/external/chromium_org/android_webview/native/ |
H A D | aw_contents_client_bridge.cc | 41 const scoped_refptr<net::X509Certificate>& client_cert, 45 client_cert.get(), private_key.get()); 224 scoped_refptr<net::X509Certificate> client_cert( 226 if (!client_cert.get()) { 246 client_cert, 248 base::Bind(*callback, client_cert)); 40 RecordClientCertificateKey( const scoped_refptr<net::X509Certificate>& client_cert, crypto::ScopedEVP_PKEY private_key) argument
|
/external/chromium_org/chrome/browser/devtools/ |
H A D | devtools_network_transaction.cc | 171 net::X509Certificate* client_cert, 176 client_cert, proxy_callback_); 170 RestartWithCertificate( net::X509Certificate* client_cert, const net::CompletionCallback& callback) argument
|
/external/chromium_org/chrome/browser/ui/android/ |
H A D | ssl_client_certificate_request.cc | 37 const scoped_refptr<net::X509Certificate>& client_cert, 41 client_cert.get(), private_key.get()); 178 scoped_refptr<net::X509Certificate> client_cert( 180 if (!client_cert.get()) { 202 client_cert, 204 base::Bind(*callback, client_cert)); 36 RecordClientCertificateKey( const scoped_refptr<net::X509Certificate>& client_cert, crypto::ScopedEVP_PKEY private_key) argument
|
/external/chromium_org/chromeos/network/ |
H A D | client_cert_util.cc | 30 namespace client_cert { namespace in namespace:chromeos 46 using namespace ::onc::client_cert; 263 client_cert_type(onc::client_cert::kClientCertTypeNone) { 357 } // namespace client_cert
|
H A D | client_cert_util.h | 27 namespace client_cert { namespace in namespace:chromeos 92 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, 101 } // namespace client_cert
|
/external/chromium_org/components/onc/ |
H A D | onc_constants.cc | 204 namespace client_cert { namespace in namespace:onc 221 } // namespace client_cert
|
H A D | onc_constants.h | 222 namespace client_cert { namespace in namespace:onc 239 } // namespace client_cert
|
/external/chromium_org/net/http/ |
H A D | failing_http_transaction_factory.cc | 41 X509Certificate* client_cert, 94 X509Certificate* client_cert, 93 RestartWithCertificate( X509Certificate* client_cert, const CompletionCallback& callback) argument
|
H A D | http_cache_transaction.cc | 471 X509Certificate* client_cert, 481 int rv = RestartNetworkRequestWithCertificate(client_cert); 2273 X509Certificate* client_cert) { 2279 int rv = network_trans_->RestartWithCertificate(client_cert, io_callback_); 470 RestartWithCertificate( X509Certificate* client_cert, const CompletionCallback& callback) argument 2272 RestartNetworkRequestWithCertificate( X509Certificate* client_cert) argument
|
H A D | http_network_transaction.cc | 219 X509Certificate* client_cert, const CompletionCallback& callback) { 229 ssl_config->client_cert = client_cert; 231 response_.cert_request_info->host_and_port, client_cert); 1254 scoped_refptr<X509Certificate> client_cert; local 1256 response_.cert_request_info->host_and_port, &client_cert); 1263 if (client_cert.get()) { 1268 client_cert->IsIssuedByEncoded(cert_authorities); 1279 ssl_config->client_cert = client_cert; 218 RestartWithCertificate( X509Certificate* client_cert, const CompletionCallback& callback) argument [all...] |
H A D | http_network_transaction_unittest.cc | 10709 scoped_refptr<X509Certificate> client_cert; local 10711 HostPortPair("www.example.com", 443), &client_cert)); 10712 ASSERT_EQ(NULL, client_cert.get()); 10723 HostPortPair("www.example.com", 443), &client_cert)); 10830 scoped_refptr<X509Certificate> client_cert; local 10832 HostPortPair("www.example.com", 443), &client_cert)); 10833 ASSERT_EQ(NULL, client_cert.get()); 10844 HostPortPair("www.example.com", 443), &client_cert)); 10924 scoped_refptr<X509Certificate> client_cert; local 10926 HostPortPair("proxy", 70), &client_cert)); [all...] |
