
196 if (!decode(decoder, certificate))
198 result.adoptCF(certificate.leakRef());
484 void encode(ArgumentEncoder* encoder, SecCertificateRef certificate) argument
486 RetainPtr<CFDataRef> data(AdoptCF, SecCertificateCopyData(certificate));

Completed in 538 milliseconds

12