/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
H A D | HostnameVerifierTest.java | 396 X509Certificate certificate = certificate("" 407 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); 409 FakeSSLSession session = new FakeSSLSession(certificate); 546 private X509Certificate certificate(String certificate) throws Exception { argument 548 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); 551 private SSLSession session(String certificate) throws Exception { argument 552 return new FakeSSLSession(certificate(certificate)); [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslidentity_unittest.cc | 72 ASSERT_TRUE(identity1_->certificate().GetSignatureDigestAlgorithm( 75 ASSERT_TRUE(identity2_->certificate().GetSignatureDigestAlgorithm( 79 // The test certificate has an MD5-based signature. 94 rv = identity1_->certificate().ComputeDigest(algorithm, 100 rv = identity1_->certificate().ComputeDigest(algorithm, 108 rv = identity2_->certificate().ComputeDigest(algorithm, 194 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString());
|
H A D | sslidentity.cc | 106 const std::string& certificate) { 125 const std::string& certificate) { 126 return OpenSSLIdentity::FromPEMStrings(private_key, certificate); 144 const std::string& certificate) { 145 return NSSIdentity::FromPEMStrings(private_key, certificate); 105 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 124 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 143 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
|
H A D | nssidentity.h | 76 CERTCertificate* certificate() { return certificate_; } function in class:rtc::NSSCertificate 79 // only checks that each certificate certifies the preceding certificate, 80 // and ignores many other certificate features such as expiration dates. 86 // Comparison. Only the certificate itself is considered, not the chain. 100 // Represents a SSL key pair and certificate for NSS. 106 const std::string& certificate); 112 virtual NSSCertificate& certificate() const;
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_client_auth_observer.cc | 34 net::X509Certificate* certificate) { 43 details.second = certificate; 50 callback_.Run(certificate); 33 CertificateSelected( net::X509Certificate* certificate) argument
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.h | 36 // This class handles certificate imports from ONC (both policy and user 37 // imports) into a certificate store. The GUID of Client certificates is stored 38 // together with the certificate as Nickname. In contrast, Server and CA 67 // Lists the certificates that have the string |label| as their certificate 73 // Deletes any certificate that has the string |label| as its nickname (exact 78 // Parses and stores/removes |certificate| in/from the certificate 82 const base::DictionaryValue& certificate, 86 // Imports the Server or CA certificate |certificate| [all...] |
/external/chromium_org/net/cert/ |
H A D | test_root_certs_mac.cc | 39 // rather than checking if they were the same (logical) certificate, so a 51 bool TestRootCerts::Add(X509Certificate* certificate) { argument 54 certificate->os_cert_handle())) 56 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
|
H A D | x509_util_ios.cc | 24 // Creates an NSS certificate handle from |data|, which is |length| bytes in 41 // Parse into a certificate structure. 117 NSSCertChain::NSSCertChain(X509Certificate* certificate) { argument 118 DCHECK(certificate); 120 certificate->os_cert_handle())); 122 certificate->GetIntermediateCertificates();
|
H A D | x509_util_ios.h | 25 // Converts a Security.framework certificate handle (SecCertificateRef) into 26 // an NSS certificate handle (CERTCertificate*). 29 // Converts an NSS certificate handle (CERTCertificate*) into a 44 // This is a wrapper class around the native NSS certificate handle. 45 // The constructor copies the certificate data from |cert_handle| and 56 // A wrapper class that loads a certificate and all of its intermediates into 61 explicit NSSCertChain(X509Certificate* certificate);
|
/external/chromium_org/chrome/browser/ui/cocoa/ |
H A D | certificate_viewer_mac.h | 36 - (id)initWithCertificate:(net::X509Certificate*)certificate;
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto.h | 17 // Verify that the credentials described by |certificate| and |signed_data| 19 // 1) The MAC address listed in the certificate matches |connected_mac|. 20 // 2) The certificate is a valid PEM encoded certificate signed by trusted CA. 22 // |certificate| 23 bool VerifyCredentials(const std::string& certificate,
|
/external/chromium_org/content/renderer/media/ |
H A D | peer_connection_identity_service.h | 33 void OnIdentityReady(const std::string& certificate,
|
