/external/chromium_org/net/cert/ |
x509_util_openssl_unittest.cc | 8 #include "net/cert/x509_util.h" 92 EXPECT_TRUE(x509_util::IsSupportedValidityRange(now, now)); 93 EXPECT_FALSE(x509_util::IsSupportedValidityRange( 108 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_old, too_old)); 109 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_old, now)); 111 EXPECT_FALSE(x509_util::IsSupportedValidityRange(now, too_late)); 112 EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_late, too_late)); 124 x509_util::CreateDomainBoundCertEC(private_key.get(), 125 x509_util::DIGEST_SHA1,
|
x509_certificate_ios.cc | 63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_); 64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_); 65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_); 66 x509_util::ParseDate(&cert_handle->validity.notAfter, &valid_expiry_); 67 serial_number_ = x509_util::ParseSerialNumber(cert_handle); 79 if (!x509_util::GetIssuersFromEncodedList(valid_issuers, 84 return x509_util::IsCertificateIssuedBy( 100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs); 153 return x509_util::CreateOSCertHandlesFromBytes(data, length, format); 211 return x509_util::ReadOSCertHandleFromPickle(pickle_iter) [all...] |
x509_certificate_nss.cc | 29 x509_util::ParsePrincipal(&cert_handle_->subject, &subject_); 30 x509_util::ParsePrincipal(&cert_handle_->issuer, &issuer_); 32 x509_util::ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 33 x509_util::ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); 38 serial_number_ = x509_util::ParseSerialNumber(cert_handle_); 119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs); 133 if (!x509_util::GetIssuersFromEncodedList(valid_issuers, 138 return x509_util::IsCertificateIssuedBy(cert_chain, issuers); 197 return x509_util::CreateOSCertHandlesFromBytes(data, length, format); 251 return x509_util::ReadOSCertHandleFromPickle(pickle_iter) [all...] |
x509_util_openssl.h | 24 namespace x509_util { namespace in namespace:net 41 } // namespace x509_util
|
x509_certificate_mac.cc | 35 const x509_util::CSSMCachedCertificate& cached_cert, 38 x509_util::CSSMFieldValue distinguished_name; 48 x509_util::CSSMCachedCertificate cached_cert; 52 x509_util::CSSMFieldValue distinguished_name; 72 void GetCertDateForOID(const x509_util::CSSMCachedCertificate& cached_cert, 77 x509_util::CSSMFieldValue field; 100 const x509_util::CSSMCachedCertificate& cached_cert) { 101 x509_util::CSSMFieldValue serial_number; 202 x509_util::CSSMCachedCertificate cached_cert; 240 x509_util::CSSMCachedCertificate cached_cert [all...] |
x509_util.h | 24 namespace x509_util { namespace in namespace:net 122 } // namespace x509_util
|
x509_util_mac.h | 18 namespace x509_util { namespace in namespace:net 135 } // namespace x509_util
|
x509_util_nss.h | 25 namespace x509_util { namespace in namespace:net 95 } // namespace x509_util
|
x509_certificate_openssl.cc | 68 if (!x509_util::ParsePrincipalValueByIndex(name, index, &field)) 89 x509_util::ParsePrincipalValueByNID(x509_name, NID_commonName, 91 x509_util::ParsePrincipalValueByNID(x509_name, NID_localityName, 93 x509_util::ParsePrincipalValueByNID(x509_name, NID_stateOrProvinceName, 95 x509_util::ParsePrincipalValueByNID(x509_name, NID_countryName, 286 x509_util::ParseDate(X509_get_notBefore(cert_handle_), &valid_start_); 287 x509_util::ParseDate(X509_get_notAfter(cert_handle_), &valid_expiry_);
|
cert_database_nss.cc | 87 std::string nickname = x509_util::GetUniqueNicknameForSlot(
