HomeSort by relevance Sort by last modified time
    Searched refs:dns_names (Results 1 - 21 of 21) sorted by null

  /external/chromium/chrome/browser/ssl/
ssl_error_info.cc 44 std::vector<std::string> dns_names; local
45 cert->GetDNSNames(&dns_names);
46 DCHECK(!dns_names.empty());
48 for (; i < dns_names.size(); ++i) {
49 if (dns_names[i] == cert->subject().common_name)
52 if (i == dns_names.size())
57 UTF8ToUTF16(dns_names[i]),
  /external/chromium_org/net/cert/
cert_verify_proc.h 95 // imposed on it and the names in |dns_names| are not permitted.
99 const std::vector<std::string>& dns_names,
cert_verify_proc.cc 225 std::vector<std::string> dns_names, ip_addrs; local
226 cert->GetSubjectAltName(&dns_names, &ip_addrs);
229 dns_names,
420 // CheckNameConstraints verifies that every name in |dns_names| is in one of
423 static bool CheckNameConstraints(const std::vector<std::string>& dns_names,
425 for (std::vector<std::string>::const_iterator i = dns_names.begin();
426 i != dns_names.end(); ++i) {
476 const std::vector<std::string>& dns_names,
522 if (dns_names.empty() && ip_addrs.empty()) {
523 std::vector<std::string> dns_names; local
    [all...]
x509_certificate_unittest.cc 129 std::vector<std::string> dns_names; local
130 google_cert->GetDNSNames(&dns_names);
131 ASSERT_EQ(1U, dns_names.size());
132 EXPECT_EQ("www.google.com", dns_names[0]);
186 std::vector<std::string> dns_names; local
187 webkit_cert->GetDNSNames(&dns_names);
188 ASSERT_EQ(2U, dns_names.size());
189 EXPECT_EQ("*.webkit.org", dns_names[0]);
190 EXPECT_EQ("webkit.org", dns_names[1]);
242 std::vector<std::string> dns_names; local
387 std::vector<std::string> dns_names; local
932 const char* dns_names; member in struct:net::CertificateNameVerifyTestData
1101 std::vector<std::string> dns_names, ip_addressses; local
    [all...]
x509_certificate_openssl.cc 100 std::vector<std::string>* dns_names,
102 DCHECK(dns_names || ip_addresses);
115 if (name->type == GEN_DNS && dns_names) {
120 dns_names->push_back(
366 std::vector<std::string>* dns_names,
368 if (dns_names)
369 dns_names->clear();
373 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs);
x509_certificate_ios.cc 89 std::vector<std::string>* dns_names,
94 if (dns_names)
95 dns_names->clear();
100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs);
x509_util_nss.h 41 std::vector<std::string>* dns_names,
x509_certificate_win.cc 168 std::vector<std::string>* dns_names,
170 if (dns_names)
171 dns_names->clear();
188 if (dns_names && entry.dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) {
189 dns_names->push_back(WideToASCII(entry.pwszDNSName));
x509_certificate.cc 488 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
489 GetSubjectAltName(dns_names, NULL);
490 if (dns_names->empty())
491 dns_names->push_back(subject_.common_name);
656 std::vector<std::string> dns_names, ip_addrs; local
657 GetSubjectAltName(&dns_names, &ip_addrs);
658 return VerifyHostname(hostname, subject_.common_name, dns_names, ip_addrs,
x509_certificate.h 229 void GetDNSNames(std::vector<std::string>* dns_names) const;
235 void GetSubjectAltName(std::vector<std::string>* dns_names,
x509_certificate_nss.cc 117 std::vector<std::string>* dns_names,
119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs);
x509_certificate_mac.cc 275 std::vector<std::string>* dns_names,
277 if (dns_names)
278 dns_names->clear();
303 if (dns_names && name_struct.nameType == GNT_DNSName) {
304 dns_names->push_back(std::string(
x509_util_nss.cc 448 std::vector<std::string>* dns_names,
450 if (dns_names)
451 dns_names->clear();
474 if (dns_names && name->type == certDNSName) {
475 dns_names->push_back(std::string(
  /external/chromium_org/chrome/browser/ssl/
ssl_error_info.cc 45 std::vector<std::string> dns_names; local
46 cert->GetDNSNames(&dns_names);
47 DCHECK(!dns_names.empty());
49 for (; i < dns_names.size(); ++i) {
50 if (dns_names[i] == cert->subject().common_name)
53 if (i == dns_names.size())
59 UTF8ToUTF16(dns_names[i])),
  /external/chromium/net/base/
x509_certificate_openssl.cc 98 std::vector<std::string>* dns_names) {
116 dns_names->push_back(
397 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
398 dns_names->clear();
400 ParseSubjectAltNames(cert_handle_, dns_names);
402 if (dns_names->empty())
403 dns_names->push_back(subject_.common_name);
x509_certificate_unittest.cc 223 std::vector<std::string> dns_names; local
224 google_cert->GetDNSNames(&dns_names);
225 ASSERT_EQ(1U, dns_names.size());
226 EXPECT_EQ("www.google.com", dns_names[0]);
289 std::vector<std::string> dns_names; local
290 webkit_cert->GetDNSNames(&dns_names);
291 ASSERT_EQ(2U, dns_names.size());
292 EXPECT_EQ("*.webkit.org", dns_names[0]);
293 EXPECT_EQ("webkit.org", dns_names[1]);
352 std::vector<std::string> dns_names; local
    [all...]
x509_certificate_mac.cc 109 std::vector<std::string>* dns_names) {
124 for (std::vector<std::string>::const_iterator name = dns_names->begin();
125 name != dns_names->end() && !override_hostname_mismatch; ++name)
776 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
777 dns_names->clear();
780 dns_names);
782 if (dns_names->empty())
783 dns_names->push_back(subject_.common_name);
    [all...]
x509_certificate_nss.cc 754 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
755 dns_names->clear();
758 GetCertSubjectAltNamesOfType(cert_handle_, certDNSName, dns_names);
760 if (dns_names->empty())
761 dns_names->push_back(subject_.common_name);
    [all...]
x509_certificate_win.cc 615 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
616 dns_names->clear();
627 dns_names->push_back(
632 if (dns_names->empty())
633 dns_names->push_back(subject_.common_name);
    [all...]
x509_certificate.h 226 void GetDNSNames(std::vector<std::string>* dns_names) const;
x509_certificate.cc 528 std::vector<std::string> dns_names; local
529 GetDNSNames(&dns_names);
530 return VerifyHostname(hostname, dns_names);
    [all...]

Completed in 278 milliseconds