/external/chromium_org/third_party/webrtc/base/ |
H A D | sslfingerprint.cc | 28 return Create(algorithm, &(identity->certificate()));
|
H A D | openssladapter.cc | 645 X509* certificate = SSL_get_peer_certificate(ssl); 646 if (!certificate) 654 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER); 669 int extension_count = X509_get_ext_count(certificate); 671 X509_EXTENSION* extension = X509_get_ext(certificate, i); 727 && ((subject = X509_get_subject_name(certificate)) != NULL) 735 X509_free(certificate); 739 LOG(LS_WARNING) << "TLS certificate check FAILED. " 803 LOG(LS_INFO) << "Error with certificate at depth: " << depth; 826 LOG(LS_INFO) << "validated certificate usin [all...] |
H A D | fakesslidentity.h | 89 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLX509CRL.java | 288 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { argument 289 if (certificate instanceof OpenSSLX509Certificate) { 290 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate; 301 return getRevokedCertificate(certificate.getSerialNumber()); 358 throw new RuntimeException("cannot convert certificate", e);
|
/external/chromium_org/net/cert/ |
H A D | asn1_util.cc | 114 base::StringPiece certificate; local 115 if (!GetElement(cert, kSEQUENCE, &certificate)) 118 // We don't allow junk after the certificate. 123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
|
H A D | nss_cert_database_unittest.cc | 231 // Importing a PKCS#12 file with a certificate but no corresponding 245 // Now import a PKCS#12 file with just a certificate but no private key. 386 EXPECT_EQ(certs[0], failed[0].certificate); 409 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name); 410 EXPECT_EQ(ERR_FAILED, failed[0].net_error); // The certificate expired. 411 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); 445 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); 447 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name); 448 EXPECT_EQ(ERR_FAILED, failed[1].net_error); // The certificate expired. 449 EXPECT_EQ("www.us.army.mil", failed[2].certificate [all...] |
H A D | nss_cert_database.h | 32 // Provides functions to manipulate the NSS certificate stores. 33 // Forwards notifications about certificate changes to the global CertDatabase 41 // Will be called when a new certificate is added. 46 // Will be called when a certificate is removed. 49 // Will be called when a CA certificate is changed. 61 // Stores per-certificate error codes for import failures. 67 scoped_refptr<X509Certificate> certificate; member in struct:net::NSSCertDatabase::ImportCertFailure 72 // Constants that define which usages a certificate is trusted for. 74 // of certificate. 116 // Get a list of unique certificates in the certificate databas [all...] |
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client.cc | 153 writer.AppendString(properties.certificate); 172 writer.AppendString(properties.certificate); 192 writer.AppendString(properties.certificate);
|
H A D | shill_manager_client.h | 103 // A string containing a PEM-encoded X.509 certificate for use in verifying 105 std::string certificate; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_normalizer.cc | 82 using namespace ::onc::certificate; 86 RemoveEntryUnless(cert, ::onc::certificate::kType, !remove); 89 cert->GetStringWithoutPathExpansion(::onc::certificate::kType, &type);
|
H A D | onc_utils.cc | 326 cert->GetStringWithoutPathExpansion(certificate::kGUID, &guid); 328 cert->GetStringWithoutPathExpansion(certificate::kType, &cert_type); 329 if (cert_type != certificate::kServer && 330 cert_type != certificate::kAuthority) { 334 cert->GetStringWithoutPathExpansion(certificate::kX509, &x509_data); 431 LOG(ERROR) << "Some certificate references in the ONC policy for source " 454 LOG_IF(ERROR, !cert.get()) << "Couldn't create certificate from X509 data: " 466 LOG(ERROR) << "Couldn't resolve certificate reference " << guid_ref; 471 LOG(ERROR) << "Couldn't PEM-encode certificate with GUID " << guid_ref; 639 // certificate could [all...] |
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | platform_verification_flow_unittest.cc | 254 std::string certificate = local 260 certificate)); 276 const std::string& certificate) { 280 certificate_ = certificate; 273 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
|
H A D | fake_certificate.cc | 53 std::string* certificate) { 70 certificate); 52 GetFakeCertificate(const base::TimeDelta& expiry, std::string* certificate) argument
