/external/chromium_org/third_party/libjingle/source/talk/base/ |
opensslidentity.h | 76 const std::string& common_name); 117 static OpenSSLIdentity* Generate(const std::string& common_name);
|
nssidentity.h | 104 static NSSIdentity* Generate(const std::string& common_name);
|
nssidentity.cc | 205 NSSIdentity *NSSIdentity::Generate(const std::string &common_name) { 206 std::string subject_name_string = "CN=" + common_name;
|
/external/chromium_org/net/cert/ |
nss_cert_database_unittest.cc | 167 cert->subject().common_name); 214 cert->subject().common_name); 285 EXPECT_EQ("Test Root CA", cert->subject().common_name); 316 EXPECT_EQ("Test Root CA", cert->subject().common_name); 347 EXPECT_EQ("Test Root CA", cert->subject().common_name); 399 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name); 401 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); 406 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name); 422 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name); 435 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); [all...] |
x509_certificate_unittest.cc | 162 EXPECT_EQ("www.google.com", subject.common_name); 173 EXPECT_EQ("Thawte SGC CA", issuer.common_name); 228 EXPECT_EQ("Go Daddy Secure Certification Authority", issuer.common_name); 272 EXPECT_EQ("www.thawte.com", subject.common_name); 283 EXPECT_EQ("thawte Extended Validation SSL CA", issuer.common_name); 324 EXPECT_EQ("Multivalue RDN Test", subject.common_name); 348 EXPECT_EQ("127.0.0.1", subject.common_name); 479 EXPECT_EQ("127.0.0.1", san_cert->subject().common_name); 926 const char* common_name; member in struct:net::CertificateNameVerifyTestData [all...] |
x509_cert_types.h | 60 std::string common_name; member in struct:net::CertPrincipal
|
x509_cert_types_mac.cc | 270 SetSingle(common_names, &this->common_name); 281 return match(common_name, against.common_name) &&
|
x509_cert_types_win.cc | 132 SetSingle(common_names, &this->common_name);
|
x509_util_openssl.cc | 63 const std::string& common_name,
|
x509_util_unittest.cc | 44 EXPECT_EQ("newer cert", certs[0]->subject().common_name); 46 EXPECT_EQ("older cert", certs[1]->subject().common_name); 48 EXPECT_EQ("not yet valid", certs[2]->subject().common_name); 50 EXPECT_EQ("expired", certs[3]->subject().common_name);
|
cert_verify_proc_win.cc | 244 wchar_t* common_name = local 247 if (common_name[k] == L'\0') 255 int* common_name = local 258 if (common_name[k] == 0)
|
/external/chromium_org/chromeos/network/ |
certificate_pattern.cc | 54 IssuerSubjectPattern::IssuerSubjectPattern(const std::string& common_name, 58 : common_name_(common_name),
|
client_cert_util.cc | 102 if (!pattern.common_name().empty() && 103 pattern.common_name() != principal.common_name) {
|
/external/chromium/net/base/ |
x509_cert_types.h | 74 std::string common_name; member in struct:net::CertPrincipal
|
x509_cert_types_mac.cc | 259 SetSingle(common_names, &this->common_name); 294 SetSingle(common_names, &this->common_name); 301 return match(common_name, against.common_name) &&
|
x509_cert_types_mac_unittest.cc | 218 spamco.common_name = "SpamCo Dept. Of Certificization"; 256 EXPECT_EQ("", verisign.common_name); 268 EXPECT_EQ("StartCom Certification Authority", startcom.common_name); 282 usertrust.common_name); 299 turktrust.common_name); 313 atrust.common_name); 329 entrust.common_name);
|
x509_certificate_win.cc | 264 wchar_t* common_name = local 267 if (common_name[k] == L'\0') 275 int* common_name = local 278 if (common_name[k] == 0) 411 &principal->common_name, &principal->locality_name, 633 dns_names->push_back(subject_.common_name); [all...] |
x509_certificate_unittest.cc | 191 EXPECT_EQ("www.google.com", subject.common_name); 202 EXPECT_EQ("Thawte SGC CA", issuer.common_name); 266 EXPECT_EQ("Go Daddy Secure Certification Authority", issuer.common_name); 318 EXPECT_EQ("www.thawte.com", subject.common_name); 329 EXPECT_EQ("thawte Extended Validation SSL CA", issuer.common_name); [all...] |
x509_certificate_openssl.cc | 88 &principal->common_name); 403 dns_names->push_back(subject_.common_name);
|
/external/chromium/chrome/browser/ssl/ |
ssl_error_info.cc | 49 if (dns_names[i] == cert->subject().common_name) 66 UTF8ToUTF16(cert->subject().common_name),
|
/external/chromium_org/content/browser/media/ |
webrtc_identity_store_unittest.cc | 67 const std::string& common_name, 74 common_name,
|
/external/chromium_org/net/tools/quic/test_tools/ |
quic_test_client.cc | 59 const string& common_name() const { return common_name_; } function in class:__anon11589::RecordingProofVerifier 256 ->common_name();
|
/external/chromium_org/content/browser/renderer_host/media/ |
webrtc_identity_service_host_unittest.cc | 35 const std::string& common_name,
|
/external/chromium_org/chrome/browser/ssl/ |
ssl_error_info.cc | 50 if (dns_names[i] == cert->subject().common_name) 68 net::EscapeForHTML(UTF8ToUTF16(cert->subject().common_name)),
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
peerconnectioninterface.h | 368 // |common_name| is the common name used to generate the certificate. If the 369 // certificate already exists in the store, |common_name| is ignored. 376 const std::string& common_name,
|