Searched defs:certificate (Results 26 - 50 of 81) sorted by relevance

1234

/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/
H A DX509CertPathImplTest.java45 private X509Certificate certificate; field in class:X509CertPathImplTest
50 certificate = test.certificate;
61 certList.add(certificate);
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
H A DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) argument
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
/external/chromium/net/base/
H A Dtest_root_certs_mac.cc46 // rather than checking if they were the same (logical) certificate, so a
58 bool TestRootCerts::Add(X509Certificate* certificate) { argument
61 certificate->os_cert_handle()))
63 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
H A Dtest_root_certs_win.cc31 // certificate stores before the one provided internally by Crypt32.dll.
125 // Attempting to add an individual certificate to |memory_store| causes
129 // trust the certificate. However, appending a store to the collection
132 // searched to see if a certificate is in the Root store, all the
133 // underlying stores in the collection will be searched, and any certificate
141 bool TestRootCerts::Add(X509Certificate* certificate) { argument
143 // If a test certificate is never added, then no interception should
148 temporary_roots_, certificate->os_cert_handle(),
151 // If the certificate is already added, return successfully.
178 // various caches are flushed, when at least one certificate i
[all...]
/external/chromium_org/components/onc/
H A Donc_constants.h169 namespace certificate { namespace in namespace:onc
192 } // namespace certificate
/external/chromium_org/content/browser/renderer_host/media/
H A Dwebrtc_identity_service_host.cc80 const std::string& certificate,
85 sequence_number, certificate, private_key));
78 OnComplete(int sequence_number, int status, const std::string& certificate, const std::string& private_key) argument
/external/chromium_org/content/renderer/media/
H A Dwebrtc_identity_service.cc101 const std::string& certificate,
110 pending_requests_.front().success_callback.Run(certificate, private_key);
100 OnIdentityReady(int request_id, const std::string& certificate, const std::string& private_key) argument
/external/chromium_org/net/cert/
H A Dnss_cert_database.h27 // Provides functions to manipulate the NSS certificate stores.
35 // Will be called when a new certificate is added.
40 // Will be called when a certificate is removed.
43 // Will be called when a CA certificate is changed.
55 // Stores per-certificate error codes for import failures.
61 scoped_refptr<X509Certificate> certificate; member in struct:net::NSSCertDatabase::ImportCertFailure
66 // Constants that define which usages a certificate is trusted for.
68 // of certificate.
94 // Get a list of unique certificates in the certificate database (one
157 // Import server certificate
[all...]
H A Dtest_root_certs_mac.cc39 // rather than checking if they were the same (logical) certificate, so a
51 bool TestRootCerts::Add(X509Certificate* certificate) { argument
54 certificate->os_cert_handle()))
56 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
H A Dx509_util_ios.cc24 // Creates an NSS certificate handle from |data|, which is |length| bytes in
41 // Parse into a certificate structure.
117 NSSCertChain::NSSCertChain(X509Certificate* certificate) { argument
118 DCHECK(certificate);
120 certificate->os_cert_handle()));
122 certificate->GetIntermediateCertificates();
H A Dasn1_util.cc114 base::StringPiece certificate; local
115 if (!GetElement(cert, kSEQUENCE, &certificate))
118 // We don't allow junk after the certificate.
123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
H A Dtest_root_certs_win.cc33 // certificate stores before the one provided internally by Crypt32.dll.
126 // Attempting to add an individual certificate to |memory_store| causes
130 // trust the certificate. However, appending a store to the collection
133 // searched to see if a certificate is in the Root store, all the
134 // underlying stores in the collection will be searched, and any certificate
142 bool TestRootCerts::Add(X509Certificate* certificate) { argument
144 // If a test certificate is never added, then no interception should
149 temporary_roots_, certificate->os_cert_handle(),
152 // If the certificate is already added, return successfully.
185 // various caches are flushed, when at least one certificate i
[all...]
/external/chromium_org/ppapi/tests/
H A Dtest_x509_certificate_private.cc20 const pp::X509CertificatePrivate& certificate,
23 pp::Var field_value = certificate.GetField(field);
30 const pp::X509CertificatePrivate& certificate,
33 pp::Var field_value = certificate.GetField(field);
41 const pp::X509CertificatePrivate& certificate,
45 pp::Var field_value = certificate.GetField(field);
57 const pp::X509CertificatePrivate& certificate,
59 return certificate.GetField(field).is_null();
154 pp::X509CertificatePrivate certificate(instance_);
155 bool successful = certificate
19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument
29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument
40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument
56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dfakesslidentity.h98 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:talk_base::FakeSSLIdentity
H A Dsslidentity.cc119 const std::string& certificate) {
134 const std::string& certificate) {
135 return OpenSSLIdentity::FromPEMStrings(private_key, certificate);
149 const std::string& certificate) {
150 return NSSIdentity::FromPEMStrings(private_key, certificate);
118 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
133 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
148 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
