/external/chromium_org/chromeos/network/ |
H A D | certificate_pattern.cc | 68 dict.GetStringWithoutPathExpansion(onc::client_cert::kCommonName, 70 dict.GetStringWithoutPathExpansion(onc::client_cert::kLocality, &locality_); 71 dict.GetStringWithoutPathExpansion(onc::client_cert::kOrganization, 73 dict.GetStringWithoutPathExpansion(onc::client_cert::kOrganizationalUnit, 105 if (dict.GetListWithoutPathExpansion(onc::client_cert::kIssuerCAPEMs, 111 if (dict.GetDictionaryWithoutPathExpansion(onc::client_cert::kIssuer, 117 if (dict.GetDictionaryWithoutPathExpansion(onc::client_cert::kSubject, 123 if (dict.GetListWithoutPathExpansion(onc::client_cert::kEnrollmentURI,
|
H A D | client_cert_util.h | 27 namespace client_cert { namespace in namespace:chromeos 92 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, 101 } // namespace client_cert
|
H A D | client_cert_resolver.cc | 36 client_cert::ConfigType config_type, 45 client_cert::ConfigType cert_config_type; 95 const client_cert::ClientCertConfig& client_cert_config) 100 client_cert::ClientCertConfig cert_config; 111 !client_cert::CertPrincipalMatches(pattern.issuer(), 116 !client_cert::CertPrincipalMatches(pattern.subject(), 269 const client_cert::ConfigType client_cert_type, 282 client_cert::SetEmptyShillProperties(client_cert_type, shill_properties); 295 client_cert::SetShillProperties( 397 client_cert [all...] |
H A D | network_cert_migrator.cc | 116 chromeos::client_cert::ConfigType config_type = 117 chromeos::client_cert::CONFIG_TYPE_NONE; 118 chromeos::client_cert::GetClientCertFromShillProperties( 120 if (config_type == chromeos::client_cert::CONFIG_TYPE_NONE || 126 if (config_type == chromeos::client_cert::CONFIG_TYPE_OPENVPN) 135 chromeos::client_cert::SetEmptyShillProperties(config_type, 147 chromeos::client_cert::SetShillProperties(
|
H A D | network_connection_handler.cc | 425 client_cert::ClientCertConfig cert_config_from_policy; 427 client_cert::OncToClientCertConfig(*user_policy, &cert_config_from_policy); 429 client_cert::ConfigType client_cert_type = client_cert::CONFIG_TYPE_NONE; 432 client_cert_type = client_cert::CONFIG_TYPE_OPENVPN; 444 onc::client_cert::kClientCertTypeNone) { 445 client_cert_type = client_cert::CONFIG_TYPE_IPSEC; 449 client_cert_type = client_cert::CONFIG_TYPE_EAP; 453 if (client_cert_type != client_cert::CONFIG_TYPE_NONE) { 473 onc::client_cert [all...] |
H A D | client_cert_resolver.h | 56 const client_cert::ConfigType client_cert_type,
|
/external/chromium_org/net/ssl/ |
H A D | openssl_client_key_store.cc | 84 const X509Certificate* client_cert, 87 if (!client_cert || !private_key) 91 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 100 const X509Certificate* client_cert) { 101 if (!client_cert) 104 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 83 RecordClientCertPrivateKey( const X509Certificate* client_cert, EVP_PKEY* private_key) argument 99 FetchClientCertPrivateKey( const X509Certificate* client_cert) argument
|
H A D | ssl_client_auth_cache.h | 43 // |client_cert| indicates a preference that no client certificate should 45 void Add(const HostPortPair& server, X509Certificate* client_cert);
|
H A D | ssl_config.h | 136 // True if we should send client_cert to the server. 160 scoped_refptr<X509Certificate> client_cert; member in struct:net::SSLConfig
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | polochallengeresponse.h | 34 // @param client_cert the client certificate 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 52 X509* client_cert; member in class:polo::pairing::PoloChallengeResponse
|
H A D | polochallengeresponse.cc | 26 PoloChallengeResponse::PoloChallengeResponse(X509* client_cert, argument 28 : client_cert(client_cert), 33 EVP_PKEY* client_pkey = X509_get_pubkey(client_cert);
