Searched refs:certificate (Results 101 - 125 of 163) sorted by relevance

1234567

/external/chromium_org/net/socket/
H A Dssl_server_socket_openssl.cc28 X509Certificate* certificate,
33 new SSLServerSocketOpenSSL(socket.Pass(), certificate, key, ssl_config));
38 scoped_refptr<X509Certificate> certificate,
51 cert_(certificate),
625 // Set certificate and private key.
629 LOG(ERROR) << "Cannot set certificate.";
648 LOG(ERROR) << "Cannot set certificate.";
26 CreateSSLServerSocket( scoped_ptr<StreamSocket> socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
36 SSLServerSocketOpenSSL( scoped_ptr<StreamSocket> transport_socket, scoped_refptr<X509Certificate> certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3prot.h125 certificate = 11, enumerator in enum:__anon9666
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_resource_base.h84 PP_Bool AddChainBuildingCertificateImpl(PP_Resource certificate,
/external/chromium_org/third_party/webrtc/base/
H A Dnssstreamadapter.cc446 // then a peer certificate must have been specified by now.
474 rv = SSL_ConfigSecureServer(ssl_fd_, identity->certificate().certificate(),
482 // Insist on a certificate from the client
765 // Certificate verification callback. Called to check any certificate
781 // Read the peer's certificate chain.
786 // chain as defined by RFC 5246 Section 7.4.2: "Each following certificate
791 // Even if the chain is valid, the leaf certificate must still match a
792 // provided certificate or digest.
800 LOG(LS_INFO) << "Checking against specified certificate";
[all...]
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys/
H A Denterprise_platform_keys_api.cc31 "Certificate is not a valid X.509 certificate.";
212 const std::string& cert_der = params->certificate;
250 const std::string& cert_der = params->certificate;
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
H A Dsecuretunnelsessionclient.cc61 // client and server certificate, PEM encoded.
95 // The name on the certificate does not matter: the peer will
120 // Parses a certificate from a PEM encoded string.
158 // Validate the certificate
194 // The session accept iq, containing the recipient's certificate and
195 // echoing the initiator's certificate, looks something like this:
229 // Here we consider the certificate components to be optional. In
230 // practice the client certificate is always present, and the server
231 // certificate is initially missing from the session description
233 // have a certificate fo
[all...]
/external/openssl/apps/
H A Dopenssl.cnf3 # This is mostly being used for generation of certificate requests.
50 certificate = $dir/cacert.pem # The CA certificate
125 # req_extensions = v3_req # The extensions to add to a certificate request
168 # requires this to avoid interpreting an end user certificate as a CA.
173 # the certificate can be used for anything *except* object signing.
178 # For an object signing certificate this would be used.
187 # This is typical in keyUsage for a client certificate.
219 # Extensions to add to a certificate request
242 # Key usage: this is typical for a CA certificate
[all...]
/external/chromium_org/chrome/browser/safe_browsing/
H A Ddownload_protection_service.cc816 // We need to have both a signing certificate and its issuer certificate
822 chain.element(0).certificate().data(),
823 chain.element(0).certificate().size());
831 chain.element(i).certificate().data(),
832 chain.element(i).certificate().size());
1001 // Escapes a certificate attribute so that it can be used in a whitelist
1021 const net::X509Certificate& certificate,
1032 const net::CertPrincipal& subject = certificate.subject();
1020 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel_unittest.cc809 // After negotiation, each side has a distinct local certificate, but still no
810 // remote certificate, because connection has not yet occurred.
813 ASSERT_NE(identity1->certificate().ToPEMString(),
814 identity2->certificate().ToPEMString());
834 // After connection, each side has a distinct local certificate.
837 ASSERT_NE(identity1->certificate().ToPEMString(),
838 identity2->certificate().ToPEMString());
840 // Each side's remote certificate is the other side's local certificate.
844 identity2->certificate()
[all...]
H A Dtransportdescriptionfactory_unittest.cc166 ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg));
194 ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg));
356 ASSERT_TRUE(id2_->certificate().GetSignatureDigestAlgorithm(&digest_alg2));
/external/chromium_org/chromeos/network/onc/
H A Donc_signature.cc341 { ::onc::certificate::kGUID, &kStringSignature},
342 { ::onc::certificate::kPKCS12, &kStringSignature},
344 { ::onc::certificate::kTrustBits, &kStringListSignature},
345 { ::onc::certificate::kType, &kStringSignature},
346 { ::onc::certificate::kX509, &kStringSignature},
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/
H A DJavaApiConverterTest.java78 private static final X509Certificate LOCAL_CERT = certificate(""
91 private static final X509Certificate SERVER_CERT = certificate(""
730 private static X509Certificate certificate(String certificate) { argument
733 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
/external/chromium_org/chromeos/dbus/
