Searched refs:certificate (Results 76 - 100 of 157) sorted by relevance

1234567

/external/chromium_org/third_party/WebKit/Tools/Scripts/
H A Drun-blink-websocketserver56 option_parser.add_option('-c', '--certificate', dest='certificate',
57 default='', help='TLS certificate file.')
58 option_parser.add_option('--ca-certificate', dest='ca_certificate',
59 default='', help='TLS CA certificate file for '
92 if options.certificate:
93 kwds['certificate'] = options.certificate
/external/chromium_org/content/browser/media/
H A Dwebrtc_identity_store_backend.cc30 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") &&
44 "certificate BLOB NOT NULL,"
64 const std::string& certificate,
67 certificate(certificate),
72 const std::string& certificate,
76 certificate(certificate),
81 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity
221 iter->second.certificate,
63 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
71 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument
231 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java55 public ContentVerifierProvider build(final X509Certificate certificate) argument
62 certHolder = new JcaX509CertificateHolder(certificate);
66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
90 sig.initVerify(certificate.getPublicKey());
99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
/external/chromium/net/base/
H A Dtest_root_certs.h30 // artificially mark a certificate as trusted, independent of the local
40 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns
41 // false if the certificate could not be marked trusted.
42 bool Add(X509Certificate* certificate);
44 // Reads a single certificate from |file| and marks it as trusted. Returns
46 // or more than one certificate existing in |file|.
66 // Returns an HCERTCHAINENGINE suitable to be used for certificate
87 // It is necessary to maintain a cache of the original certificate trust
H A Dcert_database.h26 // certificate store.
30 // certificate store.
35 // A CertDatabase::Observer will be notified on certificate database changes.
36 // The change could be either a new user certificate is added or trust on
37 // a certificate is changed. Observers can register themselves
44 // Will be called when a new user certificate is added.
48 // Will be called when a certificate's trust is changed.
59 // Stores per-certificate error codes for import failures.
65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure
70 // Constants that define which usages a certificate i
[all...]
H A Dcert_database_nss_unittest.cc297 EXPECT_EQ(certs[0], failed[0].certificate);
320 EXPECT_EQ("www.us.army.mil", failed[0].certificate->subject().common_name);
355 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name);
357 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name);
376 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name);
425 EXPECT_EQ("DOD CA-13", failed[0].certificate->subject().common_name);
427 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name);
/external/chromium_org/net/cert/
H A Dtest_root_certs.h33 // artificially mark a certificate as trusted, independent of the local
43 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns
44 // false if the certificate could not be marked trusted.
45 bool Add(X509Certificate* certificate);
47 // Reads a single certificate from |file| and marks it as trusted. Returns
49 // or more than one certificate existing in |file|.
75 // Returns an HCERTCHAINENGINE suitable to be used for certificate
92 // It is necessary to maintain a cache of the original certificate trust
121 // If |cert_| contains a certificate (due to a prior call to Reset or due to
H A Dx509_util_nss.h36 // Parses the serial number from |certificate|.
37 std::string ParseSerialNumber(const CERTCertificate* certificate);
39 // Gets the subjectAltName extension field from the certificate, if any.
44 // Creates all possible OS certificate handles from |data| encoded in a specific
51 // Reads a single certificate from |pickle_iter| and returns a platform-specific
52 // certificate handle. Returns an invalid handle, NULL, on failure.
75 // Returns true iff a certificate is issued by any of the issuers listed
77 // |cert_chain| is the certificate's chain.
H A Dasn1_util.cc114 base::StringPiece certificate; local
115 if (!GetElement(cert, kSEQUENCE, &certificate))
118 // We don't allow junk after the certificate.
123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
H A Dnss_cert_database_unittest.cc221 // Importing a PKCS#12 file with a certificate but no corresponding
235 // Now import a PKCS#12 file with just a certificate but no private key.
376 EXPECT_EQ(certs[0], failed[0].certificate);
399 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name);
400 EXPECT_EQ(ERR_FAILED, failed[0].net_error); // The certificate expired.
401 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name);
435 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name);
437 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name);
