/external/chromium_org/chrome/browser/resources/options/ |
H A D | certificate_manager.css | 16 #certificate-manager-content-area { 20 #certificate-manager-content-area .subpages-tab-contents { 25 .certificate-tree-table { 29 .certificate-tree {
|
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_win.cc | 12 const X509Certificate* certificate) { 11 FetchClientCertPrivateKey( const X509Certificate* certificate) argument
|
H A D | openssl_platform_key.h | 15 // to |certificate|'s public key. Then wraps it in an OpenSSL EVP_PKEY 22 const X509Certificate* certificate);
|
H A D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second; 20 Lookup( const HostPortPair& server, scoped_refptr<X509Certificate>* certificate) argument
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | fake_certificate.h | 15 // Creates a self-signed |certificate| based on constant key material. The 16 // certificate |expiry| is relative to the current time. The certificate will 21 std::string* certificate);
|
H A D | attestation_policy_observer_unittest.cc | 108 // require that a certificate exists, |certificate| will be used. 109 void SetupMocks(int mock_options, const std::string& certificate) { argument 116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 197 std::string certificate; local 199 &certificate)); 200 SetupMocks(MOCK_KEY_EXISTS, certificate); 205 std::string certificate; local 207 &certificate)); 213 std::string certificate; local 221 std::string certificate; local [all...] |
H A D | attestation_policy_observer.h | 34 // changes. The CloudPolicyClient is used to upload the device certificate to 60 // Gets a new certificate for the Enterprise Machine Key (EMK). 63 // Gets the existing EMK certificate and sends it to CheckCertificateExpiry. 66 // Checks if the given certificate is expired and, if so, get a new one. 67 void CheckCertificateExpiry(const std::string& certificate); 69 // Uploads a certificate to the policy server. 70 void UploadCertificate(const std::string& certificate); 72 // Checks if a certificate has already been uploaded and, if not, upload. 73 void CheckIfUploaded(const std::string& certificate, 79 // Called when a certificate uploa [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_certificate_net_log_param.h | 16 const X509Certificate* certificate,
|
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 25 // Creates a new TrustEntry by incrementing the reference to |certificate| 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 34 // The temporary root certificate. 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, argument 46 : certificate_(CERT_DupCertificate(certificate)), 54 bool TestRootCerts::Add(X509Certificate* certificate) { argument 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); 59 CERTCertificate* cert_handle = certificate [all...] |
H A D | test_root_certs_android.cc | 14 bool TestRootCerts::Add(X509Certificate* certificate) { argument 16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
|
H A D | test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { argument 19 certificate->os_cert_handle())) { 29 temporary_roots_.push_back(certificate);
|
H A D | x509_certificate_net_log_param.cc | 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, argument 20 certificate->GetPEMEncodedChain(&encoded_chain);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
H A D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate 64 fromCertificate( X509Certificate certificate) argument 132 AuthorityKeyIdentifierStructure( X509Certificate certificate) argument [all...] |
/external/chromium_org/ppapi/thunk/ |
H A D | ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, argument 34 EnterX509CertificatePrivate enter(certificate, true); 40 PP_Var GetField(PP_Resource certificate, argument 42 EnterX509CertificatePrivate enter(certificate, true);
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.cc | 100 const base::DictionaryValue* certificate = NULL; local 101 certificates->GetDictionary(i, &certificate); 102 DCHECK(certificate != NULL); 104 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local 107 *certificate, 111 LOG(ERROR) << "Cannot parse certificate at index " << i; 113 VLOG(2) << "Successfully imported certificate at index " << i; 132 // Separate the nickname stored in the certificate at the colon, since 144 // Now we find the private key for this certificate an 192 ParseAndStoreCertificate( bool allow_trust_imports, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb, net::CertificateList* onc_trusted_certificates) argument 233 ParseServerOrCaCertificate( bool allow_trust_imports, const std::string& cert_type, const std::string& guid, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb, net::CertificateList* onc_trusted_certificates) argument 342 ParseClientCertificate( const std::string& guid, const base::DictionaryValue& certificate, net::NSSCertDatabase* nssdb) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | IssuerAndSerialNumber.java | 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber(); 72 IssuerAndSerialNumber( Certificate certificate) argument 82 IssuerAndSerialNumber( X509CertificateStructure certificate) argument
