Searched defs:certificate (Results 51 - 75 of 81) sorted by relevance

1234

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DIdentity2Test.java85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
123 certArray = new ByteArrayInputStream(certificate
H A DKeyStore3Test.java52 private Certificate certificate; field in class:KeyStore3Test
83 certificate = cf.generateCertificate(certArray);
113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate});
134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate});
144 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate});
152 mockKeyStore.setCertificateEntry(null, certificate);
H A DKeyStore2Test.java70 // creating a certificate
71 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
87 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
239 assertTrue("the public key of the certificate from getCertificate() "
240 + "did not equal the original certificate", certRes
246 // testing for a certificate chain
248 assertTrue("the certificate for alias2 is supposed to exist",
267 // certificate entry
270 assertTrue("certificate entry - the alias returned for this "
271 + "certificate wa
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
H A DCMSSignedGenerator.java217 * Add a certificate to the certificate set to be included with the generated SignedData message.
219 * @param certificate the certificate to be included.
220 * @throws CMSException if the certificate cannot be encoded for adding.
223 X509CertificateHolder certificate)
226 certs.add(certificate.toASN1Structure());
230 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message.
266 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message.
269 * @throws CMSException if the attribute certificate canno
222 addCertificate( X509CertificateHolder certificate) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dattestation_policy_observer.cc30 // The number of days before a certificate expires during which it is
213 const std::string& certificate) {
215 net::X509Certificate::CreateFromBytes(certificate.data(),
216 certificate.length()));
218 LOG(WARNING) << "Failed to parse certificate, cannot check expiry.";
223 // The certificate has expired or will soon, replace it.
229 // Get the payload and check if the certificate has already been uploaded.
232 certificate));
236 const std::string& certificate) {
238 certificate,
212 CheckCertificateExpiry( const std::string& certificate) argument
235 UploadCertificate( const std::string& certificate) argument
243 CheckIfUploaded( const std::string& certificate, const std::string& key_payload) argument
[all...]
H A Dattestation_policy_observer_unittest.cc109 // require that a certificate exists, |certificate| will be used.
110 void SetupMocks(int mock_options, const std::string& certificate) { argument
117 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate))));
138 UploadCertificate(new_key ? "fake_cert" : certificate, _))
198 std::string certificate; local
200 &certificate));
201 SetupMocks(MOCK_KEY_EXISTS, certificate);
206 std::string certificate; local
208 &certificate));
214 std::string certificate; local
222 std::string certificate; local
[all...]
H A Dplatform_verification_flow.cc228 // certificate request.
269 const std::string& certificate) {
285 if (IsExpired(certificate)) {
293 certificate);
311 const std::string& certificate,
328 certificate);
459 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument
461 net::X509Certificate::CreateFromBytes(certificate.data(),
462 certificate.length()));
464 LOG(WARNING) << "Failed to parse certificate, canno
264 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument
309 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument
[all...]
H A Dplatform_verification_flow_unittest.cc270 std::string certificate = local
276 certificate));
292 const std::string& certificate) {
296 certificate_ = certificate;
289 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl.cc57 const base::DictionaryValue* certificate = NULL; local
58 certificates.GetDictionary(i, &certificate);
59 DCHECK(certificate != NULL);
61 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local
64 *certificate,
69 base::StringPrintf("Cannot parse certificate at index %zu", i));
71 VLOG(2) << "Successfully imported certificate at index " << i;
86 // Separate the nickname stored in the certificate at the colon, since
98 // Now we find the private key for this certificate an
136 ParseAndStoreCertificate( bool allow_trust_imports, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument
177 ParseServerOrCaCertificate( bool allow_trust_imports, const std::string& cert_type, const std::string& guid, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument
294 ParseClientCertificate( const std::string& guid, const base::DictionaryValue& certificate) argument
[all...]
H A Donc_certificate_importer_impl_unittest.cc115 base::DictionaryValue* certificate = NULL; local
116 onc_certificates_->GetDictionary(0, &certificate);
117 certificate->GetStringWithoutPathExpansion(::onc::certificate::kGUID, guid);
181 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid);
217 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL);
234 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL);
251 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL);
282 // First we import a certificate.
284 SCOPED_TRACE("Import original certificate");
[all...]
/external/chromium_org/content/browser/media/
H A Dwebrtc_identity_store.cc25 const std::string& certificate,
27 : error(error), certificate(certificate), private_key(private_key) {}
30 std::string certificate; member in struct:content::WebRTCIdentityRequestResult
50 &result->certificate);
110 it->second.Run(result.error, result.certificate, result.private_key);
158 const std::string& certificate,
163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key);
242 const std::string& certificate,
247 WebRTCIdentityRequestResult result(error, certificate, private_ke
24 WebRTCIdentityRequestResult(int error, const std::string& certificate, const std::string& private_key) argument
157 OnRequestComplete(int error, const std::string& certificate, const std::string& private_key) argument
240 BackendFindCallback(WebRTCIdentityRequest* request, int error, const std::string& certificate, const std::string& private_key) argument
[all...]
H A Dwebrtc_identity_store_backend.cc30 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") &&
44 "certificate BLOB NOT NULL,"
64 const std::string& certificate,
67 certificate(certificate),
72 const std::string& certificate,
76 certificate(certificate),
81 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity
232 iter->second.certificate,
