HomeSort by relevance Sort by last modified time
    Searched refs:cert_handle (Results 1 - 25 of 31) sorted by null

1 2

  /external/chromium/chrome/common/net/
x509_certificate_model_openssl.cc 46 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) {
51 std::string GetNickname(X509Certificate::OSCertHandle cert_handle) {
56 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) {
61 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) {
62 unsigned long version = X509_get_version(cert_handle);
78 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle,
83 std::string GetKeyUsageString(X509Certificate::OSCertHandle cert_handle) {
89 X509Certificate::OSCertHandle cert_handle,
91 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle);
99 X509Certificate::OSCertHandle cert_handle,
    [all...]
x509_certificate_model_nss.cc 101 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) {
102 string name = ProcessIDN(Stringize(CERT_GetCommonName(&cert_handle->subject),
106 return GetNickname(cert_handle);
109 string GetNickname(X509Certificate::OSCertHandle cert_handle) {
111 if (cert_handle->nickname) {
112 name = cert_handle->nickname;
122 string GetTokenName(X509Certificate::OSCertHandle cert_handle) {
123 return psm::GetCertTokenName(cert_handle);
126 string GetVersion(X509Certificate::OSCertHandle cert_handle) {
128 if (SEC_ASN1DecodeInteger(&cert_handle->version, &version) == SECSuccess &
    [all...]
x509_certificate_model.h 21 net::X509Certificate::OSCertHandle cert_handle);
23 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle);
25 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle);
27 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle);
29 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle);
31 std::string GetEmailAddress(net::X509Certificate::OSCertHandle cert_handle);
34 net::X509Certificate::OSCertHandle cert_handle,
37 std::string GetKeyUsageString(net::X509Certificate::OSCertHandle cert_handle);
40 net::X509Certificate::OSCertHandle cert_handle,
44 net::X509Certificate::OSCertHandle cert_handle,
    [all...]
  /external/chromium_org/chrome/common/net/
x509_certificate_model_openssl.cc 46 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) {
51 std::string GetNickname(X509Certificate::OSCertHandle cert_handle) {
56 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) {
61 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) {
62 unsigned long version = X509_get_version(cert_handle);
78 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle,
83 std::string GetKeyUsageString(X509Certificate::OSCertHandle cert_handle) {
89 X509Certificate::OSCertHandle cert_handle,
91 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle);
99 X509Certificate::OSCertHandle cert_handle,
    [all...]
x509_certificate_model_nss.cc 102 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) {
104 Stringize(CERT_GetCommonName(&cert_handle->subject), std::string()));
107 return GetNickname(cert_handle);
110 string GetNickname(X509Certificate::OSCertHandle cert_handle) {
112 if (cert_handle->nickname) {
113 name = cert_handle->nickname;
123 string GetTokenName(X509Certificate::OSCertHandle cert_handle) {
124 return psm::GetCertTokenName(cert_handle);
127 string GetVersion(X509Certificate::OSCertHandle cert_handle) {
131 if (cert_handle->version.len == 0 |
    [all...]
x509_certificate_model.h 19 net::X509Certificate::OSCertHandle cert_handle);
21 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle);
23 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle);
25 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle);
27 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle);
29 std::string GetEmailAddress(net::X509Certificate::OSCertHandle cert_handle);
32 net::X509Certificate::OSCertHandle cert_handle,
35 std::string GetKeyUsageString(net::X509Certificate::OSCertHandle cert_handle);
38 net::X509Certificate::OSCertHandle cert_handle,
42 net::X509Certificate::OSCertHandle cert_handle,
    [all...]
  /external/chromium_org/net/cert/
x509_util_ios.h 27 CERTCertificate* CreateNSSCertHandleFromOSHandle(SecCertificateRef cert_handle);
39 CERTCertificate* cert_handle,
45 // The constructor copies the certificate data from |cert_handle| and
49 explicit NSSCertificate(SecCertificateRef cert_handle);
51 CERTCertificate* cert_handle() const;
63 CERTCertificate* cert_handle() const;
x509_certificate_ios.cc 43 // Returns true if a given |cert_handle| is actually a valid X.509 certificate
52 bool IsValidOSCertHandle(SecCertificateRef cert_handle) {
54 SecCertificateCopySubjectSummary(cert_handle));
61 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
62 if (cert_handle) {
63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_);
64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_);
65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_);
66 x509_util::ParseDate(&cert_handle->validity.notAfter, &valid_expiry_)
92 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
    [all...]
