/external/chromium_org/ppapi/tests/ |
D | test_x509_certificate_private.cc | 20 const pp::X509CertificatePrivate& certificate, in FieldMatchesString() argument 23 pp::Var field_value = certificate.GetField(field); in FieldMatchesString() 30 const pp::X509CertificatePrivate& certificate, in FieldMatchesDouble() argument 33 pp::Var field_value = certificate.GetField(field); in FieldMatchesDouble() 41 const pp::X509CertificatePrivate& certificate, in FieldMatchesBuffer() argument 45 pp::Var field_value = certificate.GetField(field); in FieldMatchesBuffer() 57 const pp::X509CertificatePrivate& certificate, in FieldIsNull() argument 59 return certificate.GetField(field).is_null(); in FieldIsNull() 154 pp::X509CertificatePrivate certificate(instance_); in TestValidCertificate() local 155 bool successful = certificate.Initialize( in TestValidCertificate() [all …]
|
/external/chromium_org/chromeos/network/onc/ |
D | onc_certificate_importer_impl.cc | 100 const base::DictionaryValue* certificate = NULL; in ParseAndStoreCertificates() local 101 certificates->GetDictionary(i, &certificate); in ParseAndStoreCertificates() 102 DCHECK(certificate != NULL); in ParseAndStoreCertificates() 104 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; in ParseAndStoreCertificates() 107 *certificate, in ParseAndStoreCertificates() 194 const base::DictionaryValue& certificate, in ParseAndStoreCertificate() argument 199 certificate.GetStringWithoutPathExpansion(::onc::certificate::kGUID, &guid); in ParseAndStoreCertificate() 203 if (certificate.GetBooleanWithoutPathExpansion(::onc::kRemove, &remove) && in ParseAndStoreCertificate() 215 certificate.GetStringWithoutPathExpansion(::onc::certificate::kType, in ParseAndStoreCertificate() 217 if (cert_type == ::onc::certificate::kServer || in ParseAndStoreCertificate() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 14 CertPathReviewer.notPermittedDN.title = Name constraint error: certificate DN is not permitted 15 CertPathReviewer.notPermittedDN.text = Name constraint error: the certificate DN {0} is not permitt… 16 CertPathReviewer.notPermittedDN.summary = Name constraint error: certificate DN is not permitted. 17 CertPathReviewer.notPermittedDN.details = Name constraint checking error. The certificate DN {0} is… 21 CertPathReviewer.excludedDN.title = Name constraint error: certificate DN is excluded 22 CertPathReviewer.excludedDN.text = Name constraint error: The certificate DN {0} is excluded. 23 CertPathReviewer.excludedDN.summary = Name constraint error: certificate DN is excluded. 24 CertPathReviewer.excludedDN.details = Name constraint checking error. The certificate DN {0} is ins… 29 CertPathReviewer.notPermittedEmail.text = Name constraint error: certificate contains the not permi… 31 CertPathReviewer.notPermittedEmail.details = Name constraint checking error. The certificate contai… [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/extension/ |
D | AuthorityKeyIdentifierStructure.java | 65 X509Certificate certificate) in fromCertificate() argument 70 if (certificate.getVersion() != 3) in fromCertificate() 72 … GeneralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 74 … (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); in fromCertificate() 77 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate() 81 …neralName genName = new GeneralName(PrincipalUtil.getIssuerX509Principal(certificate)); in fromCertificate() 83 …byte[] ext = certificate.getExtensionValue(X509Extensions.SubjectKeyIdentifier.ge… in fromCertificate() 90 … str.getOctets(), new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate() 95 … (ASN1Sequence)new ASN1InputStream(certificate.getPublicKey().getEncoded()).readObject()); in fromCertificate() 98 … info, new GeneralNames(genName), certificate.getSerialNumber()).toASN1Object(); in fromCertificate() [all …]
|
/external/chromium_org/net/data/ssl/certificates/ |
