/external/chromium/net/base/ |
x509_certificate_openssl_android.cc | 17 CertVerifyResult* verify_result) const { 18 verify_result->Reset(); 23 verify_result->cert_status |= ERR_CERT_INVALID; 24 return MapCertStatusToNetError(verify_result->cert_status); 41 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 42 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 43 return MapCertStatusToNetError(verify_result->cert_status); 53 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 56 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 60 verify_result->cert_status |= ERR_CERT_INVALID [all...] |
cert_verifier.cc | 91 CertVerifyResult* verify_result) 93 verify_result_(verify_result) { 102 // Copies the contents of |verify_result| to the caller's 104 void Post(const CachedCertVerifyResult& verify_result) { 106 *verify_result_ = verify_result.result; 107 callback_->Run(verify_result.error); 251 void HandleResult(const CachedCertVerifyResult& verify_result) { 253 PostAll(verify_result); 257 void PostAll(const CachedCertVerifyResult& verify_result) { 263 (*i)->Post(verify_result); [all...] |
cert_verifier_unittest.cc | 52 CertVerifyResult verify_result; local 56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 90 CertVerifyResult verify_result; local 97 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 127 CertVerifyResult verify_result; local 131 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 142 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 156 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 181 CertVerifyResult verify_result; local 236 CertVerifyResult verify_result; local 270 CertVerifyResult verify_result; local [all...] |
x509_certificate_win.cc | 295 // *verify_result. The caller MUST initialize *verify_result before calling 298 CertVerifyResult* verify_result) { 312 verify_result->has_md5 = true; 314 verify_result->has_md5_ca = true; 317 verify_result->has_md2 = true; 319 verify_result->has_md2_ca = true; 322 verify_result->has_md4 = true; 668 CertVerifyResult* verify_result) const { 669 verify_result->Reset() [all...] |
cert_verifier.h | 79 // The |*verify_result| structure, including the |verify_result->cert_status| 82 // |verify_result->cert_status|, and the error code for the most serious 104 CertVerifyResult* verify_result, 158 const CertVerifyResult& verify_result); 193 // Verifies the given certificate, filling out the |verify_result| object 198 CertVerifyResult* verify_result,
|
x509_certificate_unittest.cc | 230 CertVerifyResult verify_result; local 233 EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result)); 234 EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV); 298 CertVerifyResult verify_result; local 299 EXPECT_EQ(OK, webkit_cert->Verify("webkit.org", flags, &verify_result)); 300 EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV); 360 CertVerifyResult verify_result; local 362 EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result)); 363 EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV); 367 EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result)); 386 CertVerifyResult verify_result; local 420 CertVerifyResult verify_result; local 482 CertVerifyResult verify_result; local 509 CertVerifyResult verify_result; local 566 CertVerifyResult verify_result; local 591 CertVerifyResult verify_result; local [all...] |
x509_certificate_nss.cc | 169 // *verify_result. The caller MUST initialize *verify_result before calling 174 CertVerifyResult* verify_result) { 188 verify_result->has_md5 = true; 190 verify_result->has_md5_ca = true; 193 verify_result->has_md2 = true; 195 verify_result->has_md2_ca = true; 198 verify_result->has_md4 = true; 766 CertVerifyResult* verify_result) const { 767 verify_result->Reset() [all...] |
x509_certificate_openssl.cc | 414 CertVerifyResult* verify_result) const { 415 verify_result->Reset(); 418 verify_result->cert_status |= CERT_STATUS_REVOKED; 428 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 455 verify_result->cert_status |= cert_status; 458 if (IsCertStatusError(verify_result->cert_status)) 459 return MapCertStatusToNetError(verify_result->cert_status); 477 verify_result->public_key_hashes.push_back(hash); 480 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 481 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID [all...] |
x509_certificate_mac.cc | 787 CertVerifyResult* verify_result) const { 788 verify_result->Reset(); 791 verify_result->cert_status |= CERT_STATUS_REVOKED; 855 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; [all...] |
cert_database_nss_unittest.cc | 463 CertVerifyResult verify_result; local 464 int error = goog_cert->Verify("www.google.com", flags, &verify_result); 466 EXPECT_EQ(0, verify_result.cert_status); 488 CertVerifyResult verify_result; local 489 int error = puny_cert->Verify("xn--wgv71a119e.com", flags, &verify_result); 491 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status); 499 verify_result.Reset(); 500 error = puny_cert->Verify("xn--wgv71a119e.com", flags, &verify_result); 502 EXPECT_EQ(0, verify_result.cert_status);
|
x509_certificate.h | 299 // The |*verify_result| structure, including the |verify_result->cert_status| 302 // |verify_result->cert_status|, and the error code for the most serious 311 CertVerifyResult* verify_result) const;
|
/external/chromium/chrome/browser/sync/engine/ |
get_commit_ids_command.h | 92 VerifyCommitResult verify_result = local 94 if (verify_result == VERIFY_UNSYNCABLE) { 98 return verify_result == VERIFY_OK;
|
/external/openssl/ssl/ |
ssl_asn1.c | 107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 233 if (in->verify_result != X509_V_OK) 235 a.verify_result.length=LSIZE2; 236 a.verify_result.type=V_ASN1_INTEGER; 237 a.verify_result.data=ibuf5; 238 ASN1_INTEGER_set(&a.verify_result,in->verify_result); 303 if (in->verify_result != X509_V_OK) 304 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); 350 if (in->verify_result != X509_V_OK [all...] |
ssl_txt.c | 241 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, 242 X509_verify_cert_error_string(x->verify_result)) <= 0) goto err;
|
ssl_sess.c | 200 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 446 ss->verify_result = X509_V_OK; 466 * existing session if need be) and s->verify_result is set from the session. 618 s->verify_result = s->session->verify_result; 830 s->verify_result = s->session->verify_result; [all...] |
s2_clnt.c | 1054 ERR_clear_error(); /* but we keep s->verify_result */ 1055 s->session->verify_result = s->verify_result;
|
s2_srvr.c | 1091 s->session->verify_result = s->verify_result;
|
s3_srvr.c | [all...] |
ssl_cert.c | 562 s->verify_result=ctx.error;
|
s3_clnt.c | [all...] |
ssl_lib.c | 365 s->verify_result=X509_V_OK; [all...] |
ssl.h | 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 508 long verify_result; /* only for servers */ member in struct:ssl_session_st 1261 long verify_result; member in struct:ssl_st [all...] |
/external/chromium/chrome/browser/sync/sessions/ |
session_state.cc | 292 void UpdateProgress::AddVerifyResult(const VerifyResult& verify_result, 294 verified_updates_.push_back(std::make_pair(verify_result, entity));
|
session_state.h | 193 void AddVerifyResult(const VerifyResult& verify_result,
|
/external/openssl/include/openssl/ |
ssl.h | 457 * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' 508 long verify_result; /* only for servers */ member in struct:ssl_session_st 1261 long verify_result; member in struct:ssl_st [all...] |