/external/chromium_org/chromeos/network/ |
H A D | client_cert_util.h | 27 namespace client_cert { namespace in namespace:chromeos 57 } // namespace client_cert
|
H A D | client_cert_util.cc | 25 namespace client_cert { namespace in namespace:chromeos 193 void SetShillProperties(const client_cert::ConfigType cert_config_type, 241 } // namespace client_cert
|
/external/chromium/chrome/browser/ui/views/ |
H A D | ssl_client_certificate_selector_win.cc | 55 net::X509Certificate* client_cert = cert_request_info->client_certs[i]; local 57 client_cert->os_cert_handle())) { 58 cert = client_cert;
|
/external/chromium/net/base/ |
H A D | ssl_config_service.h | 78 // True if we should send client_cert to the server. 94 scoped_refptr<X509Certificate> client_cert; member in struct:net::SSLConfig
|
/external/chromium_org/chrome/browser/ui/android/ |
H A D | ssl_client_certificate_request.cc | 33 const scoped_refptr<net::X509Certificate>& client_cert, 37 client_cert.get(), private_key.get()); 175 scoped_refptr<net::X509Certificate> client_cert( 177 if (!client_cert.get()) { 199 client_cert, 201 base::Bind(*callback, client_cert)); 32 RecordClientCertificateKey( const scoped_refptr<net::X509Certificate>& client_cert, ScopedEVP_PKEY private_key) argument
|
/external/chromium_org/net/ssl/ |
H A D | openssl_client_key_store.cc | 97 const X509Certificate* client_cert, 100 if (!client_cert || !private_key) 104 ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 113 const X509Certificate* client_cert, 115 if (!client_cert) 118 ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 96 RecordClientCertPrivateKey( const X509Certificate* client_cert, EVP_PKEY* private_key) argument 112 FetchClientCertPrivateKey( const X509Certificate* client_cert, ScopedEVP_PKEY* private_key) argument
|
H A D | ssl_config_service.h | 127 // True if we should send client_cert to the server. 151 scoped_refptr<X509Certificate> client_cert; member in struct:net::SSLConfig
|
/external/chromium/net/test/ |
H A D | openssl_helper.cc | 58 bool fail_resume = false, client_cert = false, npn = false; local 86 client_cert = true; 171 if (client_cert)
|
/external/chromium_org/net/test/ |
H A D | openssl_helper.cc | 58 bool fail_resume = false, client_cert = false, npn = false; local 86 client_cert = true; 171 if (client_cert)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 245 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 245 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 245 * This field is like client_cert, but used for phase 2 (inside
|
/external/chromium/net/http/ |
H A D | http_transaction_unittest.cc | 266 net::X509Certificate* client_cert, 265 RestartWithCertificate( net::X509Certificate* client_cert, net::CompletionCallback* callback) argument
|
H A D | http_cache_transaction.cc | 261 X509Certificate* client_cert, 271 int rv = RestartNetworkRequestWithCertificate(client_cert); 1608 X509Certificate* client_cert) { 1614 int rv = network_trans_->RestartWithCertificate(client_cert, &io_callback_); 260 RestartWithCertificate( X509Certificate* client_cert, CompletionCallback* callback) argument 1607 RestartNetworkRequestWithCertificate( X509Certificate* client_cert) argument
|
H A D | http_network_transaction.cc | 187 X509Certificate* client_cert, 195 ssl_config_.client_cert = client_cert; 197 response_.cert_request_info->host_and_port, client_cert); 1114 scoped_refptr<X509Certificate> client_cert; local 1116 response_.cert_request_info->host_and_port, &client_cert); 1123 if (client_cert) { 1128 if (client_cert->Equals(client_certs[i])) { 1141 ssl_config_.client_cert = client_cert; 186 RestartWithCertificate( X509Certificate* client_cert, CompletionCallback* callback) argument [all...] |
/external/chromium/net/url_request/ |
H A D | url_request_job.cc | 163 X509Certificate* client_cert) { 162 ContinueWithCertificate( X509Certificate* client_cert) argument
|
H A D | url_request.cc | 555 void URLRequest::ContinueWithCertificate(X509Certificate* client_cert) { argument 558 job_->ContinueWithCertificate(client_cert);
|
H A D | url_request_http_job.cc | 992 X509Certificate* client_cert) { 1003 int rv = transaction_->RestartWithCertificate(client_cert, &start_callback_); 991 ContinueWithCertificate( X509Certificate* client_cert) argument
|
/external/chromium_org/net/http/ |
H A D | http_transaction_unittest.cc | 296 net::X509Certificate* client_cert, 295 RestartWithCertificate( net::X509Certificate* client_cert, const net::CompletionCallback& callback) argument
|
H A D | http_network_transaction.cc | 210 X509Certificate* client_cert, const CompletionCallback& callback) { 220 ssl_config->client_cert = client_cert; 222 response_.cert_request_info->host_and_port, client_cert); 1177 scoped_refptr<X509Certificate> client_cert; local 1179 response_.cert_request_info->host_and_port, &client_cert); 1186 if (client_cert.get()) { 1191 client_cert->IsIssuedByEncoded(cert_authorities); 1202 ssl_config->client_cert = client_cert; 209 RestartWithCertificate( X509Certificate* client_cert, const CompletionCallback& callback) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 99 * @client_cert: File or reference name for client X.509 certificate in PEM or 101 * @client_cert_blob: client_cert as inlined data or %NULL if not used 140 const char *client_cert; member in struct:tls_connection_params
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 99 * @client_cert: File or reference name for client X.509 certificate in PEM or 101 * @client_cert_blob: client_cert as inlined data or %NULL if not used 140 const char *client_cert; member in struct:tls_connection_params
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 99 * @client_cert: File or reference name for client X.509 certificate in PEM or 101 * @client_cert_blob: client_cert as inlined data or %NULL if not used 140 const char *client_cert; member in struct:tls_connection_params
|
/external/chromium_org/net/url_request/ |
H A D | url_request_job.cc | 185 X509Certificate* client_cert) { 184 ContinueWithCertificate( X509Certificate* client_cert) argument
|
/external/chromium/net/socket/ |
H A D | ssl_client_socket_win.cc | 146 int GetHandle(PCCERT_CONTEXT client_cert, argument 153 if (client_cert) { 154 CredHandleMapKey key = std::make_pair(client_cert, ssl_version_mask); 166 int result = InitializeHandle(handle, client_cert, ssl_version_mask); 176 // PCCERT_CONTEXT client_cert 184 PCCERT_CONTEXT client_cert, 202 PCCERT_CONTEXT client_cert, 206 if (client_cert) { 208 schannel_cred.paCred = &client_cert; 209 // Schannel will make its own copy of client_cert 201 InitializeHandle(CredHandle* handle, PCCERT_CONTEXT client_cert, int ssl_version_mask) argument 284 GetCredHandle(PCCERT_CONTEXT client_cert, int ssl_version_mask, CredHandle** handle_ptr) argument 356 CopyCertContext(PCCERT_CONTEXT client_cert) argument [all...] |