D | README | 14 - googlenew.chain.pem : The refreshed Google certificate 17 - mit.davidben.der : An expired MIT client certificate. 19 - foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity 25 A certificate chain used for testing certificate imports 30 - diginotar_public_ca_2025.pem : A certificate chain for the regression test 36 X509Certificate objects that contain the same server certificate but 51 _cross_certified_[1,2].pem. _omniroot_chain.pem contains a certificate 56 - ndn.ca.crt: "New Dream Network Certificate Authority" root certificate. 57 This is an X.509 v1 certificate that omits the version field. Used to 58 test that the certificate version gets the default value v1. [all …]
|
/external/chromium_org/net/cert/ |
D | test_root_certs_nss.cc | 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 30 CERTCertificate* certificate() const { return certificate_; } in certificate() function in net::TestRootCerts::TrustEntry 44 TestRootCerts::TrustEntry::TrustEntry(CERTCertificate* certificate, in TrustEntry() argument 46 : certificate_(CERT_DupCertificate(certificate)), in TrustEntry() 54 bool TestRootCerts::Add(X509Certificate* certificate) { in Add() argument 56 x509_util_ios::NSSCertificate nss_certificate(certificate->os_cert_handle()); in Add() 59 CERTCertificate* cert_handle = certificate->os_cert_handle(); in Add() 103 (*it)->certificate(), in Clear() 121 if (X509Certificate::IsSameOSCert(cert, (*it)->certificate())) in Contains()
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
D | attestation_policy_observer_unittest.cc | 109 void SetupMocks(int mock_options, const std::string& certificate) { in SetupMocks() argument 116 .WillRepeatedly(WithArgs<3>(Invoke(FakeDBusData(certificate)))); in SetupMocks() 137 UploadCertificate(new_key ? "fake_cert" : certificate, _)) in SetupMocks() 197 std::string certificate; in TEST_F() local 199 &certificate)); in TEST_F() 200 SetupMocks(MOCK_KEY_EXISTS, certificate); in TEST_F() 205 std::string certificate; in TEST_F() local 207 &certificate)); in TEST_F() 208 SetupMocks(MOCK_KEY_EXISTS | MOCK_KEY_UPLOADED, certificate); in TEST_F() 213 std::string certificate; in TEST_F() local [all …]
|
D | attestation_policy_observer.cc | 213 const std::string& certificate) { in CheckCertificateExpiry() argument 215 net::X509Certificate::CreateFromBytes(certificate.data(), in CheckCertificateExpiry() 216 certificate.length())); in CheckCertificateExpiry() 232 certificate)); in CheckCertificateExpiry() 236 const std::string& certificate) { in UploadCertificate() argument 238 certificate, in UploadCertificate() 244 const std::string& certificate, in CheckIfUploaded() argument 253 UploadCertificate(certificate); in CheckIfUploaded()
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
D | OkHostnameVerifier.java | 70 public boolean verify(String host, X509Certificate certificate) { in verify() argument 72 ? verifyIpAddress(host, certificate) in verify() 73 : verifyHostName(host, certificate); in verify() 83 private boolean verifyIpAddress(String ipAddress, X509Certificate certificate) { in verifyIpAddress() argument 84 for (String altName : getSubjectAltNames(certificate, ALT_IPA_NAME)) { in verifyIpAddress() 95 private boolean verifyHostName(String hostName, X509Certificate certificate) { in verifyHostName() argument 98 for (String altName : getSubjectAltNames(certificate, ALT_DNS_NAME)) { in verifyHostName() 106 X500Principal principal = certificate.getSubjectX500Principal(); in verifyHostName() 117 private List<String> getSubjectAltNames(X509Certificate certificate, int type) { in getSubjectAltNames() argument 120 Collection<?> subjectAltNames = certificate.getSubjectAlternativeNames(); in getSubjectAltNames()
|
/external/chromium_org/third_party/webrtc/base/ |
D | nssidentity.cc | 341 CERTCertificate *certificate = NULL; in GenerateInternal() local 393 certificate = CERT_CreateCertificate(serial, subject_name, validity, certreq); in GenerateInternal() 394 if (!certificate) { in GenerateInternal() 399 arena = certificate->arena; in GenerateInternal() 401 rv = SECOID_SetAlgorithmID(arena, &certificate->signature, in GenerateInternal() 407 *(certificate->version.data) = 2; in GenerateInternal() 408 certificate->version.len = 1; in GenerateInternal() 410 if (!SEC_ASN1EncodeItem(arena, &inner_der, certificate, in GenerateInternal() 421 certificate->derCert = signed_cert; in GenerateInternal() 423 identity = new NSSIdentity(keypair, new NSSCertificate(certificate)); in GenerateInternal() [all …]