438 EXPECT_EQ(ERR_FAILED, failed[1].net_error); // The certificate expired.
439 EXPECT_EQ("www.us.army.mil", failed[2].certificate
[all...]
/external/chromium_org/ppapi/thunk/
H A Dppb_tcp_socket_private_api.h34 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
H A Dppb_tcp_socket_private_thunk.cc88 PP_Resource certificate,
93 return enter.object()->AddChainBuildingCertificate(certificate, trusted);
87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/chromeos/network/
H A Dcertificate_pattern.cc133 dict->Set(onc::certificate::kIssuerCAPEMs,
154 if (dict.GetList(onc::certificate::kIssuerCAPEMs, &child_list) &&
/external/chromium_org/net/android/java/src/org/chromium/net/
H A DX509Util.java43 * Trust manager backed up by the read-only system certificate store.
48 * Trust manager backed up by a custom certificate store. We need such manager to plant test
60 * Ensures that the trust managers and certificate factory are initialized.
111 * Convert a DER encoded certificate to an X509Certificate.
143 * If an EKU extension is present in the end-entity certificate, it MUST contain either the
152 static boolean verifyKeyUsage(X509Certificate certificate) throws CertificateException { argument
155 ekuOids = certificate.getExtendedKeyUsage();
180 throw new IllegalArgumentException("Expected non-null and non-empty certificate " +
200 // trust managers report all certificate errors using the general CertificateException. In
224 // Neither of the trust managers confirms the validity of the certificate chai
[all...]
/external/chromium_org/ppapi/api/private/
H A Dppb_tcp_socket_private.idl77 * compared with the name(s) in the server's certificate during the SSL
104 * Adds a trusted/untrusted chain building certificate to be used for this
105 * connection. The <code>certificate</code> must be a
111 [in] PP_Resource certificate,
/external/chromium_org/ppapi/c/private/
H A Dppb_tcp_socket_private.h96 * compared with the name(s) in the server's certificate during the SSL
120 * Adds a trusted/untrusted chain building certificate to be used for this
121 * connection. The <code>certificate</code> must be a
126 PP_Resource certificate,
224 PP_Resource certificate,
/external/chromium_org/third_party/openssl/openssl/android.testssl/
H A DCAss.cnf3 # This is mostly being used for generation of certificate requests.
42 certificate = $dir/cacert.pem # The CA certificate
/external/openssl/android.testssl/
H A DCAss.cnf3 # This is mostly being used for generation of certificate requests.
42 certificate = $dir/cacert.pem # The CA certificate
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl_unittest.cc115 base::DictionaryValue* certificate = NULL; local
116 onc_certificates_->GetDictionary(0, &certificate);
117 certificate->GetStringWithoutPathExpansion(certificate::kGUID, guid);
181 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid);
217 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL);
234 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL);
251 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL);
282 // First we import a certificate.
284 SCOPED_TRACE("Import original certificate");
[all...]
/external/chromium_org/ppapi/shared_impl/private/
H A Dtcp_socket_private_impl.h49 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dsslfingerprint.h52 bool ret = identity->certificate().ComputeDigest(
/external/chromium/third_party/libjingle/source/talk/base/
H A Dopensslidentity.cc49 // Random bits for certificate serial number
87 // Generate a self-signed certificate, with the public key from the
90 LOG(LS_INFO) << "Making certificate for " << common_name;
115 // (through the secure XMPP channel), and so the certificate
117 // arbitrary common_name. Note that this certificate goes out in
136 LOG(LS_INFO) << "Returning certificate";
174 // Print a certificate to the log, for debugging.
198 LogSSLErrors("Generating certificate");
254 OpenSSLCertificate *certificate = local
256 if (certificate)
[all...]
H A Dopenssladapter.cc628 X509* certificate = SSL_get_peer_certificate(ssl);
629 if (!certificate)
636 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER);
651 int extension_count = X509_get_ext_count(certificate);
653 X509_EXTENSION* extension = X509_get_ext(certificate, i);
713 && (subject = X509_get_subject_name(certificate))
721 X509_free(certificate);
724 LOG(LS_WARNING) << "TLS certificate check FAILED. "
788 LOG(LS_INFO) << "Error with certificate at depth: " << depth;
811 LOG(LS_INFO) << "validated certificate usin
[all...]
/external/chromium_org/chromeos/dbus/
H A Dshill_manager_client.cc159 writer.AppendString(properties.certificate);
178 writer.AppendString(properties.certificate);
198 writer.AppendString(properties.certificate);
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/servers/
H A Dwebsocket_server.py53 private_key=None, certificate=None, ca_certificate=None,
77 if certificate:
78 self._certificate = certificate
148 start_cmd.append('--ca-certificate')

Completed in 828 milliseconds

1234567