/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertPathImplTest.java | 45 private X509Certificate certificate; field in class:X509CertPathImplTest 50 certificate = test.certificate; 61 certList.add(certificate);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) argument 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/chromium/net/base/ |
H A D | test_root_certs_mac.cc | 46 // rather than checking if they were the same (logical) certificate, so a 58 bool TestRootCerts::Add(X509Certificate* certificate) { argument 61 certificate->os_cert_handle())) 63 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
|
H A D | test_root_certs_win.cc | 31 // certificate stores before the one provided internally by Crypt32.dll. 125 // Attempting to add an individual certificate to |memory_store| causes 129 // trust the certificate. However, appending a store to the collection 132 // searched to see if a certificate is in the Root store, all the 133 // underlying stores in the collection will be searched, and any certificate 141 bool TestRootCerts::Add(X509Certificate* certificate) { argument 143 // If a test certificate is never added, then no interception should 148 temporary_roots_, certificate->os_cert_handle(), 151 // If the certificate is already added, return successfully. 178 // various caches are flushed, when at least one certificate i [all...] |
/external/chromium_org/components/onc/ |
H A D | onc_constants.h | 169 namespace certificate { namespace in namespace:onc 192 } // namespace certificate
|
/external/chromium_org/content/browser/renderer_host/media/ |
H A D | webrtc_identity_service_host.cc | 80 const std::string& certificate, 85 sequence_number, certificate, private_key)); 78 OnComplete(int sequence_number, int status, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/content/renderer/media/ |
H A D | webrtc_identity_service.cc | 101 const std::string& certificate, 110 pending_requests_.front().success_callback.Run(certificate, private_key); 100 OnIdentityReady(int request_id, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/net/cert/ |
H A D | nss_cert_database.h | 27 // Provides functions to manipulate the NSS certificate stores. 35 // Will be called when a new certificate is added. 40 // Will be called when a certificate is removed. 43 // Will be called when a CA certificate is changed. 55 // Stores per-certificate error codes for import failures. 61 scoped_refptr<X509Certificate> certificate; member in struct:net::NSSCertDatabase::ImportCertFailure 66 // Constants that define which usages a certificate is trusted for. 68 // of certificate. 94 // Get a list of unique certificates in the certificate database (one 157 // Import server certificate [all...] |
H A D | test_root_certs_mac.cc | 39 // rather than checking if they were the same (logical) certificate, so a 51 bool TestRootCerts::Add(X509Certificate* certificate) { argument 54 certificate->os_cert_handle())) 56 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
|
H A D | x509_util_ios.cc | 24 // Creates an NSS certificate handle from |data|, which is |length| bytes in 41 // Parse into a certificate structure. 117 NSSCertChain::NSSCertChain(X509Certificate* certificate) { argument 118 DCHECK(certificate); 120 certificate->os_cert_handle())); 122 certificate->GetIntermediateCertificates();
|
H A D | asn1_util.cc | 114 base::StringPiece certificate; local 115 if (!GetElement(cert, kSEQUENCE, &certificate)) 118 // We don't allow junk after the certificate. 123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
|
H A D | test_root_certs_win.cc | 33 // certificate stores before the one provided internally by Crypt32.dll. 126 // Attempting to add an individual certificate to |memory_store| causes 130 // trust the certificate. However, appending a store to the collection 133 // searched to see if a certificate is in the Root store, all the 134 // underlying stores in the collection will be searched, and any certificate 142 bool TestRootCerts::Add(X509Certificate* certificate) { argument 144 // If a test certificate is never added, then no interception should 149 temporary_roots_, certificate->os_cert_handle(), 152 // If the certificate is already added, return successfully. 185 // various caches are flushed, when at least one certificate i [all...] |
/external/chromium_org/ppapi/tests/ |
H A D | test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, 23 pp::Var field_value = certificate.GetField(field); 30 const pp::X509CertificatePrivate& certificate, 33 pp::Var field_value = certificate.GetField(field); 41 const pp::X509CertificatePrivate& certificate, 45 pp::Var field_value = certificate.GetField(field); 57 const pp::X509CertificatePrivate& certificate, 59 return certificate.GetField(field).is_null(); 154 pp::X509CertificatePrivate certificate(instance_); 155 bool successful = certificate 19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument 29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument 40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument 56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | fakesslidentity.h | 98 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:talk_base::FakeSSLIdentity
|
H A D | sslidentity.cc | 119 const std::string& certificate) { 134 const std::string& certificate) { 135 return OpenSSLIdentity::FromPEMStrings(private_key, certificate); 149 const std::string& certificate) { 150 return NSSIdentity::FromPEMStrings(private_key, certificate); 118 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 133 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 148 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
