Searched refs:certificate (Results 51 - 75 of 163) sorted by relevance

1234567

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStore3Test.java52 private Certificate certificate; field in class:KeyStore3Test
83 certificate = cf.generateCertificate(certArray);
113 mockKeyStore.setKeyEntry("Alias", null, null, new Certificate[] { certificate });
134 mockKeyStore.setKeyEntry("Alias", key, null, new Certificate[] { certificate });
143 mockKeyStore.setKeyEntry("Alias3", key, null, new Certificate[] { certificate });
151 mockKeyStore.setCertificateEntry(null, certificate);
/external/chromium_org/chrome/browser/chromeos/platform_keys/
H A Dplatform_keys_nss.cc219 ImportCertificateState(scoped_refptr<net::X509Certificate> certificate,
242 RemoveCertificateState(scoped_refptr<net::X509Certificate> certificate,
313 scoped_refptr<net::X509Certificate> certificate,
315 : certificate_(certificate), callback_(callback) {
319 scoped_refptr<net::X509Certificate> certificate,
321 : certificate_(certificate), callback_(callback) {
468 // Does the actual certificate importing on the IO thread. Used by
499 LOG(ERROR) << "Could not import certificate.";
507 // Called on IO thread after the certificate removal is finished.
525 // Does the actual certificate remova
312 ImportCertificateState( scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback) argument
318 RemoveCertificateState( scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback) argument
531 scoped_refptr<net::X509Certificate> certificate = state->certificate_; local
614 ImportCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const ImportCertificateCallback& callback, BrowserContext* browser_context) argument
633 RemoveCertificate(const std::string& token_id, scoped_refptr<net::X509Certificate> certificate, const RemoveCertificateCallback& callback, BrowserContext* browser_context) argument
[all...]
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/
H A DCertificateTest.java117 * Makes the certificate, gets its encoded form, makes new certificate
167 Certificate certificate = new Certificate(tbsCertificate, signature, new byte[10]);
169 encoding = certificate.getEncoded();
173 encoding = Certificate.ASN1.encode(certificate);
181 // there is no X.509 certificate factory implementation installed
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dplatform_verification_flow.h150 // because its purpose is to prevent certificate replay. The |callback| will
197 // this method invokes a certificate request.
202 // Initiates the flow to get a platform key certificate. The arguments to
204 // which to get a certificate. If |force_new_key| is true then any existing
211 // A callback called when an attestation certificate request operation
213 // |user_id| identifies the user for which the certificate was requested.
214 // |operation_success| is true iff the certificate request operation
215 // succeeded. |certificate| holds the certificate for the platform key on
216 // success. If the certificate reques
[all...]
H A Dplatform_verification_flow.cc257 // certificate request.
298 const std::string& certificate) {
314 if (IsExpired(certificate)) {
322 certificate);
340 const std::string& certificate,
358 certificate);
468 bool PlatformVerificationFlow::IsExpired(const std::string& certificate) { argument
470 net::X509Certificate::CreateFromBytes(certificate.data(),
471 certificate.length()));
473 LOG(WARNING) << "Failed to parse certificate, canno
293 OnCertificateReady( const ChallengeContext& context, const std::string& user_id, scoped_ptr<base::Timer> timer, bool operation_success, const std::string& certificate) argument
338 OnChallengeReady( const ChallengeContext& context, const std::string& certificate, bool operation_success, const std::string& response_data) argument
[all...]
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/
H A DSslContextBuilder.java42 * self-signed certificate for a single hostname such as "localhost".
84 // Generate public and private keys and use them to make a self-signed certificate.
86 X509Certificate certificate = selfSignedCertificate(keyPair);
90 Certificate[] certificateChain = { certificate };
92 keyStore.setCertificateEntry("cert", certificate);
114 * Generates a certificate for {@code hostName} containing {@code keyPair}'s
/external/chromium_org/content/renderer/media/
H A Dwebrtc_identity_service.cc101 const std::string& certificate,
110 pending_requests_.front().success_callback.Run(certificate, private_key);
100 OnIdentityReady(int request_id, const std::string& certificate, const std::string& private_key) argument
/external/chromium_org/net/cert/
H A Dtest_root_certs_win.cc33 // certificate stores before the one provided internally by Crypt32.dll.
126 // Attempting to add an individual certificate to |memory_store| causes
130 // trust the certificate. However, appending a store to the collection
133 // searched to see if a certificate is in the Root store, all the
134 // underlying stores in the collection will be searched, and any certificate
142 bool TestRootCerts::Add(X509Certificate* certificate) { argument
144 // If a test certificate is never added, then no interception should
149 temporary_roots_, certificate->os_cert_handle(),
152 // If the certificate is already added, return successfully.
187 // various caches are flushed, when at least one certificate i
[all...]
H A Dx509_util_nss.h36 // Parses the serial number from |certificate|.
37 std::string ParseSerialNumber(const CERTCertificate* certificate);
39 // Gets the subjectAltName extension field from the certificate, if any.
44 // Creates all possible OS certificate handles from |data| encoded in a specific
51 // Reads a single certificate from |pickle_iter| and returns a platform-specific
52 // certificate handle. Returns an invalid handle, NULL, on failure.
75 // Returns true iff a certificate is issued by any of the issuers listed
77 // |cert_chain| is the certificate's chain.
H A Dtest_root_certs.h41 // artificially mark a certificate as trusted, independent of the local
51 // Marks |certificate| as trusted for X509Certificate::Verify(). Returns
52 // false if the certificate could not be marked trusted.
53 bool Add(X509Certificate* certificate);
55 // Reads a single certificate from |file| and marks it as trusted. Returns
