/external/chromium/chrome/common/net/ |
x509_certificate_model_openssl.cc | 46 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { 51 std::string GetNickname(X509Certificate::OSCertHandle cert_handle) { 56 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) { 61 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) { 62 unsigned long version = X509_get_version(cert_handle); 78 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle, 83 std::string GetKeyUsageString(X509Certificate::OSCertHandle cert_handle) { 89 X509Certificate::OSCertHandle cert_handle, 91 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle); 99 X509Certificate::OSCertHandle cert_handle, [all...] |
x509_certificate_model_nss.cc | 101 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { 102 string name = ProcessIDN(Stringize(CERT_GetCommonName(&cert_handle->subject), 106 return GetNickname(cert_handle); 109 string GetNickname(X509Certificate::OSCertHandle cert_handle) { 111 if (cert_handle->nickname) { 112 name = cert_handle->nickname; 122 string GetTokenName(X509Certificate::OSCertHandle cert_handle) { 123 return psm::GetCertTokenName(cert_handle); 126 string GetVersion(X509Certificate::OSCertHandle cert_handle) { 128 if (SEC_ASN1DecodeInteger(&cert_handle->version, &version) == SECSuccess & [all...] |
x509_certificate_model.h | 21 net::X509Certificate::OSCertHandle cert_handle); 23 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle); 25 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle); 27 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle); 29 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle); 31 std::string GetEmailAddress(net::X509Certificate::OSCertHandle cert_handle); 34 net::X509Certificate::OSCertHandle cert_handle, 37 std::string GetKeyUsageString(net::X509Certificate::OSCertHandle cert_handle); 40 net::X509Certificate::OSCertHandle cert_handle, 44 net::X509Certificate::OSCertHandle cert_handle, [all...] |
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_openssl.cc | 46 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { 51 std::string GetNickname(X509Certificate::OSCertHandle cert_handle) { 56 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) { 61 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) { 62 unsigned long version = X509_get_version(cert_handle); 78 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle, 83 std::string GetKeyUsageString(X509Certificate::OSCertHandle cert_handle) { 89 X509Certificate::OSCertHandle cert_handle, 91 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle); 99 X509Certificate::OSCertHandle cert_handle, [all...] |
x509_certificate_model_nss.cc | 102 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { 104 Stringize(CERT_GetCommonName(&cert_handle->subject), std::string())); 107 return GetNickname(cert_handle); 110 string GetNickname(X509Certificate::OSCertHandle cert_handle) { 112 if (cert_handle->nickname) { 113 name = cert_handle->nickname; 123 string GetTokenName(X509Certificate::OSCertHandle cert_handle) { 124 return psm::GetCertTokenName(cert_handle); 127 string GetVersion(X509Certificate::OSCertHandle cert_handle) { 131 if (cert_handle->version.len == 0 | [all...] |
x509_certificate_model.h | 19 net::X509Certificate::OSCertHandle cert_handle); 21 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle); 23 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle); 25 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle); 27 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle); 29 std::string GetEmailAddress(net::X509Certificate::OSCertHandle cert_handle); 32 net::X509Certificate::OSCertHandle cert_handle, 35 std::string GetKeyUsageString(net::X509Certificate::OSCertHandle cert_handle); 38 net::X509Certificate::OSCertHandle cert_handle, 42 net::X509Certificate::OSCertHandle cert_handle, [all...] |
/external/chromium_org/net/cert/ |
x509_util_ios.h | 27 CERTCertificate* CreateNSSCertHandleFromOSHandle(SecCertificateRef cert_handle); 39 CERTCertificate* cert_handle, 45 // The constructor copies the certificate data from |cert_handle| and 49 explicit NSSCertificate(SecCertificateRef cert_handle); 51 CERTCertificate* cert_handle() const; 63 CERTCertificate* cert_handle() const;
|
x509_certificate_ios.cc | 43 // Returns true if a given |cert_handle| is actually a valid X.509 certificate 52 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { 54 SecCertificateCopySubjectSummary(cert_handle)); 61 CERTCertificate* cert_handle = nss_cert.cert_handle(); local 62 if (cert_handle) { 63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_); 64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_); 65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_); 66 x509_util::ParseDate(&cert_handle->validity.notAfter, &valid_expiry_) 92 CERTCertificate* cert_handle = nss_cert.cert_handle(); local [all...] |
