/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore3Test.java | 52 private Certificate certificate; field in class:KeyStore3Test 83 certificate = cf.generateCertificate(certArray); 113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[] { certificate }); 134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[] { certificate }); 143 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[] { certificate }); 151 mockKeyStore.setCertificateEntry(null, certificate);
|
/external/chromium_org/chrome/browser/chromeos/platform_keys/ |
H A D | platform_keys_nss.cc | 219 ImportCertificateState(scoped_refptr<net::X509Certificate> certificate, 242 RemoveCertificateState(scoped_refptr<net::X509Certificate> certificate, 313 scoped_refptr<net::X509Certificate> certificate, 315 : certificate_(certificate), callback_(callback) { 319 scoped_refptr<net::X509Certificate> certificate, 321 : certificate_(certificate), callback_(callback) { 468 // Does the actual certificate importing on the IO thread. Used by 499 LOG(ERROR) << "Could not import certificate."; 507 // Called on IO thread after the certificate removal is finished. 525 // Does the actual certificate remova 312 ImportCertificateState( scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback) argument 318 RemoveCertificateState( scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback) argument 531 scoped_refptr<net::X509Certificate> certificate = state->certificate_; local 614 ImportCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback, BrowserContext* browser_context) argument 633 RemoveCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback, BrowserContext* browser_context) argument [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
H A D | CertificateTest.java | 117 * Makes the certificate, gets its encoded form, makes new certificate 167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]); 169 encoding = certificate.getEncoded(); 173 encoding = Certificate.ASN1.encode(certificate); 181 // there is no X.509 certificate factory implementation installed
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | platform_verification_flow.h | 150 // because its purpose is to prevent certificate replay. The |callback| will 197 // this method invokes a certificate request. 202 // Initiates the flow to get a platform key certificate. The arguments to 204 // which to get a certificate. If |force_new_key| is true then any existing 211 // A callback called when an attestation certificate request operation 213 // |user_id| identifies the user for which the certificate was requested. 214 // |operation_success| is true iff the certificate request operation 215 // succeeded. |certificate| holds the certificate for the platform key on 216 // success. If the certificate reques [all...] |
H A D | platform_verification_flow.cc | 257 // certificate request. 298 const std::string& certificate) { 314 if (IsExpired(certificate)) { 322 certificate); 340 const std::string& certificate, 358 certificate); 468 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument 470 net::X509Certificate::CreateFromBytes(certificate.data(), 471 certificate.length())); 473 LOG(WARNING) << "Failed to parse certificate, canno 293 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument 338 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
H A D | SslContextBuilder.java | 42 * self-signed certificate for a single hostname such as "localhost". 84 // Generate public and private keys and use them to make a self-signed certificate. 86 X509Certificate certificate = selfSignedCertificate(keyPair); 90 Certificate[] certificateChain = { certificate }; 92 keyStore.setCertificateEntry("cert", certificate); 114 * Generates a certificate for {@code hostName} containing {@code keyPair}'s
|
/external/chromium_org/content/renderer/media/ |
H A D | webrtc_identity_service.cc | 101 const std::string& certificate, 110 pending_requests_.front().success_callback.Run(certificate, private_key); 100 OnIdentityReady(int request_id, const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/net/cert/ |
H A D | test_root_certs_win.cc | 33 // certificate stores before the one provided internally by Crypt32.dll. 126 // Attempting to add an individual certificate to |memory_store| causes 130 // trust the certificate. However, appending a store to the collection 133 // searched to see if a certificate is in the Root store, all the 134 // underlying stores in the collection will be searched, and any certificate 142 bool TestRootCerts::Add(X509Certificate* certificate) { argument 144 // If a test certificate is never added, then no interception should 149 temporary_roots_, certificate->os_cert_handle(), 152 // If the certificate is already added, return successfully. 187 // various caches are flushed, when at least one certificate i [all...] |
H A D | x509_util_nss.h | 36 // Parses the serial number from |certificate|. 37 std::string ParseSerialNumber(const CERTCertificate* certificate); 39 // Gets the subjectAltName extension field from the certificate, if any. 44 // Creates all possible OS certificate handles from |data| encoded in a specific 51 // Reads a single certificate from |pickle_iter| and returns a platform-specific 52 // certificate handle. Returns an invalid handle, NULL, on failure. 75 // Returns true iff a certificate is issued by any of the issuers listed 77 // |cert_chain| is the certificate's chain.