/external/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
H A DOkHostnameVerifier.java70 public boolean verify(String host, X509Certificate certificate) { argument
72 ? verifyIpAddress(host, certificate)
73 : verifyHostName(host, certificate);
81 * Returns true if {@code certificate} matches {@code ipAddress}.
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument
84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) {
93 * Returns true if {@code certificate} matches {@code hostName}.
95 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument
98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) {
106 X500Principal principal = certificate
117 getSubjectAltNames(X509Certificate certificate, int type) argument
[all...]
/external/okhttp/src/test/java/com/squareup/okhttp/internal/tls/
H A DHostnameVerifierTest.java395 X509Certificate certificate = certificate(""
406 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal());
408 FakeSSLSession session = new FakeSSLSession(certificate);
545 private X509Certificate certificate(String certificate) throws Exception { argument
547 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
550 private SSLSession session(String certificate) throws Exception { argument
551 return new FakeSSLSession(certificate(certificate));
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java55 public ContentVerifierProvider build(final X509Certificate certificate) argument
62 certHolder = new JcaX509CertificateHolder(certificate);
66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
90 sig.initVerify(certificate.getPublicKey());
99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
/external/chromium/third_party/libjingle/source/talk/base/
H A Dopensslidentity.cc49 // Random bits for certificate serial number
87 // Generate a self-signed certificate, with the public key from the
90 LOG(LS_INFO) << "Making certificate for " << common_name;
115 // (through the secure XMPP channel), and so the certificate
117 // arbitrary common_name. Note that this certificate goes out in
136 LOG(LS_INFO) << "Returning certificate";
174 // Print a certificate to the log, for debugging.
198 LogSSLErrors("Generating certificate");
254 OpenSSLCertificate *certificate = local
256 if (certificate)
[all...]
/external/chromium_org/chrome/browser/extensions/api/networking_private/
H A Dnetworking_private_crypto.cc75 const std::string& certificate,
82 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) {
83 LOG(ERROR) << "Failed to parse certificate.";
92 // Parse into a certificate structure.
101 LOG(ERROR) << "Failed to parse certificate.";
105 // Check that the certificate is signed by trusted CA.
120 // Check that the device listed in the certificate is correct.
137 // Make sure that the certificate matches the unsigned data presented.
141 LOG(ERROR) << "Unable to extract public key from certificate.";
74 VerifyCredentials( const std::string& certificate, const std::string& signature, const std::string& data, const std::string& connected_mac) argument
/external/chromium_org/content/browser/media/
H A Dwebrtc_identity_store_unittest.cc28 const std::string& certificate,
31 ASSERT_NE("", certificate);
34 *out_cert = certificate;
69 std::string* certificate,
75 base::Bind(&OnRequestCompleted, completed, certificate, private_key));
24 OnRequestCompleted(bool* completed, std::string* out_cert, std::string* out_key, int error, const std::string& certificate, const std::string& private_key) argument
65 RequestIdentityAndRunUtilIdle(const std::string& origin, const std::string& identity_name, const std::string& common_name, bool* completed, std::string* certificate, std::string* private_key) argument
/external/chromium_org/net/android/java/src/org/chromium/net/
H A DX509Util.java67 * Trust manager backed up by the read-only system certificate store.
72 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
78 * Trust manager backed up by a custom certificate store. We need such manager to plant test
92 * interact with the certificate store without user interaction.
97 * Ensures that the trust managers and certificate factory are initialized.
166 * Convert a DER encoded certificate to an X509Certificate.
200 * If an EKU extension is present in the end-entity certificate, it MUST contain either the
209 static boolean verifyKeyUsage(X509Certificate certificate) throws CertificateException { argument
212 ekuOids = certificate.getExtendedKeyUsage();
237 throw new IllegalArgumentException("Expected non-null and non-empty certificate "
[all...]
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_private_resource.cc73 PP_Resource certificate,
75 return AddChainBuildingCertificateImpl(certificate, trusted);
72 AddChainBuildingCertificate( PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/ppapi/thunk/
H A Dppb_tcp_socket_private_thunk.cc88 PP_Resource certificate,
93 return enter.object()->AddChainBuildingCertificate(certificate, trusted);
87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
/external/smack/src/org/jivesoftware/smack/
H A DServerTrustManager.java109 // Working down the chain, for every certificate in the chain,
110 // verify that the subject of the certificate is the issuer of the
111 // next certificate in the chain.
139 // Verify that the the last certificate in the chain was issued
146 System.out.println("Accepting self-signed certificate of remote server: " +
155 throw new CertificateException("root certificate not trusted of " + peerIdentities);
160 // Verify that the first certificate in the chain corresponds to
162 // Check if the certificate uses a wildcard indicating that subdomains are valid
177 // For every certificate in the chain, verify that the certificate
226 getSubjectAlternativeNames(X509Certificate certificate) argument
[all...]

Completed in 846 milliseconds

1234