/external/chromium_org/chromeos/ |
H A D | cert_loader.h | 19 #include "net/cert/cert_database.h" 20 #include "net/cert/x509_certificate.h" 36 // When certificates have been loaded (after login completes), or the cert 70 static std::string GetPkcs11IdForCert(const net::X509Certificate& cert); 146 virtual void OnCACertChanged(const net::X509Certificate* cert) OVERRIDE; 147 virtual void OnCertAdded(const net::X509Certificate* cert) OVERRIDE; 148 virtual void OnCertRemoved(const net::X509Certificate* cert) OVERRIDE;
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_util.cc | 7 #include <cert.h> 17 #include "net/cert/cert_database.h" 18 #include "net/cert/nss_cert_database.h" 19 #include "net/cert/x509_cert_types.h" 20 #include "net/cert/x509_certificate.h" 34 bool operator()(const scoped_refptr<net::X509Certificate>& cert) const { 35 return !CertPrincipalMatches(issuer_, cert.get()->issuer()); 46 bool operator()(const scoped_refptr<net::X509Certificate>& cert) const { 47 return !CertPrincipalMatches(subject_, cert.get()->subject()); 57 bool operator()(const scoped_refptr<net::X509Certificate>& cert) cons [all...] |
H A D | client_cert_resolver.cc | 7 #include <cert.h> 30 #include "net/cert/x509_certificate.h" 61 // Returns true if a private key for certificate |cert| is installed. 62 bool HasPrivateKey(const net::X509Certificate& cert) { argument 63 PK11SlotInfo* slot = PK11_KeyForCertExists(cert.os_cert_handle(), NULL, NULL); 75 : cert(certificate), 78 scoped_refptr<net::X509Certificate> cert; member in struct:chromeos::__anon7540::CertAndIssuer 84 return (a.cert->valid_expiry() > b.cert->valid_expiry()); 111 cert_and_issuer.cert 142 const net::X509Certificate& cert = **it; local [all...] |
/external/chromium_org/content/browser/renderer_host/pepper/ |
H A D | pepper_socket_utils.h | 48 bool GetCertificateFields(const net::X509Certificate& cert,
|
/external/chromium_org/google_apis/gcm/ |
H A D | gcm_client_impl.cc | 21 const std::string& cert, 19 Register(const std::string& username, const std::string& app_id, const std::string& cert, const std::vector<std::string>& sender_ids) argument
|
/external/chromium_org/net/cert/ |
H A D | cert_verifier.h | 104 virtual int Verify(X509Certificate* cert,
|
H A D | ct_objects_extractor.h | 11 #include "net/cert/x509_certificate.h" 20 // leaf cert as an X.509v3 extension with the OID 1.3.6.1.4.1.11129.2.4.2. 25 X509Certificate::OSCertHandle cert,
|
H A D | x509_certificate_nss.cc | 5 #include "net/cert/x509_certificate.h" 7 #include <cert.h> 24 #include "net/cert/x509_util_nss.h" 52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); 56 cert->default_nickname_ = nickname; 58 return cert; 213 OSCertHandle cert) { 217 DCHECK(NULL != cert->derCert.data); 218 DCHECK_NE(0U, cert->derCert.len); 221 cert 212 CalculateFingerprint( OSCertHandle cert) argument [all...] |
H A D | x509_certificate_openssl.cc | 5 #include "net/cert/x509_certificate.h" 24 #include "net/cert/x509_util_openssl.h" 48 certs = pkcs7_cert.get()->d.sign->cert; 50 certs = pkcs7_cert.get()->d.signed_and_enveloped->cert; 74 void ParsePrincipal(X509Certificate::OSCertHandle cert, argument 99 void ParseSubjectAltName(X509Certificate::OSCertHandle cert, argument 103 int index = X509_get_ext_by_NID(cert, NID_subject_alt_name, -1); 104 X509_EXTENSION* alt_name_ext = X509_get_ext(cert, index); 132 LOG(WARNING) << "Bad sized IP Address in cert: " << ip_addr_len; 191 DERCache* SetDERCache(X509Certificate::OSCertHandle cert, argument 213 GetDERAndCacheIfNeeded(X509Certificate::OSCertHandle cert, DERCache* der_cache) argument 296 CalculateFingerprint(OSCertHandle cert) argument 334 X509* cert = d2i_X509(NULL, &d2i_data, length); local [all...] |
