/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | tlsconnection.py | 188 the ciphersuites, certificate types, and SSL/TLS versions 237 combined SRP and server-certificate handshake, if the server 238 chooses to authenticate itself with a certificate chain in 261 the ciphersuites, certificate types, and SSL/TLS versions 314 """Perform a certificate-based handshake in the role of client. 317 will authenticate itself using an X.509 certificate 318 chain. If the handshake succeeds, the server's certificate 321 validation or checking of the server's certificate chain. 324 client will send the passed-in certificate chain, and use the 326 certificate chai [all...] |
H A D | messages.py | 197 # certificate status response to the client along with 198 # their certificate. If OCSP is requested, they 374 HandshakeMsg.__init__(self, HandshakeType.certificate)
|
H A D | tlsrecordlayer.py | 796 elif subType == HandshakeType.certificate:
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore2Test.java | 71 // creating a certificate 72 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 88 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 240 assertTrue("the public key of the certificate from getCertificate() " 241 + "did not equal the original certificate", certRes 247 // testing for a certificate chain 249 assertTrue("the certificate for alias2 is supposed to exist", 268 // certificate entry 271 assertTrue("certificate entry - the alias returned for this " 272 + "certificate wa [all...] |
/external/chromium_org/components/onc/ |
H A D | onc_constants.h | 241 namespace certificate { namespace in namespace:onc 251 } // namespace certificate
|
/external/openssl/crypto/cms/ |
H A D | cms_lcl.h | 140 /* Signing certificate and key */ 347 X509 *certificate; member in union:CMS_CertificateChoices::__anon28194
|
H A D | cms_asn1.c | 72 ASN1_SIMPLE(CMS_CertificateChoices, d.certificate, X509),
|
H A D | cms_sd.c | 594 x = cch->d.certificate;
|
/external/chromium-trace/trace-viewer/examples/stream_server/ |
H A D | standalone.py | 339 certfile=self.websocket_server_options.certificate, 348 self.websocket_server_options.certificate) 756 parser.add_option('-c', '--certificate', dest='certificate', 757 default='', help='TLS certificate file.') 906 if not options.private_key or not options.certificate: 908 'To use TLS, specify private_key and certificate.')
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
H A D | standalone.py | 335 certfile=self.websocket_server_options.certificate, 344 self.websocket_server_options.certificate) 752 parser.add_option('-c', '--certificate', dest='certificate', 753 default='', help='TLS certificate file.') 902 if not options.private_key or not options.certificate: 904 'To use TLS, specify private_key and certificate.')
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
H A D | standalone.py | 471 certfile=server_options.certificate, 586 ctx.use_certificate_file(server_options.certificate) 948 parser.add_option('-c', '--certificate', dest='certificate', 949 default='', help='TLS certificate file.') 956 help=('Makes client certificate optional even though ' 1136 if not options.private_key or not options.certificate: 1138 'To use TLS, specify private_key and certificate.')
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1032 CBS certificate; local 1033 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) 1039 data = CBS_data(&certificate); 1040 x = d2i_X509(NULL, &data, CBS_len(&certificate)); 1047 if (!CBS_skip(&certificate, data - CBS_data(&certificate))) 1053 if (CBS_len(&certificate) != 0) 1085 * certificate, which we don't include in s3_srvr.c */ 1364 /* else anonymous DH, so no certificate or pkey. */ 1449 /* else anonymous ECDH, so no certificate o [all...] |
/external/chromium_org/content/renderer/pepper/ |
H A D | content_decryptor_delegate.cc | 355 const uint8_t* certificate, 358 if (!certificate || 362 media::MediaKeys::INVALID_ACCESS_ERROR, 0, "Incorrect certificate."); 369 certificate_length, certificate); 354 SetServerCertificate( const uint8_t* certificate, uint32_t certificate_length, scoped_ptr<media::SimpleCdmPromise> promise) argument
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_merger.cc | 24 // of a network or a certificate. These can be special handled during merging 31 return field_name == ::onc::certificate::kGUID;
|
H A D | onc_validator.cc | 435 LOG(ERROR) << MessageHeader() << "Client certificate patterns are " 803 using namespace ::onc::certificate;
|
/external/chromium_org/net/cert/ |
H A D | nss_cert_database.cc | 77 : certificate(cert), net_error(err) {} 227 LOG(WARNING) << "certificate list is not a hierarchy";
|
H A D | cert_verify_proc.cc | 33 #error Implement certificate verification. 243 // by ensuring that if verification failed, it failed with a certificate 259 // by ensuring that if verification failed, it failed with a certificate 286 // Not a real certificate. For testing only. 299 // Note: not a CA certificate. 411 // Cyberoam CA certificate. Private key leaked, but this certificate would 412 // only have been installed by Cyberoam customers. The certificate expires 419 // ANSSI certificate under which a MITM proxy was mistakenly operated. 584 // Not a real certificate [all...] |
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_resource_base.cc | 190 PP_Resource certificate, 189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_service_client.cc | 40 credentials->certificate = properties.certificate;
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslstreamadapter_unittest.cc | 255 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 268 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, 904 // Test getting the remote certificate. 919 // The client should have a peer certificate after the handshake. 931 // The server should have a peer certificate after the handshake.
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service_unittest.cc | 163 // Add a certificate chain. Note that we add the certificate twice so that 279 const net::X509Certificate& certificate, 283 certificate, issuer, whitelist_strings); 286 // Reads a single PEM-encoded certificate from the testdata directory. 1084 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1262 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1345 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1524 // This also tests escaping of characters in the certificate attributes. 278 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
/external/openssl/crypto/store/ |
H A D | store.h | 220 X509 *certificate; member in struct:STORE_OBJECT_st::__anon28359::__anon28360
|
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | cast_auth_util_nss.cc | 637 // 1. |signature| verification of |data| using |certificate|. 638 // 2. |certificate| is signed by a trusted CA. 642 const std::string& certificate = response.client_auth_certificate(); local 672 // Make a copy of certificate string so it is safe to type cast. 674 certificate.data())); 675 der_cert.len = certificate.length(); 677 // Parse into a certificate structure. 682 kErrorPrefix + "Failed to parse certificate.", 687 // Check that the certificate is signed by trusted CA. 709 kErrorPrefix + "Unable to extract public key from certificate", [all...] |
/external/chromium_org/chrome/browser/ui/webui/options/ |
H A D | certificate_manager_handler.cc | 124 // Determine whether a certificate was stored with web trust by a policy. 1141 dict->SetString(kNameId, failure.certificate->subject().GetDisplayName());
|
/external/chromium_org/net/tools/testserver/ |
H A D | testserver.py | 14 to a pem file containing the certificate and private key that should be used. 101 self.certificate = None 1956 # generate a new certificate and run an OCSP server for it. 2035 websocket_options.certificate = self.options.cert_and_key_file 2142 'path to the file containing the certificate ' 2148 'certificate. One of [ok,revoked,invalid]') 2152 'certificate will have this serial number') 2198 'certificate request should include the CA ' 2200 'certificate contained in the specified ' 2206 'certificate reques [all...] |