x509_util_ios.cc 49 SecCertificateRef cert_handle) {
50 ScopedCFTypeRef<CFDataRef> cert_data(SecCertificateCopyData(cert_handle));
64 CERTCertificate* cert_handle,
67 CreateOSCertHandleFromNSSHandle(cert_handle));
101 NSSCertificate::NSSCertificate(SecCertificateRef cert_handle) {
102 nss_cert_handle_ = CreateNSSCertHandleFromOSHandle(cert_handle);
103 DLOG_IF(INFO, cert_handle && !nss_cert_handle_)
111 CERTCertificate* NSSCertificate::cert_handle() const { function in class:net::x509_util_ios::NSSCertificate
132 CERTCertificate* NSSCertChain::cert_handle() const { function in class:net::x509_util_ios::NSSCertChain
test_root_certs_nss.cc 57 CERTCertificate* cert_handle = nss_certificate.cert_handle(); local
59 CERTCertificate* cert_handle = certificate->os_cert_handle();
64 SECStatus rv = CERT_GetCertTrust(cert_handle, &original_trust);
83 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert_handle, &new_trust);
89 trust_cache_.push_back(new TrustEntry(cert_handle, original_trust));
x509_certificate_nss.cc 46 OSCertHandle cert_handle = CreateOSCertHandleFromBytesWithNickname(data, local
49 if (!cert_handle)
52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles());
53 FreeOSCertHandle(cert_handle);
142 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
144 if (!cert_handle->derCert.len)
146 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data),
147 cert_handle->derCert.len);
202 OSCertHandle cert_handle) {
203 return CERT_DupCertificate(cert_handle);
    [all...]
x509_certificate.cc 63 // for the same certificate data as |*cert_handle| already exists in the
64 // cache, the original |*cert_handle| will be freed and |cert_handle|
68 // reference to |*cert_handle| will be added to the cache. In either case,
69 // upon return, the caller fully owns |*cert_handle| and is responsible for
71 void InsertOrUpdate(X509Certificate::OSCertHandle* cert_handle);
73 // Decrements the cache reference count for |cert_handle|, a handle that was
76 // caller retains ownership of |cert_handle| and remains responsible for
78 void Remove(X509Certificate::OSCertHandle cert_handle);
85 Entry() : cert_handle(NULL), ref_count(0) {
87 X509Certificate::OSCertHandle cert_handle; member in struct:net::__anon11001::X509CertificateCache::Entry
295 OSCertHandle cert_handle = CreateOSCertHandleFromBytes(data, length); local
327 OSCertHandle cert_handle = ReadOSCertHandleFromPickle(pickle_iter); local
    [all...]
x509_certificate_win.cc 235 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
237 if (!cert_handle->pbCertEncoded || !cert_handle->cbCertEncoded)
239 encoded->assign(reinterpret_cast<char*>(cert_handle->pbCertEncoded),
240 cert_handle->cbCertEncoded);
257 OSCertHandle cert_handle = NULL; local
260 length, CERT_STORE_ADD_USE_EXISTING, &cert_handle))
263 return cert_handle;
289 OSCertHandle cert_handle) {
290 return CertDuplicateCertificateContext(cert_handle);
    [all...]
cert_verify_proc_android.cc 57 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local
63 if (cert_handles.empty() || cert_handles[0] != cert_handle)
64 cert_handles.insert(cert_handles.begin(), cert_handle);
x509_certificate.h 142 static X509Certificate* CreateFromHandle(OSCertHandle cert_handle,
319 // Obtains the DER encoded certificate data for |cert_handle|. On success,
321 static bool GetDEREncoded(OSCertHandle cert_handle,
332 static bool GetPEMEncoded(OSCertHandle cert_handle,
345 static void GetPublicKeyInfo(OSCertHandle cert_handle,
382 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle);
385 static void FreeOSCertHandle(OSCertHandle cert_handle);
389 static SHA1HashValue CalculateFingerprint(OSCertHandle cert_handle);
405 X509Certificate(OSCertHandle cert_handle,
cert_verify_proc_nss.cc 337 CERTCertificate* cert_handle, int num_policy_oids,
340 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle);
342 // Call CERT_PKIXVerifyCert for the cert_handle.
355 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle,
454 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
457 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
467 CERTCertificate* cert_handle, int num_policy_oids,
495 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
521 SECOidTag policy = GetFirstCertPolicy(cert_handle);
531 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer
761 CERTCertificate* cert_handle = scoped_chain.cert_handle(); local
    [all...]
x509_certificate_openssl.cc 245 OSCertHandle cert_handle) {
246 DCHECK(cert_handle);
252 CRYPTO_add(&cert_handle->references, 1, CRYPTO_LOCK_X509);
253 return cert_handle;
257 void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) {
261 X509_free(cert_handle);
382 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
385 if (!GetDERAndCacheIfNeeded(cert_handle, &der_cache))
422 bool X509Certificate::WriteOSCertHandleToPickle(OSCertHandle cert_handle,
425 if (!GetDERAndCacheIfNeeded(cert_handle, &der_cache)
    [all...]