H A D | cert_verify_proc_win.cc | 5 #include "net/cert/cert_verify_proc_win.h" 18 #include "net/cert/asn1_util.h" 19 #include "net/cert/cert_status_flags.h" 20 #include "net/cert/cert_verifier.h" 21 #include "net/cert/cert_verify_result.h" 22 #include "net/cert/crl_set.h" 23 #include "net/cert/ev_root_ca_metadata.h" 24 #include "net/cert/test_root_certs.h" 25 #include "net/cert/x509_certificate.h" 26 #include "net/cert/x509_certificate_known_roots_wi 186 CertSubjectCommonNameHasNull(PCCERT_CONTEXT cert) argument 283 PCCERT_CONTEXT cert = element[num_elements - 1]->pCertContext; local 321 PCCERT_CONTEXT cert = element[i]->pCertContext; local 352 GetCertPoliciesInfo(PCCERT_CONTEXT cert, scoped_ptr_malloc<CERT_POLICIES_INFO>* output) argument 410 PCCERT_CONTEXT cert = element[i]->pCertContext; local 470 PCCERT_CONTEXT cert = element[i]->pCertContext; local 543 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
/external/chromium_org/net/ssl/ |
H A D | ssl_client_auth_cache.h | 14 #include "net/cert/cert_database.h" 50 virtual void OnCertAdded(const X509Certificate* cert) OVERRIDE;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | fakesslidentity.h | 84 static FakeSSLCertificate* DupCert(FakeSSLCertificate cert) { argument 85 return cert.GetReference(); 94 explicit FakeSSLIdentity(const FakeSSLCertificate& cert) : cert_(cert) {} argument
|
H A D | nssidentity.h | 33 #include "cert.h" 71 explicit NSSCertificate(CERTCertificate* cert); 102 NSSCertificate(CERTCertificate* cert, SSLCertChain* chain); 128 NSSIdentity(NSSKeyPair* keypair, NSSCertificate* cert) : argument 129 keypair_(keypair), certificate_(cert) {}
|
H A D | nssidentity.cc | 41 #include "cert.h" 95 NSSCertificate::NSSCertificate(CERTCertificate* cert) argument 96 : certificate_(CERT_DupCertificate(cert)) { 100 static void DeleteCert(SSLCertificate* cert) { argument 101 delete cert; 105 // Copy the first cert into certificate_. 107 certificate_ = CERT_DupCertificate(node->cert); 113 certs.push_back(new NSSCertificate(node->cert)); 124 NSSCertificate::NSSCertificate(CERTCertificate* cert, SSLCertChain* chain) argument 125 : certificate_(CERT_DupCertificate(cert)) { 141 CERTCertificate *cert = CERT_NewTempCertificate(CERT_GetDefaultCertDB(), local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/external/chromium/chrome/browser/ui/gtk/ |
H A D | certificate_viewer.cc | 91 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert); 95 net::X509Certificate::OSCertHandle cert); 106 // The certificate hierarchy (leaf cert first). 185 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local 199 x509_certificate_model::GetUsageStrings(cert, &usages); 226 cert, alternative_text))); 230 cert, alternative_text)); 234 cert, alternative_text)); 238 cert, alternative_text)); 248 cert, alternative_tex 319 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument 449 cert, &extensions); local 518 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument 710 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate::OSCertHandle cert) argument 717 ShowCertificateViewer(gfx::NativeWindow parent, net::X509Certificate* cert) argument [all...] |
/external/chromium/net/base/ |
H A D | x509_certificate_nss.cc | 7 #include <cert.h> 67 if (p->value.pointer.cert) { 68 CERT_DestroyCertificate(p->value.pointer.cert); 69 p->value.pointer.cert = NULL; 129 // Map PORT_GetError() return values to our cert status flags. 184 SECAlgorithmID& signature = node->cert->signature; 614 SHA1Fingerprint CertPublicKeyHash(CERTCertificate* cert) { argument 617 cert->derPublicKey.data, cert->derPublicKey.len); 628 hashes->push_back(CertPublicKeyHash(node->cert)); 685 CERTCertificate* cert = CERT_CreateCertificate(serial_number, subject_name, local 983 CalculateFingerprint( OSCertHandle cert) argument [all...] |
H A D | cert_verifier.cc | 125 CertVerifierWorker(X509Certificate* cert, argument 129 : cert_(cert), 306 int CertVerifier::Verify(X509Certificate* cert, argument 321 const RequestParams key = {cert->fingerprint(), hostname, flags}; 347 CertVerifierWorker* worker = new CertVerifierWorker(cert, hostname, flags, 389 void CertVerifier::HandleResult(X509Certificate* cert, argument 404 const RequestParams key = {cert->fingerprint(), hostname, flags}; 438 void CertVerifier::OnCertTrustChanged(const X509Certificate* cert) { argument 463 int SingleRequestCertVerifier::Verify(X509Certificate* cert, argument 473 return cert [all...] |
