/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_win.cc | 12 const X509Certificate* certificate) { 11 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
|
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const HostPortPair& server, scoped_refptr<X509Certificate>* certificate) argument
|
/external/chromium_org/net/cert/ |
H A D | x509_certificate_net_log_param.cc | 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, argument 20 certificate->GetPEMEncodedChain(&encoded_chain);
|
H A D | test_root_certs_android.cc | 14 bool TestRootCerts::Add(X509Certificate* certificate) { argument 16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
|
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) { 29 temporary_roots_.push_back(certificate);
|
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 25 // Creates a new TrustEntry by incrementing the reference to |certificate| 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 34 // The temporary root certificate. 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 46 : certificate_(CERT_DupCertificate(certificate)), 54 bool TestRootCerts::Add(X509Certificate* certificate) { argument 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); 59 CERTCertificate* cert_handle = certificate [all...] |
H A D | test_root_certs_mac.cc | 39 // rather than checking if they were the same (logical) certificate, so a 51 bool TestRootCerts::Add(X509Certificate* certificate) { argument 54 certificate->os_cert_handle())) 56 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
|
H A D | x509_util_ios.cc | 24 // Creates an NSS certificate handle from |data|, which is |length| bytes in 41 // Parse into a certificate structure. 117 NSSCertChain::NSSCertChain(X509Certificate* certificate) { argument 118 DCHECK(certificate); 120 certificate->os_cert_handle())); 122 certificate->GetIntermediateCertificates();
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | fake_certificate.cc | 53 std::string* certificate) { 70 certificate); 52 GetFakeCertificate(const base::TimeDelta& expiry, std::string* certificate) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | IssuerAndSerialNumber.java | 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber(); 72 IssuerAndSerialNumber( Certificate certificate) argument 82 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
H A D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate 64 fromCertificate( X509Certificate certificate) argument 132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument [all...] |
/external/chromium_org/content/renderer/media/ |
H A D | peer_connection_identity_service.cc | 43 const std::string& certificate, 45 pending_observer_->OnSuccess(certificate, private_key); 42 OnIdentityReady( const std::string& certificate, const std::string& private_key) argument
|
H A D | webrtc_identity_service.cc | 101 const std::string& certificate, 110 pending_requests_.front().success_callback.Run(certificate, private_key); 100 OnIdentityReady(int request_id, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, argument 34 EnterX509CertificatePrivate enter(certificate, true); 40 PP_Var GetField(PP_Resource certificate, argument 42 EnterX509CertificatePrivate enter(certificate, true);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoGeneratorBuilder.java | 63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument 66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
|
H A D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) argument 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
H A D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) argument 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_client_auth_observer.cc | 34 net::X509Certificate* certificate) { 43 details.second = certificate; 50 callback_.Run(certificate); 33 CertificateSelected( net::X509Certificate* certificate) argument
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssidentity.h | 76 CERTCertificate* certificate() { return certificate_; } function in class:rtc::NSSCertificate 79 // only checks that each certificate certifies the preceding certificate, 80 // and ignores many other certificate features such as expiration dates. 86 // Comparison. Only the certificate itself is considered, not the chain. 100 // Represents a SSL key pair and certificate for NSS. 106 const std::string& certificate); 112 virtual NSSCertificate& certificate() const;
|
H A D | opensslidentity.h | 54 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 79 // Compute the digest of the certificate given algorithm 85 // Compute the digest of a certificate as an X509 * 97 // certificate to be self-signed. 109 // Holds a keypair and certificate together, and a method to generate 116 const std::string& certificate); 119 virtual const OpenSSLCertificate& certificate() const { function in class:rtc::OpenSSLIdentity 128 // Configure an SSL context object to use our key and certificate. 133 OpenSSLCertificate* certificate) 134 : key_pair_(key_pair), certificate_(certificate) { 132 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument [all...] |
H A D | fakesslidentity.h | 89 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_openssl.cc | 44 bool VerifyCredentials(const std::string& certificate, argument 52 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) { 53 LOG(ERROR) << "Failed to parse certificate."; 62 LOG(ERROR) << "Failed to parse certificate."; 83 // Check that the certificate is signed by the trusted public key. 89 // Check that the device listed in the certificate is correct. 119 // Make sure that the certificate matches the unsigned data presented. 123 LOG(ERROR) << "Unable to extract public key from certificate.";
|
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client.h | 103 // A string containing a PEM-encoded X.509 certificate for use in verifying 105 std::string certificate; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/external/chromium_org/content/browser/renderer_host/media/ |
H A D | webrtc_identity_service_host.cc | 80 const std::string& certificate, 85 sequence_number, certificate, private_key)); 78 OnComplete(int sequence_number, int status, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/ppapi/tests/ |
H A D | test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, 23 pp::Var field_value = certificate.GetField(field); 30 const pp::X509CertificatePrivate& certificate, 33 pp::Var field_value = certificate.GetField(field); 41 const pp::X509CertificatePrivate& certificate, 45 pp::Var field_value = certificate.GetField(field); 57 const pp::X509CertificatePrivate& certificate, 59 return certificate.GetField(field).is_null(); 154 pp::X509CertificatePrivate certificate(instance_); 155 bool successful = certificate 19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument 29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument 40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument 56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument [all...] |