HomeSort by relevance Sort by last modified time
    Searched refs:verify_result (Results 1 - 25 of 25) sorted by null

  /external/chromium/net/base/
x509_certificate_openssl_android.cc 17 CertVerifyResult* verify_result) const {
18 verify_result->Reset();
23 verify_result->cert_status |= ERR_CERT_INVALID;
24 return MapCertStatusToNetError(verify_result->cert_status);
41 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) {
42 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
43 return MapCertStatusToNetError(verify_result->cert_status);
53 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
56 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
60 verify_result->cert_status |= ERR_CERT_INVALID
    [all...]
cert_verifier.cc 91 CertVerifyResult* verify_result)
93 verify_result_(verify_result) {
102 // Copies the contents of |verify_result| to the caller's
104 void Post(const CachedCertVerifyResult& verify_result) {
106 *verify_result_ = verify_result.result;
107 callback_->Run(verify_result.error);
251 void HandleResult(const CachedCertVerifyResult& verify_result) {
253 PostAll(verify_result);
257 void PostAll(const CachedCertVerifyResult& verify_result) {
263 (*i)->Post(verify_result);
    [all...]
cert_verifier_unittest.cc 52 CertVerifyResult verify_result; local
56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
90 CertVerifyResult verify_result; local
97 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
127 CertVerifyResult verify_result; local
131 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
142 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
156 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result,
181 CertVerifyResult verify_result; local
236 CertVerifyResult verify_result; local
270 CertVerifyResult verify_result; local
    [all...]
x509_certificate_win.cc 295 // *verify_result. The caller MUST initialize *verify_result before calling
298 CertVerifyResult* verify_result) {
312 verify_result->has_md5 = true;
314 verify_result->has_md5_ca = true;
317 verify_result->has_md2 = true;
319 verify_result->has_md2_ca = true;
322 verify_result->has_md4 = true;
668 CertVerifyResult* verify_result) const {
669 verify_result->Reset()
    [all...]
cert_verifier.h 79 // The |*verify_result| structure, including the |verify_result->cert_status|
82 // |verify_result->cert_status|, and the error code for the most serious
104 CertVerifyResult* verify_result,
158 const CertVerifyResult& verify_result);
193 // Verifies the given certificate, filling out the |verify_result| object
198 CertVerifyResult* verify_result,
x509_certificate_unittest.cc 230 CertVerifyResult verify_result; local
233 EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result));
234 EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
298 CertVerifyResult verify_result; local
299 EXPECT_EQ(OK, webkit_cert->Verify("webkit.org", flags, &verify_result));
300 EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
360 CertVerifyResult verify_result; local
362 EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
363 EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
367 EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
386 CertVerifyResult verify_result; local
420 CertVerifyResult verify_result; local
482 CertVerifyResult verify_result; local
509 CertVerifyResult verify_result; local
566 CertVerifyResult verify_result; local
591 CertVerifyResult verify_result; local
    [all...]
x509_certificate_nss.cc 169 // *verify_result. The caller MUST initialize *verify_result before calling
174 CertVerifyResult* verify_result) {
188 verify_result->has_md5 = true;
190 verify_result->has_md5_ca = true;
193 verify_result->has_md2 = true;
195 verify_result->has_md2_ca = true;
198 verify_result->has_md4 = true;
766 CertVerifyResult* verify_result) const {
767 verify_result->Reset()
    [all...]
x509_certificate_openssl.cc 414 CertVerifyResult* verify_result) const {
415 verify_result->Reset();
418 verify_result->cert_status |= CERT_STATUS_REVOKED;
428 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
455 verify_result->cert_status |= cert_status;
458 if (IsCertStatusError(verify_result->cert_status))
459 return MapCertStatusToNetError(verify_result->cert_status);
477 verify_result->public_key_hashes.push_back(hash);
480 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) {
481 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID
    [all...]
x509_certificate_mac.cc 787 CertVerifyResult* verify_result) const {
788 verify_result->Reset();
791 verify_result->cert_status |= CERT_STATUS_REVOKED;
855 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
    [all...]
cert_database_nss_unittest.cc 463 CertVerifyResult verify_result; local
464 int error = goog_cert->Verify("www.google.com", flags, &verify_result);
466 EXPECT_EQ(0, verify_result.cert_status);
488 CertVerifyResult verify_result; local
489 int error = puny_cert->Verify("xn--wgv71a119e.com", flags, &verify_result);
491 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
499 verify_result.Reset();
500 error = puny_cert->Verify("xn--wgv71a119e.com", flags, &verify_result);
502 EXPECT_EQ(0, verify_result.cert_status);
x509_certificate.h 299 // The |*verify_result| structure, including the |verify_result->cert_status|
302 // |verify_result->cert_status|, and the error code for the most serious
311 CertVerifyResult* verify_result) const;
  /external/chromium/chrome/browser/sync/engine/
get_commit_ids_command.h 92 VerifyCommitResult verify_result = local
94 if (verify_result == VERIFY_UNSYNCABLE) {
98 return verify_result == VERIFY_OK;
  /external/openssl/ssl/
ssl_asn1.c 107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st
233 if (in->verify_result != X509_V_OK)
235 a.verify_result.length=LSIZE2;
236 a.verify_result.type=V_ASN1_INTEGER;
237 a.verify_result.data=ibuf5;
238 ASN1_INTEGER_set(&a.verify_result,in->verify_result);
303 if (in->verify_result != X509_V_OK)
304 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5);
350 if (in->verify_result != X509_V_OK
    [all...]
ssl_txt.c 241 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result,
242 X509_verify_cert_error_string(x->verify_result)) <= 0) goto err;
ssl_sess.c 200 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */
446 ss->verify_result = X509_V_OK;
466 * existing session if need be) and s->verify_result is set from the session.
618 s->verify_result = s->session->verify_result;
830 s->verify_result = s->session->verify_result;
    [all...]
s2_clnt.c 1054 ERR_clear_error(); /* but we keep s->verify_result */
1055 s->session->verify_result = s->verify_result;
s2_srvr.c 1091 s->session->verify_result = s->verify_result;
s3_srvr.c     [all...]
ssl_cert.c 562 s->verify_result=ctx.error;
s3_clnt.c     [all...]
ssl_lib.c 365 s->verify_result=X509_V_OK;
    [all...]
ssl.h 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer'
508 long verify_result; /* only for servers */ member in struct:ssl_session_st
1261 long verify_result; member in struct:ssl_st
    [all...]
  /external/chromium/chrome/browser/sync/sessions/
session_state.cc 292 void UpdateProgress::AddVerifyResult(const VerifyResult& verify_result,
294 verified_updates_.push_back(std::make_pair(verify_result, entity));
session_state.h 193 void AddVerifyResult(const VerifyResult& verify_result,
  /external/openssl/include/openssl/
ssl.h 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer'
508 long verify_result; /* only for servers */ member in struct:ssl_session_st
1261 long verify_result; member in struct:ssl_st
    [all...]

Completed in 462 milliseconds