/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | Identity2Test.java | 85 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 123 certArray = new ByteArrayInputStream(certificate
|
H A D | KeyStore3Test.java | 52 private Certificate certificate; field in class:KeyStore3Test 83 certificate = cf.generateCertificate(certArray); 113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[]{certificate}); 134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[]{certificate}); 144 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[]{certificate}); 152 mockKeyStore.setCertificateEntry(null, certificate);
|
H A D | KeyStore2Test.java | 70 // creating a certificate 71 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 87 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 239 assertTrue("the public key of the certificate from getCertificate() " 240 + "did not equal the original certificate", certRes 246 // testing for a certificate chain 248 assertTrue("the certificate for alias2 is supposed to exist", 267 // certificate entry 270 assertTrue("certificate entry - the alias returned for this " 271 + "certificate wa [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedGenerator.java | 217 * Add a certificate to the certificate set to be included with the generated SignedData message. 219 * @param certificate the certificate to be included. 220 * @throws CMSException if the certificate cannot be encoded for adding. 223 X509CertificateHolder certificate) 226 certs.add(certificate.toASN1Structure()); 230 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message. 266 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message. 269 * @throws CMSException if the attribute certificate canno 222 addCertificate( X509CertificateHolder certificate) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | attestation_policy_observer.cc | 30 // The number of days before a certificate expires during which it is 213 const std::string& certificate) { 215 net::X509Certificate::CreateFromBytes(certificate.data(), 216 certificate.length())); 218 LOG(WARNING) << "Failed to parse certificate, cannot check expiry."; 223 // The certificate has expired or will soon, replace it. 229 // Get the payload and check if the certificate has already been uploaded. 232 certificate)); 236 const std::string& certificate) { 238 certificate, 212 CheckCertificateExpiry( const std::string& certificate) argument 235 UploadCertificate( const std::string& certificate) argument 243 CheckIfUploaded( const std::string& certificate, const std::string& key_payload) argument [all...] |
H A D | attestation_policy_observer_unittest.cc | 109 // require that a certificate exists, |certificate| will be used. 110 void SetupMocks(int mock_options, const std::string& certificate) { argument 117 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); 138 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 198 std::string certificate; local 200 &certificate)); 201 SetupMocks(MOCK_KEY_EXISTS, certificate); 206 std::string certificate; local 208 &certificate)); 214 std::string certificate; local 222 std::string certificate; local [all...] |
H A D | platform_verification_flow.cc | 228 // certificate request. 269 const std::string& certificate) { 285 if (IsExpired(certificate)) { 293 certificate); 311 const std::string& certificate, 328 certificate); 459 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument 461 net::X509Certificate::CreateFromBytes(certificate.data(), 462 certificate.length())); 464 LOG(WARNING) << "Failed to parse certificate, canno 264 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument 309 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument [all...] |
H A D | platform_verification_flow_unittest.cc | 270 std::string certificate = local 276 certificate)); 292 const std::string& certificate) { 296 certificate_ = certificate; 289 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.cc | 57 const base::DictionaryValue* certificate = NULL; local 58 certificates.GetDictionary(i, &certificate); 59 DCHECK(certificate != NULL); 61 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local 64 *certificate, 69 base::StringPrintf("Cannot parse certificate at index %zu", i)); 71 VLOG(2) << "Successfully imported certificate at index " << i; 86 // Separate the nickname stored in the certificate at the colon, since 98 // Now we find the private key for this certificate an 136 ParseAndStoreCertificate( bool allow_trust_imports, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument 177 ParseServerOrCaCertificate( bool allow_trust_imports, const std::string& cert_type, const std::string& guid, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument 294 ParseClientCertificate( const std::string& guid, const base::DictionaryValue& certificate) argument [all...] |
H A D | onc_certificate_importer_impl_unittest.cc | 115 base::DictionaryValue* certificate = NULL; local 116 onc_certificates_->GetDictionary(0, &certificate); 117 certificate->GetStringWithoutPathExpansion(::onc::certificate::kGUID, guid); 181 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid); 217 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL); 234 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL); 251 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL); 282 // First we import a certificate. 284 SCOPED_TRACE("Import original certificate"); [all...] |
/external/chromium_org/content/browser/media/ |
H A D | webrtc_identity_store.cc | 25 const std::string& certificate, 27 : error(error), certificate(certificate), private_key(private_key) {} 30 std::string certificate; member in struct:content::WebRTCIdentityRequestResult 50 &result->certificate); 110 it->second.Run(result.error, result.certificate, result.private_key); 158 const std::string& certificate, 163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key); 242 const std::string& certificate, 247 WebRTCIdentityRequestResult result(error, certificate, private_ke 24 WebRTCIdentityRequestResult(int error, const std::string& certificate, const std::string& private_key) argument 157 OnRequestComplete(int error, const std::string& certificate, const std::string& private_key) argument 240 BackendFindCallback(WebRTCIdentityRequest* request, int error, const std::string& certificate, const std::string& private_key) argument [all...] |
