/external/chromium/net/base/ |
H A D | ssl_config_service.h | 56 // True if we should send client_cert to the server. 69 scoped_refptr<X509Certificate> client_cert; member in struct:net::SSLConfig
|
/external/chromium/net/flip/ |
H A D | flip_network_transaction.cc | 72 X509Certificate* client_cert, CompletionCallback* callback) { 71 RestartWithCertificate( X509Certificate* client_cert, CompletionCallback* callback) argument
|
/external/wpa_supplicant/ |
H A D | tls.h | 48 * @client_cert: File or reference name for client X.509 certificate in PEM or 50 * @client_cert_blob: client_cert as inlined data or %NULL if not used 84 const char *client_cert; member in struct:tls_connection_params
|
H A D | config_ssid.h | 296 * client_cert - File path to client certificate file (PEM/DER) 307 u8 *client_cert; member in struct:wpa_ssid 312 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 318 * Windows certificate store can be used by leaving client_cert out and 426 * This field is like client_cert, but used for phase 2 (inside
|
H A D | tls_openssl.c | 1322 const char *client_cert, 1326 if (client_cert == NULL && client_cert_blob == NULL) 1340 if (client_cert == NULL) 1344 if (strncmp("keystore://", client_cert, 11) == 0) { 1345 BIO *bio = BIO_from_keystore(&client_cert[11]); 1363 if (SSL_use_certificate_file(conn->ssl, client_cert, 1373 if (SSL_use_certificate_file(conn->ssl, client_cert, 1390 static int tls_global_client_cert(SSL_CTX *ssl_ctx, const char *client_cert) argument 1393 if (client_cert == NULL) 1396 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 1321 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument [all...] |
H A D | tlsv1_client.c | 85 struct x509_certificate *client_cert; member in struct:tlsv1_client 1167 cert = conn->client_cert; 1188 if (cert == conn->client_cert || cert == NULL) { 1669 cert = conn->client_cert; 2126 x509_certificate_chain_free(conn->client_cert); 2551 return tlsv1_client_set_cert_chain(&conn->client_cert, cert,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls.h | 51 * @client_cert: File or reference name for client X.509 certificate in PEM or 53 * @client_cert_blob: client_cert as inlined data or %NULL if not used 91 const char *client_cert; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 1319 const char *client_cert, 1323 if (client_cert == NULL && client_cert_blob == NULL) 1337 if (client_cert == NULL) 1341 if (strncmp("keystore://", client_cert, 11) == 0) { 1342 BIO *bio = BIO_from_keystore(&client_cert[11]); 1360 if (SSL_use_certificate_file(conn->ssl, client_cert, 1370 if (SSL_use_certificate_file(conn->ssl, client_cert, 1387 static int tls_global_client_cert(SSL_CTX *ssl_ctx, const char *client_cert) argument 1390 if (client_cert == NULL) 1393 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 1318 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 109 * client_cert - File path to client certificate file (PEM/DER) 120 u8 *client_cert; member in struct:eap_peer_config 125 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 131 * Windows certificate store can be used by leaving client_cert out and 239 * This field is like client_cert, but used for phase 2 (inside
|
/external/chromium/net/url_request/ |
H A D | url_request_job.cc | 111 net::X509Certificate* client_cert) { 110 ContinueWithCertificate( net::X509Certificate* client_cert) argument
|
H A D | url_request.cc | 394 void URLRequest::ContinueWithCertificate(net::X509Certificate* client_cert) { argument 397 job_->ContinueWithCertificate(client_cert);
|
H A D | url_request_http_job.cc | 370 net::X509Certificate* client_cert) { 379 int rv = transaction_->RestartWithCertificate(client_cert, &start_callback_); 369 ContinueWithCertificate( net::X509Certificate* client_cert) argument
|
/external/chromium/net/http/ |
H A D | http_transaction_unittest.h | 255 virtual int RestartWithCertificate(net::X509Certificate* client_cert, argument
|
H A D | http_cache_transaction.cc | 255 X509Certificate* client_cert, 265 int rv = RestartNetworkRequestWithCertificate(client_cert); 1077 X509Certificate* client_cert) { 1083 int rv = network_trans_->RestartWithCertificate(client_cert, &io_callback_); 254 RestartWithCertificate( X509Certificate* client_cert, CompletionCallback* callback) argument 1076 RestartNetworkRequestWithCertificate( X509Certificate* client_cert) argument
|
H A D | http_network_transaction.cc | 197 X509Certificate* client_cert, 199 ssl_config_.client_cert = client_cert; 200 if (client_cert) { 202 client_cert); 1464 X509Certificate* client_cert = session_->ssl_client_auth_cache()-> local 1466 if (client_cert) { 1470 if (client_cert->fingerprint().Equals(client_certs[i]->fingerprint())) { 1471 ssl_config_.client_cert = client_cert; 196 RestartWithCertificate( X509Certificate* client_cert, CompletionCallback* callback) argument [all...] |
/external/chromium/net/socket/ |
H A D | ssl_client_socket_win.cc | 115 CredHandle* GetHandle(PCCERT_CONTEXT client_cert, int ssl_version_mask) { argument 120 if (client_cert) { 121 CredHandleMapKey key = std::make_pair(client_cert, ssl_version_mask); 133 InitializeHandle(handle, client_cert, ssl_version_mask); 139 // PCCERT_CONTEXT client_cert 146 PCCERT_CONTEXT client_cert, 161 PCCERT_CONTEXT client_cert, 165 if (client_cert) { 167 schannel_cred.paCred = &client_cert; 168 // Schannel will make its own copy of client_cert 160 InitializeHandle(CredHandle* handle, PCCERT_CONTEXT client_cert, int ssl_version_mask) argument 245 GetCredHandle(PCCERT_CONTEXT client_cert, int ssl_version_mask) argument 276 CopyCertContext(PCCERT_CONTEXT client_cert) argument [all...] |
/external/openssl/ssl/ |
H A D | ssltest.c | 468 char *client_cert=TEST_CLIENT_CERT; local 626 client_cert= *(++argv); 922 SSL_CTX_use_certificate_file(c_ctx,client_cert, 925 (client_key?client_key:client_cert),
|