/external/chromium/third_party/libjingle/source/talk/base/ |
sslidentity.cc | 62 SSLIdentity* SSLIdentity::Generate(const std::string& common_name) { 63 return OpenSSLIdentity::Generate(common_name);
|
sslidentity.h | 72 // common_name is non-empty, it will be used for the certificate's 76 static SSLIdentity* Generate(const std::string& common_name);
|
opensslidentity.h | 75 const std::string& common_name); 105 static OpenSSLIdentity* Generate(const std::string& common_name);
|
opensslidentity.cc | 89 static X509* MakeCertificate(EVP_PKEY* pkey, const char* common_name) { 90 LOG(LS_INFO) << "Making certificate for " << common_name; 117 // arbitrary common_name. Note that this certificate goes out in 122 (unsigned char*)common_name, -1, -1, 0) || 191 OpenSSLKeyPair* key_pair, const std::string& common_name) { 192 std::string actual_common_name = common_name; 251 OpenSSLIdentity* OpenSSLIdentity::Generate(const std::string& common_name) { 255 OpenSSLCertificate::Generate(key_pair, common_name);
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/test/ |
fakedtlsidentityservice.h | 70 Request(const std::string& common_name, 72 : common_name(common_name), observer(observer) {} 74 std::string common_name; member in struct:FakeIdentityService::Request 87 const std::string& common_name, 89 MessageData* msg = new MessageData(Request(common_name, observer)); 112 GenerateIdentity(message_data->data().common_name, &cert, &key); 124 const std::string& common_name,
|
/external/chromium_org/content/renderer/media/ |
webrtc_identity_service.cc | 17 const std::string& common_name, 23 common_name(common_name), 49 const std::string& common_name, 57 common_name, 130 request_info.common_name))) {
|
peer_connection_identity_service.cc | 23 const std::string& common_name, 34 common_name,
|
webrtc_identity_service.h | 36 // |identity_name| and |common_name| have the same meaning as in 46 const std::string& common_name, 68 const std::string& common_name, 76 std::string common_name; member in struct:content::WebRTCIdentityService::RequestInfo
|
peer_connection_identity_service.h | 29 const std::string& common_name,
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslidentity.cc | 114 SSLIdentity* SSLIdentity::Generate(const std::string& common_name) { 129 SSLIdentity* SSLIdentity::Generate(const std::string& common_name) { 130 return OpenSSLIdentity::Generate(common_name); 144 SSLIdentity* SSLIdentity::Generate(const std::string& common_name) { 145 return NSSIdentity::Generate(common_name);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
signature_util_win_unittest.cc | 59 EXPECT_EQ("Joe's-Software-Emporium", certs[0]->subject().common_name); 60 EXPECT_EQ("Root Agency", certs[1]->subject().common_name); 77 EXPECT_EQ("Google Inc", certs[0]->subject().common_name); 79 certs[1]->subject().common_name);
|
/external/chromium/net/base/ |
cert_database_nss_unittest.cc | 176 cert->subject().common_name); 205 EXPECT_EQ("Test CA", cert->subject().common_name); 237 EXPECT_EQ("Test CA", cert->subject().common_name); 268 EXPECT_EQ("Test CA", cert->subject().common_name); 320 EXPECT_EQ("www.us.army.mil", failed[0].certificate->subject().common_name); 325 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name); 326 EXPECT_EQ("DOD CA-17", cert_list[1]->subject().common_name); 342 EXPECT_EQ("DoD Root CA 2", cert_list[0]->subject().common_name); 355 EXPECT_EQ("DoD Root CA 2", failed[0].certificate->subject().common_name); 357 EXPECT_EQ("www.us.army.mil", failed[1].certificate->subject().common_name); [all...] |
x509_cert_types.cc | 33 CertPrincipal::CertPrincipal(const std::string& name) : common_name(name) {} 39 if (!common_name.empty()) 40 return common_name;
|
/external/chromium_org/content/browser/media/ |
webrtc_identity_store_backend.cc | 29 db->DoesColumnExist(kWebRTCIdentityStoreDBName, "common_name") && 43 "common_name TEXT NOT NULL," 63 Identity(const std::string& common_name, 66 : common_name(common_name), 71 Identity(const std::string& common_name, 75 : common_name(common_name), 80 std::string common_name; member in struct:content::WebRTCIdentityStoreBackend::Identity 89 const std::string& common_name, 100 std::string common_name; member in struct:content::WebRTCIdentityStoreBackend::PendingFindRequest [all...] |
webrtc_identity_store.h | 50 // |common_name| if such an identity does not exist. 51 // If the given |common_name| is different from the common name in the cached 59 // |common_name| is the common name used to generate the certificate and will 69 const std::string& common_name, 98 const std::string& common_name);
|
webrtc_identity_store_backend.h | 44 // Finds the identity with |origin|, |identity_name|, and |common_name| from 48 // |common_name| is the common name used to generate the certificate; 54 const std::string& common_name, 61 // |common_name| is the common name used to generate the certificate; 67 const std::string& common_name,
|
webrtc_identity_store.cc | 34 // Generates a new identity using |common_name| which expires after 36 static void GenerateIdentityWorker(const std::string& common_name, 45 "CN=" + common_name, 80 const std::string& common_name) 83 common_name_(common_name) {} 185 const std::string& common_name, 189 FindRequest(origin, identity_name, common_name); 193 request = new WebRTCIdentityRequest(origin, identity_name, common_name); 198 common_name, 304 const std::string& common_name) { [all...] |
/external/chromium_org/net/cert/ |
x509_cert_types_unittest.cc | 20 spamco.common_name = "SpamCo Dept. Of Certificization"; 60 EXPECT_EQ("", verisign.common_name); 72 EXPECT_EQ("StartCom Certification Authority", startcom.common_name); 86 usertrust.common_name); 103 turktrust.common_name); 117 atrust.common_name); 133 entrust.common_name);
|
x509_util_openssl.cc | 41 const std::string& common_name, 70 // Because |common_name| only contains a common name and starts with 'CN=', 75 if (common_name.size() < kCommonNamePrefixLen || 76 strncmp(common_name.c_str(), kCommonNamePrefix, kCommonNamePrefixLen)) { 80 if (common_name.size() > INT_MAX) { 85 reinterpret_cast<unsigned char*>(const_cast<char*>(common_name.data())) + 88 static_cast<int>(common_name.size() - kCommonNamePrefixLen); 98 LOG(ERROR) << "Can't parse common name: " << common_name.c_str(); 272 const std::string& common_name, 281 common_name, [all...] |
x509_cert_types.cc | 36 CertPrincipal::CertPrincipal(const std::string& name) : common_name(name) {} 42 if (!common_name.empty()) 43 return common_name;
|
cert_verify_proc.h | 98 const std::string& common_name,
|
x509_util_nss_unittest.cc | 119 char* common_name = CERT_GetCommonName(&nss_cert->subject); local 120 ASSERT_TRUE(common_name); 121 EXPECT_STREQ("anonymous.invalid", common_name); 122 PORT_Free(common_name);
|
/external/chromium_org/content/browser/renderer_host/media/ |
webrtc_identity_service_host.h | 55 const std::string& common_name);
|
webrtc_identity_service_host.cc | 43 const std::string& common_name) { 62 common_name,
|
/external/chromium_org/chromeos/network/ |
certificate_pattern.h | 24 IssuerSubjectPattern(const std::string& common_name, 45 const std::string& common_name() const { function in class:chromeos::IssuerSubjectPattern
|