Searched refs:certificate (Results 126 - 150 of 163) sorted by relevance

1234567

/external/chromium_org/third_party/tlslite/tlslite/
H A Dtlsconnection.py188 the ciphersuites, certificate types, and SSL/TLS versions
237 combined SRP and server-certificate handshake, if the server
238 chooses to authenticate itself with a certificate chain in
261 the ciphersuites, certificate types, and SSL/TLS versions
314 """Perform a certificate-based handshake in the role of client.
317 will authenticate itself using an X.509 certificate
318 chain. If the handshake succeeds, the server's certificate
321 validation or checking of the server's certificate chain.
324 client will send the passed-in certificate chain, and use the
326 certificate chai
[all...]
H A Dmessages.py197 # certificate status response to the client along with
198 # their certificate. If OCSP is requested, they
374 HandshakeMsg.__init__(self, HandshakeType.certificate)
H A Dtlsrecordlayer.py796 elif subType == HandshakeType.certificate:
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStore2Test.java71 // creating a certificate
72 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
88 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
240 assertTrue("the public key of the certificate from getCertificate() "
241 + "did not equal the original certificate", certRes
247 // testing for a certificate chain
249 assertTrue("the certificate for alias2 is supposed to exist",
268 // certificate entry
271 assertTrue("certificate entry - the alias returned for this "
272 + "certificate wa
[all...]
/external/chromium_org/components/onc/
H A Donc_constants.h241 namespace certificate { namespace in namespace:onc
251 } // namespace certificate
/external/openssl/crypto/cms/
H A Dcms_lcl.h140 /* Signing certificate and key */
347 X509 *certificate; member in union:CMS_CertificateChoices::__anon28194
H A Dcms_asn1.c72 ASN1_SIMPLE(CMS_CertificateChoices, d.certificate, X509),
H A Dcms_sd.c594 x = cch->d.certificate;
/external/chromium-trace/trace-viewer/examples/stream_server/
H A Dstandalone.py339 certfile=self.websocket_server_options.certificate,
348 self.websocket_server_options.certificate)
756 parser.add_option('-c', '--certificate', dest='certificate',
757 default='', help='TLS certificate file.')
906 if not options.private_key or not options.certificate:
908 'To use TLS, specify private_key and certificate.')
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
H A Dstandalone.py335 certfile=self.websocket_server_options.certificate,
344 self.websocket_server_options.certificate)
752 parser.add_option('-c', '--certificate', dest='certificate',
753 default='', help='TLS certificate file.')
902 if not options.private_key or not options.certificate:
904 'To use TLS, specify private_key and certificate.')
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/
H A Dstandalone.py471 certfile=server_options.certificate,
586 ctx.use_certificate_file(server_options.certificate)
948 parser.add_option('-c', '--certificate', dest='certificate',
949 default='', help='TLS certificate file.')
956 help=('Makes client certificate optional even though '
1136 if not options.private_key or not options.certificate:
1138 'To use TLS, specify private_key and certificate.')
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c1032 CBS certificate; local
1033 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate))
1039 data = CBS_data(&certificate);
1040 x = d2i_X509(NULL, &data, CBS_len(&certificate));
1047 if (!CBS_skip(&certificate, data - CBS_data(&certificate)))
1053 if (CBS_len(&certificate) != 0)
1085 * certificate, which we don't include in s3_srvr.c */
1364 /* else anonymous DH, so no certificate or pkey. */
1449 /* else anonymous ECDH, so no certificate o
[all...]
/external/chromium_org/content/renderer/pepper/
H A Dcontent_decryptor_delegate.cc355 const uint8_t* certificate,
358 if (!certificate ||
362 media::MediaKeys::INVALID_ACCESS_ERROR, 0, "Incorrect certificate.");
369 certificate_length, certificate);
354 SetServerCertificate( const uint8_t* certificate, uint32_t certificate_length, scoped_ptr<media::SimpleCdmPromise> promise) argument
/external/chromium_org/chromeos/network/onc/
H A Donc_merger.cc24 // of a network or a certificate. These can be special handled during merging
31 return field_name == ::onc::certificate::kGUID;
H A Donc_validator.cc435 LOG(ERROR) << MessageHeader() << "Client certificate patterns are "
803 using namespace ::onc::certificate;
/external/chromium_org/net/cert/
H A Dnss_cert_database.cc77 : certificate(cert), net_error(err) {}
227 LOG(WARNING) << "certificate list is not a hierarchy";
H A Dcert_verify_proc.cc33 #error Implement certificate verification.
243 // by ensuring that if verification failed, it failed with a certificate
259 // by ensuring that if verification failed, it failed with a certificate
286 // Not a real certificate. For testing only.
299 // Note: not a CA certificate.
411 // Cyberoam CA certificate. Private key leaked, but this certificate would
412 // only have been installed by Cyberoam customers. The certificate expires
419 // ANSSI certificate under which a MITM proxy was mistakenly operated.
584 // Not a real certificate
[all...]
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_resource_base.cc190 PP_Resource certificate,
189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/chrome/browser/extensions/api/networking_private/
H A Dnetworking_private_service_client.cc40 credentials->certificate = properties.certificate;
/external/chromium_org/third_party/webrtc/base/
H A Dsslstreamadapter_unittest.cc255 rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
268 rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1,
904 // Test getting the remote certificate.
919 // The client should have a peer certificate after the handshake.
931 // The server should have a peer certificate after the handshake.
/external/chromium_org/chrome/browser/safe_browsing/
H A Ddownload_protection_service_unittest.cc163 // Add a certificate chain. Note that we add the certificate twice so that
279 const net::X509Certificate& certificate,
283 certificate, issuer, whitelist_strings);
286 // Reads a single PEM-encoded certificate from the testdata directory.
1084 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1262 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1345 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1524 // This also tests escaping of characters in the certificate attributes.
278 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
/external/openssl/crypto/store/
H A Dstore.h220 X509 *certificate; member in struct:STORE_OBJECT_st::__anon28359::__anon28360
/external/chromium_org/extensions/browser/api/cast_channel/
H A Dcast_auth_util_nss.cc637 // 1. |signature| verification of |data| using |certificate|.
638 // 2. |certificate| is signed by a trusted CA.
642 const std::string& certificate = response.client_auth_certificate(); local
672 // Make a copy of certificate string so it is safe to type cast.
674 certificate.data()));
675 der_cert.len = certificate.length();
677 // Parse into a certificate structure.
682 kErrorPrefix + "Failed to parse certificate.",
687 // Check that the certificate is signed by trusted CA.
709 kErrorPrefix + "Unable to extract public key from certificate",
[all...]
/external/chromium_org/chrome/browser/ui/webui/options/
H A Dcertificate_manager_handler.cc124 // Determine whether a certificate was stored with web trust by a policy.
1141 dict->SetString(kNameId, failure.certificate->subject().GetDisplayName());
/external/chromium_org/net/tools/testserver/
H A Dtestserver.py14 to a pem file containing the certificate and private key that should be used.
101 self.certificate = None
1956 # generate a new certificate and run an OCSP server for it.
2035 websocket_options.certificate = self.options.cert_and_key_file
2142 'path to the file containing the certificate '
2148 'certificate. One of [ok,revoked,invalid]')
2152 'certificate will have this serial number')
2198 'certificate request should include the CA '
2200 'certificate contained in the specified '
2206 'certificate reques
[all...]

Completed in 750 milliseconds

1234567