Searched defs:certificate (Results 51 - 75 of 81) sorted by relevance

1234

/external/chromium_org/net/android/java/src/org/chromium/net/
H A DX509Util.java124 * Trust manager backed up by the read-only system certificate store.
129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
135 * Trust manager backed up by a custom certificate store. We need such manager to plant test
174 * Allow disabling registering the observer and recording histograms for the certificate
176 * the system does not allow to interact with the certificate store without user interaction.
181 * Ensures that the trust managers and certificate factory are initialized.
282 * Convert a DER encoded certificate to an X509Certificate.
363 // that case, the certificate remains in the system directory but is also added to
389 * If an EKU extension is present in the end-entity certificate, it MUST contain either the
398 static boolean verifyKeyUsage(X509Certificate certificate) throw argument
[all...]
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_resource_base.cc190 PP_Resource certificate,
189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/third_party/webrtc/base/
H A Dopensslidentity.cc39 // Random bits for certificate serial number
70 // Generate a self-signed certificate, with the public key from the
73 LOG(LS_INFO) << "Making certificate for " << params.common_name;
98 // (through the secure XMPP channel), and so the certificate
100 // arbitrary common_name. Note that this certificate goes out in
120 LOG(LS_INFO) << "Returning certificate";
159 // Print a certificate to the log, for debugging.
184 LogSSLErrors("Generating certificate");
274 // Calculates the DER representation of the certificate, from scratch.
298 OpenSSLCertificate *certificate local
321 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument
[all...]
H A Dnssidentity.cc159 // self-signed), certificate transparency logging, or many other attributes.
161 // certificate chains. Users should be advised not to deploy chained
172 // (e.g. certificate is corrupted).
341 CERTCertificate *certificate = NULL; local
374 LOG(LS_ERROR) << "Couldn't create certificate signing request";
393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq);
394 if (!certificate) {
395 LOG(LS_ERROR) << "Couldn't create certificate";
399 arena = certificate->arena;
401 rv = SECOID_SetAlgorithmID(arena, &certificate
451 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
513 NSSCertificate &NSSIdentity::certificate() const { function in class:rtc::NSSIdentity
[all...]
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStore2Test.java71 // creating a certificate
72 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test
88 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate
240 assertTrue("the public key of the certificate from getCertificate() "
241 + "did not equal the original certificate", certRes
247 // testing for a certificate chain
249 assertTrue("the certificate for alias2 is supposed to exist",
268 // certificate entry
271 assertTrue("certificate entry - the alias returned for this "
272 + "certificate wa
[all...]
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dplatform_verification_flow.cc257 // certificate request.
298 const std::string& certificate) {
314 if (IsExpired(certificate)) {
322 certificate);
340 const std::string& certificate,
358 certificate);
468 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument
470 net::X509Certificate::CreateFromBytes(certificate.data(),
471 certificate.length()));
473 LOG(WARNING) << "Failed to parse certificate, canno
293 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument
338 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument
[all...]
H A Dplatform_verification_flow_unittest.cc254 std::string certificate = local
260 certificate));
276 const std::string& certificate) {
280 certificate_ = certificate;
273 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
/external/chromium_org/chromeos/network/
H A Dclient_cert_resolver.cc32 // Describes a network |network_path| for which a matching certificate |cert_id|
33 // was found or for which no certificate was found (|cert_id| will be empty).
47 // The id of the matching certificate or empty if no certificate was found.
50 // The id of the slot containing the certificate and the private key.
65 // Returns true if a private key for certificate |cert| is installed.
75 // Describes a certificate which is issued by |issuer| (encoded as PEM).
77 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument
79 : cert(certificate),
91 // Describes a network that is configured with the certificate patter
[all...]
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_mac.cc63 // Looks up the private key for |certificate| in KeyChain and returns
66 SecKeyRef FetchSecKeyRefForCertificate(const X509Certificate* certificate) { argument
72 NULL, certificate->os_cert_handle(), identity.InitializeInto());
453 const X509Certificate* certificate) {
456 FetchSecKeyRefForCertificate(certificate));
452 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/
H A DJavaApiConverterTest.java78 private static final X509Certificate LOCAL_CERT = certificate(""
91 private static final X509Certificate SERVER_CERT = certificate(""
730 private static X509Certificate certificate(String certificate) { argument
733 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
/external/chromium_org/chrome/browser/chromeos/platform_keys/
H A Dplatform_keys_nss.cc219 ImportCertificateState(scoped_refptr<net::X509Certificate> certificate,
242 RemoveCertificateState(scoped_refptr<net::X509Certificate> certificate,
313 scoped_refptr<net::X509Certificate> certificate,
315 : certificate_(certificate), callback_(callback) {
319 scoped_refptr<net::X509Certificate> certificate,
321 : certificate_(certificate), callback_(callback) {
468 // Does the actual certificate importing on the IO thread. Used by
499 LOG(ERROR) << "Could not import certificate.";
507 // Called on IO thread after the certificate removal is finished.
525 // Does the actual certificate remova
312 ImportCertificateState( scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback) argument
