Searched refs:certificate (Results 1 - 25 of 163) sorted by relevance

1234567

/external/chromium_org/chrome/browser/resources/options/
H A Dcertificate_manager.css16 #certificate-manager-content-area {
20 #certificate-manager-content-area .subpages-tab-contents {
25 .certificate-tree-table {
29 .certificate-tree {
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_win.cc12 const X509Certificate* certificate) {
11 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
H A Dopenssl_platform_key.h15 // to |certificate|'s public key. Then wraps it in an OpenSSL EVP_PKEY
22 const X509Certificate* certificate);
H A Dssl_client_auth_cache.cc22 scoped_refptr<X509Certificate>* certificate) {
23 DCHECK(certificate);
29 *certificate = iter->second;
20 Lookup( const HostPortPair& server, scoped_refptr<X509Certificate>* certificate) argument
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dfake_certificate.h15 // Creates a self-signed |certificate| based on constant key material. The
16 // certificate |expiry| is relative to the current time. The certificate will
21 std::string* certificate);
H A Dattestation_policy_observer_unittest.cc108 // require that a certificate exists, |certificate| will be used.
109 void SetupMocks(int mock_options, const std::string& certificate) { argument
116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate))));
137 UploadCertificate(new_key ? "fake_cert" : certificate, _))
197 std::string certificate; local
199 &certificate));
200 SetupMocks(MOCK_KEY_EXISTS, certificate);
205 std::string certificate; local
207 &certificate));
213 std::string certificate; local
221 std::string certificate; local
[all...]
H A Dattestation_policy_observer.h34 // changes. The CloudPolicyClient is used to upload the device certificate to
60 // Gets a new certificate for the Enterprise Machine Key (EMK).
63 // Gets the existing EMK certificate and sends it to CheckCertificateExpiry.
66 // Checks if the given certificate is expired and, if so, get a new one.
67 void CheckCertificateExpiry(const std::string& certificate);
69 // Uploads a certificate to the policy server.
70 void UploadCertificate(const std::string& certificate);
72 // Checks if a certificate has already been uploaded and, if not, upload.
73 void CheckIfUploaded(const std::string& certificate,
79 // Called when a certificate uploa
[all...]
/external/chromium_org/net/cert/
H A Dx509_certificate_net_log_param.h16 const X509Certificate* certificate,
H A Dtest_root_certs_nss.cc21 // for a certificate whose trust status has been changed by the
25 // Creates a new TrustEntry by incrementing the reference to |certificate|
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry
34 // The temporary root certificate.
44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument
46 : certificate_(CERT_DupCertificate(certificate)),
54 bool TestRootCerts::Add(X509Certificate* certificate) { argument
56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle());
59 CERTCertificate* cert_handle = certificate
[all...]
H A Dtest_root_certs_android.cc14 bool TestRootCerts::Add(X509Certificate* certificate) { argument
16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
H A Dtest_root_certs_openssl.cc17 bool TestRootCerts::Add(X509Certificate* certificate) { argument
19 certificate->os_cert_handle())) {
29 temporary_roots_.push_back(certificate);
H A Dx509_certificate_net_log_param.cc15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, argument
20 certificate->GetPEMEncodedChain(&encoded_chain);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
H A DAuthorityKeyIdentifierStructure.java65 X509Certificate certificate)
70 if (certificate.getVersion() != 3)
72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId());
90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
98 info, new GeneralNames(genName), certificate
64 fromCertificate( X509Certificate certificate) argument
132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument
[all...]
/external/chromium_org/ppapi/thunk/
H A Dppb_x509_certificate_private_thunk.cc31 PP_Bool Initialize(PP_Resource certificate, argument
34 EnterX509CertificatePrivate enter(certificate, true);
40 PP_Var GetField(PP_Resource certificate, argument
42 EnterX509CertificatePrivate enter(certificate, true);
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl.cc100 const base::DictionaryValue* certificate = NULL; local
101 certificates->GetDictionary(i, &certificate);
102 DCHECK(certificate != NULL);
104 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local
107 *certificate,
111 LOG(ERROR) << "Cannot parse certificate at index " << i;
113 VLOG(2) << "Successfully imported certificate at index " << i;
132 // Separate the nickname stored in the certificate at the colon, since
144 // Now we find the private key for this certificate an
192 ParseAndStoreCertificate( bool allow_trust_imports, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb, net::CertificateList* onc_trusted_certificates) argument
