/external/chromium/chrome/browser/resources/options/ |
H A D | certificate_manager.css | 7 .certificate-tree-table { 11 .certificate-tree {
|
/external/chromium_org/chrome/browser/resources/options/ |
H A D | certificate_manager.css | 16 #certificate-manager-content-area { 20 #certificate-manager-content-area .subpages-tab-contents { 25 .certificate-tree-table { 29 .certificate-tree {
|
/external/chromium/net/base/ |
H A D | test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 21 // Creates a new TrustEntry by incrementing the reference to |certificate| 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 26 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 30 // The temporary root certificate. 40 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 42 : certificate_(CERT_DupCertificate(certificate)), 50 bool TestRootCerts::Add(X509Certificate* certificate) { argument 52 // the certificate is removed. 54 SECStatus rv = CERT_GetCertTrust(certificate [all...] |
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
|
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) {
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | fake_certificate.h | 15 // Creates a self-signed |certificate| based on constant key material. The 16 // certificate |expiry| is relative to the current time. The certificate will 21 std::string* certificate);
|
H A D | attestation_policy_observer_unittest.cc | 109 // require that a certificate exists, |certificate| will be used. 110 void SetupMocks(int mock_options, const std::string& certificate) { argument 117 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); 138 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 198 std::string certificate; local 200 &certificate)); 201 SetupMocks(MOCK_KEY_EXISTS, certificate); 206 std::string certificate; local 208 &certificate)); 214 std::string certificate; local 222 std::string certificate; local [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_certificate_net_log_param.h | 16 const X509Certificate* certificate,
|
H A D | test_root_certs_android.cc | 14 bool TestRootCerts::Add(X509Certificate* certificate) { argument 16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
|
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 25 // Creates a new TrustEntry by incrementing the reference to |certificate| 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 34 // The temporary root certificate. 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 46 : certificate_(CERT_DupCertificate(certificate)), 54 bool TestRootCerts::Add(X509Certificate* certificate) { argument 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); 59 CERTCertificate* cert_handle = certificate [all...] |
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) {
|
H A D | x509_certificate_net_log_param.cc | 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, argument 20 certificate->GetPEMEncodedChain(&encoded_chain);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
H A D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate 64 fromCertificate( X509Certificate certificate) argument 132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument [all...] |
/external/chromium_org/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 21 X509Certificate* certificate, 19 CreateSSLServerSocket( scoped_ptr<StreamSocket> socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, argument 34 EnterX509CertificatePrivate enter(certificate, true); 40 PP_Var GetField(PP_Resource certificate, argument 42 EnterX509CertificatePrivate enter(certificate, true);
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.cc | 57 const base::DictionaryValue* certificate = NULL; local 58 certificates.GetDictionary(i, &certificate); 59 DCHECK(certificate != NULL); 61 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local 64 *certificate, 69 base::StringPrintf("Cannot parse certificate at index %zu", i)); 71 VLOG(2) << "Successfully imported certificate at index " << i; 86 // Separate the nickname stored in the certificate at the colon, since 98 // Now we find the private key for this certificate an 136 ParseAndStoreCertificate( bool allow_trust_imports, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument 177 ParseServerOrCaCertificate( bool allow_trust_imports, const std::string& cert_type, const std::string& guid, const base::DictionaryValue& certificate, net::CertificateList* onc_trusted_certificates, CertsByGUID* imported_server_and_ca_certs) argument 294 ParseClientCertificate( const std::string& guid, const base::DictionaryValue& certificate) argument [all...] |
/external/chromium_org/net/ssl/ |
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | IssuerAndSerialNumber.java | 49 Certificate certificate) 51 this.name = certificate.getIssuer(); 52 this.serialNumber = certificate.getSerialNumber(); 56 X509CertificateStructure certificate) 58 this.name = certificate.getIssuer(); 59 this.serialNumber = certificate.getSerialNumber(); 48 IssuerAndSerialNumber( Certificate certificate) argument 55 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertImplTest.java | 86 // The values of certificate's fields: 252 public X509Certificate certificate; field in class:X509CertImplTest 261 * Creates the master certificate on the base of which 313 certificate = new X509CertImpl(cert); 318 certificate = new X509CertImpl(bis); 326 certificate.checkValidity(); 339 certificate.checkValidity(new Date(3000000000L)); 346 certificate.checkValidity(new Date(100000000L)); 353 certificate.checkValidity(new Date(1000000000L)); 354 certificate [all...] |
H A D | X509CertFactoryPerfTest.java | 61 // The values of certificate's fields: 227 static X509Certificate certificate; field in class:X509CertFactoryPerfTest 328 * Creates the master certificate on the base of which 349 certificate = (X509Certificate) factory.generateCertificate(stream); 353 //System.out.println("\nUSING: "+certificate.getClass()); 416 certificate.checkValidity(); 429 certificate.checkValidity(new Date(3000000000L)); 436 certificate.checkValidity(new Date(100000000L)); 443 certificate.checkValidity(new Date(1000000000L)); 444 certificate [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStorePrivateKeyEntryTest.java | 62 Certificate certificate = cf.generateCertificate(certArray); 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate });
|
/external/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 70 public boolean verify(String host, X509Certificate certificate) { argument 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument 84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { 93 * Returns true if {@code certificate} matches {@code hostName}. 95 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument 98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) { 106 X500Principal principal = certificate 117 getSubjectAltNames(X509Certificate certificate, int type) argument [all...] |
/external/chromium_org/ppapi/tests/ |
H A D | test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, 23 pp::Var field_value = certificate.GetField(field); 30 const pp::X509CertificatePrivate& certificate, 33 pp::Var field_value = certificate.GetField(field); 41 const pp::X509CertificatePrivate& certificate, 45 pp::Var field_value = certificate.GetField(field); 57 const pp::X509CertificatePrivate& certificate, 59 return certificate.GetField(field).is_null(); 154 pp::X509CertificatePrivate certificate(instance_); 155 bool successful = certificate 19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument 29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument 40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument 56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) argument 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
H A D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) argument 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|