57 // or more than one certificate existing in |file|.
88 // Returns an HCERTCHAINENGINE suitable to be used for certificate
105 // It is necessary to maintain a cache of the original certificate trust
136 // If |cert_| contains a certificate (due to a prior call to Reset or due to
/external/chromium_org/third_party/webrtc/base/
H A Dsslidentity.h31 // A somewhat opaque type used to encapsulate a certificate.
32 // Wraps the SSL library's notion of a certificate, with reference counting.
38 // Parses and build a certificate from a PEM encoded string.
40 // The length of the string representation of the certificate is
48 // underlying certificate, including its chain if present.
53 // The chain includes a copy of each certificate, excluding the leaf.
56 // Returns a PEM encoded string representation of the certificate.
59 // Provides a DER encoded binary representation of the certificate.
63 // certificate's signature.
66 // Compute the digest of the certificate give
[all...]
H A Dopensslidentity.cc39 // Random bits for certificate serial number
70 // Generate a self-signed certificate, with the public key from the
73 LOG(LS_INFO) << "Making certificate for " << params.common_name;
98 // (through the secure XMPP channel), and so the certificate
100 // arbitrary common_name. Note that this certificate goes out in
120 LOG(LS_INFO) << "Returning certificate";
159 // Print a certificate to the log, for debugging.
184 LogSSLErrors("Generating certificate");
274 // Calculates the DER representation of the certificate, from scratch.
298 OpenSSLCertificate *certificate local
321 FromPEMStrings( const std::string& private_key, const std::string& certificate) argument
[all...]
/external/chromium_org/content/browser/media/
H A Dwebrtc_identity_store_backend.cc32 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "certificate") &&
47 "certificate BLOB NOT NULL,"
67 const std::string& certificate,
70 certificate(certificate),
75 const std::string& certificate,
79 certificate(certificate),
84 std::string certificate; member in struct:content::WebRTCIdentityStoreBackend::Identity
236 iter->second.certificate,
66 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
74 Identity(const std::string& common_name, const std::string& certificate, const std::string& private_key, int64 creation_time) argument
250 AddIdentity(const GURL& origin, const std::string& identity_name, const std::string& common_name, const std::string& certificate, const std::string& private_key) argument
[all...]
H A Dwebrtc_identity_store_unittest.cc30 const std::string& certificate,
33 ASSERT_NE("", certificate);
36 *out_cert = certificate;
71 std::string* certificate,
77 base::Bind(&OnRequestCompleted, completed, certificate, private_key));
26 OnRequestCompleted(bool* completed, std::string* out_cert, std::string* out_key, int error, const std::string& certificate, const std::string& private_key) argument
67 RequestIdentityAndRunUtilIdle(const std::string& origin, const std::string& identity_name, const std::string& common_name, bool* completed, std::string* certificate, std::string* private_key) argument
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java56 public ContentVerifierProvider build(final X509Certificate certificate) argument
63 certHolder = new JcaX509CertificateHolder(certificate);
67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e);
91 sig.initVerify(certificate.getPublicKey());
100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
/external/chromium_org/chrome/browser/extensions/api/networking_private/
H A Dcrypto_verify_impl.cc15 return networking_private_crypto::VerifyCredentials(credentials.certificate,
/external/chromium_org/ppapi/thunk/
H A Dppb_tcp_socket_private_api.h34 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,
H A Dppb_tcp_socket_private_thunk.cc88 PP_Resource certificate,
93 return enter.object()->AddChainBuildingCertificate(certificate, trusted);
87 AddChainBuildingCertificate(PP_Resource tcp_socket, PP_Resource certificate, PP_Bool trusted) argument
/external/chromium_org/chrome/browser/safe_browsing/
H A Dbinary_feature_extractor_win_unittest.cc34 // Given a certificate chain protobuf, parse it into X509Certificates.
41 chain.element(i).certificate().data(),
42 chain.element(i).certificate().size()));
/external/chromium_org/ppapi/api/private/
H A Dppb_tcp_socket_private.idl77 * compared with the name(s) in the server's certificate during the SSL
104 * Adds a trusted/untrusted chain building certificate to be used for this
105 * connection. The <code>certificate</code> must be a
111 [in] PP_Resource certificate,
/external/chromium_org/ppapi/c/private/
H A Dppb_tcp_socket_private.h96 * compared with the name(s) in the server's certificate during the SSL
120 * Adds a trusted/untrusted chain building certificate to be used for this
121 * connection. The <code>certificate</code> must be a
126 PP_Resource certificate,
224 PP_Resource certificate,
/external/openssl/android.testssl/
H A DCAss.cnf3 # This is mostly being used for generation of certificate requests.
42 certificate = $dir/cacert.pem # The CA certificate
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl_unittest.cc144 base::DictionaryValue* certificate = NULL; local
145 onc_certificates_->GetDictionary(0, &certificate);
146 certificate->GetStringWithoutPathExpansion(::onc::certificate::kGUID, guid);
206 AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid);
244 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL);
262 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL);
280 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL);
311 // First we import a certificate.
313 SCOPED_TRACE("Import original certificate");
[all...]
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_mac.cc63 // Looks up the private key for |certificate| in KeyChain and returns
66 SecKeyRef FetchSecKeyRefForCertificate(const X509Certificate* certificate) { argument
72 NULL, certificate->os_cert_handle(), identity.InitializeInto());
453 const X509Certificate* certificate) {
456 FetchSecKeyRefForCertificate(certificate));
452 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
/external/chromium_org/ppapi/proxy/
H A Dtcp_socket_private_resource.h49 virtual PP_Bool AddChainBuildingCertificate(PP_Resource certificate,

Completed in 559 milliseconds

1234567