Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 250) sorted by relevance

12345678910

/external/chromium_org/ppapi/tests/
Dtest_x509_certificate_private.cc20 const pp::X509CertificatePrivate& certificate, in FieldMatchesString() argument
23 pp::Var field_value = certificate.GetField(field); in FieldMatchesString()
30 const pp::X509CertificatePrivate& certificate, in FieldMatchesDouble() argument
33 pp::Var field_value = certificate.GetField(field); in FieldMatchesDouble()
41 const pp::X509CertificatePrivate& certificate, in FieldMatchesBuffer() argument
45 pp::Var field_value = certificate.GetField(field); in FieldMatchesBuffer()
57 const pp::X509CertificatePrivate& certificate, in FieldIsNull() argument
59 return certificate.GetField(field).is_null(); in FieldIsNull()
154 pp::X509CertificatePrivate certificate(instance_); in TestValidCertificate() local
155 bool successful = certificate.Initialize( in TestValidCertificate()
[all …]
/external/chromium_org/chromeos/network/onc/
Donc_certificate_importer_impl.cc100 const base::DictionaryValue* certificate = NULL; in ParseAndStoreCertificates() local
101 certificates->GetDictionary(i, &certificate); in ParseAndStoreCertificates()
102 DCHECK(certificate != NULL); in ParseAndStoreCertificates()
104 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; in ParseAndStoreCertificates()
107 *certificate, in ParseAndStoreCertificates()
194 const base::DictionaryValue& certificate, in ParseAndStoreCertificate() argument
199 certificate.GetStringWithoutPathExpansion(::onc::certificate::kGUID, &guid); in ParseAndStoreCertificate()
203 if (certificate.GetBooleanWithoutPathExpansion(::onc::kRemove, &remove) && in ParseAndStoreCertificate()
215 certificate.GetStringWithoutPathExpansion(::onc::certificate::kType, in ParseAndStoreCertificate()
217 if (cert_type == ::onc::certificate::kServer || in ParseAndStoreCertificate()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted
15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt…
16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted.
17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is…
21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded
22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded.
23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded.
24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins…
29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi…
31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/
DAuthorityKeyIdentifierStructure.java65 X509Certificate certificate) in fromCertificate() argument
70 if (certificate.getVersion() != 3) in fromCertificate()
72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
74 … (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); in fromCertificate()
77 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate()
81 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate()
83 …byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.ge… in fromCertificate()
90 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate()
95 … (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); in fromCertificate()
98 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate()
[all …]
/external/chromium_org/net/data/ssl/certificates/
DREADME14 - googlenew.chain.pem : The refreshed Google certificate
17 - mit.davidben.der : An expired MIT client certificate.
19 - foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
25 A certificate chain used for testing certificate imports
30 - diginotar_public_ca_2025.pem : A certificate chain for the regression test
36 X509Certificate objects that contain the same server certificate but
51 _cross_certified_[1,2].pem. _omniroot_chain.pem contains a certificate
56 - ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
57 This is an X.509 v1 certificate that omits the version field. Used to
58 test that the certificate version gets the default value v1.