63 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
71 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument
246 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dnssidentity.cc310 CERTCertificate *certificate = NULL; local
341 LOG(LS_ERROR) << "Couldn't create certificate signing request";
365 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq);
366 if (!certificate) {
367 LOG(LS_ERROR) << "Couldn't create certificate";
371 arena = certificate->arena;
373 rv = SECOID_SetAlgorithmID(arena, &certificate->signature,
379 *(certificate->version.data) = 2;
380 certificate->version.len = 1;
382 if (!SEC_ASN1EncodeItem(arena, &inner_der, certificate,
411 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
474 NSSCertificate &NSSIdentity::certificate() const { function in class:talk_base::NSSIdentity
[all...]
H A Dopensslidentity.cc56 // Random bits for certificate serial number
97 // Generate a self-signed certificate, with the public key from the
100 LOG(LS_INFO) << "Making certificate for " << common_name;
125 // (through the secure XMPP channel), and so the certificate
127 // arbitrary common_name. Note that this certificate goes out in
146 LOG(LS_INFO) << "Returning certificate";
185 // Print a certificate to the log, for debugging.
209 LogSSLErrors("Generating certificate");
301 // Calculates the DER representation of the certificate, from scratch.
326 OpenSSLCertificate *certificate local
336 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument
[all...]
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
H A DX509CertImplTest.java86 // The values of certificate's fields:
252 public X509Certificate certificate; field in class:X509CertImplTest
261 * Creates the master certificate on the base of which
313 certificate = new X509CertImpl(cert);
318 certificate = new X509CertImpl(bis);
326 certificate.checkValidity();
339 certificate.checkValidity(new Date(3000000000L));
346 certificate.checkValidity(new Date(100000000L));
353 certificate.checkValidity(new Date(1000000000L));
354 certificate
[all...]
H A DX509CertFactoryPerfTest.java61 // The values of certificate's fields:
227 static X509Certificate certificate; field in class:X509CertFactoryPerfTest
328 * Creates the master certificate on the base of which
349 certificate = (X509Certificate) factory.generateCertificate(stream);
353 //System.out.println("\nUSING: "+certificate.getClass());
416 certificate.checkValidity();
429 certificate.checkValidity(new Date(3000000000L));
436 certificate.checkValidity(new Date(100000000L));
443 certificate.checkValidity(new Date(1000000000L));
444 certificate
[all...]
/external/chromium_org/chrome/browser/safe_browsing/
H A Ddownload_protection_service_unittest.cc118 // Add a certificate chain. Note that we add the certificate twice so that
229 const net::X509Certificate& certificate,
233 certificate, issuer, whitelist_strings);
236 // Reads a single PEM-encoded certificate from the testdata directory.
867 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1110 // This also tests escaping of characters in the certificate attributes.
228 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
H A Ddownload_protection_service.cc718 // We need to have both a signing certificate and its issuer certificate
724 chain.element(0).certificate().data(),
725 chain.element(0).certificate().size());
733 chain.element(i).certificate().data(),
734 chain.element(i).certificate().size());
892 // Escapes a certificate attribute so that it can be used in a whitelist
912 const net::X509Certificate& certificate,
923 const net::CertPrincipal& subject = certificate.subject();
911 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
/external/chromium_org/chromeos/network/
H A Dclient_cert_resolver.cc34 // Describes a network |network_path| for which a matching certificate |cert_id|
46 // The id of the matching certificate.
61 // Returns true if a private key for certificate |cert| is installed.
71 // Describes a certificate which is issued by |issuer| (encoded as PEM).
73 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument
75 : cert(certificate),
87 // Describes a network that is configured with the certificate pattern
102 // certificate pattern of the NetworkAndCertPattern.
137 // Filter all client certs and determines each certificate's issuer, which is
164 LOG(ERROR) << "Couldn't PEM-encode certificate
[all...]
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_resource_base.cc190 PP_Resource certificate,
198 enter_cert(certificate, true);
189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/chrome/browser/ui/gtk/
H A Dcertificate_viewer_gtk.cc63 net::X509Certificate* certificate);
72 // Indices and column count for the certificate chain hierarchy tree store.
80 // Indices and column count for the certificate fields tree store.
87 // Fill the tree store with the certificate hierarchy, and set |leaf| to the
92 // Fill the tree store with the details of the given certificate.
96 // Create a tree store filled with the details of the given certificate.
109 // The certificate hierarchy (leaf cert first).
140 net::X509Certificate* certificate)
141 : certificate_(certificate) {
656 // Select the initial certificate i
138 CertificateViewer( gfx::NativeWindow parent, net::X509Certificate* certificate) argument
[all...]
/external/chromium_org/net/cert/
H A Dmulti_threaded_cert_verifier.cc110 // contains the validity range - both when the certificate was verified and
182 // process of performing the certificate verification. Deletes itself
205 // Returns the certificate being verified. May only be called /before/
207 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker
330 base::Unretained(worker_->certificate())));
H A Dx509_util_nss.cc82 // method to generate an X509 certificate.
83 // Returns NULL if an error is encountered in the certificate creation
85 // Caller responsible for freeing returned certificate object.
98 // Create the certificate request.
107 LOG(ERROR) << "Failed to create certificate request: " << prerr;
117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr;
126 LOG(ERROR) << "Failed to create certificate: " << prerr;
147 // Signs a certificate object, with |key| generating a new X509Certificate
148 // and destroying the passed certificate object (even when NULL is returned).
152 // certificate signin
442 ParseSerialNumber(const CERTCertificate* certificate) argument
[all...]
/external/chromium_org/third_party/tlslite/tlslite/
H A Dconstants.py18 certificate = 11 variable in class:HandshakeType
/external/chromium_org/components/onc/
H A Donc_constants.cc146 namespace certificate { namespace in namespace:onc
169 } // namespace certificate

Completed in 674 milliseconds

1234