318 RemoveCertificateState( scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback) argument
531 scoped_refptr<net::X509Certificate> certificate = state->certificate_; local
614 ImportCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback, BrowserContext* browser_context) argument
633 RemoveCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback, BrowserContext* browser_context) argument
[all...]
/external/chromium_org/chrome/browser/safe_browsing/
H A Ddownload_protection_service_unittest.cc163 // Add a certificate chain. Note that we add the certificate twice so that
279 const net::X509Certificate& certificate,
283 certificate, issuer, whitelist_strings);
286 // Reads a single PEM-encoded certificate from the testdata directory.
1084 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1262 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1345 EXPECT_EQ("dummy cert data", chain.element(0).certificate());
1524 // This also tests escaping of characters in the certificate attributes.
278 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
H A Ddownload_protection_service.cc816 // We need to have both a signing certificate and its issuer certificate
822 chain.element(0).certificate().data(),
823 chain.element(0).certificate().size());
831 chain.element(i).certificate().data(),
832 chain.element(i).certificate().size());
1001 // Escapes a certificate attribute so that it can be used in a whitelist
1021 const net::X509Certificate& certificate,
1032 const net::CertPrincipal& subject = certificate.subject();
1020 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
/external/chromium_org/net/cert/
H A Dmulti_threaded_cert_verifier.cc141 // contains the validity range - both when the certificate was verified and
213 // process of performing the certificate verification. Deletes itself
236 // Returns the certificate being verified. May only be called /before/
238 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker
361 base::Unretained(worker_->certificate())));
H A Dx509_util_nss.cc82 // method to generate an X509 certificate.
83 // Returns NULL if an error is encountered in the certificate creation
85 // Caller responsible for freeing returned certificate object.
98 // Create the certificate request.
107 LOG(ERROR) << "Failed to create certificate request: " << prerr;
117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr;
126 LOG(ERROR) << "Failed to create certificate: " << prerr;
147 // Signs a certificate object, with |key| generating a new X509Certificate
148 // and destroying the passed certificate object (even when NULL is returned).
152 // certificate signin
442 ParseSerialNumber(const CERTCertificate* certificate) argument
[all...]
/external/chromium_org/net/socket/
H A Dssl_server_socket_openssl.cc28 X509Certificate* certificate,
33 new SSLServerSocketOpenSSL(socket.Pass(), certificate, key, ssl_config));
38 scoped_refptr<X509Certificate> certificate,
51 cert_(certificate),
625 // Set certificate and private key.
629 LOG(ERROR) << "Cannot set certificate.";
648 LOG(ERROR) << "Cannot set certificate.";
26 CreateSSLServerSocket( scoped_ptr<StreamSocket> socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
36 SSLServerSocketOpenSSL( scoped_ptr<StreamSocket> transport_socket, scoped_refptr<X509Certificate> certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
/external/chromium_org/content/renderer/pepper/
H A Dcontent_decryptor_delegate.cc355 const uint8_t* certificate,
358 if (!certificate ||
362 media::MediaKeys::INVALID_ACCESS_ERROR, 0, "Incorrect certificate.");
369 certificate_length, certificate);
354 SetServerCertificate( const uint8_t* certificate, uint32_t certificate_length, scoped_ptr<media::SimpleCdmPromise> promise) argument
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c1032 CBS certificate; local
1033 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate))
1039 data = CBS_data(&certificate);
1040 x = d2i_X509(NULL, &data, CBS_len(&certificate));
1047 if (!CBS_skip(&certificate, data - CBS_data(&certificate)))
1053 if (CBS_len(&certificate) != 0)
1085 * certificate, which we don't include in s3_srvr.c */
1364 /* else anonymous DH, so no certificate or pkey. */
1449 /* else anonymous ECDH, so no certificate o
[all...]
H A Ds3_srvr.c398 /* Don't request a certificate if an obc was presented */
2232 * client certificate. */
2251 /* Filter out unsupported certificate types. */
2379 CBS certificate; local
2382 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate))
2390 /* If this is the first certificate, and we don't want
2394 SHA256_Update(&sha256, CBS_data(&certificate), CBS_len(&certificate));
2399 data = CBS_data(&certificate);
2400 x = d2i_X509(NULL, &data, CBS_len(&certificate));
[all...]
/external/chromium_org/third_party/tlslite/tlslite/
H A Dconstants.py30 certificate = 11 variable in class:HandshakeType
/external/openssl/crypto/cms/
H A Dcms_lcl.h140 /* Signing certificate and key */
347 X509 *certificate; member in union:CMS_CertificateChoices::__anon28194
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3prot.h125 certificate = 11, enumerator in enum:__anon9666
/external/openssl/crypto/store/
H A Dstore.h220 X509 *certificate; member in struct:STORE_OBJECT_st::__anon28359::__anon28360
/external/chromium_org/components/onc/
H A Donc_constants.cc223 namespace certificate { namespace in namespace:onc
233 } // namespace certificate
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp1499 // it's not valid for the certificate.
6374 * Returns an array containing all the X509 certificate references
6475 * Java to perform certificate verification and handshake
6781 * Verify the X509 certificate via SSL_CTX_set_cert_verify_callback
6860 * Call back to ask for a client certificate. There are three possible exit codes:
6862 * 1 is success. x509Out and pkeyOut should point to the correct private key and certificate.
6869 /* Clear output of key and certificate in case of early exit due to error. */
6933 X509* certificate = SSL_get_certificate(ssl); local
6936 if (certificate != NULL && privatekey != NULL) {
6937 *x509Out = certificate;
8521 X509* certificate = SSL_get_certificate(ssl); local
[all...]

Completed in 1247 milliseconds

1234