[all …]
/external/chromium_org/net/cert/
Dtest_root_certs_nss.cc27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
30 CERTCertificate* certificate() const { return certificate_; } in certificate() function in net::TestRootCerts::TrustEntry
44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, in TrustEntry() argument
46 : certificate_(CERT_DupCertificate(certificate)), in TrustEntry()
54 bool TestRootCerts::Add(X509Certificate* certificate) { in Add() argument
56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); in Add()
59 CERTCertificate* cert_handle = certificate->os_cert_handle(); in Add()
103 (*it)->certificate(), in Clear()
121 if (X509Certificate::IsSameOSCert(cert, (*it)->certificate())) in Contains()
/external/chromium_org/chrome/browser/chromeos/attestation/
Dattestation_policy_observer_unittest.cc109 void SetupMocks(int mock_options, const std::string& certificate) { in SetupMocks() argument
116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); in SetupMocks()
137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) in SetupMocks()
197 std::string certificate; in TEST_F() local
199 &certificate)); in TEST_F()
200 SetupMocks(MOCK_KEY_EXISTS, certificate); in TEST_F()
205 std::string certificate; in TEST_F() local
207 &certificate)); in TEST_F()
208 SetupMocks(MOCK_KEY_EXISTS | MOCK_KEY_UPLOADED, certificate); in TEST_F()
213 std::string certificate; in TEST_F() local
[all …]
Dattestation_policy_observer.cc213 const std::string& certificate) { in CheckCertificateExpiry() argument
215 net::X509Certificate::CreateFromBytes(certificate.data(), in CheckCertificateExpiry()
216 certificate.length())); in CheckCertificateExpiry()
232 certificate)); in CheckCertificateExpiry()
236 const std::string& certificate) { in UploadCertificate() argument
238 certificate, in UploadCertificate()
244 const std::string& certificate, in CheckIfUploaded() argument
253 UploadCertificate(certificate); in CheckIfUploaded()
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/
DOkHostnameVerifier.java70 public boolean verify(String host, X509Certificate certificate) { in verify() argument
72 ? verifyIpAddress(host, certificate) in verify()
73 : verifyHostName(host, certificate); in verify()
83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument
84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { in verifyIpAddress()
95 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument
98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) { in verifyHostName()
106 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName()
117 private List<String> getSubjectAltNames(X509Certificate certificate, int type) { in getSubjectAltNames() argument
120 Collection<?> subjectAltNames = certificate.getSubjectAlternativeNames(); in getSubjectAltNames()
/external/chromium_org/third_party/webrtc/base/
Dnssidentity.cc341 CERTCertificate *certificate = NULL; in GenerateInternal() local
393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); in GenerateInternal()
394 if (!certificate) { in GenerateInternal()
399 arena = certificate->arena; in GenerateInternal()
401 rv = SECOID_SetAlgorithmID(arena, &certificate->signature, in GenerateInternal()
407 *(certificate->version.data) = 2; in GenerateInternal()
408 certificate->version.len = 1; in GenerateInternal()
410 if (!SEC_ASN1EncodeItem(arena, &inner_der, certificate, in GenerateInternal()
421 certificate->derCert = signed_cert; in GenerateInternal()
423 identity = new NSSIdentity(keypair, new NSSCertificate(certificate)); in GenerateInternal()
[all …]
Dsslidentity_unittest.cc72 ASSERT_TRUE(identity1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
75 ASSERT_TRUE(identity2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm()
94 rv = identity1_->certificate().ComputeDigest(algorithm, in TestDigest()
100 rv = identity1_->certificate().ComputeDigest(algorithm, in TestDigest()
108 rv = identity2_->certificate().ComputeDigest(algorithm, in TestDigest()
194 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString());
Dopensslidentity.h116 const std::string& certificate);
119 virtual const OpenSSLCertificate& certificate() const { in certificate() function
133 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument
134 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity()
136 ASSERT(certificate != NULL); in OpenSSLIdentity()
Dsslidentity.cc106 const std::string& certificate) { in FromPEMStrings() argument
125 const std::string& certificate) { in FromPEMStrings() argument
126 return OpenSSLIdentity::FromPEMStrings(private_key, certificate); in FromPEMStrings()
144 const std::string& certificate) { in FromPEMStrings() argument
145 return NSSIdentity::FromPEMStrings(private_key, certificate); in FromPEMStrings()
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/
DJcaSimpleSignerInfoVerifierBuilder.java42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build()
62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
DJcaSignerInfoVerifierBuilder.java72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument
75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build()
92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider()
127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider()
162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument
165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
DIssuerAndSerialNumber.java73 Certificate certificate) in IssuerAndSerialNumber() argument
75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument
85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber()
86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
/external/chromium_org/chrome/common/extensions/api/
Denterprise_platform_keys.idl40 // certificate.