H A D | webrtc_identity_service.h | 25 void(const std::string& certificate, const std::string& private_key)> 83 const std::string& certificate,
|
/external/chromium_org/net/ssl/ |
H A D | ssl_client_auth_cache.h | 33 // Checks for a client certificate preference for SSL server at |server|. 34 // Returns true if a preference is found, and sets |*certificate| to the 35 // desired client certificate. The desired certificate may be NULL, which 36 // indicates a preference to not send any certificate to |server|. 37 // If a certificate preference is not found, returns false. 39 scoped_refptr<X509Certificate>* certificate); 41 // Add a client certificate for |server| to the cache. If there is already 42 // a client certificate for |server|, it will be overwritten. A NULL 43 // |client_cert| indicates a preference that no client certificate shoul [all...] |
/external/chromium_org/content/browser/media/ |
H A D | webrtc_identity_store.cc | 25 const std::string& certificate, 27 : error(error), certificate(certificate), private_key(private_key) {} 30 std::string certificate; member in struct:content::WebRTCIdentityRequestResult 50 &result->certificate); 110 it->second.Run(result.error, result.certificate, result.private_key); 158 const std::string& certificate, 163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key); 242 const std::string& certificate, 247 WebRTCIdentityRequestResult result(error, certificate, private_ke 24 WebRTCIdentityRequestResult(int error, const std::string& certificate, const std::string& private_key) argument 157 OnRequestComplete(int error, const std::string& certificate, const std::string& private_key) argument 240 BackendFindCallback(WebRTCIdentityRequest* request, int error, const std::string& certificate, const std::string& private_key) argument [all...] |
H A D | webrtc_identity_store_backend.h | 34 const std::string& certificate, 48 // |common_name| is the common name used to generate the certificate; 61 // |common_name| is the common name used to generate the certificate; 62 // |certificate| is the DER string of the certificate; 68 const std::string& certificate,
|
H A D | webrtc_identity_store.h | 33 // the self-signed certificate. 40 const std::string& certificate, 48 // Retrieve the cached DTLS private key and certificate, i.e. identity, for 53 // a new certificate will be generated, overwriting the old one. 58 // present in the certificate; 59 // |common_name| is the common name used to generate the certificate and will 92 const std::string& certificate,
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoGeneratorBuilder.java | 63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument 66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | attestation_policy_observer.cc | 30 // The number of days before a certificate expires during which it is 213 const std::string& certificate) { 215 net::X509Certificate::CreateFromBytes(certificate.data(), 216 certificate.length())); 218 LOG(WARNING) << "Failed to parse certificate, cannot check expiry."; 223 // The certificate has expired or will soon, replace it. 229 // Get the payload and check if the certificate has already been uploaded. 232 certificate)); 236 const std::string& certificate) { 238 certificate, 212 CheckCertificateExpiry( const std::string& certificate) argument 235 UploadCertificate( const std::string& certificate) argument 243 CheckIfUploaded( const std::string& certificate, const std::string& key_payload) argument [all...] |
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
H A D | racoon.conf | 1 path certificate "/etc/openssl/certs";
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
H A D | racoon.conf | 1 path certificate "/etc/openssl/certs";
|
/external/chromium_org/content/browser/renderer_host/media/ |
H A D | webrtc_identity_service_host.h | 43 const std::string& certificate,
|
H A D | webrtc_identity_service_host.cc | 80 const std::string& certificate, 85 sequence_number, certificate, private_key)); 78 OnComplete(int sequence_number, int status, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
H A D | platform_keys.h | 103 // Imports |certificate| to the given token if the certified key is already 104 // stored in this token. Any intermediate of |certificate| will be ignored. 109 scoped_refptr<net::X509Certificate> certificate, 118 // Removes |certificate| from the given token if present. Any intermediate of 119 // |certificate| will be ignored. |token_id| is currently ignored, instead the 123 scoped_refptr<net::X509Certificate> certificate,
|
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_private_resource.cc | 73 PP_Resource certificate, 75 return AddChainBuildingCertificateImpl(certificate, trusted); 72 AddChainBuildingCertificate( PP_Resource certificate, PP_Bool trusted) argument
|