Searched refs:cert (Results 276 - 300 of 869) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/chromeos/
H A Dcert_loader.h19 #include "net/cert/cert_database.h"
20 #include "net/cert/x509_certificate.h"
36 // When certificates have been loaded (after login completes), or the cert
70 static std::string GetPkcs11IdForCert(const net::X509Certificate& cert);
146 virtual void OnCACertChanged(const net::X509Certificate* cert) OVERRIDE;
147 virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE;
148 virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE;
/external/chromium_org/chromeos/network/
H A Dclient_cert_util.cc7 #include <cert.h>
17 #include "net/cert/cert_database.h"
18 #include "net/cert/nss_cert_database.h"
19 #include "net/cert/x509_cert_types.h"
20 #include "net/cert/x509_certificate.h"
34 bool operator()(const scoped_refptr<net::X509Certificate>& cert) const {
35 return !CertPrincipalMatches(issuer_, cert.get()->issuer());
46 bool operator()(const scoped_refptr<net::X509Certificate>& cert) const {
47 return !CertPrincipalMatches(subject_, cert.get()->subject());
57 bool operator()(const scoped_refptr<net::X509Certificate>& cert) cons
[all...]
H A Dclient_cert_resolver.cc7 #include <cert.h>
30 #include "net/cert/x509_certificate.h"
61 // Returns true if a private key for certificate |cert| is installed.
62 bool HasPrivateKey(const net::X509Certificate& cert) { argument
63 PK11SlotInfo* slot = PK11_KeyForCertExists(cert.os_cert_handle(), NULL, NULL);
75 : cert(certificate),
78 scoped_refptr<net::X509Certificate> cert; member in struct:chromeos::__anon7540::CertAndIssuer
84 return (a.cert->valid_expiry() > b.cert->valid_expiry());
111 cert_and_issuer.cert
142 const net::X509Certificate& cert = **it; local
[all...]
/external/chromium_org/content/browser/renderer_host/pepper/
H A Dpepper_socket_utils.h48 bool GetCertificateFields(const net::X509Certificate& cert,
/external/chromium_org/google_apis/gcm/
H A Dgcm_client_impl.cc21 const std::string& cert,
19 Register(const std::string& username, const std::string& app_id, const std::string& cert, const std::vector<std::string>& sender_ids) argument
/external/chromium_org/net/cert/
H A Dcert_verifier.h104 virtual int Verify(X509Certificate* cert,
H A Dct_objects_extractor.h11 #include "net/cert/x509_certificate.h"
20 // leaf cert as an X.509v3 extension with the OID 1.3.6.1.4.1.11129.2.4.2.
25 X509Certificate::OSCertHandle cert,
H A Dx509_certificate_nss.cc5 #include "net/cert/x509_certificate.h"
7 #include <cert.h>
24 #include "net/cert/x509_util_nss.h"
52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles());
56 cert->default_nickname_ = nickname;
58 return cert;
213 OSCertHandle cert) {
217 DCHECK(NULL != cert->derCert.data);
218 DCHECK_NE(0U, cert->derCert.len);
221 cert
212 CalculateFingerprint( OSCertHandle cert) argument
[all...]
H A Dx509_certificate_openssl.cc5 #include "net/cert/x509_certificate.h"
24 #include "net/cert/x509_util_openssl.h"
48 certs = pkcs7_cert.get()->d.sign->cert;
50 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert;
74 void ParsePrincipal(X509Certificate::OSCertHandle cert, argument
99 void ParseSubjectAltName(X509Certificate::OSCertHandle cert, argument
103 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1);
104 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index);
132 LOG(WARNING) << "Bad sized IP Address in cert: " << ip_addr_len;
191 DERCache* SetDERCache(X509Certificate::OSCertHandle cert, argument
213 GetDERAndCacheIfNeeded(X509Certificate::OSCertHandle cert, DERCache* der_cache) argument
296 CalculateFingerprint(OSCertHandle cert) argument
334 X509* cert = d2i_X509(NULL, &d2i_data, length); local
[all...]
