Searched refs:certificate (Results 76 - 100 of 163) sorted by relevance

1234567

/external/chromium_org/third_party/webrtc/base/
H A Dsslfingerprint.cc28 return Create(algorithm, &(identity->certificate()));
H A Dopenssladapter.cc645 X509* certificate = SSL_get_peer_certificate(ssl);
646 if (!certificate)
654 X509_print_ex(mem, certificate, XN_FLAG_SEP_CPLUS_SPC, X509_FLAG_NO_HEADER);
669 int extension_count = X509_get_ext_count(certificate);
671 X509_EXTENSION* extension = X509_get_ext(certificate, i);
727 && ((subject = X509_get_subject_name(certificate)) != NULL)
735 X509_free(certificate);
739 LOG(LS_WARNING) << "TLS certificate check FAILED. "
803 LOG(LS_INFO) << "Error with certificate at depth: " << depth;
826 LOG(LS_INFO) << "validated certificate usin
[all...]
H A Dfakesslidentity.h89 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLX509CRL.java288 public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { argument
289 if (certificate instanceof OpenSSLX509Certificate) {
290 OpenSSLX509Certificate osslCert = (OpenSSLX509Certificate) certificate;
301 return getRevokedCertificate(certificate.getSerialNumber());
358 throw new RuntimeException("cannot convert certificate", e);
/external/chromium_org/net/cert/
H A Dasn1_util.cc114 base::StringPiece certificate; local
115 if (!GetElement(cert, kSEQUENCE, &certificate))
118 // We don't allow junk after the certificate.
123 if (!GetElement(&certificate, kSEQUENCE, &tbs_certificate))
H A Dnss_cert_database_unittest.cc231 // Importing a PKCS#12 file with a certificate but no corresponding
245 // Now import a PKCS#12 file with just a certificate but no private key.
386 EXPECT_EQ(certs[0], failed[0].certificate);
409 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name);
410 EXPECT_EQ(ERR_FAILED, failed[0].net_error); // The certificate expired.
411 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name);
445 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name);
447 EXPECT_EQ("DOD CA-17", failed[1].certificate->subject().common_name);
448 EXPECT_EQ(ERR_FAILED, failed[1].net_error); // The certificate expired.
449 EXPECT_EQ("www.us.army.mil", failed[2].certificate
[all...]
H A Dnss_cert_database.h32 // Provides functions to manipulate the NSS certificate stores.
33 // Forwards notifications about certificate changes to the global CertDatabase
41 // Will be called when a new certificate is added.
46 // Will be called when a certificate is removed.
49 // Will be called when a CA certificate is changed.
61 // Stores per-certificate error codes for import failures.
67 scoped_refptr<X509Certificate> certificate; member in struct:net::NSSCertDatabase::ImportCertFailure
72 // Constants that define which usages a certificate is trusted for.
74 // of certificate.
116 // Get a list of unique certificates in the certificate databas
[all...]
/external/chromium_org/chromeos/dbus/
H A Dshill_manager_client.cc153 writer.AppendString(properties.certificate);
172 writer.AppendString(properties.certificate);
192 writer.AppendString(properties.certificate);
H A Dshill_manager_client.h103 // A string containing a PEM-encoded X.509 certificate for use in verifying
105 std::string certificate; member in struct:chromeos::ShillManagerClient::VerificationProperties
/external/chromium_org/chromeos/network/onc/
H A Donc_normalizer.cc82 using namespace ::onc::certificate;
86 RemoveEntryUnless(cert, ::onc::certificate::kType, !remove);
89 cert->GetStringWithoutPathExpansion(::onc::certificate::kType, &type);
H A Donc_utils.cc326 cert->GetStringWithoutPathExpansion(certificate::kGUID, &guid);
328 cert->GetStringWithoutPathExpansion(certificate::kType, &cert_type);
329 if (cert_type != certificate::kServer &&
330 cert_type != certificate::kAuthority) {
334 cert->GetStringWithoutPathExpansion(certificate::kX509, &x509_data);
431 LOG(ERROR) << "Some certificate references in the ONC policy for source "
454 LOG_IF(ERROR, !cert.get()) << "Couldn't create certificate from X509 data: "
466 LOG(ERROR) << "Couldn't resolve certificate reference " << guid_ref;
471 LOG(ERROR) << "Couldn't PEM-encode certificate with GUID " << guid_ref;
639 // certificate could
[all...]
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dplatform_verification_flow_unittest.cc254 std::string certificate = local
260 certificate));
276 const std::string& certificate) {
280 certificate_ = certificate;
273 FakeChallengeCallback(PlatformVerificationFlow::Result result, const std::string& salt, const std::string& signature, const std::string& certificate) argument
H A Dfake_certificate.cc53 std::string* certificate) {
70 certificate);
52 GetFakeCertificate(const base::TimeDelta& expiry, std::string* certificate) argument
/external/chromium_org/chrome/browser/safe_browsing/