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_normalizer.cc | 107 eap->GetStringWithoutPathExpansion(::onc::client_cert::kClientCertType, 110 ::onc::client_cert::kClientCertPattern, 111 clientcert_type == ::onc::client_cert::kPattern); 113 ::onc::client_cert::kClientCertRef, 114 clientcert_type == ::onc::client_cert::kRef); 130 ipsec, ::onc::client_cert::kClientCertType, auth_type == kCert); 136 ipsec->GetStringWithoutPathExpansion(::onc::client_cert::kClientCertType, 139 ::onc::client_cert::kClientCertPattern, 140 clientcert_type == ::onc::client_cert::kPattern); 142 ::onc::client_cert [all...] |
H A D | onc_signature.cc | 45 { ::onc::client_cert::kCommonName, &kStringSignature}, 46 { ::onc::client_cert::kLocality, &kStringSignature}, 47 { ::onc::client_cert::kOrganization, &kStringSignature}, 48 { ::onc::client_cert::kOrganizationalUnit, &kStringSignature}, 53 { ::onc::client_cert::kEnrollmentURI, &kStringListSignature}, 54 { ::onc::client_cert::kIssuer, &kIssuerSubjectPatternSignature}, 55 { ::onc::client_cert::kIssuerCARef, &kStringListSignature}, 57 { ::onc::client_cert::kIssuerCAPEMs, &kStringListSignature}, 58 { ::onc::client_cert::kSubject, &kIssuerSubjectPatternSignature}, 64 { ::onc::client_cert [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
H A D | polochallengeresponsetest.cc | 71 client_cert = PEM_read_bio_X509(client_bio, NULL, NULL, NULL); 81 response = new PoloChallengeResponse(client_cert, server_cert); 85 X509_free(client_cert); 95 X509* client_cert; member in class:polo::pairing::PoloChallengeResponseTest
|
/external/wpa_supplicant_8/hs20/client/ |
H A D | osu_client.h | 78 const char *client_cert, const char *client_key, 83 const char *client_cert, const char *client_key, 96 const char *client_cert, const char *client_key, 101 const char *client_cert, const char *client_key,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
/external/chromium_org/chrome/browser/ui/android/ |
H A D | ssl_client_certificate_request.cc | 37 const scoped_refptr<net::X509Certificate>& client_cert, 41 client_cert.get(), private_key.get()); 178 scoped_refptr<net::X509Certificate> client_cert( 180 if (!client_cert.get()) { 202 client_cert, 204 base::Bind(*callback, client_cert)); 36 RecordClientCertificateKey( const scoped_refptr<net::X509Certificate>& client_cert, crypto::ScopedEVP_PKEY private_key) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 401 # client_cert: File path to client certificate file (PEM/DER) 411 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 417 # Windows certificate store can be used by leaving client_cert out and 810 # client_cert: File path to client certificate file (PEM/DER) 816 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 820 # Windows certificate store can be used by leaving client_cert out and 1094 client_cert="/etc/cert/user.pem" 1208 client_cert="/etc/cert/user.pem" 1326 client_cert="/etc/cert/user.pem" 1342 client_cert [all...] |
/external/chromium_org/net/http/ |
H A D | http_transaction.h | 79 virtual int RestartWithCertificate(X509Certificate* client_cert,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 263 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 263 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 263 * This field is like client_cert, but used for phase 2 (inside
|
/external/chromium_org/android_webview/native/ |
H A D | aw_contents_client_bridge.cc | 41 const scoped_refptr<net::X509Certificate>& client_cert, 45 client_cert.get(), private_key.get()); 224 scoped_refptr<net::X509Certificate> client_cert( 226 if (!client_cert.get()) { 246 client_cert, 248 base::Bind(*callback, client_cert)); 40 RecordClientCertificateKey( const scoped_refptr<net::X509Certificate>& client_cert, crypto::ScopedEVP_PKEY private_key) argument
|