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | download_protection_service.h | 168 // Given a certificate and its immediate issuer certificate, generates the 170 // determine whether the certificate is whitelisted. 172 const net::X509Certificate& certificate,
|
/external/chromium_org/net/socket/ |
H A D | ssl_server_socket_nss.h | 28 scoped_refptr<X509Certificate> certificate,
|
H A D | ssl_server_socket_openssl.h | 30 scoped_refptr<X509Certificate> certificate,
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportdescriptionfactory.cc | 156 // the certificate's signature. 158 if (!identity_->certificate().GetSignatureDigestAlgorithm(&digest_alg)) { 159 LOG(LS_ERROR) << "Failed to retrieve the certificate's digest algorithm";
|
/external/openssl/crypto/cms/ |
H A D | cms_lib.c | 473 if (!X509_cmp(cch->d.certificate, cert)) 485 cch->d.certificate = cert; 579 if (!sk_X509_push(certs, cch->d.certificate)) 584 CRYPTO_add(&cch->d.certificate->references,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | Identity2Test.java | 86 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test 124 certArray = new ByteArrayInputStream(certificate
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedGenerator.java | 109 * Add a certificate to the certificate set to be included with the generated SignedData message. 111 * @param certificate the certificate to be included. 112 * @throws CMSException if the certificate cannot be encoded for adding. 115 X509CertificateHolder certificate) 118 certs.add(certificate.toASN1Structure()); 122 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message. 158 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message. 161 * @throws CMSException if the attribute certificate canno 114 addCertificate( X509CertificateHolder certificate) argument [all...] |
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_nss.cc | 49 bool VerifyCredentials(const std::string& certificate, argument 56 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) { 57 LOG(ERROR) << "Failed to parse certificate."; 65 // Parse into a certificate structure. 73 LOG(ERROR) << "Failed to parse certificate."; 77 // Check that the certificate is signed by trusted CA. 92 // Check that the device listed in the certificate is correct. 109 // Make sure that the certificate matches the unsigned data presented. 113 LOG(ERROR) << "Unable to extract public key from certificate.";
|
H A D | networking_private_crypto_openssl.cc | 44 bool VerifyCredentials(const std::string& certificate, argument 52 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) { 53 LOG(ERROR) << "Failed to parse certificate."; 62 LOG(ERROR) << "Failed to parse certificate."; 83 // Check that the certificate is signed by the trusted public key. 89 // Check that the device listed in the certificate is correct. 119 // Make sure that the certificate matches the unsigned data presented. 123 LOG(ERROR) << "Unable to extract public key from certificate.";
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | ServerTrustManager.java | 109 // Working down the chain, for every certificate in the chain, 110 // verify that the subject of the certificate is the issuer of the 111 // next certificate in the chain. 139 // Verify that the the last certificate in the chain was issued 146 System.out.println("Accepting self-signed certificate of remote server: " + 155 throw new CertificateException("root certificate not trusted of " + peerIdentities); 160 // Verify that the first certificate in the chain corresponds to 162 // Check if the certificate uses a wildcard indicating that subdomains are valid 177 // For every certificate in the chain, verify that the certificate 226 getSubjectAlternativeNames(X509Certificate certificate) argument [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CertSelectorTest.java | 446 * setCertificate(X509Certificate certificate) method testing. 451 TestCert cert_1 = new TestCert("same certificate"); 452 TestCert cert_2 = new TestCert("other certificate"); 460 assertTrue("The certificate should match the selection criteria.", 462 assertFalse("The certificate should not match the selection criteria.", 465 assertTrue("The certificate should match the selection criteria.", 475 TestCert cert_1 = new TestCert("same certificate"); 476 TestCert cert_2 = new TestCert("other certificate"); 481 assertEquals("The returned certificate should be equal to specified", 483 assertFalse("The returned certificate shoul [all...] |
/external/chromium_org/components/onc/ |
H A D | onc_constants.cc | 223 namespace certificate { namespace in namespace:onc 233 } // namespace certificate
|