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStorePrivateKeyEntryTest.java | 62 Certificate certificate = cf.generateCertificate(certArray); 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate });
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 70 public boolean verify(String host, X509Certificate certificate) { argument 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { argument 84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { 93 * Returns true if {@code certificate} matches {@code hostName}. 95 private boolean verifyHostName(String hostName, X509Certificate certificate) { argument 98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) { 106 X500Principal principal = certificate 117 getSubjectAltNames(X509Certificate certificate, int type) argument [all...] |
/external/chromium_org/ppapi/tests/ |
H A D | test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, 23 pp::Var field_value = certificate.GetField(field); 30 const pp::X509CertificatePrivate& certificate, 33 pp::Var field_value = certificate.GetField(field); 41 const pp::X509CertificatePrivate& certificate, 45 pp::Var field_value = certificate.GetField(field); 57 const pp::X509CertificatePrivate& certificate, 59 return certificate.GetField(field).is_null(); 154 pp::X509CertificatePrivate certificate(instance_); 155 bool successful = certificate 19 FieldMatchesString( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const std::string& expected) argument 29 FieldMatchesDouble( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, double expected) argument 40 FieldMatchesBuffer( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field, const char* expected, uint32_t expected_length) argument 56 FieldIsNull( const pp::X509CertificatePrivate& certificate, PP_X509Certificate_Private_Field field) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
H A D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) argument 75 return new SignerInformationVerifier(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvider); 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 130 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
H A D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) argument 45 return new SignerInformationVerifier(new DefaultCMSSignatureAlgorithmNameGenerator(), new DefaultSignatureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.createDigestCalculatorProvider()); 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 100 return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate);
|
/external/chromium_org/content/renderer/media/ |
H A D | peer_connection_identity_service.cc | 43 const std::string& certificate, 45 pending_observer_->OnSuccess(certificate, private_key); 42 OnIdentityReady( const std::string& certificate, const std::string& private_key) argument
|
/external/chromium_org/net/socket/ |
H A D | ssl_server_socket.h | 46 // The caller must provide the server certificate and private key to use. 50 // It takes a reference to |certificate|. 58 X509Certificate* certificate,
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslidentity.h | 54 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 79 // Compute the digest of the certificate given algorithm 85 // Compute the digest of a certificate as an X509 * 97 // certificate to be self-signed. 109 // Holds a keypair and certificate together, and a method to generate 116 const std::string& certificate); 119 virtual const OpenSSLCertificate& certificate() const { function in class:rtc::OpenSSLIdentity 128 // Configure an SSL context object to use our key and certificate. 133 OpenSSLCertificate* certificate) 134 : key_pair_(key_pair), certificate_(certificate) { 132 OpenSSLIdentity(OpenSSLKeyPair* key_pair, OpenSSLCertificate* certificate) argument [all...] |
H A D | nssidentity.cc | 159 // self-signed), certificate transparency logging, or many other attributes. 161 // certificate chains. Users should be advised not to deploy chained 172 // (e.g. certificate is corrupted). 341 CERTCertificate *certificate = NULL; local 374 LOG(LS_ERROR) << "Couldn't create certificate signing request"; 393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); 394 if (!certificate) { 395 LOG(LS_ERROR) << "Couldn't create certificate"; 399 arena = certificate->arena; 401 rv = SECOID_SetAlgorithmID(arena, &certificate 451 FromPEMStrings(const std::string& private_key, const std::string& certificate) argument 513 NSSCertificate &NSSIdentity::certificate() const { function in class:rtc::NSSIdentity [all...] |