/external/chromium_org/net/android/java/src/org/chromium/net/ |
H A D | X509Util.java | 124 * Trust manager backed up by the read-only system certificate store. 129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate 135 * Trust manager backed up by a custom certificate store. We need such manager to plant test 174 * Allow disabling registering the observer and recording histograms for the certificate 176 * the system does not allow to interact with the certificate store without user interaction. 181 * Ensures that the trust managers and certificate factory are initialized. 282 * Convert a DER encoded certificate to an X509Certificate. 363 // that case, the certificate remains in the system directory but is also added to 389 * If an EKU extension is present in the end-entity certificate, it MUST contain either the 398 static boolean verifyKeyUsage(X509Certificate certificate) throw argument [all...] |
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_resource_base.cc | 190 PP_Resource certificate, 189 AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslidentity.cc | 39 // Random bits for certificate serial number 70 // Generate a self-signed certificate, with the public key from the 73 LOG(LS_INFO) << "Making certificate for " << params.common_name; 98 // (through the secure XMPP channel), and so the certificate 100 // arbitrary common_name. Note that this certificate goes out in 120 LOG(LS_INFO) << "Returning certificate"; 159 // Print a certificate to the log, for debugging. 184 LogSSLErrors("Generating certificate"); 274 // Calculates the DER representation of the certificate, from scratch. 298 OpenSSLCertificate *certificate local 321 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument [all...] |
H A D | nssidentity.cc | 159 // self-signed), certificate transparency logging, or many other attributes. 161 // certificate chains. Users should be advised not to deploy chained 172 // (e.g. certificate is corrupted). 341 CERTCertificate *certificate = NULL; local 374 LOG(LS_ERROR) << "Couldn't create certificate signing request"; 393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); 394 if (!certificate) { 395 LOG(LS_ERROR) << "Couldn't create certificate"; 399 arena = certificate->arena; 401 rv = SECOID_SetAlgorithmID(arena, &certificate 451 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 513 NSSCertificate &NSSIdentity::certificate() const { function in class:rtc::NSSIdentity [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore2Test.java | 71 // creating a certificate 72 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:KeyStore2Test 88 ByteArrayInputStream certArray = new ByteArrayInputStream(certificate 240 assertTrue("the public key of the certificate from getCertificate() " 241 + "did not equal the original certificate", certRes 247 // testing for a certificate chain 249 assertTrue("the certificate for alias2 is supposed to exist", 268 // certificate entry 271 assertTrue("certificate entry - the alias returned for this " 272 + "certificate wa [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | platform_verification_flow.cc | 257 // certificate request. 298 const std::string& certificate) { 314 if (IsExpired(certificate)) { 322 certificate); 340 const std::string& certificate, 358 certificate); 468 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument 470 net::X509Certificate::CreateFromBytes(certificate.data(), 471 certificate.length())); 473 LOG(WARNING) << "Failed to parse certificate, canno 293 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument 338 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument [all...] |
H A D | platform_verification_flow_unittest.cc | 254 std::string certificate = local 260 certificate)); 276 const std::string& certificate) { 280 certificate_ = certificate; 273 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_resolver.cc | 32 // Describes a network |network_path| for which a matching certificate |cert_id| 33 // was found or for which no certificate was found (|cert_id| will be empty). 47 // The id of the matching certificate or empty if no certificate was found. 50 // The id of the slot containing the certificate and the private key. 65 // Returns true if a private key for certificate |cert| is installed. 75 // Describes a certificate which is issued by |issuer| (encoded as PEM). 77 CertAndIssuer(const scoped_refptr<net::X509Certificate>& certificate, argument 79 : cert(certificate), 91 // Describes a network that is configured with the certificate patter [all...] |
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 63 // Looks up the private key for |certificate| in KeyChain and returns 66 SecKeyRef FetchSecKeyRefForCertificate(const X509Certificate* certificate) { argument 72 NULL, certificate->os_cert_handle(), identity.InitializeInto()); 453 const X509Certificate* certificate) { 456 FetchSecKeyRefForCertificate(certificate)); 452 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
H A D | JavaApiConverterTest.java | 78 private static final X509Certificate LOCAL_CERT = certificate("" 91 private static final X509Certificate SERVER_CERT = certificate("" 730 private static X509Certificate certificate(String certificate) { argument 733 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8)));
|
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
H A D | platform_keys_nss.cc | 219 ImportCertificateState(scoped_refptr<net::X509Certificate> certificate, 242 RemoveCertificateState(scoped_refptr<net::X509Certificate> certificate, 313 scoped_refptr<net::X509Certificate> certificate, 315 : certificate_(certificate), callback_(callback) { 319 scoped_refptr<net::X509Certificate> certificate, 321 : certificate_(certificate), callback_(callback) { 468 // Does the actual certificate importing on the IO thread. Used by 499 LOG(ERROR) << "Could not import certificate."; 507 // Called on IO thread after the certificate removal is finished. 525 // Does the actual certificate remova 312 ImportCertificateState( scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback) argument 318 RemoveCertificateState( scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback) argument 531 scoped_refptr<net::X509Certificate> certificate = state->certificate_; local 614 ImportCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback, BrowserContext* browser_context) argument 633 RemoveCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback, BrowserContext* browser_context) argument [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service_unittest.cc | 163 // Add a certificate chain. Note that we add the certificate twice so that 279 const net::X509Certificate& certificate, 283 certificate, issuer, whitelist_strings); 286 // Reads a single PEM-encoded certificate from the testdata directory. 1084 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1262 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1345 EXPECT_EQ("dummy cert data", chain.element(0).certificate()); 1524 // This also tests escaping of characters in the certificate attributes. 278 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