x509_certificate_mac.cc 49 bool IsCertIssuerInEncodedList(X509Certificate::OSCertHandle cert_handle,
52 if (cached_cert.Init(cert_handle) != CSSM_OK)
129 // Test that a given |cert_handle| is actually a valid X.509 certificate, and
140 bool IsValidOSCertHandle(SecCertificateRef cert_handle) {
142 OSStatus status = SecCertificateGetSubject(cert_handle, &sanity_check);
370 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
373 if (SecCertificateGetData(cert_handle, &der_data) != noErr)
402 OSCertHandle cert_handle = NULL; local
406 &cert_handle);
409 if (!IsValidOSCertHandle(cert_handle)) {
    [all...]
x509_util_nss.h 40 void GetSubjectAltName(CERTCertificate* cert_handle,
  /external/chromium/chrome/browser/chromeos/options/
wifi_config_model.cc 72 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local
73 net::CertType type = x509_certificate_model::GetType(cert_handle);
81 x509_certificate_model::GetTokenName(cert_handle);
122 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle();
123 return x509_certificate_model::GetPkcs11Id(cert_handle);
130 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local
131 std::string id = x509_certificate_model::GetPkcs11Id(cert_handle);
154 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle();
155 return x509_certificate_model::GetNickname(cert_handle);
163 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle() local
    [all...]
  /external/chromium_org/net/ssl/
client_cert_store_impl_mac.cc 37 OSStatus CopyCertChain(SecCertificateRef cert_handle,
39 DCHECK(cert_handle);
51 NULL, const_cast<const void**>(reinterpret_cast<void**>(&cert_handle)),
88 X509Certificate::OSCertHandle cert_handle = (*cert)->os_cert_handle(); local
90 OSStatus result = CopyCertChain(cert_handle, &cert_chain);
108 cert_handle, intermediates));
221 SecCertificateRef cert_handle; local
222 err = SecIdentityCopyCertificate(identity, &cert_handle);
225 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
228 X509Certificate::CreateFromHandle(cert_handle,
    [all...]
  /external/chromium/net/base/
x509_certificate_nss.cc 284 void GetCertSubjectAltNamesOfType(X509Certificate::OSCertHandle cert_handle,
294 SECStatus rv = CERT_FindCertExtension(cert_handle,
326 X509Certificate::OSCertHandle cert_handle, int num_policy_oids,
328 SECOidTag GetFirstCertPolicy(X509Certificate::OSCertHandle cert_handle);
330 // Call CERT_PKIXVerifyCert for the cert_handle.
335 SECStatus PKIXVerifyCert(X509Certificate::OSCertHandle cert_handle,
361 if (strcmp(cert_handle->issuerName, kMultipleKeyCA[i]) == 0) {
444 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
447 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
457 X509Certificate::OSCertHandle cert_handle, int num_policy_oids
    [all...]
x509_certificate_mac.cc 143 OSStatus GetCertFields(X509Certificate::OSCertHandle cert_handle,
145 DCHECK(cert_handle);
149 OSStatus status = SecCertificateGetData(cert_handle, &cert_data);
153 status = SecCertificateGetCLHandle(cert_handle, &fields->cl_handle);
164 void GetCertGeneralNamesForOID(X509Certificate::OSCertHandle cert_handle,
174 OSStatus status = GetCertFields(cert_handle, &fields);
205 void GetCertDateForOID(X509Certificate::OSCertHandle cert_handle,
210 OSStatus status = GetCertFields(cert_handle, &fields);
237 std::string GetCertSerialNumber(X509Certificate::OSCertHandle cert_handle) {
239 OSStatus status = GetCertFields(cert_handle, &fields)
1065 OSCertHandle cert_handle = NULL; local
1185 SecCertificateRef cert_handle = reinterpret_cast<SecCertificateRef>( local
1244 SecCertificateRef cert_handle; local
    [all...]
x509_certificate.h 134 // underlying crypto library. |source| specifies where |cert_handle| comes
140 static scoped_refptr<X509Certificate> CreateFromHandle(OSCertHandle cert_handle,
344 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle);
347 static void FreeOSCertHandle(OSCertHandle cert_handle);
359 X509Certificate(OSCertHandle cert_handle, Source source,
385 static SHA1Fingerprint CalculateFingerprint(OSCertHandle cert_handle);
x509_certificate_win.cc 599 PCCERT_CONTEXT cert_handle = local
603 DCHECK(cert_handle) << "Failed to create self-signed certificate: "
605 if (!cert_handle)
608 X509Certificate* cert = CreateFromHandle(cert_handle,
611 FreeOSCertHandle(cert_handle);
951 OSCertHandle cert_handle = NULL; local
    [all...]

Completed in 1049 milliseconds

1 2