/external/chromium_org/chrome/browser/ui/gtk/ |
H A D | certificate_viewer_gtk.cc | 21 #include "net/cert/x509_certificate.h" 94 GtkTreeStore* store, net::X509Certificate::OSCertHandle cert); 98 net::X509Certificate::OSCertHandle cert); 109 // The certificate hierarchy (leaf cert first). 195 net::X509Certificate::OSCertHandle cert = cert_chain_list_.front(); local 209 x509_certificate_model::GetUsageStrings(cert, &usages); 236 cert, alternative_text))); 240 cert, alternative_text)); 244 cert, alternative_text)); 248 cert, alternative_tex 333 FillTreeStoreWithCertFields( GtkTreeStore* store, net::X509Certificate::OSCertHandle cert) argument 463 cert, &extensions); local 532 CreateFieldsTreeStore( net::X509Certificate::OSCertHandle cert) argument 723 ShowCertificateViewer(content::WebContents* web_contents, gfx::NativeWindow parent, net::X509Certificate* cert) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 304 if (priv->cert) 305 CertFreeCertificateContext(priv->cert); 332 if (strncmp(name, "cert://", 7) == 0) { 367 X509 *cert = NULL; local 373 (strncmp(name, "cert://", 7) != 0 && 387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 388 if (priv->cert == NULL) { 389 priv->cert = cryptoapi_find_cert( 392 if (priv->cert 469 X509 *cert; local 1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1099 tls_match_altsubject(X509 *cert, const char *match) argument 1180 get_x509_cert(X509 *cert) argument 1205 struct wpabuf *cert = NULL; local 1228 struct wpabuf *cert = NULL; local 1309 struct wpabuf *cert; local 1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1787 X509 *cert; local 1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1919 X509 *cert; member in struct:__anon29133 1946 X509 *cert; local 1973 X509 *cert; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 304 if (priv->cert) 305 CertFreeCertificateContext(priv->cert); 332 if (strncmp(name, "cert://", 7) == 0) { 367 X509 *cert = NULL; local 373 (strncmp(name, "cert://", 7) != 0 && 387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 388 if (priv->cert == NULL) { 389 priv->cert = cryptoapi_find_cert( 392 if (priv->cert 469 X509 *cert; local 1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1099 tls_match_altsubject(X509 *cert, const char *match) argument 1180 get_x509_cert(X509 *cert) argument 1205 struct wpabuf *cert = NULL; local 1228 struct wpabuf *cert = NULL; local 1309 struct wpabuf *cert; local 1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1787 X509 *cert; local 1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1919 X509 *cert; member in struct:__anon29363 1946 X509 *cert; local 1973 X509 *cert; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 181 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 304 if (priv->cert) 305 CertFreeCertificateContext(priv->cert); 332 if (strncmp(name, "cert://", 7) == 0) { 367 X509 *cert = NULL; local 373 (strncmp(name, "cert://", 7) != 0 && 387 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 388 if (priv->cert == NULL) { 389 priv->cert = cryptoapi_find_cert( 392 if (priv->cert 469 X509 *cert; local 1077 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1099 tls_match_altsubject(X509 *cert, const char *match) argument 1180 get_x509_cert(X509 *cert) argument 1205 struct wpabuf *cert = NULL; local 1228 struct wpabuf *cert = NULL; local 1309 struct wpabuf *cert; local 1473 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1787 X509 *cert; local 1912 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1919 X509 *cert; member in struct:__anon29595 1946 X509 *cert; local 1973 X509 *cert; local [all...] |