H A D | download_protection_service.cc | 816 // We need to have both a signing certificate and its issuer certificate 822 chain.element(0).certificate().data(), 823 chain.element(0).certificate().size()); 831 chain.element(i).certificate().data(), 832 chain.element(i).certificate().size()); 1001 // Escapes a certificate attribute so that it can be used in a whitelist 1021 const net::X509Certificate& certificate, 1032 const net::CertPrincipal& subject = certificate.subject(); 1020 GetCertificateWhitelistStrings( const net::X509Certificate& certificate, const net::X509Certificate& issuer, std::vector<std::string>* whitelist_strings) argument
|
/external/chromium_org/net/cert/ |
H A D | multi_threaded_cert_verifier.cc | 141 // contains the validity range - both when the certificate was verified and 213 // process of performing the certificate verification. Deletes itself 236 // Returns the certificate being verified. May only be called /before/ 238 X509Certificate* certificate() const { return cert_.get(); } function in class:net::CertVerifierWorker 361 base::Unretained(worker_->certificate())));
|
H A D | x509_util_nss.cc | 82 // method to generate an X509 certificate. 83 // Returns NULL if an error is encountered in the certificate creation 85 // Caller responsible for freeing returned certificate object. 98 // Create the certificate request. 107 LOG(ERROR) << "Failed to create certificate request: " << prerr; 117 LOG(ERROR) << "Failed to create certificate validity object: " << prerr; 126 LOG(ERROR) << "Failed to create certificate: " << prerr; 147 // Signs a certificate object, with |key| generating a new X509Certificate 148 // and destroying the passed certificate object (even when NULL is returned). 152 // certificate signin 442 ParseSerialNumber(const CERTCertificate* certificate) argument [all...] |
/external/chromium_org/net/socket/ |
H A D | ssl_server_socket_openssl.cc | 28 X509Certificate* certificate, 33 new SSLServerSocketOpenSSL(socket.Pass(), certificate, key, ssl_config)); 38 scoped_refptr<X509Certificate> certificate, 51 cert_(certificate), 625 // Set certificate and private key. 629 LOG(ERROR) << "Cannot set certificate."; 648 LOG(ERROR) << "Cannot set certificate."; 26 CreateSSLServerSocket( scoped_ptr<StreamSocket> socket, X509Certificate* certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument 36 SSLServerSocketOpenSSL( scoped_ptr<StreamSocket> transport_socket, scoped_refptr<X509Certificate> certificate, crypto::RSAPrivateKey* key, const SSLConfig& ssl_config) argument
|
/external/chromium_org/content/renderer/pepper/ |
H A D | content_decryptor_delegate.cc | 355 const uint8_t* certificate, 358 if (!certificate || 362 media::MediaKeys::INVALID_ACCESS_ERROR, 0, "Incorrect certificate."); 369 certificate_length, certificate); 354 SetServerCertificate( const uint8_t* certificate, uint32_t certificate_length, scoped_ptr<media::SimpleCdmPromise> promise) argument
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1032 CBS certificate; local 1033 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) 1039 data = CBS_data(&certificate); 1040 x = d2i_X509(NULL, &data, CBS_len(&certificate)); 1047 if (!CBS_skip(&certificate, data - CBS_data(&certificate))) 1053 if (CBS_len(&certificate) != 0) 1085 * certificate, which we don't include in s3_srvr.c */ 1364 /* else anonymous DH, so no certificate or pkey. */ 1449 /* else anonymous ECDH, so no certificate o [all...] |
H A D | s3_srvr.c | 398 /* Don't request a certificate if an obc was presented */ 2232 * client certificate. */ 2251 /* Filter out unsupported certificate types. */ 2379 CBS certificate; local 2382 if (!CBS_get_u24_length_prefixed(&certificate_list, &certificate)) 2390 /* If this is the first certificate, and we don't want 2394 SHA256_Update(&sha256, CBS_data(&certificate), CBS_len(&certificate)); 2399 data = CBS_data(&certificate); 2400 x = d2i_X509(NULL, &data, CBS_len(&certificate)); [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | constants.py | 30 certificate = 11 variable in class:HandshakeType
|
/external/openssl/crypto/cms/ |
H A D | cms_lcl.h | 140 /* Signing certificate and key */ 347 X509 *certificate; member in union:CMS_CertificateChoices::__anon28194
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 125 certificate = 11, enumerator in enum:__anon9666
|
/external/openssl/crypto/store/ |
H A D | store.h | 220 X509 *certificate; member in struct:STORE_OBJECT_st::__anon28359::__anon28360
|
/external/chromium_org/components/onc/ |
H A D | onc_constants.cc | 223 namespace certificate { namespace in namespace:onc 233 } // namespace certificate
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 1499 // it's not valid for the certificate. 6374 * Returns an array containing all the X509 certificate references 6475 * Java to perform certificate verification and handshake 6781 * Verify the X509 certificate via SSL_CTX_set_cert_verify_callback 6860 * Call back to ask for a client certificate. There are three possible exit codes: 6862 * 1 is success. x509Out and pkeyOut should point to the correct private key and certificate. 6869 /* Clear output of key and certificate in case of early exit due to error. */ 6933 X509* certificate = SSL_get_certificate(ssl); local 6936 if (certificate != NULL && privatekey != NULL) { 6937 *x509Out = certificate; 8521 X509* certificate = SSL_get_certificate(ssl); local [all...] |