H A Dcert_verify_proc_win.cc5 #include "net/cert/cert_verify_proc_win.h"
18 #include "net/cert/asn1_util.h"
19 #include "net/cert/cert_status_flags.h"
20 #include "net/cert/cert_verifier.h"
21 #include "net/cert/cert_verify_result.h"
22 #include "net/cert/crl_set.h"
23 #include "net/cert/ev_root_ca_metadata.h"
24 #include "net/cert/test_root_certs.h"
25 #include "net/cert/x509_certificate.h"
26 #include "net/cert/x509_certificate_known_roots_wi
186 CertSubjectCommonNameHasNull(PCCERT_CONTEXT cert) argument
283 PCCERT_CONTEXT cert = element[num_elements - 1]->pCertContext; local
321 PCCERT_CONTEXT cert = element[i]->pCertContext; local
352 GetCertPoliciesInfo(PCCERT_CONTEXT cert, scoped_ptr_malloc<CERT_POLICIES_INFO>* output) argument
410 PCCERT_CONTEXT cert = element[i]->pCertContext; local
470 PCCERT_CONTEXT cert = element[i]->pCertContext; local
543 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
/external/chromium_org/net/ssl/
H A Dssl_client_auth_cache.h14 #include "net/cert/cert_database.h"
50 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE;
/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dfakesslidentity.h84 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) { argument
85 return cert.GetReference();
94 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {} argument
H A Dnssidentity.h33 #include "cert.h"
71 explicit NSSCertificate(CERTCertificate* cert);
102 NSSCertificate(CERTCertificate* cert, SSLCertChain* chain);
128 NSSIdentity(NSSKeyPair* keypair, NSSCertificate* cert) : argument
129 keypair_(keypair), certificate_(cert) {}
H A Dnssidentity.cc41 #include "cert.h"
95 NSSCertificate::NSSCertificate(CERTCertificate* cert) argument
96 : certificate_(CERT_DupCertificate(cert)) {
100 static void DeleteCert(SSLCertificate* cert) { argument
101 delete cert;
105 // Copy the first cert into certificate_.
107 certificate_ = CERT_DupCertificate(node->cert);
113 certs.push_back(new NSSCertificate(node->cert));
124 NSSCertificate::NSSCertificate(CERTCertificate* cert, SSLCertChain* chain) argument
125 : certificate_(CERT_DupCertificate(cert)) {
141 CERTCertificate *cert = CERT_NewTempCertificate(CERT_GetDefaultCertDB(), local
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_kiss.c74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
76 * or it should point to a valid STACK structure. pkey and cert can be
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
95 if(cert)
96 *cert = NULL;
135 if (pkey && *pkey && cert && !*cert)
139 *cert = x;
167 if (cert && *cert)
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
H A Dpk7_enc.c70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
/external/openssl/crypto/pkcs12/
H A Dp12_kiss.c74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
76 * or it should point to a valid STACK structure. pkey and cert can be
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
95 if(cert)
96 *cert = NULL;
135 if (pkey && *pkey && cert && !*cert)
139 *cert = x;
167 if (cert && *cert)
[all...]
/external/openssl/crypto/pkcs7/
H A Dpk7_enc.c70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
/external/chromium/chrome/browser/ui/gtk/
H A Dcertificate_viewer.cc91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert);
95 net::X509Certificate::OSCertHandle cert);
106 // The certificate hierarchy (leaf cert first).
185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local
199 x509_certificate_model::GetUsageStrings(cert, &usages);
226 cert, alternative_text)));
230 cert, alternative_text));
234 cert, alternative_text));
238 cert, alternative_text));
248 cert, alternative_tex
319 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument
449 cert, &extensions); local
518 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument
710 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate::OSCertHandle cert) argument
717 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate* cert) argument
[all...]
/external/chromium/net/base/
H A Dx509_certificate_nss.cc7 #include <cert.h>
67 if (p->value.pointer.cert) {
68 CERT_DestroyCertificate(p->value.pointer.cert);
69 p->value.pointer.cert = NULL;
129 // Map PORT_GetError() return values to our cert status flags.
184 SECAlgorithmID& signature = node->cert->signature;
614 SHA1Fingerprint CertPublicKeyHash(CERTCertificate* cert) { argument
617 cert->derPublicKey.data, cert->derPublicKey.len);
628 hashes->push_back(CertPublicKeyHash(node->cert));
685 CERTCertificate* cert = CERT_CreateCertificate(serial_number, subject_name, local
983 CalculateFingerprint( OSCertHandle cert) argument
[all...]
