Searched refs:certificate (Results 26 - 50 of 163) sorted by relevance

1234567

/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
H A DHostnameVerifierTest.java396 X509Certificate certificate = certificate(""
407 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal());
409 FakeSSLSession session = new FakeSSLSession(certificate);
546 private X509Certificate certificate(String certificate) throws Exception { argument
548 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
551 private SSLSession session(String certificate) throws Exception { argument
552 return new FakeSSLSession(certificate(certificate));
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dsslidentity_unittest.cc72 ASSERT_TRUE(identity1_->certificate().GetSignatureDigestAlgorithm(
75 ASSERT_TRUE(identity2_->certificate().GetSignatureDigestAlgorithm(
79 // The test certificate has an MD5-based signature.
94 rv = identity1_->certificate().ComputeDigest(algorithm,
100 rv = identity1_->certificate().ComputeDigest(algorithm,
108 rv = identity2_->certificate().ComputeDigest(algorithm,
194 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString());
H A Dsslidentity.cc106 const std::string& certificate) {
125 const std::string& certificate) {
126 return OpenSSLIdentity::FromPEMStrings(private_key, certificate);
144 const std::string& certificate) {
145 return NSSIdentity::FromPEMStrings(private_key, certificate);
105 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
124 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
143 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
H A Dnssidentity.h76 CERTCertificate* certificate() { return certificate_; } function in class:rtc::NSSCertificate
79 // only checks that each certificate certifies the preceding certificate,
80 // and ignores many other certificate features such as expiration dates.
86 // Comparison. Only the certificate itself is considered, not the chain.
100 // Represents a SSL key pair and certificate for NSS.
106 const std::string& certificate);
112 virtual NSSCertificate& certificate() const;
/external/chromium_org/chrome/browser/ssl/
H A Dssl_client_auth_observer.cc34 net::X509Certificate* certificate) {
43 details.second = certificate;
50 callback_.Run(certificate);
33 CertificateSelected( net::X509Certificate* certificate) argument
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl.h36 // This class handles certificate imports from ONC (both policy and user
37 // imports) into a certificate store. The GUID of Client certificates is stored
38 // together with the certificate as Nickname. In contrast, Server and CA
67 // Lists the certificates that have the string |label| as their certificate
73 // Deletes any certificate that has the string |label| as its nickname (exact
78 // Parses and stores/removes |certificate| in/from the certificate
82 const base::DictionaryValue& certificate,
86 // Imports the Server or CA certificate |certificate|
[all...]
/external/chromium_org/net/cert/
H A Dtest_root_certs_mac.cc39 // rather than checking if they were the same (logical) certificate, so a
51 bool TestRootCerts::Add(X509Certificate* certificate) { argument
54 certificate->os_cert_handle()))
56 CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
H A Dx509_util_ios.cc24 // Creates an NSS certificate handle from |data|, which is |length| bytes in
41 // Parse into a certificate structure.
117 NSSCertChain::NSSCertChain(X509Certificate* certificate) { argument
118 DCHECK(certificate);
120 certificate->os_cert_handle()));
122 certificate->GetIntermediateCertificates();
H A Dx509_util_ios.h25 // Converts a Security.framework certificate handle (SecCertificateRef) into
26 // an NSS certificate handle (CERTCertificate*).
29 // Converts an NSS certificate handle (CERTCertificate*) into a
44 // This is a wrapper class around the native NSS certificate handle.
45 // The constructor copies the certificate data from |cert_handle| and
56 // A wrapper class that loads a certificate and all of its intermediates into
61 explicit NSSCertChain(X509Certificate* certificate);
/external/chromium_org/chrome/browser/ui/cocoa/
H A Dcertificate_viewer_mac.h36 - (id)initWithCertificate:(net::X509Certificate*)certificate;
/external/chromium_org/chrome/common/extensions/api/networking_private/
H A Dnetworking_private_crypto.h17 // Verify that the credentials described by |certificate| and |signed_data|
19 // 1) The MAC address listed in the certificate matches |connected_mac|.
20 // 2) The certificate is a valid PEM encoded certificate signed by trusted CA.
22 // |certificate|
23 bool VerifyCredentials(const std::string& certificate,
/external/chromium_org/content/renderer/media/
H A Dpeer_connection_identity_service.h33 void OnIdentityReady(const std::string& certificate,
H A Dwebrtc_identity_service.h25 void(const std::string& certificate, const std::string& private_key)>