H A Ddownload_protection_service.h168 // Given a certificate and its immediate issuer certificate, generates the
170 // determine whether the certificate is whitelisted.
172 const net::X509Certificate& certificate,
/external/chromium_org/net/socket/
H A Dssl_server_socket_nss.h28 scoped_refptr<X509Certificate> certificate,
H A Dssl_server_socket_openssl.h30 scoped_refptr<X509Certificate> certificate,
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dtransportdescriptionfactory.cc156 // the certificate's signature.
158 if (!identity_->certificate().GetSignatureDigestAlgorithm(&digest_alg)) {
159 LOG(LS_ERROR) << "Failed to retrieve the certificate's digest algorithm";
/external/openssl/crypto/cms/
H A Dcms_lib.c473 if (!X509_cmp(cch->d.certificate, cert))
485 cch->d.certificate = cert;
579 if (!sk_X509_push(certs, cch->d.certificate))
584 CRYPTO_add(&cch->d.certificate->references,
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DIdentity2Test.java86 String certificate = "-----BEGIN CERTIFICATE-----\n" field in class:Identity2Test
124 certArray = new ByteArrayInputStream(certificate
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
H A DCMSSignedGenerator.java109 * Add a certificate to the certificate set to be included with the generated SignedData message.
111 * @param certificate the certificate to be included.
112 * @throws CMSException if the certificate cannot be encoded for adding.
115 X509CertificateHolder certificate)
118 certs.add(certificate.toASN1Structure());
122 * Add the certificates in certStore to the certificate set to be included with the generated SignedData message.
158 * Add the attribute certificates in attrStore to the certificate set to be included with the generated SignedData message.
161 * @throws CMSException if the attribute certificate canno
114 addCertificate( X509CertificateHolder certificate) argument
[all...]
/external/chromium_org/chrome/common/extensions/api/networking_private/
H A Dnetworking_private_crypto_nss.cc49 bool VerifyCredentials(const std::string& certificate, argument
56 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) {
57 LOG(ERROR) << "Failed to parse certificate.";
65 // Parse into a certificate structure.
73 LOG(ERROR) << "Failed to parse certificate.";
77 // Check that the certificate is signed by trusted CA.
92 // Check that the device listed in the certificate is correct.
109 // Make sure that the certificate matches the unsigned data presented.
113 LOG(ERROR) << "Unable to extract public key from certificate.";
H A Dnetworking_private_crypto_openssl.cc44 bool VerifyCredentials(const std::string& certificate, argument
52 if (!GetDERFromPEM(certificate, "CERTIFICATE", &cert_data)) {
53 LOG(ERROR) << "Failed to parse certificate.";
62 LOG(ERROR) << "Failed to parse certificate.";
83 // Check that the certificate is signed by the trusted public key.
89 // Check that the device listed in the certificate is correct.
119 // Make sure that the certificate matches the unsigned data presented.
123 LOG(ERROR) << "Unable to extract public key from certificate.";
/external/smack/src/org/jivesoftware/smack/
H A DServerTrustManager.java109 // Working down the chain, for every certificate in the chain,
110 // verify that the subject of the certificate is the issuer of the
111 // next certificate in the chain.
139 // Verify that the the last certificate in the chain was issued
146 System.out.println("Accepting self-signed certificate of remote server: " +
155 throw new CertificateException("root certificate not trusted of " + peerIdentities);
160 // Verify that the first certificate in the chain corresponds to
162 // Check if the certificate uses a wildcard indicating that subdomains are valid
177 // For every certificate in the chain, verify that the certificate
226 getSubjectAlternativeNames(X509Certificate certificate) argument
[all...]
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
H A DX509CertSelectorTest.java446 * setCertificate(X509Certificate certificate) method testing.
451 TestCert cert_1 = new TestCert("same certificate");
452 TestCert cert_2 = new TestCert("other certificate");
460 assertTrue("The certificate should match the selection criteria.",
462 assertFalse("The certificate should not match the selection criteria.",
465 assertTrue("The certificate should match the selection criteria.",
475 TestCert cert_1 = new TestCert("same certificate");
476 TestCert cert_2 = new TestCert("other certificate");
481 assertEquals("The returned certificate should be equal to specified",
483 assertFalse("The returned certificate shoul
[all...]
/external/chromium_org/components/onc/
H A Donc_constants.cc223 namespace certificate { namespace in namespace:onc
233 } // namespace certificate

Completed in 701 milliseconds

1234567