64 // Imports <code>certificate</code> to the given token if the certified key
67 // store the obtained certificate and to make it available to the operating
70 // |certificate|: The DER encoding of a X.509 certificate.
73 ArrayBuffer certificate,
76 // Removes <code>certificate</code> from the given token if present.
78 // considered during authentication and do not clutter the certificate
79 // choice. Should be used to free storage in the certificate store.
81 // |certificate|: The DER encoding of a X.509 certificate.
84 ArrayBuffer certificate,
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/
DHostnameVerifierTest.java396 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local
407 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp()
409 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp()
546 private X509Certificate certificate(String certificate) throws Exception { in certificate() argument
548 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate()
551 private SSLSession session(String certificate) throws Exception { in session() argument
552 return new FakeSSLSession(certificate(certificate)); in session()
/external/chromium_org/net/http/
Dtransport_security_state_static.json8 // of certificate pinning to a name and "entries" contains the HSTS details for
17 // For a given pinset, a certificate is accepted if at least one of the
31 // certificate if SNI is sent. Note that this only covers the case where
34 // fatal certificate error will result. Spurious certificate errors are
184 // Dummy entry to test certificate pinning.
187 // (*.)google.com, iff using SSL, must use an acceptable certificate.
256 // chart.apis.google.com is *not* HSTS because the certificate doesn't match
261 // Other Google-related domains that must use an acceptable certificate
/external/chromium_org/content/browser/media/
Dwebrtc_identity_store.cc25 const std::string& certificate, in WebRTCIdentityRequestResult()
27 : error(error), certificate(certificate), private_key(private_key) {} in WebRTCIdentityRequestResult()
30 std::string certificate; member
50 &result->certificate); in GenerateIdentityWorker()
110 it->second.Run(result.error, result.certificate, result.private_key); in Post()
158 const std::string& certificate, in OnRequestComplete() argument
163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key); in OnRequestComplete()
242 const std::string& certificate, in BackendFindCallback() argument
247 WebRTCIdentityRequestResult result(error, certificate, private_key); in BackendFindCallback()
279 result->certificate, in GenerateIdentityCallback()
/external/chromium_org/ppapi/thunk/
Dppb_x509_certificate_private_thunk.cc31 PP_Bool Initialize(PP_Resource certificate, in Initialize() argument
34 EnterX509CertificatePrivate enter(certificate, true); in Initialize()
40 PP_Var GetField(PP_Resource certificate, in GetField() argument
42 EnterX509CertificatePrivate enter(certificate, true); in GetField()
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DKeyStorePrivateKeyEntryTest.java62 Certificate certificate = cf.generateCertificate(certArray); in testGetCertificateChain() local
63 assertTrue(certificate instanceof X509Certificate); in testGetCertificateChain()
65 String algorithm = certificate.getPublicKey().getAlgorithm(); in testGetCertificateChain()
74 privateKey, new Certificate[] { certificate }); in testGetCertificateChain()
/external/chromium_org/chrome/browser/resources/options/
Dcertificate_manager.css16 #certificate-manager-content-area {
20 #certificate-manager-content-area .subpages-tab-contents {
25 .certificate-tree-table {
29 .certificate-tree {
/external/openssl/apps/
Dopenssl.cnf3 # This is mostly being used for generation of certificate requests.
50 certificate = $dir/cacert.pem # The CA certificate
125 # req_extensions = v3_req # The extensions to add to a certificate request
168 # requires this to avoid interpreting an end user certificate as a CA.
173 # the certificate can be used for anything *except* object signing.
178 # For an object signing certificate this would be used.
187 # This is typical in keyUsage for a client certificate.
219 # Extensions to add to a certificate request
242 # Key usage: this is typical for a CA certificate. However since it will
243 # prevent it being used as an test self-signed certificate it is best
[all …]
/external/chromium_org/net/ssl/
Dssl_client_auth_cache.cc22 scoped_refptr<X509Certificate>* certificate) { in Lookup() argument
23 DCHECK(certificate); in Lookup()
29 *certificate = iter->second; in Lookup()

12345678910