83 const std::string& certificate,
/external/chromium_org/net/ssl/
H A Dssl_client_auth_cache.h33 // Checks for a client certificate preference for SSL server at |server|.
34 // Returns true if a preference is found, and sets |*certificate| to the
35 // desired client certificate. The desired certificate may be NULL, which
36 // indicates a preference to not send any certificate to |server|.
37 // If a certificate preference is not found, returns false.
39 scoped_refptr<X509Certificate>* certificate);
41 // Add a client certificate for |server| to the cache. If there is already
42 // a client certificate for |server|, it will be overwritten. A NULL
43 // |client_cert| indicates a preference that no client certificate shoul
[all...]
/external/chromium_org/content/browser/media/
H A Dwebrtc_identity_store.cc25 const std::string& certificate,
27 : error(error), certificate(certificate), private_key(private_key) {}
30 std::string certificate; member in struct:content::WebRTCIdentityRequestResult
50 &result->certificate);
110 it->second.Run(result.error, result.certificate, result.private_key);
158 const std::string& certificate,
163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key);
242 const std::string& certificate,
247 WebRTCIdentityRequestResult result(error, certificate, private_ke
24 WebRTCIdentityRequestResult(int error, const std::string& certificate, const std::string& private_key) argument
157 OnRequestComplete(int error, const std::string& certificate, const std::string& private_key) argument
240 BackendFindCallback(WebRTCIdentityRequest* request, int error, const std::string& certificate, const std::string& private_key) argument
[all...]
H A Dwebrtc_identity_store_backend.h34 const std::string& certificate,
48 // |common_name| is the common name used to generate the certificate;
61 // |common_name| is the common name used to generate the certificate;
62 // |certificate| is the DER string of the certificate;
68 const std::string& certificate,
H A Dwebrtc_identity_store.h33 // the self-signed certificate.
40 const std::string& certificate,
48 // Retrieve the cached DTLS private key and certificate, i.e. identity, for
53 // a new certificate will be generated, overwriting the old one.
58 // present in the certificate;
59 // |common_name| is the common name used to generate the certificate and will
92 const std::string& certificate,
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
H A DJcaSignerInfoGeneratorBuilder.java63 public SignerInfoGenerator build(ContentSigner contentSigner, X509Certificate certificate) argument
66 return this.build(contentSigner, new JcaX509CertificateHolder(certificate));
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dattestation_policy_observer.cc30 // The number of days before a certificate expires during which it is
213 const std::string& certificate) {
215 net::X509Certificate::CreateFromBytes(certificate.data(),
216 certificate.length()));
218 LOG(WARNING) << "Failed to parse certificate, cannot check expiry.";
223 // The certificate has expired or will soon, replace it.
229 // Get the payload and check if the certificate has already been uploaded.
232 certificate));
236 const std::string& certificate) {
238 certificate,
212 CheckCertificateExpiry( const std::string& certificate) argument
235 UploadCertificate( const std::string& certificate) argument
243 CheckIfUploaded( const std::string& certificate, const std::string& key_payload) argument
[all...]
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/
H A Dracoon.conf1 path certificate "/etc/openssl/certs";
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/
H A Dracoon.conf1 path certificate "/etc/openssl/certs";
/external/chromium_org/content/browser/renderer_host/media/
H A Dwebrtc_identity_service_host.h43 const std::string& certificate,
H A Dwebrtc_identity_service_host.cc80 const std::string& certificate,
85 sequence_number, certificate, private_key));
78 OnComplete(int sequence_number, int status, const std::string& certificate, const std::string& private_key) argument
/external/chromium_org/chrome/browser/chromeos/platform_keys/
H A Dplatform_keys.h103 // Imports |certificate| to the given token if the certified key is already
104 // stored in this token. Any intermediate of |certificate| will be ignored.
109 scoped_refptr<net::X509Certificate> certificate,
118 // Removes |certificate| from the given token if present. Any intermediate of
119 // |certificate| will be ignored. |token_id| is currently ignored, instead the
123 scoped_refptr<net::X509Certificate> certificate,
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_private_resource.cc73 PP_Resource certificate,
75 return AddChainBuildingCertificateImpl(certificate, trusted);
72 AddChainBuildingCertificate( PP_Resource certificate, PP_Bool trusted) argument

Completed in 436 milliseconds

1234567