233 ParseServerOrCaCertificate( bool allow_trust_imports, const std::string& cert_type, const std::string& guid, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb, net::CertificateList* onc_trusted_certificates) argument
342 ParseClientCertificate( const std::string& guid, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
H A DIssuerAndSerialNumber.java73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
72 IssuerAndSerialNumber( Certificate certificate) argument
82 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyStorePrivateKeyEntryTest.java62 Certificate certificate = cf.generateCertificate(certArray);
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
H A DOkHostnameVerifier.java70 public boolean verify(String host, X509Certificate certificate) { argument
72 ? verifyIpAddress(host, certificate)
73 : verifyHostName(host, certificate);
81 * Returns true if {@code certificate} matches {@code ipAddress}.
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument
84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) {
93 * Returns true if {@code certificate} matches {@code hostName}.
95 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument
98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) {
106 X500Principal principal = certificate
117 getSubjectAltNames(X509Certificate certificate, int type) argument
[all...]
/external/chromium_org/ppapi/tests/
H A Dtest_x509_certificate_private.cc20 const pp::X509CertificatePrivate& certificate,
23 pp::Var field_value = certificate.GetField(field);
30 const pp::X509CertificatePrivate& certificate,
33 pp::Var field_value = certificate.GetField(field);
41 const pp::X509CertificatePrivate& certificate,
45 pp::Var field_value = certificate.GetField(field);
57 const pp::X509CertificatePrivate& certificate,
59 return certificate.GetField(field).is_null();
154 pp::X509CertificatePrivate certificate(instance_);
155 bool successful = certificate
19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument
29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument
40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument
56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument
[all...]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
H A DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) argument
75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider);
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
95 return new JcaContentVerifierProviderBuilder().build(certificate);
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
H A DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) argument
45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider());
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
65 return new JcaContentVerifierProviderBuilder().build(certificate);
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate);
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
/external/chromium_org/content/renderer/media/
H A Dpeer_connection_identity_service.cc43 const std::string& certificate,
45 pending_observer_->OnSuccess(certificate, private_key);
42 OnIdentityReady( const std::string& certificate, const std::string& private_key) argument
/external/chromium_org/net/socket/
H A Dssl_server_socket.h46 // The caller must provide the server certificate and private key to use.
50 // It takes a reference to |certificate|.
58 X509Certificate* certificate,
/external/chromium_org/third_party/webrtc/base/
H A Dopensslidentity.h54 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object,
79 // Compute the digest of the certificate given algorithm
85 // Compute the digest of a certificate as an X509 *
97 // certificate to be self-signed.
109 // Holds a keypair and certificate together, and a method to generate
116 const std::string& certificate);
119 virtual const OpenSSLCertificate& certificate() const { function in class:rtc::OpenSSLIdentity
128 // Configure an SSL context object to use our key and certificate.
133 OpenSSLCertificate* certificate)
134 : key_pair_(key_pair), certificate_(certificate) {
132 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument
[all...]
H A Dnssidentity.cc159 // self-signed), certificate transparency logging, or many other attributes.
161 // certificate chains. Users should be advised not to deploy chained
172 // (e.g. certificate is corrupted).
341 CERTCertificate *certificate = NULL; local
374 LOG(LS_ERROR) << "Couldn't create certificate signing request";
393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq);
394 if (!certificate) {
395 LOG(LS_ERROR) << "Couldn't create certificate";
399 arena = certificate->arena;
401 rv = SECOID_SetAlgorithmID(arena, &certificate
451 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument
513 NSSCertificate &NSSIdentity::certificate() const { function in class:rtc::NSSIdentity
[all...]

Completed in 583 milliseconds

1234567