/external/chromium_org/third_party/WebKit/Tools/Scripts/ |
H A D | run-blink-websocketserver | 56 option_parser.add_option('-c', '--certificate', dest='certificate', 57 default='', help='TLS certificate file.') 58 option_parser.add_option('--ca-certificate', dest='ca_certificate', 59 default='', help='TLS CA certificate file for ' 92 if options.certificate: 93 kwds['certificate'] = options.certificate
|
/external/chromium_org/content/browser/media/ |
H A D | webrtc_identity_store_backend.cc | 30 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") && 44 "certificate BLOB NOT NULL," 64 const std::string& certificate, 67 certificate(certificate), 72 const std::string& certificate, 76 certificate(certificate), 81 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity 221 iter->second.certificate, 63 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument 71 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument 231 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaContentVerifierProviderBuilder.java | 55 public ContentVerifierProvider build(final X509Certificate certificate) argument 62 certHolder = new JcaX509CertificateHolder(certificate); 66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 90 sig.initVerify(certificate.getPublicKey()); 99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/external/chromium/net/base/ |
H A D | test_root_certs.h | 30 // artificially mark a certificate as trusted, independent of the local 40 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns 41 // false if the certificate could not be marked trusted. 42 bool Add(X509Certificate* certificate); 44 // Reads a single certificate from |file| and marks it as trusted. Returns 46 // or more than one certificate existing in |file|. 66 // Returns an HCERTCHAINENGINE suitable to be used for certificate 87 // It is necessary to maintain a cache of the original certificate trust
|
H A D | cert_database.h | 26 // certificate store. 30 // certificate store. 35 // A CertDatabase::Observer will be notified on certificate database changes. 36 // The change could be either a new user certificate is added or trust on 37 // a certificate is changed. Observers can register themselves 44 // Will be called when a new user certificate is added. 48 // Will be called when a certificate's trust is changed. 59 // Stores per-certificate error codes for import failures. 65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure 70 // Constants that define which usages a certificate i [all...] |
H A D | cert_database_nss_unittest.cc | 297 EXPECT_EQ(certs[0], failed[0].certificate); 320 EXPECT_EQ("www.us.army.mil", failed[0].certificate->subject().common_name); 355 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); 357 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); 376 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name); 425 EXPECT_EQ("DOD CA-13", failed[0].certificate->subject().common_name); 427 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name);
|
/external/chromium_org/net/cert/ |
H A D | test_root_certs.h | 33 // artificially mark a certificate as trusted, independent of the local 43 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns 44 // false if the certificate could not be marked trusted. 45 bool Add(X509Certificate* certificate); 47 // Reads a single certificate from |file| and marks it as trusted. Returns 49 // or more than one certificate existing in |file|. 75 // Returns an HCERTCHAINENGINE suitable to be used for certificate 92 // It is necessary to maintain a cache of the original certificate trust 121 // If |cert_| contains a certificate (due to a prior call to Reset or due to
|
H A D | x509_util_nss.h | 36 // Parses the serial number from |certificate|. 37 std::string ParseSerialNumber(const CERTCertificate* certificate); 39 // Gets the subjectAltName extension field from the certificate, if any. 44 // Creates all possible OS certificate handles from |data| encoded in a specific 51 // Reads a single certificate from |pickle_iter| and returns a platform-specific 52 // certificate handle. Returns an invalid handle, NULL, on failure. 75 // Returns true iff a certificate is issued by any of the issuers listed 77 // |cert_chain| is the certificate's chain.
