HomeSort by relevance Sort by last modified time
    Searched refs:certificate (Results 1 - 25 of 304) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/resources/options/
certificate_manager.css 16 #certificate-manager-content-area {
20 #certificate-manager-content-area .subpages-tab-contents {
25 .certificate-tree-table {
29 .certificate-tree {
  /external/chromium_org/chrome/browser/chromeos/attestation/
fake_certificate.h 15 // Creates a self-signed |certificate| based on constant key material. The
16 // certificate |expiry| is relative to the current time. The certificate will
21 std::string* certificate);
attestation_policy_observer_unittest.cc 108 // require that a certificate exists, |certificate| will be used.
109 void SetupMocks(int mock_options, const std::string& certificate) {
116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate))));
137 UploadCertificate(new_key ? "fake_cert" : certificate, _))
197 std::string certificate; local
199 &certificate));
200 SetupMocks(MOCK_KEY_EXISTS, certificate);
205 std::string certificate; local
207 &certificate));
213 std::string certificate; local
221 std::string certificate; local
    [all...]
  /external/chromium_org/net/cert/
x509_certificate_net_log_param.h 16 const X509Certificate* certificate,
test_root_certs_nss.cc 21 // for a certificate whose trust status has been changed by the
25 // Creates a new TrustEntry by incrementing the reference to |certificate|
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
30 CERTCertificate* certificate() const { return certificate_; } function in class:net::TestRootCerts::TrustEntry
34 // The temporary root certificate.
44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate,
46 : certificate_(CERT_DupCertificate(certificate)),
54 bool TestRootCerts::Add(X509Certificate* certificate) {
56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle());
59 CERTCertificate* cert_handle = certificate->os_cert_handle()
    [all...]
test_root_certs_android.cc 14 bool TestRootCerts::Add(X509Certificate* certificate) {
16 if (!X509Certificate::GetDEREncoded(certificate->os_cert_handle(),
test_root_certs_openssl.cc 17 bool TestRootCerts::Add(X509Certificate* certificate) {
19 certificate->os_cert_handle())) {
29 temporary_roots_.push_back(certificate);
x509_certificate_net_log_param.cc 15 base::Value* NetLogX509CertificateCallback(const X509Certificate* certificate,
20 certificate->GetPEMEncodedChain(&encoded_chain);
  /frameworks/base/core/java/android/net/http/
SslError.java 23 * certificate.
32 * The certificate is not yet valid
36 * The certificate has expired
44 * The certificate authority is not trusted
48 * The date of the certificate is invalid
73 * The SSL certificate associated with the error set
83 * Creates a new SslError object using the supplied error and certificate.
86 * @param certificate The associated SSL certificate
90 public SslError(int error, SslCertificate certificate) {
    [all...]
EventHandler.java 24 * there is an SSL certificate error. error() can occur anywhere
109 * SSL certificate callback called before resource request is
112 public void certificate(SslCertificate certificate); method in interface:EventHandler
122 * SSL certificate error callback. Handles SSL error(s) on the way
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
AuthorityKeyIdentifierStructure.java 65 X509Certificate certificate)
70 if (certificate.getVersion() != 3)
72 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
74 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
77 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
81 GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate));
83 byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.getId());
90 str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object();
95 (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject());
98 info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object()
    [all...]
  /external/chromium_org/net/ssl/
ssl_client_auth_cache.cc 22 scoped_refptr<X509Certificate>* certificate) {
23 DCHECK(certificate);
29 *certificate = iter->second;
  /external/chromium_org/ppapi/thunk/
ppb_x509_certificate_private_thunk.cc 31 PP_Bool Initialize(PP_Resource certificate,
34 EnterX509CertificatePrivate enter(certificate, true);
40 PP_Var GetField(PP_Resource certificate,
42 EnterX509CertificatePrivate enter(certificate, true);
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer_impl.cc 24 NET_LOG_DEBUG("ONC Certificate Import Warning", message)
26 NET_LOG_ERROR("ONC Certificate Import Error", message)
63 const base::DictionaryValue* certificate = NULL; local
64 certificates.GetDictionary(i, &certificate);
65 DCHECK(certificate != NULL);
67 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; local
70 *certificate,
75 base::StringPrintf("Cannot parse certificate at index %zu", i));
77 VLOG(2) << "Successfully imported certificate at index " << i
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
IssuerAndSerialNumber.java 12 import org.bouncycastle.asn1.x509.Certificate;
73 Certificate certificate)
75 this.name = certificate.getIssuer();
76 this.serialNumber = certificate.getSerialNumber();
80 * @deprecated use constructor taking Certificate
83 X509CertificateStructure certificate)
85 this.name = certificate.getIssuer();
86 this.serialNumber = certificate.getSerialNumber();
  /libcore/luni/src/test/java/tests/security/
CertificateFactoryTest.java 20 import java.security.cert.Certificate;
43 Certificate certificate = certificateFactory.generateCertificate( local
45 assertNotNull(certificate);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
36 String certificateData = "-----BEGIN CERTIFICATE-----\n"
50 + "-----END CERTIFICATE-----\n";
62 Certificate certificate = cf.generateCertificate(certArray); local
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
    [all...]