|
D | sslidentity_unittest.cc | 72 ASSERT_TRUE(identity1_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 75 ASSERT_TRUE(identity2_->certificate().GetSignatureDigestAlgorithm( in TestGetSignatureDigestAlgorithm() 94 rv = identity1_->certificate().ComputeDigest(algorithm, in TestDigest() 100 rv = identity1_->certificate().ComputeDigest(algorithm, in TestDigest() 108 rv = identity2_->certificate().ComputeDigest(algorithm, in TestDigest() 194 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString());
|
D | opensslidentity.h | 116 const std::string& certificate); 119 virtual const OpenSSLCertificate& certificate() const { in certificate() function 133 OpenSSLCertificate* certificate) in OpenSSLIdentity() argument 134 : key_pair_(key_pair), certificate_(certificate) { in OpenSSLIdentity() 136 ASSERT(certificate != NULL); in OpenSSLIdentity()
|
D | sslidentity.cc | 106 const std::string& certificate) { in FromPEMStrings() argument 125 const std::string& certificate) { in FromPEMStrings() argument 126 return OpenSSLIdentity::FromPEMStrings(private_key, certificate); in FromPEMStrings() 144 const std::string& certificate) { in FromPEMStrings() argument 145 return NSSIdentity::FromPEMStrings(private_key, certificate); in FromPEMStrings()
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
D | JcaSimpleSignerInfoVerifierBuilder.java | 42 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 45 …atureAlgorithmIdentifierFinder(), helper.createContentVerifierProvider(certificate), helper.create… in build() 62 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 65 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 97 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 100 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 132 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 135 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
D | JcaSignerInfoVerifierBuilder.java | 72 public SignerInformationVerifier build(X509Certificate certificate) in build() argument 75 …er(sigAlgNameGen, sigAlgIDFinder, helper.createContentVerifierProvider(certificate), digestProvide… in build() 92 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 95 return new JcaContentVerifierProviderBuilder().build(certificate); in createContentVerifierProvider() 127 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 130 … return new JcaContentVerifierProviderBuilder().setProvider(providerName).build(certificate); in createContentVerifierProvider() 162 ContentVerifierProvider createContentVerifierProvider(X509Certificate certificate) in createContentVerifierProvider() argument 165 return new JcaContentVerifierProviderBuilder().setProvider(provider).build(certificate); in createContentVerifierProvider()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
D | IssuerAndSerialNumber.java | 73 Certificate certificate) in IssuerAndSerialNumber() argument 75 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 76 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber() 83 X509CertificateStructure certificate) in IssuerAndSerialNumber() argument 85 this.name = certificate.getIssuer(); in IssuerAndSerialNumber() 86 this.serialNumber = certificate.getSerialNumber(); in IssuerAndSerialNumber()
|
/external/chromium_org/chrome/common/extensions/api/ |
D | enterprise_platform_keys.idl | 40 // certificate. 64 // Imports <code>certificate</code> to the given token if the certified key 67 // store the obtained certificate and to make it available to the operating 70 // |certificate|: The DER encoding of a X.509 certificate. 73 ArrayBuffer certificate, 76 // Removes <code>certificate</code> from the given token if present. 78 // considered during authentication and do not clutter the certificate 79 // choice. Should be used to free storage in the certificate store. 81 // |certificate|: The DER encoding of a X.509 certificate. 84 ArrayBuffer certificate,
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
