HomeSort by relevance Sort by last modified time
    Searched refs:common_name (Results 26 - 50 of 59) sorted by null

12 3

  /external/chromium_org/third_party/libjingle/source/talk/base/
opensslidentity.h 76 const std::string& common_name);
117 static OpenSSLIdentity* Generate(const std::string& common_name);
nssidentity.h 104 static NSSIdentity* Generate(const std::string& common_name);
nssidentity.cc 205 NSSIdentity *NSSIdentity::Generate(const std::string &common_name) {
206 std::string subject_name_string = "CN=" + common_name;
  /external/chromium_org/net/cert/
nss_cert_database_unittest.cc 167 cert->subject().common_name);
214 cert->subject().common_name);
285 EXPECT_EQ("Test Root CA", cert->subject().common_name);
316 EXPECT_EQ("Test Root CA", cert->subject().common_name);
347 EXPECT_EQ("Test Root CA", cert->subject().common_name);
399 EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name);
401 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name);
406 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name);
422 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name);
435 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name);
    [all...]
x509_certificate_unittest.cc 162 EXPECT_EQ("www.google.com", subject.common_name);
173 EXPECT_EQ("Thawte SGC CA", issuer.common_name);
228 EXPECT_EQ("Go Daddy Secure Certification Authority", issuer.common_name);
272 EXPECT_EQ("www.thawte.com", subject.common_name);
283 EXPECT_EQ("thawte Extended Validation SSL CA", issuer.common_name);
324 EXPECT_EQ("Multivalue RDN Test", subject.common_name);
348 EXPECT_EQ("127.0.0.1", subject.common_name);
479 EXPECT_EQ("127.0.0.1", san_cert->subject().common_name);
926 const char* common_name; member in struct:net::CertificateNameVerifyTestData
    [all...]
x509_cert_types.h 60 std::string common_name; member in struct:net::CertPrincipal
x509_cert_types_mac.cc 270 SetSingle(common_names, &this->common_name);
281 return match(common_name, against.common_name) &&
x509_cert_types_win.cc 132 SetSingle(common_names, &this->common_name);
x509_util_openssl.cc 63 const std::string& common_name,
x509_util_unittest.cc 44 EXPECT_EQ("newer cert", certs[0]->subject().common_name);
46 EXPECT_EQ("older cert", certs[1]->subject().common_name);
48 EXPECT_EQ("not yet valid", certs[2]->subject().common_name);
50 EXPECT_EQ("expired", certs[3]->subject().common_name);
cert_verify_proc_win.cc 244 wchar_t* common_name = local
247 if (common_name[k] == L'\0')
255 int* common_name = local
258 if (common_name[k] == 0)
  /external/chromium_org/chromeos/network/
certificate_pattern.cc 54 IssuerSubjectPattern::IssuerSubjectPattern(const std::string& common_name,
58 : common_name_(common_name),
client_cert_util.cc 102 if (!pattern.common_name().empty() &&
103 pattern.common_name() != principal.common_name) {
  /external/chromium/net/base/
x509_cert_types.h 74 std::string common_name; member in struct:net::CertPrincipal
x509_cert_types_mac.cc 259 SetSingle(common_names, &this->common_name);
294 SetSingle(common_names, &this->common_name);
301 return match(common_name, against.common_name) &&
x509_cert_types_mac_unittest.cc 218 spamco.common_name = "SpamCo Dept. Of Certificization";
256 EXPECT_EQ("", verisign.common_name);
268 EXPECT_EQ("StartCom Certification Authority", startcom.common_name);
282 usertrust.common_name);
299 turktrust.common_name);
313 atrust.common_name);
329 entrust.common_name);
x509_certificate_win.cc 264 wchar_t* common_name = local
267 if (common_name[k] == L'\0')
275 int* common_name = local
278 if (common_name[k] == 0)
411 &principal->common_name, &principal->locality_name,
633 dns_names->push_back(subject_.common_name);
    [all...]
x509_certificate_unittest.cc 191 EXPECT_EQ("www.google.com", subject.common_name);
202 EXPECT_EQ("Thawte SGC CA", issuer.common_name);
266 EXPECT_EQ("Go Daddy Secure Certification Authority", issuer.common_name);
318 EXPECT_EQ("www.thawte.com", subject.common_name);
329 EXPECT_EQ("thawte Extended Validation SSL CA", issuer.common_name);
    [all...]
x509_certificate_openssl.cc 88 &principal->common_name);
403 dns_names->push_back(subject_.common_name);
  /external/chromium/chrome/browser/ssl/
ssl_error_info.cc 49 if (dns_names[i] == cert->subject().common_name)
66 UTF8ToUTF16(cert->subject().common_name),
  /external/chromium_org/content/browser/media/
webrtc_identity_store_unittest.cc 67 const std::string& common_name,
74 common_name,
  /external/chromium_org/net/tools/quic/test_tools/
quic_test_client.cc 59 const string& common_name() const { return common_name_; } function in class:__anon11589::RecordingProofVerifier
256 ->common_name();
  /external/chromium_org/content/browser/renderer_host/media/
webrtc_identity_service_host_unittest.cc 35 const std::string& common_name,
  /external/chromium_org/chrome/browser/ssl/
ssl_error_info.cc 50 if (dns_names[i] == cert->subject().common_name)
68 net::EscapeForHTML(UTF8ToUTF16(cert->subject().common_name)),
  /external/chromium_org/third_party/libjingle/source/talk/app/webrtc/
peerconnectioninterface.h 368 // |common_name| is the common name used to generate the certificate. If the
369 // certificate already exists in the store, |common_name| is ignored.
376 const std::string& common_name,

Completed in 635 milliseconds

12 3