H A Dcert_verifier.cc125 CertVerifierWorker(X509Certificate* cert, argument
129 : cert_(cert),
306 int CertVerifier::Verify(X509Certificate* cert, argument
321 const RequestParams key = {cert->fingerprint(), hostname, flags};
347 CertVerifierWorker* worker = new CertVerifierWorker(cert, hostname, flags,
389 void CertVerifier::HandleResult(X509Certificate* cert, argument
404 const RequestParams key = {cert->fingerprint(), hostname, flags};
438 void CertVerifier::OnCertTrustChanged(const X509Certificate* cert) { argument
463 int SingleRequestCertVerifier::Verify(X509Certificate* cert, argument
473 return cert
[all...]
/external/chromium_org/chrome/browser/ui/gtk/
H A Dcertificate_viewer_gtk.cc21 #include "net/cert/x509_certificate.h"
94 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert);
98 net::X509Certificate::OSCertHandle cert);
109 // The certificate hierarchy (leaf cert first).
195 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local
209 x509_certificate_model::GetUsageStrings(cert, &usages);
236 cert, alternative_text)));
240 cert, alternative_text));
244 cert, alternative_text));
248 cert, alternative_tex
333 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument
463 cert, &extensions); local
532 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument
723 ShowCertificateViewer(content::WebContents* web_contents, gfx::NativeWindow parent, net::X509Certificate* cert) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
304 if (priv->cert)
305 CertFreeCertificateContext(priv->cert);
332 if (strncmp(name, "cert://", 7) == 0) {
367 X509 *cert = NULL; local
373 (strncmp(name, "cert://", 7) != 0 &&
387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
388 if (priv->cert == NULL) {
389 priv->cert = cryptoapi_find_cert(
392 if (priv->cert
469 X509 *cert; local
1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument
1099 tls_match_altsubject(X509 *cert, const char *match) argument
1180 get_x509_cert(X509 *cert) argument
1205 struct wpabuf *cert = NULL; local
1228 struct wpabuf *cert = NULL; local
1309 struct wpabuf *cert; local
1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1787 X509 *cert; local
1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument
1919 X509 *cert; member in struct:__anon29133
1946 X509 *cert; local
1973 X509 *cert; local
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
304 if (priv->cert)
305 CertFreeCertificateContext(priv->cert);
332 if (strncmp(name, "cert://", 7) == 0) {
367 X509 *cert = NULL; local
373 (strncmp(name, "cert://", 7) != 0 &&
387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
388 if (priv->cert == NULL) {
389 priv->cert = cryptoapi_find_cert(
392 if (priv->cert
469 X509 *cert; local
1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument
1099 tls_match_altsubject(X509 *cert, const char *match) argument
1180 get_x509_cert(X509 *cert) argument
1205 struct wpabuf *cert = NULL; local
1228 struct wpabuf *cert = NULL; local
1309 struct wpabuf *cert; local
1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1787 X509 *cert; local
1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument
1919 X509 *cert; member in struct:__anon29363
1946 X509 *cert; local
1973 X509 *cert; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
304 if (priv->cert)
305 CertFreeCertificateContext(priv->cert);
332 if (strncmp(name, "cert://", 7) == 0) {
367 X509 *cert = NULL; local
373 (strncmp(name, "cert://", 7) != 0 &&
387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
388 if (priv->cert == NULL) {
389 priv->cert = cryptoapi_find_cert(
392 if (priv->cert
469 X509 *cert; local
1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument
1099 tls_match_altsubject(X509 *cert, const char *match) argument
1180 get_x509_cert(X509 *cert) argument
1205 struct wpabuf *cert = NULL; local
1228 struct wpabuf *cert = NULL; local
1309 struct wpabuf *cert; local
1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1787 X509 *cert; local
1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument
1919 X509 *cert; member in struct:__anon29595
1946 X509 *cert; local
1973 X509 *cert; local
[all...]

Completed in 681 milliseconds

<<11121314151617181920>>