D | HostnameVerifierTest.java | 396 X509Certificate certificate = certificate("" in subjectAltUsesLocalDomainAndIp() local 407 assertEquals(new X500Principal("CN=localhost"), certificate.getSubjectX500Principal()); in subjectAltUsesLocalDomainAndIp() 409 FakeSSLSession session = new FakeSSLSession(certificate); in subjectAltUsesLocalDomainAndIp() 546 private X509Certificate certificate(String certificate) throws Exception { in certificate() argument 548 new ByteArrayInputStream(certificate.getBytes(Util.UTF_8))); in certificate() 551 private SSLSession session(String certificate) throws Exception { in session() argument 552 return new FakeSSLSession(certificate(certificate)); in session()
|
/external/chromium_org/net/http/ |
D | transport_security_state_static.json | 8 // of certificate pinning to a name and "entries" contains the HSTS details for 17 // For a given pinset, a certificate is accepted if at least one of the 31 // certificate if SNI is sent. Note that this only covers the case where 34 // fatal certificate error will result. Spurious certificate errors are 184 // Dummy entry to test certificate pinning. 187 // (*.)google.com, iff using SSL, must use an acceptable certificate. 256 // chart.apis.google.com is *not* HSTS because the certificate doesn't match 261 // Other Google-related domains that must use an acceptable certificate
|
/external/chromium_org/content/browser/media/ |
D | webrtc_identity_store.cc | 25 const std::string& certificate, in WebRTCIdentityRequestResult() 27 : error(error), certificate(certificate), private_key(private_key) {} in WebRTCIdentityRequestResult() 30 std::string certificate; member 50 &result->certificate); in GenerateIdentityWorker() 110 it->second.Run(result.error, result.certificate, result.private_key); in Post() 158 const std::string& certificate, in OnRequestComplete() argument 163 base::ResetAndReturn(&callback_).Run(error, certificate, private_key); in OnRequestComplete() 242 const std::string& certificate, in BackendFindCallback() argument 247 WebRTCIdentityRequestResult result(error, certificate, private_key); in BackendFindCallback() 279 result->certificate, in GenerateIdentityCallback()
|
/external/chromium_org/ppapi/thunk/ |
D | ppb_x509_certificate_private_thunk.cc | 31 PP_Bool Initialize(PP_Resource certificate, in Initialize() argument 34 EnterX509CertificatePrivate enter(certificate, true); in Initialize() 40 PP_Var GetField(PP_Resource certificate, in GetField() argument 42 EnterX509CertificatePrivate enter(certificate, true); in GetField()
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | KeyStorePrivateKeyEntryTest.java | 62 Certificate certificate = cf.generateCertificate(certArray); in testGetCertificateChain() local 63 assertTrue(certificate instanceof X509Certificate); in testGetCertificateChain() 65 String algorithm = certificate.getPublicKey().getAlgorithm(); in testGetCertificateChain() 74 privateKey, new Certificate[] { certificate }); in testGetCertificateChain()
|
/external/chromium_org/chrome/browser/resources/options/ |
D | certificate_manager.css | 16 #certificate-manager-content-area { 20 #certificate-manager-content-area .subpages-tab-contents { 25 .certificate-tree-table { 29 .certificate-tree {
|
/external/openssl/apps/ |
D | openssl.cnf | 3 # This is mostly being used for generation of certificate requests. 50 certificate = $dir/cacert.pem # The CA certificate 125 # req_extensions = v3_req # The extensions to add to a certificate request 168 # requires this to avoid interpreting an end user certificate as a CA. 173 # the certificate can be used for anything *except* object signing. 178 # For an object signing certificate this would be used. 187 # This is typical in keyUsage for a client certificate. 219 # Extensions to add to a certificate request 242 # Key usage: this is typical for a CA certificate. However since it will 243 # prevent it being used as an test self-signed certificate it is best [all …]
|
/external/chromium_org/net/ssl/ |
D | ssl_client_auth_cache.cc | 22 scoped_refptr<X509Certificate>* certificate) { in Lookup() argument 23 DCHECK(certificate); in Lookup() 29 *certificate = iter->second; in Lookup()
|