|
H A D | test_root_certs.h | 41 // artificially mark a certificate as trusted, independent of the local 51 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns 52 // false if the certificate could not be marked trusted. 53 bool Add(X509Certificate* certificate); 55 // Reads a single certificate from |file| and marks it as trusted. Returns 57 // or more than one certificate existing in |file|. 88 // Returns an HCERTCHAINENGINE suitable to be used for certificate 105 // It is necessary to maintain a cache of the original certificate trust 136 // If |cert_| contains a certificate (due to a prior call to Reset or due to
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslidentity.h | 31 // A somewhat opaque type used to encapsulate a certificate. 32 // Wraps the SSL library's notion of a certificate, with reference counting. 38 // Parses and build a certificate from a PEM encoded string. 40 // The length of the string representation of the certificate is 48 // underlying certificate, including its chain if present. 53 // The chain includes a copy of each certificate, excluding the leaf. 56 // Returns a PEM encoded string representation of the certificate. 59 // Provides a DER encoded binary representation of the certificate. 63 // certificate's signature. 66 // Compute the digest of the certificate give [all...] |
H A D | opensslidentity.cc | 39 // Random bits for certificate serial number 70 // Generate a self-signed certificate, with the public key from the 73 LOG(LS_INFO) << "Making certificate for " << params.common_name; 98 // (through the secure XMPP channel), and so the certificate 100 // arbitrary common_name. Note that this certificate goes out in 120 LOG(LS_INFO) << "Returning certificate"; 159 // Print a certificate to the log, for debugging. 184 LogSSLErrors("Generating certificate"); 274 // Calculates the DER representation of the certificate, from scratch. 298 OpenSSLCertificate *certificate local 321 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument [all...] |
/external/chromium_org/content/browser/media/ |
H A D | webrtc_identity_store_backend.cc | 32 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") && 47 "certificate BLOB NOT NULL," 67 const std::string& certificate, 70 certificate(certificate), 75 const std::string& certificate, 79 certificate(certificate), 84 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity 236 iter->second.certificate, 66 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument 74 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument 250 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument [all...] |
H A D | webrtc_identity_store_unittest.cc | 30 const std::string& certificate, 33 ASSERT_NE("", certificate); 36 *out_cert = certificate; 71 std::string* certificate, 77 base::Bind(&OnRequestCompleted, completed, certificate, private_key)); 26 OnRequestCompleted(bool* completed, std::string* out_cert, std::string* out_key, int error, const std::string& certificate, const std::string& private_key) argument 67 RequestIdentityAndRunUtilIdle(const std::string& origin, const std::string& identity_name, const std::string& common_name, bool* completed, std::string* certificate, std::string* private_key) argument
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaContentVerifierProviderBuilder.java | 56 public ContentVerifierProvider build(final X509Certificate certificate) argument 63 certHolder = new JcaX509CertificateHolder(certificate); 67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 91 sig.initVerify(certificate.getPublicKey()); 100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | crypto_verify_impl.cc | 15 return networking_private_crypto::VerifyCredentials(credentials.certificate,
|
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_tcp_socket_private_api.h | 34 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
|
H A D | ppb_tcp_socket_private_thunk.cc | 88 PP_Resource certificate, 93 return enter.object()->AddChainBuildingCertificate(certificate, trusted); 87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | binary_feature_extractor_win_unittest.cc | 34 // Given a certificate chain protobuf, parse it into X509Certificates. 41 chain.element(i).certificate().data(), 42 chain.element(i).certificate().size()));
|
/external/chromium_org/ppapi/api/private/ |
H A D | ppb_tcp_socket_private.idl | 77 * compared with the name(s) in the server's certificate during the SSL 104 * Adds a trusted/untrusted chain building certificate to be used for this 105 * connection. The <code>certificate</code> must be a 111 [in] PP_Resource certificate,
|
/external/chromium_org/ppapi/c/private/ |
H A D | ppb_tcp_socket_private.h | 96 * compared with the name(s) in the server's certificate during the SSL 120 * Adds a trusted/untrusted chain building certificate to be used for this 121 * connection. The <code>certificate</code> must be a 126 PP_Resource certificate, 224 PP_Resource certificate,
|
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 3 # This is mostly being used for generation of certificate requests. 42 certificate = $dir/cacert.pem # The CA certificate
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl_unittest.cc | 144 base::DictionaryValue* certificate = NULL; local 145 onc_certificates_->GetDictionary(0, &certificate); 146 certificate->GetStringWithoutPathExpansion(::onc::certificate::kGUID, guid); 206 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid); 244 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL); 262 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL); 280 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL); 311 // First we import a certificate. 313 SCOPED_TRACE("Import original certificate"); [all...] |
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 63 // Looks up the private key for |certificate| in KeyChain and returns 66 SecKeyRef FetchSecKeyRefForCertificate(const X509Certificate* certificate) { argument 72 NULL, certificate->os_cert_handle(), identity.InitializeInto()); 453 const X509Certificate* certificate) { 456 FetchSecKeyRefForCertificate(certificate)); 452 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
|
/external/chromium_org/ppapi/proxy/ |
H A D | tcp_socket_private_resource.h | 49 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
|