H A Dshill_manager_client_unittest.cc324 arguments.push_back("certificate");
338 properties.certificate = arguments[0];
363 arguments.push_back("certificate");
381 properties.certificate = arguments[0];
407 arguments.push_back("certificate");
422 properties.certificate = arguments[0];
/external/chromium_org/net/cert/
H A Dx509_util_nss.cc82 // method to generate an X509 certificate.
83 // Returns NULL if an error is encountered in the certificate creation
85 // Caller responsible for freeing returned certificate object.
98 // Create the certificate request.
107 LOG(ERROR) << "Failed to create certificate request: " << prerr;
117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr;
126 LOG(ERROR) << "Failed to create certificate: " << prerr;
147 // Signs a certificate object, with |key| generating a new X509Certificate
148 // and destroying the passed certificate object (even when NULL is returned).
152 // certificate signin
442 ParseSerialNumber(const CERTCertificate* certificate) argument
[all...]
H A Dmulti_threaded_cert_verifier.cc141 // contains the validity range - both when the certificate was verified and
213 // process of performing the certificate verification. Deletes itself
236 // Returns the certificate being verified. May only be called /before/
238 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker
361 base::Unretained(worker_->certificate())));
/external/chromium_org/chrome/browser/chromeos/net/
H A Dcert_verify_proc_chromeos_unittest.cc325 << failed[i].certificate->subject().GetDisplayName();
338 << failed[i].certificate->subject().GetDisplayName();
/external/chromium_org/chrome/browser/extensions/api/networking_private/
H A Dnetworking_private_chromeos.cc53 output.certificate = input.certificate;
H A Dnetworking_private_service_client.h60 std::string certificate; member in struct:extensions::NetworkingPrivateServiceClient::CryptoVerify::Credentials
70 // Must be provided by the implementation. May return NULL if certificate
/external/chromium_org/chromeos/network/
H A Dclient_cert_resolver.cc32 // Describes a network |network_path| for which a matching certificate |cert_id|
33 // was found or for which no certificate was found (|cert_id| will be empty).
47 // The id of the matching certificate or empty if no certificate was found.
50 // The id of the slot containing the certificate and the private key.
65 // Returns true if a private key for certificate |cert| is installed.
75 // Describes a certificate which is issued by |issuer| (encoded as PEM).
77 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument
79 : cert(certificate),
91 // Describes a network that is configured with the certificate patter
[all...]
/external/chromium_org/net/android/java/src/org/chromium/net/
H A DX509Util.java124 * Trust manager backed up by the read-only system certificate store.
129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
135 * Trust manager backed up by a custom certificate store. We need such manager to plant test
174 * Allow disabling registering the observer and recording histograms for the certificate
176 * the system does not allow to interact with the certificate store without user interaction.
181 * Ensures that the trust managers and certificate factory are initialized.
282 * Convert a DER encoded certificate to an X509Certificate.
363 // that case, the certificate remains in the system directory but is also added to
389 * If an EKU extension is present in the end-entity certificate, it MUST contain either the
398 static boolean verifyKeyUsage(X509Certificate certificate) throw argument
[all...]
/external/openssl/crypto/store/
H A Dstr_lib.c265 if (!object || !object->data.x509.certificate)
271 CRYPTO_add(&object->data.x509.certificate->references,1,CRYPTO_LOCK_X509);
275 x = object->data.x509.certificate;
301 object->data.x509.certificate = data;
395 if (!object || !object->data.x509.certificate)
401 CRYPTO_add(&object->data.x509.certificate->references,1,CRYPTO_LOCK_X509);
405 x = object->data.x509.certificate;
1240 X509_free(data->data.x509.certificate);
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
H A DOAuth.php171 // Either way should return a string representation of the certificate
177 // Either way should return a string representation of the certificate
187 // Pull the private key ID from the certificate
207 // Pull the public key ID from the certificate
/external/chromium_org/content/renderer/pepper/
H A Dcontent_decryptor_delegate.h62 void SetServerCertificate(const uint8_t* certificate,
/external/chromium_org/third_party/tlslite/tlslite/
H A Dconstants.py30 certificate = 11 variable in class:HandshakeType
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_srvr.c398 /* Don't request a certificate if an obc was presented */
2232 * client certificate. */
2251 /* Filter out unsupported certificate types. */
2379 CBS certificate; local
2382 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate))
2390 /* If this is the first certificate, and we don't want
2394 SHA256_Update(&sha256, CBS_data(&certificate), CBS_len(&certificate));
2399 data = CBS_data(&certificate);
2400 x = d2i_X509(NULL, &data, CBS_len(&certificate));
[all...]

Completed in 1145 milliseconds

1234567