|
x509_util.cc | 5 #include "net/cert/x509_util.h" 16 namespace x509_util { namespace in namespace:net 105 } // namespace x509_util
|
x509_util_openssl.cc | 17 #include "net/cert/x509_util.h" 23 const EVP_MD* ToEVP(x509_util::DigestAlgorithm alg) { 25 case x509_util::DIGEST_SHA1: 27 case x509_util::DIGEST_SHA256: 35 namespace x509_util { namespace in namespace:net 346 } // namespace x509_util
|
cert_verify_proc_mac.cc | 158 OSStatus status = x509_util::CreateSSLServerPolicy(hostname, &ssl_policy); 167 status = x509_util::CreateRevocationPolicies( 205 x509_util::CSSMCachedCertificate cached_cert; 209 x509_util::CSSMFieldValue signature_field; 291 x509_util::CSSMCachedCertificate cached_cert; 296 x509_util::CSSMFieldValue serial_number;
|
x509_util_unittest.cc | 5 #include "net/cert/x509_util.h" 18 namespace x509_util { namespace in namespace:net 61 ASSERT_TRUE(x509_util::CreateKeyAndSelfSignedCert( 174 ASSERT_TRUE(x509_util::CreateSelfSignedCert( 176 x509_util::DIGEST_SHA1, 191 } // namespace x509_util
|
x509_util_mac.cc | 12 namespace x509_util { namespace in namespace:net 229 } // namespace x509_util
|
x509_util_nss.cc | 5 #include "net/cert/x509_util.h" 137 SECOidTag ToSECOid(x509_util::DigestAlgorithm alg) { 139 case x509_util::DIGEST_SHA1: 141 case x509_util::DIGEST_SHA256: 251 namespace x509_util { namespace in namespace:net 636 } // namespace x509_util
|
x509_util_nss_unittest.cc | 5 #include "net/cert/x509_util.h" 153 ASSERT_TRUE(x509_util::CreateKeyAndDomainBoundCertEC(
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_openssl.cc | 18 namespace x509_util = net::x509_util; 33 if (!x509_util::ParsePrincipalKeyAndValueByIndex(name, i, &key, &value)) 101 x509_util::ParsePrincipalValueByNID(X509_get_issuer_name(cert_handle), 110 x509_util::ParsePrincipalValueByNID(X509_get_issuer_name(cert_handle), 119 x509_util::ParsePrincipalValueByNID(X509_get_issuer_name(cert_handle), 128 x509_util::ParsePrincipalValueByNID(X509_get_subject_name(cert_handle), 137 x509_util::ParsePrincipalValueByNID(X509_get_subject_name(cert_handle), 145 x509_util::ParsePrincipalValueByNID(X509_get_subject_name(cert_handle), 152 return x509_util::ParseDate(X509_get_notBefore(cert_handle), issued) & [all...] |
/external/chromium_org/remoting/base/ |
rsa_key_pair.cc | 17 #include "net/cert/x509_util.h" 97 net::x509_util::CreateSelfSignedCert( 99 net::x509_util::DIGEST_SHA1,
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 92 net::x509_util::GetUniqueNicknameForSlot( 152 net::x509_util::GetUniqueNicknameForSlot( 188 net::x509_util::GetUniqueNicknameForSlot(
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
fake_certificate.cc | 10 #include "net/cert/x509_util.h" 64 return net::x509_util::CreateSelfSignedCert(test_key.get(), 65 net::x509_util::DIGEST_SHA256,
|
/external/chromium_org/net/ssl/ |
client_cert_store_mac.cc | 24 #include "net/cert/x509_util.h" 45 OSStatus result = x509_util::CreateSSLClientPolicy(&ssl_policy); 170 sort(sort_begin, sort_end, x509_util::ClientCertSorter());
|
client_cert_store_nss.cc | 17 #include "net/cert/x509_util.h" 113 x509_util::ClientCertSorter());
|
client_cert_store_win.cc | 18 #include "net/cert/x509_util.h" 141 x509_util::ClientCertSorter());
|
server_bound_cert_service.cc | 27 #include "net/cert/x509_util.h" 102 if (!x509_util::CreateKeyAndDomainBoundCertEC(server_identifier, 380 is_system_time_valid_ = x509_util::IsSupportedValidityRange(start, end);
|