Searched refs:peer_cert (Results 1 - 22 of 22) sorted by relevance

/external/chromium_org/extensions/browser/api/cast_channel/
H A Dcast_auth_util_openssl.cc14 const std::string& peer_cert) {
13 AuthenticateChallengeReply(const CastMessage& challenge_reply, const std::string& peer_cert) argument
H A Dcast_auth_util.h59 const std::string& peer_cert);
H A Dcast_auth_util_nss.cc741 const std::string& peer_cert) {
742 if (peer_cert.empty()) {
758 result = VerifyCredentials(response, peer_cert);
740 AuthenticateChallengeReply(const CastMessage& challenge_reply, const std::string& peer_cert) argument
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
H A Dsecuretunnelsessionclient.cc159 rtc::scoped_ptr<rtc::SSLCertificate> peer_cert(
161 if (peer_cert.get() == NULL) {
168 // peer_cert so as not to have to parse it a second time when
363 rtc::scoped_ptr<rtc::SSLCertificate> peer_cert(
365 if (peer_cert == NULL) {
378 if (!peer_cert->GetSignatureDigestAlgorithm(&algorithm)) {
384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len);
/external/chromium_org/third_party/webrtc/base/
H A Dopensslstreamadapter.h152 const X509* peer_cert,
H A Dnssstreamadapter.cc775 NSSCertificate peer_cert(raw_peer_cert);
804 Equals(&peer_cert)) {
814 if (!peer_cert.ComputeDigest(
H A Dopensslstreamadapter.cc830 const X509* peer_cert,
843 ASSERT((peer_cert != NULL) || (!peer_digest.empty()));
828 SSLPostConnectionCheck(SSL* ssl, const char* server_name, const X509* peer_cert, const std::string &peer_digest) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h62 } peer_cert; member in union:tls_event_data
H A Dtls_openssl.c126 X509 *peer_cert; member in struct:tls_connection
1376 ev.peer_cert.cert = cert;
1385 ev.peer_cert.hash = hash;
1386 ev.peer_cert.hash_len = sizeof(hash);
1390 ev.peer_cert.depth = depth;
1391 ev.peer_cert.subject = subject;
1423 conn->peer_cert = err_cert;
3105 if (!conn->peer_cert) {
3119 id = OCSP_cert_to_id(NULL, conn->peer_cert, conn->peer_issuer);
/external/wpa_supplicant_8/src/crypto/
H A Dtls.h62 } peer_cert; member in union:tls_event_data
H A Dtls_openssl.c126 X509 *peer_cert; member in struct:tls_connection
1376 ev.peer_cert.cert = cert;
1385 ev.peer_cert.hash = hash;
1386 ev.peer_cert.hash_len = sizeof(hash);
1390 ev.peer_cert.depth = depth;
1391 ev.peer_cert.subject = subject;
1423 conn->peer_cert = err_cert;
3105 if (!conn->peer_cert) {
3119 id = OCSP_cert_to_id(NULL, conn->peer_cert, conn->peer_issuer);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls.h62 } peer_cert; member in union:tls_event_data
H A Dtls_openssl.c126 X509 *peer_cert; member in struct:tls_connection
1376 ev.peer_cert.cert = cert;
1385 ev.peer_cert.hash = hash;
1386 ev.peer_cert.hash_len = sizeof(hash);
1390 ev.peer_cert.depth = depth;
1391 ev.peer_cert.subject = subject;
1423 conn->peer_cert = err_cert;
3105 if (!conn->peer_cert) {
3119 id = OCSP_cert_to_id(NULL, conn->peer_cert, conn->peer_issuer);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c1358 if (data->peer_cert.hash) {
1359 size_t len = data->peer_cert.hash_len * 2 + 1;
1363 data->peer_cert.hash,
1364 data->peer_cert.hash_len);
1369 data->peer_cert.depth,
1370 data->peer_cert.subject,
1371 hash_hex, data->peer_cert.cert);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.c1358 if (data->peer_cert.hash) {
1359 size_t len = data->peer_cert.hash_len * 2 + 1;
1363 data->peer_cert.hash,
1364 data->peer_cert.hash_len);
1369 data->peer_cert.depth,
1370 data->peer_cert.subject,
1371 hash_hex, data->peer_cert.cert);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.c1358 if (data->peer_cert.hash) {
1359 size_t len = data->peer_cert.hash_len * 2 + 1;
1363 data->peer_cert.hash,
1364 data->peer_cert.hash_len);
1369 data->peer_cert.depth,
1370 data->peer_cert.subject,
1371 hash_hex, data->peer_cert.cert);
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp_curl.c51 X509 *peer_cert; member in struct:http_ctx
966 ctx->peer_cert = cert;
1126 if (!ctx->peer_cert) {
1142 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer);
/external/wpa_supplicant_8/src/utils/
H A Dhttp_curl.c51 X509 *peer_cert; member in struct:http_ctx
966 ctx->peer_cert = cert;
1126 if (!ctx->peer_cert) {
1142 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer);
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dhttp_curl.c51 X509 *peer_cert; member in struct:http_ctx
966 ctx->peer_cert = cert;
1126 if (!ctx->peer_cert) {
1142 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer);
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3ext.c1638 rv = SECITEM_CopyItem(NULL, &parsed_session_ticket->peer_cert,
1713 if (parsed_session_ticket->peer_cert.data != NULL) {
1717 &parsed_session_ticket->peer_cert, NULL, PR_FALSE, PR_TRUE);
1754 if (parsed_session_ticket->peer_cert.data) {
1755 SECITEM_FreeItem(&parsed_session_ticket->peer_cert, PR_FALSE);
H A Dsslimpl.h1089 SECItem peer_cert; member in struct:SessionTicketStr
/external/openssl/ssl/
H A Ds3_clnt.c3062 X509 *peer_cert; local
3071 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509;
3072 if (!peer_cert)
3073 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509;
3074 if (!peer_cert) {
3079 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);

Completed in 382 milliseconds