x509_util_ios.cc | 49 SecCertificateRef cert_handle) { 50 ScopedCFTypeRef<CFDataRef> cert_data(SecCertificateCopyData(cert_handle)); 64 CERTCertificate* cert_handle, 67 CreateOSCertHandleFromNSSHandle(cert_handle)); 101 NSSCertificate::NSSCertificate(SecCertificateRef cert_handle) { 102 nss_cert_handle_ = CreateNSSCertHandleFromOSHandle(cert_handle); 103 DLOG_IF(INFO, cert_handle && !nss_cert_handle_) 111 CERTCertificate* NSSCertificate::cert_handle() const { function in class:net::x509_util_ios::NSSCertificate 132 CERTCertificate* NSSCertChain::cert_handle() const { function in class:net::x509_util_ios::NSSCertChain
|
test_root_certs_nss.cc | 57 CERTCertificate* cert_handle = nss_certificate.cert_handle(); local 59 CERTCertificate* cert_handle = certificate->os_cert_handle(); 64 SECStatus rv = CERT_GetCertTrust(cert_handle, &original_trust); 83 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert_handle, &new_trust); 89 trust_cache_.push_back(new TrustEntry(cert_handle, original_trust));
|
x509_certificate_nss.cc | 46 OSCertHandle cert_handle = CreateOSCertHandleFromBytesWithNickname(data, local 49 if (!cert_handle) 52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); 53 FreeOSCertHandle(cert_handle); 142 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, 144 if (!cert_handle->derCert.len) 146 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data), 147 cert_handle->derCert.len); 202 OSCertHandle cert_handle) { 203 return CERT_DupCertificate(cert_handle); [all...] |
x509_certificate.cc | 63 // for the same certificate data as |*cert_handle| already exists in the 64 // cache, the original |*cert_handle| will be freed and |cert_handle| 68 // reference to |*cert_handle| will be added to the cache. In either case, 69 // upon return, the caller fully owns |*cert_handle| and is responsible for 71 void InsertOrUpdate(X509Certificate::OSCertHandle* cert_handle); 73 // Decrements the cache reference count for |cert_handle|, a handle that was 76 // caller retains ownership of |cert_handle| and remains responsible for 78 void Remove(X509Certificate::OSCertHandle cert_handle); 85 Entry() : cert_handle(NULL), ref_count(0) { 87 X509Certificate::OSCertHandle cert_handle; member in struct:net::__anon8955::X509CertificateCache::Entry 295 OSCertHandle cert_handle = CreateOSCertHandleFromBytes(data, length); local 327 OSCertHandle cert_handle = ReadOSCertHandleFromPickle(pickle_iter); local [all...] |
x509_certificate_win.cc | 235 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, 237 if (!cert_handle->pbCertEncoded || !cert_handle->cbCertEncoded) 239 encoded->assign(reinterpret_cast<char*>(cert_handle->pbCertEncoded), 240 cert_handle->cbCertEncoded); 257 OSCertHandle cert_handle = NULL; local 260 length, CERT_STORE_ADD_USE_EXISTING, &cert_handle)) 263 return cert_handle; 289 OSCertHandle cert_handle) { 290 return CertDuplicateCertificateContext(cert_handle); [all...] |
cert_verify_proc_android.cc | 57 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local 63 if (cert_handles.empty() || cert_handles[0] != cert_handle) 64 cert_handles.insert(cert_handles.begin(), cert_handle);
|
x509_certificate.h | 142 static X509Certificate* CreateFromHandle(OSCertHandle cert_handle, 322 // Obtains the DER encoded certificate data for |cert_handle|. On success, 324 static bool GetDEREncoded(OSCertHandle cert_handle, 335 static bool GetPEMEncoded(OSCertHandle cert_handle, 348 static void GetPublicKeyInfo(OSCertHandle cert_handle, 385 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle); 388 static void FreeOSCertHandle(OSCertHandle cert_handle); 392 static SHA1HashValue CalculateFingerprint(OSCertHandle cert_handle); 408 X509Certificate(OSCertHandle cert_handle,
|
x509_certificate_openssl.cc | 245 OSCertHandle cert_handle) { 246 DCHECK(cert_handle); 252 CRYPTO_add(&cert_handle->references, 1, CRYPTO_LOCK_X509); 253 return cert_handle; 257 void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) { 261 X509_free(cert_handle); 382 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, 385 if (!GetDERAndCacheIfNeeded(cert_handle, &der_cache)) 422 bool X509Certificate::WriteOSCertHandleToPickle(OSCertHandle cert_handle, 425 if (!GetDERAndCacheIfNeeded(cert_handle, &der_cache) [all...] |
x509_certificate_mac.cc | 49 bool IsCertIssuerInEncodedList(X509Certificate::OSCertHandle cert_handle, 52 if (cached_cert.Init(cert_handle) != CSSM_OK) 129 // Test that a given |cert_handle| is actually a valid X.509 certificate, and 140 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { 142 OSStatus status = SecCertificateGetSubject(cert_handle, &sanity_check); 316 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, 319 if (SecCertificateGetData(cert_handle, &der_data) != noErr) 348 OSCertHandle cert_handle = NULL; local 352 &cert_handle); 355 if (!IsValidOSCertHandle(cert_handle)) { [all...] |
