Searched refs:peer_cert (Results 1 - 13 of 13) sorted by relevance
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 155 talk_base::scoped_ptr<talk_base::SSLCertificate> peer_cert( 157 if (peer_cert.get() == NULL) { 164 // peer_cert so as not to have to parse it a second time when 359 talk_base::SSLCertificate* peer_cert = local 361 if (peer_cert == NULL) { 372 ssl_stream->SetPeerCertificate(peer_cert); // pass ownership of certificate.
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslstreamadapter.h | 136 const X509* peer_cert);
|
H A D | opensslstreamadapter.cc | 622 const X509* peer_cert) { 633 ASSERT(peer_cert != NULL); 620 SSLPostConnectionCheck(SSL* ssl, const char* server_name, const X509* peer_cert) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 61 } peer_cert; member in union:tls_event_data
|
H A D | tls_openssl.c | 1172 ev.peer_cert.cert = cert; 1181 ev.peer_cert.hash = hash; 1182 ev.peer_cert.hash_len = sizeof(hash); 1186 ev.peer_cert.depth = depth; 1187 ev.peer_cert.subject = subject;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 61 } peer_cert; member in union:tls_event_data
|
H A D | tls_openssl.c | 1172 ev.peer_cert.cert = cert; 1181 ev.peer_cert.hash = hash; 1182 ev.peer_cert.hash_len = sizeof(hash); 1186 ev.peer_cert.depth = depth; 1187 ev.peer_cert.subject = subject;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 61 } peer_cert; member in union:tls_event_data
|
H A D | tls_openssl.c | 1172 ev.peer_cert.cert = cert; 1181 ev.peer_cert.hash = hash; 1182 ev.peer_cert.hash_len = sizeof(hash); 1186 ev.peer_cert.depth = depth; 1187 ev.peer_cert.subject = subject;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1316 if (data->peer_cert.hash) { 1317 size_t len = data->peer_cert.hash_len * 2 + 1; 1321 data->peer_cert.hash, 1322 data->peer_cert.hash_len); 1327 data->peer_cert.depth, 1328 data->peer_cert.subject, 1329 hash_hex, data->peer_cert.cert);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 1316 if (data->peer_cert.hash) { 1317 size_t len = data->peer_cert.hash_len * 2 + 1; 1321 data->peer_cert.hash, 1322 data->peer_cert.hash_len); 1327 data->peer_cert.depth, 1328 data->peer_cert.subject, 1329 hash_hex, data->peer_cert.cert);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1316 if (data->peer_cert.hash) { 1317 size_t len = data->peer_cert.hash_len * 2 + 1; 1321 data->peer_cert.hash, 1322 data->peer_cert.hash_len); 1327 data->peer_cert.depth, 1328 data->peer_cert.subject, 1329 hash_hex, data->peer_cert.cert);
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 2752 X509 *peer_cert; local 2761 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509; 2762 if (!peer_cert) 2763 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509; 2764 if (!peer_cert) { 2769 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
|
Completed in 233 milliseconds