|
H A D | asn1_util.cc | 114 base::StringPiece certificate; local 115 if (!GetElement(cert, kSEQUENCE, &certificate)) 118 // We don't allow junk after the certificate. 123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
|
H A D | nss_cert_database_unittest.cc | 221 // Importing a PKCS#12 file with a certificate but no corresponding 235 // Now import a PKCS#12 file with just a certificate but no private key. 376 EXPECT_EQ(certs[0], failed[0].certificate); 399 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name); 400 EXPECT_EQ(ERR_FAILED, failed[0].net_error); // The certificate expired. 401 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); 435 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); 437 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name); 438 EXPECT_EQ(ERR_FAILED, failed[1].net_error); // The certificate expired. 439 EXPECT_EQ("www.us.army.mil", failed[2].certificate [all...] |
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_tcp_socket_private_api.h | 34 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
|
H A D | ppb_tcp_socket_private_thunk.cc | 88 PP_Resource certificate, 93 return enter.object()->AddChainBuildingCertificate(certificate, trusted); 87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/chromeos/network/ |
H A D | certificate_pattern.cc | 133 dict->Set(onc::certificate::kIssuerCAPEMs, 154 if (dict.GetList(onc::certificate::kIssuerCAPEMs, &child_list) &&
|
/external/chromium_org/net/android/java/src/org/chromium/net/ |
H A D | X509Util.java | 43 * Trust manager backed up by the read-only system certificate store. 48 * Trust manager backed up by a custom certificate store. We need such manager to plant test 60 * Ensures that the trust managers and certificate factory are initialized. 111 * Convert a DER encoded certificate to an X509Certificate. 143 * If an EKU extension is present in the end-entity certificate, it MUST contain either the 152 static boolean verifyKeyUsage(X509Certificate certificate) throws CertificateException { argument 155 ekuOids = certificate.getExtendedKeyUsage(); 180 throw new IllegalArgumentException("Expected non-null and non-empty certificate " + 200 // trust managers report all certificate errors using the general CertificateException. In 224 // Neither of the trust managers confirms the validity of the certificate chai [all...] |
/external/chromium_org/ppapi/api/private/ |
H A D | ppb_tcp_socket_private.idl | 77 * compared with the name(s) in the server's certificate during the SSL 104 * Adds a trusted/untrusted chain building certificate to be used for this 105 * connection. The <code>certificate</code> must be a 111 [in] PP_Resource certificate,
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppb_tcp_socket_private.h | 96 * compared with the name(s) in the server's certificate during the SSL 120 * Adds a trusted/untrusted chain building certificate to be used for this 121 * connection. The <code>certificate</code> must be a 126 PP_Resource certificate, 224 PP_Resource certificate,
|
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
H A D | CAss.cnf | 3 # This is mostly being used for generation of certificate requests. 42 certificate = $dir/cacert.pem # The CA certificate
|
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 3 # This is mostly being used for generation of certificate requests. 42 certificate = $dir/cacert.pem # The CA certificate
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl_unittest.cc | 115 base::DictionaryValue* certificate = NULL; local 116 onc_certificates_->GetDictionary(0, &certificate); 117 certificate->GetStringWithoutPathExpansion(certificate::kGUID, guid); 181 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid); 217 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL); 234 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL); 251 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL); 282 // First we import a certificate. 284 SCOPED_TRACE("Import original certificate"); [all...] |
/external/chromium_org/ppapi/shared_impl/private/ |
H A D | tcp_socket_private_impl.h | 49 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | sslfingerprint.h | 52 bool ret = identity->certificate().ComputeDigest(
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.cc | 49 // Random bits for certificate serial number 87 // Generate a self-signed certificate, with the public key from the 90 LOG(LS_INFO) << "Making certificate for " << common_name; 115 // (through the secure XMPP channel), and so the certificate 117 // arbitrary common_name. Note that this certificate goes out in 136 LOG(LS_INFO) << "Returning certificate"; 174 // Print a certificate to the log, for debugging. 198 LogSSLErrors("Generating certificate"); 254 OpenSSLCertificate *certificate = local 256 if (certificate) [all...] |
H A D | openssladapter.cc | 628 X509* certificate = SSL_get_peer_certificate(ssl); 629 if (!certificate) 636 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER); 651 int extension_count = X509_get_ext_count(certificate); 653 X509_EXTENSION* extension = X509_get_ext(certificate, i); 713 && (subject = X509_get_subject_name(certificate)) 721 X509_free(certificate); 724 LOG(LS_WARNING) << "TLS certificate check FAILED. " 788 LOG(LS_INFO) << "Error with certificate at depth: " << depth; 811 LOG(LS_INFO) << "validated certificate usin [all...] |
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client.cc | 159 writer.AppendString(properties.certificate); 178 writer.AppendString(properties.certificate); 198 writer.AppendString(properties.certificate);
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/servers/ |
H A D | websocket_server.py | 53 private_key=None, certificate=None, ca_certificate=None, 77 if certificate: 78 self._certificate = certificate 148 start_cmd.append('--ca-certificate')
|