cert_verify_proc_nss.cc | 338 CERTCertificate* cert_handle, int num_policy_oids, 341 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle); 343 // Call CERT_PKIXVerifyCert for the cert_handle. 356 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle, 455 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer, 458 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids, 468 CERTCertificate* cert_handle, int num_policy_oids, 496 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer, 522 SECOidTag policy = GetFirstCertPolicy(cert_handle); 532 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer 762 CERTCertificate* cert_handle = scoped_chain.cert_handle(); local [all...] |
x509_util_nss.h | 40 void GetSubjectAltName(CERTCertificate* cert_handle,
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_model.cc | 72 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local 73 net::CertType type = x509_certificate_model::GetType(cert_handle); 81 x509_certificate_model::GetTokenName(cert_handle); 122 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); 123 return x509_certificate_model::GetPkcs11Id(cert_handle); 130 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local 131 std::string id = x509_certificate_model::GetPkcs11Id(cert_handle); 154 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); 155 return x509_certificate_model::GetNickname(cert_handle); 163 net::X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle() local [all...] |
/external/chromium_org/net/ssl/ |
client_cert_store_mac.cc | 38 OSStatus CopyCertChain(SecCertificateRef cert_handle, 40 DCHECK(cert_handle); 52 NULL, const_cast<const void**>(reinterpret_cast<void**>(&cert_handle)), 89 X509Certificate::OSCertHandle cert_handle = (*cert)->os_cert_handle(); local 91 OSStatus result = CopyCertChain(cert_handle, &cert_chain); 109 cert_handle, intermediates)); 229 SecCertificateRef cert_handle; local 230 err = SecIdentityCopyCertificate(identity, &cert_handle); 233 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle); 236 X509Certificate::CreateFromHandle(cert_handle, [all...] |
/external/chromium/net/base/ |
x509_certificate_nss.cc | 284 void GetCertSubjectAltNamesOfType(X509Certificate::OSCertHandle cert_handle, 294 SECStatus rv = CERT_FindCertExtension(cert_handle, 326 X509Certificate::OSCertHandle cert_handle, int num_policy_oids, 328 SECOidTag GetFirstCertPolicy(X509Certificate::OSCertHandle cert_handle); 330 // Call CERT_PKIXVerifyCert for the cert_handle. 335 SECStatus PKIXVerifyCert(X509Certificate::OSCertHandle cert_handle, 361 if (strcmp(cert_handle->issuerName, kMultipleKeyCA[i]) == 0) { 444 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer, 447 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids, 457 X509Certificate::OSCertHandle cert_handle, int num_policy_oids [all...] |
x509_certificate_mac.cc | 143 OSStatus GetCertFields(X509Certificate::OSCertHandle cert_handle, 145 DCHECK(cert_handle); 149 OSStatus status = SecCertificateGetData(cert_handle, &cert_data); 153 status = SecCertificateGetCLHandle(cert_handle, &fields->cl_handle); 164 void GetCertGeneralNamesForOID(X509Certificate::OSCertHandle cert_handle, 174 OSStatus status = GetCertFields(cert_handle, &fields); 205 void GetCertDateForOID(X509Certificate::OSCertHandle cert_handle, 210 OSStatus status = GetCertFields(cert_handle, &fields); 237 std::string GetCertSerialNumber(X509Certificate::OSCertHandle cert_handle) { 239 OSStatus status = GetCertFields(cert_handle, &fields) 1065 OSCertHandle cert_handle = NULL; local 1185 SecCertificateRef cert_handle = reinterpret_cast<SecCertificateRef>( local 1244 SecCertificateRef cert_handle; local [all...] |
x509_certificate.h | 134 // underlying crypto library. |source| specifies where |cert_handle| comes 140 static scoped_refptr<X509Certificate> CreateFromHandle(OSCertHandle cert_handle, 344 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle); 347 static void FreeOSCertHandle(OSCertHandle cert_handle); 359 X509Certificate(OSCertHandle cert_handle, Source source, 385 static SHA1Fingerprint CalculateFingerprint(OSCertHandle cert_handle);
|
x509_certificate_win.cc | 599 PCCERT_CONTEXT cert_handle = local 603 DCHECK(cert_handle) << "Failed to create self-signed certificate: " 605 if (!cert_handle) 608 X509Certificate* cert = CreateFromHandle(cert_handle, 611 FreeOSCertHandle(cert_handle); 951 OSCertHandle cert_handle = NULL; local [all...] |