/external/chromium_org/chrome/browser/resources/options/ |
certificate_manager.css | 16 #certificate-manager-content-area { 20 #certificate-manager-content-area .subpages-tab-contents { 25 .certificate-tree-table { 29 .certificate-tree {
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
fake_certificate.h | 15 // Creates a self-signed |certificate| based on constant key material. The 16 // certificate |expiry| is relative to the current time. The certificate will 21 std::string* certificate);
|
attestation_policy_observer_unittest.cc | 108 // require that a certificate exists, |certificate| will be used. 109 void SetupMocks(int mock_options, const std::string& certificate) { 116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) 197 std::string certificate; local 199 &certificate)); 200 SetupMocks(MOCK_KEY_EXISTS, certificate); 205 std::string certificate; local 207 &certificate)); 213 std::string certificate; local 221 std::string certificate; local [all...] |
/external/chromium_org/net/cert/ |
x509_certificate_net_log_param.h | 16 const X509Certificate* certificate,
|
test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 25 // Creates a new TrustEntry by incrementing the reference to |certificate| 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry 34 // The temporary root certificate. 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, 46 : certificate_(CERT_DupCertificate(certificate)), 54 bool TestRootCerts::Add(X509Certificate* certificate) { 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); 59 CERTCertificate* cert_handle = certificate->os_cert_handle() [all...] |
test_root_certs_android.cc | 14 bool TestRootCerts::Add(X509Certificate* certificate) { 16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
|
test_root_certs_openssl.cc | 17 bool TestRootCerts::Add(X509Certificate* certificate) { 19 certificate->os_cert_handle())) { 29 temporary_roots_.push_back(certificate);
|
x509_certificate_net_log_param.cc | 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate, 20 certificate->GetPEMEncodedChain(&encoded_chain);
|
/frameworks/base/core/java/android/net/http/ |
SslError.java | 23 * certificate. 32 * The certificate is not yet valid 36 * The certificate has expired 44 * The certificate authority is not trusted 48 * The date of the certificate is invalid 73 * The SSL certificate associated with the error set 83 * Creates a new SslError object using the supplied error and certificate. 86 * @param certificate The associated SSL certificate 90 public SslError(int error, SslCertificate certificate) { [all...] |
EventHandler.java | 24 * there is an SSL certificate error. error() can occur anywhere 109 * SSL certificate callback called before resource request is 112 public void certificate(SslCertificate certificate); method in interface:EventHandler 122 * SSL certificate error callback. Handles SSL error(s) on the way
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) 70 if (certificate.getVersion() != 3) 72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); 83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId()); 90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); 95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); 98 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object() [all...] |
/external/chromium_org/net/ssl/ |
ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { 23 DCHECK(certificate); 29 *certificate = iter->second;
|
/external/chromium_org/ppapi/thunk/ |
ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, 34 EnterX509CertificatePrivate enter(certificate, true); 40 PP_Var GetField(PP_Resource certificate, 42 EnterX509CertificatePrivate enter(certificate, true);
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl.cc | 24 NET_LOG_DEBUG("ONC Certificate Import Warning", message) 26 NET_LOG_ERROR("ONC Certificate Import Error", message) 63 const base::DictionaryValue* certificate = NULL; local 64 certificates.GetDictionary(i, &certificate); 65 DCHECK(certificate != NULL); 67 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local 70 *certificate, 75 base::StringPrintf("Cannot parse certificate at index %zu", i)); 77 VLOG(2) << "Successfully imported certificate at index " << i [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
IssuerAndSerialNumber.java | 12 import org.bouncycastle.asn1.x509.Certificate; 73 Certificate certificate) 75 this.name = certificate.getIssuer(); 76 this.serialNumber = certificate.getSerialNumber(); 80 * @deprecated use constructor taking Certificate 83 X509CertificateStructure certificate) 85 this.name = certificate.getIssuer(); 86 this.serialNumber = certificate.getSerialNumber();
|
/libcore/luni/src/test/java/tests/security/ |
CertificateFactoryTest.java | 20 import java.security.cert.Certificate; 43 Certificate certificate = certificateFactory.generateCertificate( local 45 assertNotNull(certificate);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/external/chromium_org/net/socket/ |
ssl_server_socket.h | 46 // The caller must provide the server certificate and private key to use. 50 // It takes a reference to |certificate|. 58 X509Certificate* certificate,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 58 * adding a new certificate authority is in your users' best interests. 62 * modify the certificate list used by this test must have a corresponding change in AOSP 63 * (one certificate per change) authored by the OEM in question and including: 65 * - the certificate in question: 66 * - The certificate must be in a file under 68 * Mail) format, with the textual representation of the certificate following the PEM 77 * - information about who created and maintains both the certificate and the corresponding 80 * - information about what the certificate is to be used for and why the certificate is 85 * intended use that they believe adding the certificate is not detrimental to th 125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local 146 X509Certificate certificate = (X509Certificate) certFactory.generateCertificate(in); local [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
OkHostnameVerifier.java | 20 import java.security.cert.Certificate; 63 Certificate[] certificates = session.getPeerCertificates(); 70 public boolean verify(String host, X509Certificate certificate) { 72 ? verifyIpAddress(host, certificate) 73 : verifyHostName(host, certificate); 81 * Returns true if {@code certificate} matches {@code ipAddress}. 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { 93 * Returns true if {@code certificate} matches {@code hostName}. 95 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/libcore/luni/src/main/java/javax/net/ssl/ |
DefaultHostnameVerifier.java | 21 import java.security.cert.Certificate; 43 Certificate[] certificates = session.getPeerCertificates(); 50 public boolean verify(String host, X509Certificate certificate) { 52 ? verifyIpAddress(host, certificate) 53 : verifyHostName(host, certificate); 57 * Returns true if {@code certificate} matches {@code ipAddress}. 59 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { 60 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { 69 * Returns true if {@code certificate} matches {@code hostName}. 71 private boolean verifyHostName(String hostName, X509Certificate certificate) { [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
opensslidentity.h | 71 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 96 // Compute the digest of the certificate given algorithm 102 // Compute the digest of a certificate as an X509 * 114 // certificate to be self-signed. 126 // Holds a keypair and certificate together, and a method to generate 133 const std::string& certificate); 136 virtual const OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity 145 // Configure an SSL context object to use our key and certificate. 150 OpenSSLCertificate* certificate) 151 : key_pair_(key_pair), certificate_(certificate) { [all...] |
/external/chromium_org/third_party/webrtc/base/ |
opensslidentity.h | 54 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object, 79 // Compute the digest of the certificate given algorithm 85 // Compute the digest of a certificate as an X509 * 97 // certificate to be self-signed. 109 // Holds a keypair and certificate together, and a method to generate 116 const std::string& certificate); 119 virtual const OpenSSLCertificate& certificate() const { function in class:rtc::OpenSSLIdentity 128 // Configure an SSL context object to use our key and certificate. 133 OpenSSLCertificate* certificate) 134 : key_pair_(key_pair), certificate_(certificate) { [all...] |
/external/chromium_org/ppapi/tests/ |
test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, 23 pp::Var field_value = certificate.GetField(field); 30 const pp::X509CertificatePrivate& certificate, 33 pp::Var field_value = certificate.GetField(field); 41 const pp::X509CertificatePrivate& certificate, 45 pp::Var field_value = certificate.GetField(field); 57 const pp::X509CertificatePrivate& certificate, 59 return certificate.GetField(field).is_null(); 154 pp::X509CertificatePrivate certificate(instance_); 155 bool successful = certificate.Initialize [all...] |