/external/chromium_org/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 28 X509Certificate* certificate, 33 new SSLServerSocketOpenSSL(socket.Pass(), certificate, key, ssl_config)); 38 scoped_refptr<X509Certificate> certificate, 51 cert_(certificate), 625 // Set certificate and private key. 629 LOG(ERROR) << "Cannot set certificate."; 648 LOG(ERROR) << "Cannot set certificate."; 26 CreateSSLServerSocket( scoped_ptr<StreamSocket> socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument 36 SSLServerSocketOpenSSL( scoped_ptr<StreamSocket> transport_socket, scoped_refptr<X509Certificate> certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 125 certificate = 11, enumerator in enum:__anon9666
|
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_resource_base.h | 84 PP_Bool AddChainBuildingCertificateImpl(PP_Resource certificate,
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssstreamadapter.cc | 446 // then a peer certificate must have been specified by now. 474 rv = SSL_ConfigSecureServer(ssl_fd_, identity->certificate().certificate(), 482 // Insist on a certificate from the client 765 // Certificate verification callback. Called to check any certificate 781 // Read the peer's certificate chain. 786 // chain as defined by RFC 5246 Section 7.4.2: "Each following certificate 791 // Even if the chain is valid, the leaf certificate must still match a 792 // provided certificate or digest. 800 LOG(LS_INFO) << "Checking against specified certificate"; [all...] |
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys/ |
H A D | enterprise_platform_keys_api.cc | 31 "Certificate is not a valid X.509 certificate."; 212 const std::string& cert_der = params->certificate; 250 const std::string& cert_der = params->certificate;
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 61 // client and server certificate, PEM encoded. 95 // The name on the certificate does not matter: the peer will 120 // Parses a certificate from a PEM encoded string. 158 // Validate the certificate 194 // The session accept iq, containing the recipient's certificate and 195 // echoing the initiator's certificate, looks something like this: 229 // Here we consider the certificate components to be optional. In 230 // practice the client certificate is always present, and the server 231 // certificate is initially missing from the session description 233 // have a certificate fo [all...] |
/external/openssl/apps/ |
H A D | openssl.cnf | 3 # This is mostly being used for generation of certificate requests. 50 certificate = $dir/cacert.pem # The CA certificate 125 # req_extensions = v3_req # The extensions to add to a certificate request 168 # requires this to avoid interpreting an end user certificate as a CA. 173 # the certificate can be used for anything *except* object signing. 178 # For an object signing certificate this would be used. 187 # This is typical in keyUsage for a client certificate. 219 # Extensions to add to a certificate request 242 # Key usage: this is typical for a CA certificate [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service.cc | 816 // We need to have both a signing certificate and its issuer certificate 822 chain.element(0).certificate().data(), 823 chain.element(0).certificate().size()); 831 chain.element(i).certificate().data(), 832 chain.element(i).certificate().size()); 1001 // Escapes a certificate attribute so that it can be used in a whitelist 1021 const net::X509Certificate& certificate, 1032 const net::CertPrincipal& subject = certificate.subject(); 1020 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | dtlstransportchannel_unittest.cc | 809 // After negotiation, each side has a distinct local certificate, but still no 810 // remote certificate, because connection has not yet occurred. 813 ASSERT_NE(identity1->certificate().ToPEMString(), 814 identity2->certificate().ToPEMString()); 834 // After connection, each side has a distinct local certificate. 837 ASSERT_NE(identity1->certificate().ToPEMString(), 838 identity2->certificate().ToPEMString()); 840 // Each side's remote certificate is the other side's local certificate. 844 identity2->certificate() [all...] |
H A D | transportdescriptionfactory_unittest.cc | 166 ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg)); 194 ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg)); 356 ASSERT_TRUE(id2_->certificate().GetSignatureDigestAlgorithm(&digest_alg2));
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_signature.cc | 341 { ::onc::certificate::kGUID, &kStringSignature}, 342 { ::onc::certificate::kPKCS12, &kStringSignature}, 344 { ::onc::certificate::kTrustBits, &kStringListSignature}, 345 { ::onc::certificate::kType, &kStringSignature}, 346 { ::onc::certificate::kX509, &kStringSignature},
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | JavaApiConverterTest.java | 78 private static final X509Certificate LOCAL_CERT = certificate("" 91 private static final X509Certificate SERVER_CERT = certificate("" 730 private static X509Certificate certificate(String certificate) { argument 733 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
|
