/external/chromium_org/net/cert/ |
cert_type.h | 17 // SERVER_CERT, TRUSTED_SSL), it would become a SERVER_CERT. 22 SERVER_CERT,
|
multi_threaded_cert_verifier_unittest.cc | 130 scoped_refptr<X509Certificate> server_cert = local 132 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); local 145 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 151 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(),
|
nss_cert_database_unittest.cc | 573 cert_db_->GetCertTrust(goog_cert.get(), SERVER_CERT)); 605 cert_db_->GetCertTrust(puny_cert.get(), SERVER_CERT)); 636 cert_db_->GetCertTrust(puny_cert.get(), SERVER_CERT)); 712 cert_db_->GetCertTrust(certs[0].get(), SERVER_CERT)); 763 cert_db_->GetCertTrust(certs[0].get(), SERVER_CERT)); 839 cert_db_->GetCertTrust(certs[0].get(), SERVER_CERT)); [all...] |
cert_verify_proc_unittest.cc | 283 scoped_refptr<X509Certificate> server_cert = local 285 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); local 294 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 434 scoped_refptr<X509Certificate> server_cert = local 436 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert.get()); 451 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 479 scoped_refptr<X509Certificate> server_cert = local 481 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); local 490 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 715 scoped_refptr<X509Certificate> server_cert local 717 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); local [all...] |
x509_certificate_nss.cc | 106 case SERVER_CERT:
|
x509_certificate_unittest.cc | 329 scoped_refptr<X509Certificate> server_cert = local 331 ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); local 344 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 350 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), 356 X509Certificate::CreateFromHandle(server_cert->os_cert_handle(), [all...] |
nss_cert_database.h | 77 // For SERVER_CERT, only TRUSTED_SSL makes sense, and specifies the cert is
|
nss_cert_database.cc | 259 case SERVER_CERT:
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.h | 35 // @param server_cert the server certificate 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 53 X509* server_cert; member in class:polo::pairing::PoloChallengeResponse
|
polochallengeresponse.cc | 27 X509* server_cert) 29 server_cert(server_cert) { 43 EVP_PKEY* server_pkey = X509_get_pubkey(server_cert);
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
polochallengeresponsetest.cc | 74 server_cert = PEM_read_bio_X509(server_bio, NULL, NULL, NULL); 81 response = new PoloChallengeResponse(client_cert, server_cert); 88 X509_free(server_cert); 97 X509* server_cert; member in class:polo::pairing::PoloChallengeResponseTest
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 115 cert.get(), net::SERVER_CERT, net::NSSCertDatabase::TRUSTED_SSL)); 117 EXPECT_EQ(net::SERVER_CERT, 122 cert.get(), net::SERVER_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); 124 EXPECT_EQ(net::SERVER_CERT,
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl_unittest.cc | 52 return net::SERVER_CERT; 132 if (expected_type == net::SERVER_CERT || expected_type == net::CA_CERT) { 234 AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, NULL); 332 CertParam(net::SERVER_CERT,
|
onc_certificate_importer_impl.cc | 249 cert_type == ::onc::certificate::kServer ? net::SERVER_CERT
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 144 (hapd->conf->ca_cert || hapd->conf->server_cert || 157 params.client_cert = hapd->conf->server_cert;
|
ap_config.h | 299 char *server_cert; member in struct:hostapd_bss_config
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/http/ |
JavaApiConverterTest.java | 91 private static final X509Certificate SERVER_CERT = certificate("" 239 final Principal serverPrincipal = SERVER_CERT.getSubjectX500Principal(); 240 final List<Certificate> serverCertificates = Arrays.<Certificate>asList(SERVER_CERT); 540 Handshake handshake = Handshake.get("SecureCipher", Arrays.<Certificate>asList(SERVER_CERT), 549 assertEquals(SERVER_CERT.getSubjectX500Principal(), httpsUrlConnection.getPeerPrincipal()); 551 assertArrayEquals(new Certificate[] { SERVER_CERT }, 631 Handshake handshake = Handshake.get("SecureCipher", Arrays.<Certificate>asList(SERVER_CERT),
|
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 189 cert->GetDefaultNickname(net::SERVER_CERT), 201 SetCertTrust(certificates[0].get(), net::SERVER_CERT, trustBits); 254 } else if (type == net::SERVER_CERT) {
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLUtils.java | 77 new String[] {HostAuthColumns.SERVER_CERT}, HostAuthColumns._ID + "=?", 126 values.put(HostAuthColumns.SERVER_CERT, encodedCert);
|
/external/chromium_org/net/socket/ |
ssl_client_socket_nss.cc | 414 server_cert = NULL; 439 // X509Certificate object (|server_cert|). It's possible for some 442 // algorithms, etc), so it's not safe to assume that |server_cert| will 445 scoped_refptr<X509Certificate> server_cert; member in struct:net::__anon13550::HandshakeState [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
cert_library.cc | 222 case net::SERVER_CERT:
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier_browsertest.cc | 53 test_server_cert_ = LoadCertificate("ok_cert.pem", net::SERVER_CERT);
|
/external/wpa_supplicant_8/hs20/server/ |
hs20-osu-server.txt | 138 server_cert=Key/server.pem
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssltest.c | 513 char *server_cert=TEST_SERVER_CERT; local 686 server_cert= *(++argv); 691 server_cert= *(++argv); 983 if (!SSL_CTX_use_certificate_file(s_ctx,server_cert,SSL_FILETYPE_PEM)) 988 (server_key?server_key:server_cert), SSL_FILETYPE_PEM)) [all...] |
/external/openssl/ssl/ |
ssltest.c | 513 char *server_cert=TEST_SERVER_CERT; local 686 server_cert= *(++argv); 691 server_cert= *(++argv); 989 if (!SSL_CTX_use_certificate_file(s_ctx,server_cert,SSL_FILETYPE_PEM)) 994 (server_key?server_key:server_cert), SSL_FILETYPE_PEM)) [all...] |