H A D | webrtc_identity_store_backend.cc | 30 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") && 44 "certificate BLOB NOT NULL," 64 const std::string& certificate, 67 certificate(certificate), 72 const std::string& certificate, 76 certificate(certificate), 81 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity 232 iter->second.certificate, 63 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument 71 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument 246 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | nssidentity.cc | 310 CERTCertificate *certificate = NULL; local 341 LOG(LS_ERROR) << "Couldn't create certificate signing request"; 365 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); 366 if (!certificate) { 367 LOG(LS_ERROR) << "Couldn't create certificate"; 371 arena = certificate->arena; 373 rv = SECOID_SetAlgorithmID(arena, &certificate->signature, 379 *(certificate->version.data) = 2; 380 certificate->version.len = 1; 382 if (!SEC_ASN1EncodeItem(arena, &inner_der, certificate, 411 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 474 NSSCertificate &NSSIdentity::certificate() const { function in class:talk_base::NSSIdentity [all...] |
H A D | opensslidentity.cc | 56 // Random bits for certificate serial number 97 // Generate a self-signed certificate, with the public key from the 100 LOG(LS_INFO) << "Making certificate for " << common_name; 125 // (through the secure XMPP channel), and so the certificate 127 // arbitrary common_name. Note that this certificate goes out in 146 LOG(LS_INFO) << "Returning certificate"; 185 // Print a certificate to the log, for debugging. 209 LogSSLErrors("Generating certificate"); 301 // Calculates the DER representation of the certificate, from scratch. 326 OpenSSLCertificate *certificate local 336 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertImplTest.java | 86 // The values of certificate's fields: 252 public X509Certificate certificate; field in class:X509CertImplTest 261 * Creates the master certificate on the base of which 313 certificate = new X509CertImpl(cert); 318 certificate = new X509CertImpl(bis); 326 certificate.checkValidity(); 339 certificate.checkValidity(new Date(3000000000L)); 346 certificate.checkValidity(new Date(100000000L)); 353 certificate.checkValidity(new Date(1000000000L)); 354 certificate [all...] |
H A D | X509CertFactoryPerfTest.java | 61 // The values of certificate's fields: 227 static X509Certificate certificate; field in class:X509CertFactoryPerfTest 328 * Creates the master certificate on the base of which 349 certificate = (X509Certificate) factory.generateCertificate(stream); 353 //System.out.println("\nUSING: "+certificate.getClass()); 416 certificate.checkValidity(); 429 certificate.checkValidity(new Date(3000000000L)); 436 certificate.checkValidity(new Date(100000000L)); 443 certificate.checkValidity(new Date(1000000000L)); 444 certificate [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service_unittest.cc | 118 // Add a certificate chain. Note that we add the certificate twice so that 229 const net::X509Certificate& certificate, 233 certificate, issuer, whitelist_strings); 236 // Reads a single PEM-encoded certificate from the testdata directory. 867 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1110 // This also tests escaping of characters in the certificate attributes. 228 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
H A D | download_protection_service.cc | 718 // We need to have both a signing certificate and its issuer certificate 724 chain.element(0).certificate().data(), 725 chain.element(0).certificate().size()); 733 chain.element(i).certificate().data(), 734 chain.element(i).certificate().size()); 892 // Escapes a certificate attribute so that it can be used in a whitelist 912 const net::X509Certificate& certificate, 923 const net::CertPrincipal& subject = certificate.subject(); 911 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_resolver.cc | 34 // Describes a network |network_path| for which a matching certificate |cert_id| 46 // The id of the matching certificate. 61 // Returns true if a private key for certificate |cert| is installed. 71 // Describes a certificate which is issued by |issuer| (encoded as PEM). 73 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument 75 : cert(certificate), 87 // Describes a network that is configured with the certificate pattern 102 // certificate pattern of the NetworkAndCertPattern. 137 // Filter all client certs and determines each certificate's issuer, which is 164 LOG(ERROR) << "Couldn't PEM-encode certificate [all...] |
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_resource_base.cc | 190 PP_Resource certificate, 198 enter_cert(certificate, true); 189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/chrome/browser/ui/gtk/ |
H A D | certificate_viewer_gtk.cc | 63 net::X509Certificate* certificate); 72 // Indices and column count for the certificate chain hierarchy tree store. 80 // Indices and column count for the certificate fields tree store. 87 // Fill the tree store with the certificate hierarchy, and set |leaf| to the 92 // Fill the tree store with the details of the given certificate. 96 // Create a tree store filled with the details of the given certificate. 109 // The certificate hierarchy (leaf cert first). 140 net::X509Certificate* certificate) 141 : certificate_(certificate) { 656 // Select the initial certificate i 138 CertificateViewer( gfx::NativeWindow parent, net::X509Certificate* certificate) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | multi_threaded_cert_verifier.cc | 110 // contains the validity range - both when the certificate was verified and 182 // process of performing the certificate verification. Deletes itself 205 // Returns the certificate being verified. May only be called /before/ 207 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker 330 base::Unretained(worker_->certificate())));
|
H A D | x509_util_nss.cc | 82 // method to generate an X509 certificate. 83 // Returns NULL if an error is encountered in the certificate creation 85 // Caller responsible for freeing returned certificate object. 98 // Create the certificate request. 107 LOG(ERROR) << "Failed to create certificate request: " << prerr; 117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr; 126 LOG(ERROR) << "Failed to create certificate: " << prerr; 147 // Signs a certificate object, with |key| generating a new X509Certificate 148 // and destroying the passed certificate object (even when NULL is returned). 152 // certificate signin 442 ParseSerialNumber(const CERTCertificate* certificate) argument [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | constants.py | 18 certificate = 11 variable in class:HandshakeType
|
/external/chromium_org/components/onc/ |
H A D | onc_constants.cc | 146 namespace certificate { namespace in namespace:onc 169 } // namespace certificate
|