|
/external/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 70 public boolean verify(String host, X509Certificate certificate) { argument 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument 84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { 93 * Returns true if {@code certificate} matches {@code hostName}. 95 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument 98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) { 106 X500Principal principal = certificate 117 getSubjectAltNames(X509Certificate certificate, int type) argument [all...] |
/external/okhttp/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | HostnameVerifierTest.java | 395 X509Certificate certificate = certificate("" 406 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); 408 FakeSSLSession session = new FakeSSLSession(certificate); 545 private X509Certificate certificate(String certificate) throws Exception { argument 547 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); 550 private SSLSession session(String certificate) throws Exception { argument 551 return new FakeSSLSession(certificate(certificate)); [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaContentVerifierProviderBuilder.java | 55 public ContentVerifierProvider build(final X509Certificate certificate) argument 62 certHolder = new JcaX509CertificateHolder(certificate); 66 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 90 sig.initVerify(certificate.getPublicKey()); 99 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.cc | 49 // Random bits for certificate serial number 87 // Generate a self-signed certificate, with the public key from the 90 LOG(LS_INFO) << "Making certificate for " << common_name; 115 // (through the secure XMPP channel), and so the certificate 117 // arbitrary common_name. Note that this certificate goes out in 136 LOG(LS_INFO) << "Returning certificate"; 174 // Print a certificate to the log, for debugging. 198 LogSSLErrors("Generating certificate"); 254 OpenSSLCertificate *certificate = local 256 if (certificate) [all...] |
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_crypto.cc | 75 const std::string& certificate, 82 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) { 83 LOG(ERROR) << "Failed to parse certificate."; 92 // Parse into a certificate structure. 101 LOG(ERROR) << "Failed to parse certificate."; 105 // Check that the certificate is signed by trusted CA. 120 // Check that the device listed in the certificate is correct. 137 // Make sure that the certificate matches the unsigned data presented. 141 LOG(ERROR) << "Unable to extract public key from certificate."; 74 VerifyCredentials( const std::string& certificate, const std::string& signature, const std::string& data, const std::string& connected_mac) argument
|
/external/chromium_org/content/browser/media/ |
H A D | webrtc_identity_store_unittest.cc | 28 const std::string& certificate, 31 ASSERT_NE("", certificate); 34 *out_cert = certificate; 69 std::string* certificate, 75 base::Bind(&OnRequestCompleted, completed, certificate, private_key)); 24 OnRequestCompleted(bool* completed, std::string* out_cert, std::string* out_key, int error, const std::string& certificate, const std::string& private_key) argument 65 RequestIdentityAndRunUtilIdle(const std::string& origin, const std::string& identity_name, const std::string& common_name, bool* completed, std::string* certificate, std::string* private_key) argument
|
/external/chromium_org/net/android/java/src/org/chromium/net/ |
H A D | X509Util.java | 67 * Trust manager backed up by the read-only system certificate store. 72 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate 78 * Trust manager backed up by a custom certificate store. We need such manager to plant test 92 * interact with the certificate store without user interaction. 97 * Ensures that the trust managers and certificate factory are initialized. 166 * Convert a DER encoded certificate to an X509Certificate. 200 * If an EKU extension is present in the end-entity certificate, it MUST contain either the 209 static boolean verifyKeyUsage(X509Certificate certificate) throws CertificateException { argument 212 ekuOids = certificate.getExtendedKeyUsage(); 237 throw new IllegalArgumentException("Expected non-null and non-empty certificate " [all...] |
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_private_resource.cc | 73 PP_Resource certificate, 75 return AddChainBuildingCertificateImpl(certificate, trusted); 72 AddChainBuildingCertificate( PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_tcp_socket_private_thunk.cc | 88 PP_Resource certificate, 93 return enter.object()->AddChainBuildingCertificate(certificate, trusted); 87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | ServerTrustManager.java | 109 // Working down the chain, for every certificate in the chain, 110 // verify that the subject of the certificate is the issuer of the 111 // next certificate in the chain. 139 // Verify that the the last certificate in the chain was issued 146 System.out.println("Accepting self-signed certificate of remote server: " + 155 throw new CertificateException("root certificate not trusted of " + peerIdentities); 160 // Verify that the first certificate in the chain corresponds to 162 // Check if the certificate uses a wildcard indicating that subdomains are valid 177 // For every certificate in the chain, verify that the certificate 226 getSubjectAlternativeNames(X509Certificate certificate) argument [all...] |