  /external/chromium_org/net/socket/
ssl_server_socket.h 46 // The caller must provide the server certificate and private key to use.
50 // It takes a reference to |certificate|.
58 X509Certificate* certificate,
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 26 import java.security.cert.Certificate;
36 String certificateData = "-----BEGIN CERTIFICATE-----\n"
50 + "-----END CERTIFICATE-----\n";
62 Certificate certificate = cf.generateCertificate(certArray); local
63 assertTrue(certificate instanceof X509Certificate);
65 String algorithm = certificate.getPublicKey().getAlgorithm();
71 // If all the certificate in the chain is X509Certificate,
74 privateKey, new Certificate[] { certificate });
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 58 * adding a new certificate authority is in your users' best interests.
62 * modify the certificate list used by this test must have a corresponding change in AOSP
63 * (one certificate per change) authored by the OEM in question and including:
65 * - the certificate in question:
66 * - The certificate must be in a file under
68 * Mail) format, with the textual representation of the certificate following the PEM
77 * - information about who created and maintains both the certificate and the corresponding
80 * - information about what the certificate is to be used for and why the certificate is
85 * intended use that they believe adding the certificate is not detrimental to th
125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local
146 X509Certificate certificate = (X509Certificate) certFactory.generateCertificate(in); local
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
OkHostnameVerifier.java 20 import java.security.cert.Certificate;
63 Certificate[] certificates = session.getPeerCertificates();
70 public boolean verify(String host, X509Certificate certificate) {
72 ? verifyIpAddress(host, certificate)
73 : verifyHostName(host, certificate);
81 * Returns true if {@code certificate} matches {@code ipAddress}.
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) {
84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) {
93 * Returns true if {@code certificate} matches {@code hostName}.
95 private boolean verifyHostName(String hostName, X509Certificate certificate) {
    [all...]
  /libcore/luni/src/main/java/javax/net/ssl/
DefaultHostnameVerifier.java 21 import java.security.cert.Certificate;
43 Certificate[] certificates = session.getPeerCertificates();
50 public boolean verify(String host, X509Certificate certificate) {
52 ? verifyIpAddress(host, certificate)
53 : verifyHostName(host, certificate);
57 * Returns true if {@code certificate} matches {@code ipAddress}.
59 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) {
60 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) {
69 * Returns true if {@code certificate} matches {@code hostName}.
71 private boolean verifyHostName(String hostName, X509Certificate certificate) {
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/base/
opensslidentity.h 71 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object,
96 // Compute the digest of the certificate given algorithm
102 // Compute the digest of a certificate as an X509 *
114 // certificate to be self-signed.
126 // Holds a keypair and certificate together, and a method to generate
133 const std::string& certificate);
136 virtual const OpenSSLCertificate& certificate() const { function in class:talk_base::OpenSSLIdentity
145 // Configure an SSL context object to use our key and certificate.
150 OpenSSLCertificate* certificate)
151 : key_pair_(key_pair), certificate_(certificate) {
    [all...]
  /external/chromium_org/third_party/webrtc/base/
opensslidentity.h 54 // OpenSSLCertificate encapsulates an OpenSSL X509* certificate object,
79 // Compute the digest of the certificate given algorithm
85 // Compute the digest of a certificate as an X509 *
97 // certificate to be self-signed.
109 // Holds a keypair and certificate together, and a method to generate
116 const std::string& certificate);
119 virtual const OpenSSLCertificate& certificate() const { function in class:rtc::OpenSSLIdentity
128 // Configure an SSL context object to use our key and certificate.
133 OpenSSLCertificate* certificate)
134 : key_pair_(key_pair), certificate_(certificate) {
    [all...]
  /external/chromium_org/ppapi/tests/
test_x509_certificate_private.cc 20 const pp::X509CertificatePrivate& certificate,
23 pp::Var field_value = certificate.GetField(field);
30 const pp::X509CertificatePrivate& certificate,
33 pp::Var field_value = certificate.GetField(field);
41 const pp::X509CertificatePrivate& certificate,
45 pp::Var field_value = certificate.GetField(field);
57 const pp::X509CertificatePrivate& certificate,
59 return certificate.GetField(field).is_null();
154 pp::X509CertificatePrivate certificate(instance_);
155 bool successful = certificate.Initialize
    [all...]

Completed in 575 milliseconds

1 2 3 4 5 6 7 8 91011>>