H A D | http_transaction_test_util.cc | 256 net::X509Certificate* client_cert, 255 RestartWithCertificate( net::X509Certificate* client_cert, const net::CompletionCallback& callback) argument
|
/external/chromium_org/net/ssl/ |
H A D | openssl_client_key_store.cc | 84 const X509Certificate* client_cert, 87 if (!client_cert || !private_key) 91 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 100 const X509Certificate* client_cert) { 101 if (!client_cert) 104 crypto::ScopedEVP_PKEY pub_key(GetOpenSSLPublicKey(client_cert)); 83 RecordClientCertPrivateKey( const X509Certificate* client_cert, EVP_PKEY* private_key) argument 99 FetchClientCertPrivateKey( const X509Certificate* client_cert) argument
|
H A D | ssl_config.h | 136 // True if we should send client_cert to the server. 160 scoped_refptr<X509Certificate> client_cert; member in struct:net::SSLConfig
|
/external/chromium_org/net/test/ |
H A D | openssl_helper.cc | 58 bool fail_resume = false, client_cert = false, npn = false; local 86 client_cert = true; 171 if (client_cert)
|
/external/chromium_org/net/url_request/ |
H A D | url_request.cc | 911 void URLRequest::ContinueWithCertificate(X509Certificate* client_cert) { argument 914 job_->ContinueWithCertificate(client_cert);
|
H A D | url_request_http_job.cc | 1159 X509Certificate* client_cert) { 1171 int rv = transaction_->RestartWithCertificate(client_cert, start_callback_); 1158 ContinueWithCertificate( X509Certificate* client_cert) argument
|
H A D | url_request_job.cc | 192 X509Certificate* client_cert) { 191 ContinueWithCertificate( X509Certificate* client_cert) argument
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | polochallengeresponse.cc | 26 PoloChallengeResponse::PoloChallengeResponse(X509* client_cert, argument 28 : client_cert(client_cert), 33 EVP_PKEY* client_pkey = X509_get_pubkey(client_cert);
|
H A D | polochallengeresponse.h | 34 // @param client_cert the client certificate 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 52 X509* client_cert; member in class:polo::pairing::PoloChallengeResponse
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
H A D | polochallengeresponsetest.cc | 71 client_cert = PEM_read_bio_X509(client_bio, NULL, NULL, NULL); 81 response = new PoloChallengeResponse(client_cert, server_cert); 85 X509_free(client_cert); 95 X509* client_cert; member in class:polo::pairing::PoloChallengeResponseTest
|
/external/openssl/ssl/ |
H A D | ssltest.c | 515 char *client_cert=TEST_CLIENT_CERT; local 706 client_cert= *(++argv); 1002 SSL_CTX_use_certificate_file(c_ctx,client_cert, 1005 (client_key?client_key:client_cert),
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 104 * @client_cert: File or reference name for client X.509 certificate in PEM or 106 * @client_cert_blob: client_cert as inlined data or %NULL if not used 146 const char *client_cert; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 1840 const char *client_cert, 1844 if (client_cert == NULL && client_cert_blob == NULL) 1858 if (client_cert == NULL) 1862 if (os_strncmp("keystore://", client_cert, 11) == 0) { 1863 BIO *bio = BIO_from_keystore(&client_cert[11]); 1880 if (SSL_use_certificate_file(conn->ssl, client_cert, 1887 if (SSL_use_certificate_file(conn->ssl, client_cert, 1905 static int tls_global_client_cert(SSL_CTX *ssl_ctx, const char *client_cert) argument 1908 if (client_cert == NULL) 1911 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 1839 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 115 * client_cert - File path to client certificate file (PEM/DER) 126 u8 *client_cert; member in struct:eap_peer_config 131 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 137 * Windows certificate store can be used by leaving client_cert out and 263 * This field is like client_cert, but used for phase 2 (inside
|