Home | History | Annotate | Download | only in base

Lines Matching refs:cert_handle

284 void GetCertSubjectAltNamesOfType(X509Certificate::OSCertHandle cert_handle,
294 SECStatus rv = CERT_FindCertExtension(cert_handle,
326 X509Certificate::OSCertHandle cert_handle, int num_policy_oids,
328 SECOidTag GetFirstCertPolicy(X509Certificate::OSCertHandle cert_handle);
330 // Call CERT_PKIXVerifyCert for the cert_handle.
335 SECStatus PKIXVerifyCert(X509Certificate::OSCertHandle cert_handle,
361 if (strcmp(cert_handle->issuerName, kMultipleKeyCA[i]) == 0) {
444 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
447 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
457 X509Certificate::OSCertHandle cert_handle, int num_policy_oids,
483 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
508 SECOidTag policy = GetFirstCertPolicy(cert_handle);
518 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
535 X509Certificate::OSCertHandle cert_handle) {
538 cert_handle, SEC_OID_X509_CERTIFICATE_POLICIES, &policy_ext);
550 SECOidTag GetFirstCertPolicy(X509Certificate::OSCertHandle cert_handle) {
551 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle);
576 bool CheckCertPolicies(X509Certificate::OSCertHandle cert_handle,
578 CERTCertificatePolicies* policies = DecodeCertPolicies(cert_handle);
973 OSCertHandle cert_handle) {
974 return CERT_DupCertificate(cert_handle);
978 void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) {
979 CERT_DestroyCertificate(cert_handle);
1011 bool X509Certificate::WriteCertHandleToPickle(OSCertHandle cert_handle,
1014 reinterpret_cast<const char*>(cert_handle->derCert.data),
1015 cert_handle->derCert.len);