/external/chromium_org/net/cert/ |
H A D | x509_certificate_net_log_param.cc | 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, argument 20 certificate->GetPEMEncodedChain(&encoded_chain);
|
H A D | test_root_certs_android.cc | 14 bool TestRootCerts::Add(X509Certificate* certificate) { argument 16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
|
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) {
|
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 25 // Creates a new TrustEntry by incrementing the reference to |certificate| 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 34 // The temporary root certificate. 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 46 : certificate_(CERT_DupCertificate(certificate)), 54 bool TestRootCerts::Add(X509Certificate* certificate) { argument 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); 59 CERTCertificate* cert_handle = certificate [all...] |
/external/chromium_org/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 20 X509Certificate* certificate, 19 CreateSSLServerSocket(StreamSocket* socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium/net/base/ |
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) {
|
H A D | asn1_util.cc | 91 base::StringPiece certificate; local 92 if (!asn1::GetElement(&cert, asn1::kSEQUENCE, &certificate)) 96 if (!asn1::GetElement(&certificate, asn1::kSEQUENCE, &tbs_certificate))
|
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
|
H A D | cert_database.h | 26 // certificate store. 30 // certificate store. 35 // A CertDatabase::Observer will be notified on certificate database changes. 36 // The change could be either a new user certificate is added or trust on 37 // a certificate is changed. Observers can register themselves 44 // Will be called when a new user certificate is added. 48 // Will be called when a certificate's trust is changed. 59 // Stores per-certificate error codes for import failures. 65 scoped_refptr<X509Certificate> certificate; member in struct:net::CertDatabase::ImportCertFailure 70 // Constants that define which usages a certificate i [all...] |
H A D | test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 21 // Creates a new TrustEntry by incrementing the reference to |certificate| 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 26 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 30 // The temporary root certificate. 40 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 42 : certificate_(CERT_DupCertificate(certificate)), 50 bool TestRootCerts::Add(X509Certificate* certificate) { argument 52 // the certificate is removed. 54 SECStatus rv = CERT_GetCertTrust(certificate [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | IssuerAndSerialNumber.java | 49 Certificate certificate) 51 this.name = certificate.getIssuer(); 52 this.serialNumber = certificate.getSerialNumber(); 56 X509CertificateStructure certificate) 58 this.name = certificate.getIssuer(); 59 this.serialNumber = certificate.getSerialNumber(); 48 IssuerAndSerialNumber( Certificate certificate) argument 55 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
H A D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate 64 fromCertificate( X509Certificate certificate) argument 132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument [all...] |
/external/chromium_org/content/renderer/media/ |
H A D | peer_connection_identity_service.cc | 55 const std::string& certificate, 57 pending_observer_->OnSuccess(certificate, private_key); 54 OnIdentityReady( const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/net/ssl/ |
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const std::string& server, scoped_refptr<X509Certificate>* certificate) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, argument 34 EnterX509CertificatePrivate enter(certificate, true); 40 PP_Var GetField(PP_Resource certificate, argument 42 EnterX509CertificatePrivate enter(certificate, true);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | fakesslidentity.h | 62 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:talk_base::FakeSSLIdentity
|
H A D | nssidentity.h | 83 CERTCertificate* certificate() { return certificate_; } function in class:talk_base::NSSCertificate 101 // Represents a SSL key pair and certificate for NSS. 106 const std::string& certificate); 112 virtual NSSCertificate& certificate() const;
|
H A D | opensslidentity.h | 71 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 90 // Compute the digest of the certificate given algorithm 95 // Compute the digest of a certificate as an X509 * 113 // Holds a keypair and certificate together, and a method to generate 119 const std::string& certificate); 122 virtual const OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity 131 // Configure an SSL context object to use our key and certificate. 136 OpenSSLCertificate* certificate) 137 : key_pair_(key_pair), certificate_(certificate) { 139 ASSERT(certificate ! 135 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoGeneratorBuilder.java | 63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument 66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
H A D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) argument 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/chromium/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 53 X509Certificate* certificate, 52 CreateSSLServerSocket(Socket* socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.h | 70 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 101 // Holds a keypair and certificate together, and a method to generate 109 virtual OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity 118 // Configure an SSL context object to use our key and certificate. 123 OpenSSLCertificate* certificate) 124 : key_pair_(key_pair), certificate_(certificate) { 126 ASSERT(certificate != NULL); 122 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_client_auth_observer.cc | 34 net::X509Certificate* certificate) { 43 details.second = certificate; 50 callback_.Run(certificate); 33 CertificateSelected( net::X509Certificate* certificate) argument
|
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client.h | 81 // A string containing a PEM-encoded X.509 certificate for use in verifying 83 std::string certificate; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CertPathImplTest.java | 45 private X509Certificate certificate; field in class:X509CertPathImplTest 50 certificate = test.certificate; 61 certList.add(certificate);
|