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client_unittest.cc | 324 arguments.push_back("certificate"); 338 properties.certificate = arguments[0]; 363 arguments.push_back("certificate"); 381 properties.certificate = arguments[0]; 407 arguments.push_back("certificate"); 422 properties.certificate = arguments[0];
|
/external/chromium_org/net/cert/ |
H A D | x509_util_nss.cc | 82 // method to generate an X509 certificate. 83 // Returns NULL if an error is encountered in the certificate creation 85 // Caller responsible for freeing returned certificate object. 98 // Create the certificate request. 107 LOG(ERROR) << "Failed to create certificate request: " << prerr; 117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr; 126 LOG(ERROR) << "Failed to create certificate: " << prerr; 147 // Signs a certificate object, with |key| generating a new X509Certificate 148 // and destroying the passed certificate object (even when NULL is returned). 152 // certificate signin 442 ParseSerialNumber(const CERTCertificate* certificate) argument [all...] |
H A D | multi_threaded_cert_verifier.cc | 141 // contains the validity range - both when the certificate was verified and 213 // process of performing the certificate verification. Deletes itself 236 // Returns the certificate being verified. May only be called /before/ 238 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker 361 base::Unretained(worker_->certificate())));
|
/external/chromium_org/chrome/browser/chromeos/net/ |
H A D | cert_verify_proc_chromeos_unittest.cc | 325 << failed[i].certificate->subject().GetDisplayName(); 338 << failed[i].certificate->subject().GetDisplayName();
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_chromeos.cc | 53 output.certificate = input.certificate;
|
H A D | networking_private_service_client.h | 60 std::string certificate; member in struct:extensions::NetworkingPrivateServiceClient::CryptoVerify::Credentials 70 // Must be provided by the implementation. May return NULL if certificate
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_resolver.cc | 32 // Describes a network |network_path| for which a matching certificate |cert_id| 33 // was found or for which no certificate was found (|cert_id| will be empty). 47 // The id of the matching certificate or empty if no certificate was found. 50 // The id of the slot containing the certificate and the private key. 65 // Returns true if a private key for certificate |cert| is installed. 75 // Describes a certificate which is issued by |issuer| (encoded as PEM). 77 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument 79 : cert(certificate), 91 // Describes a network that is configured with the certificate patter [all...] |
/external/chromium_org/net/android/java/src/org/chromium/net/ |
H A D | X509Util.java | 124 * Trust manager backed up by the read-only system certificate store. 129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate 135 * Trust manager backed up by a custom certificate store. We need such manager to plant test 174 * Allow disabling registering the observer and recording histograms for the certificate 176 * the system does not allow to interact with the certificate store without user interaction. 181 * Ensures that the trust managers and certificate factory are initialized. 282 * Convert a DER encoded certificate to an X509Certificate. 363 // that case, the certificate remains in the system directory but is also added to 389 * If an EKU extension is present in the end-entity certificate, it MUST contain either the 398 static boolean verifyKeyUsage(X509Certificate certificate) throw argument [all...] |
/external/openssl/crypto/store/ |
H A D | str_lib.c | 265 if (!object || !object->data.x509.certificate) 271 CRYPTO_add(&object->data.x509.certificate->references,1,CRYPTO_LOCK_X509); 275 x = object->data.x509.certificate; 301 object->data.x509.certificate = data; 395 if (!object || !object->data.x509.certificate) 401 CRYPTO_add(&object->data.x509.certificate->references,1,CRYPTO_LOCK_X509); 405 x = object->data.x509.certificate; 1240 X509_free(data->data.x509.certificate);
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 171 // Either way should return a string representation of the certificate 177 // Either way should return a string representation of the certificate 187 // Pull the private key ID from the certificate 207 // Pull the public key ID from the certificate
|
/external/chromium_org/content/renderer/pepper/ |
H A D | content_decryptor_delegate.h | 62 void SetServerCertificate(const uint8_t* certificate,
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | constants.py | 30 certificate = 11 variable in class:HandshakeType
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_srvr.c | 398 /* Don't request a certificate if an obc was presented */ 2232 * client certificate. */ 2251 /* Filter out unsupported certificate types. */ 2379 CBS certificate; local 2382 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) 2390 /* If this is the first certificate, and we don't want 2394 SHA256_Update(&sha256, CBS_data(&certificate), CBS_len(&certificate)); 2399 data = CBS_data(&certificate); 2400 x = d2i_X509(NULL, &data, CBS_len(&certificate)); [all...] |