Lines Matching refs:cert
128 CERTCertDBHandle *handle, CERTCertificate *cert, PRTime time,
307 DNSVR_SUCCESS, // the cert is immediately acceptable.
308 DNSVR_FAILURE, // the cert is unconditionally rejected.
370 } else if (j->second == "cert") {
521 ssl_info->cert = server_cert_;
1346 // doesn't require a client cert), we need to invalidate the SSL session
1349 // cert again.
1591 // Eventually, we should cache the cert verification results so that we don't
1593 // Alternatively, we could use the cert's status that we stored along with
1594 // the cert in the allowed_bad_certs vector.
1898 CERTCertificate* cert = SSL_PeerCertificate(that->nss_fd_);
1899 if (cert) {
1900 char* common_name = CERT_GetCommonName(&cert->issuer);
1914 CERT_DestroyCertificate(cert);
1994 LOG(WARNING) << "Client cert found without private key";
2074 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle(
2077 that->client_certs_.push_back(cert);
2138 LOG(WARNING) << "Client cert found, but could not be used: "
2157 // First, get the cert issuer names allowed by the server.
2201 CERTCertificate* cert = CERT_DupCertificate(
2203 SECKEYPrivateKey* privkey = PK11_FindKeyByAnyCert(cert, wincx);
2208 *result_certificate = cert;
2212 LOG(WARNING) << "Client cert found without private key";
2227 if (CERT_CheckCertValidTimes(node->cert, PR_Now(), PR_TRUE) !=
2236 NSS_CmpCertChainWCANames(node->cert, ca_names) != SECSuccess)
2239 node->cert, X509Certificate::SOURCE_LONE_CERT_IMPORT,