/external/chromium/chrome/browser/ssl/ |
ssl_error_info.cc | 44 std::vector<std::string> dns_names; local 45 cert->GetDNSNames(&dns_names); 46 DCHECK(!dns_names.empty()); 48 for (; i < dns_names.size(); ++i) { 49 if (dns_names[i] == cert->subject().common_name) 52 if (i == dns_names.size()) 57 UTF8ToUTF16(dns_names[i]),
|
/external/chromium_org/chrome/browser/ssl/ |
ssl_error_info.cc | 45 std::vector<std::string> dns_names; local 46 cert->GetDNSNames(&dns_names); 47 DCHECK(!dns_names.empty()); 49 for (; i < dns_names.size(); ++i) { 50 if (dns_names[i] == cert->subject().common_name) 53 if (i == dns_names.size()) 59 UTF8ToUTF16(dns_names[i])),
|
/external/chromium_org/net/cert/ |
x509_certificate_ios.cc | 89 std::vector<std::string>* dns_names, 94 if (dns_names) 95 dns_names->clear(); 100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs);
|
x509_certificate_unittest.cc | 129 std::vector<std::string> dns_names; local 130 google_cert->GetDNSNames(&dns_names); 131 ASSERT_EQ(1U, dns_names.size()); 132 EXPECT_EQ("www.google.com", dns_names[0]); 186 std::vector<std::string> dns_names; local 187 webkit_cert->GetDNSNames(&dns_names); 188 ASSERT_EQ(2U, dns_names.size()); 189 EXPECT_EQ("*.webkit.org", dns_names[0]); 190 EXPECT_EQ("webkit.org", dns_names[1]); 242 std::vector<std::string> dns_names; local 387 std::vector<std::string> dns_names; local 932 const char* dns_names; member in struct:net::CertificateNameVerifyTestData 1101 std::vector<std::string> dns_names, ip_addressses; local [all...] |
cert_verify_proc.cc | 225 std::vector<std::string> dns_names, ip_addrs; local 226 cert->GetSubjectAltName(&dns_names, &ip_addrs); 229 dns_names, 420 // CheckNameConstraints verifies that every name in |dns_names| is in one of 423 static bool CheckNameConstraints(const std::vector<std::string>& dns_names, 425 for (std::vector<std::string>::const_iterator i = dns_names.begin(); 426 i != dns_names.end(); ++i) { 476 const std::vector<std::string>& dns_names, 522 if (dns_names.empty() && ip_addrs.empty()) { 523 std::vector<std::string> dns_names; local [all...] |
cert_verify_proc.h | 95 // imposed on it and the names in |dns_names| are not permitted. 99 const std::vector<std::string>& dns_names,
|
x509_certificate_openssl.cc | 100 std::vector<std::string>* dns_names, 102 DCHECK(dns_names || ip_addresses); 115 if (name->type == GEN_DNS && dns_names) { 120 dns_names->push_back( 366 std::vector<std::string>* dns_names, 368 if (dns_names) 369 dns_names->clear(); 373 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs);
|
x509_certificate_nss.cc | 117 std::vector<std::string>* dns_names, 119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs);
|
x509_certificate_mac.cc | 275 std::vector<std::string>* dns_names, 277 if (dns_names) 278 dns_names->clear(); 303 if (dns_names && name_struct.nameType == GNT_DNSName) { 304 dns_names->push_back(std::string(
|
x509_certificate_win.cc | 168 std::vector<std::string>* dns_names, 170 if (dns_names) 171 dns_names->clear(); 188 if (dns_names && entry.dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) { 189 dns_names->push_back(WideToASCII(entry.pwszDNSName));
|
x509_util_nss.cc | 448 std::vector<std::string>* dns_names, 450 if (dns_names) 451 dns_names->clear(); 474 if (dns_names && name->type == certDNSName) { 475 dns_names->push_back(std::string(
|
x509_certificate.cc | 488 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 489 GetSubjectAltName(dns_names, NULL); 490 if (dns_names->empty()) 491 dns_names->push_back(subject_.common_name); 656 std::vector<std::string> dns_names, ip_addrs; local 657 GetSubjectAltName(&dns_names, &ip_addrs); 658 return VerifyHostname(hostname, subject_.common_name, dns_names, ip_addrs,
|
x509_util_nss.h | 41 std::vector<std::string>* dns_names,
|
x509_certificate.h | 229 void GetDNSNames(std::vector<std::string>* dns_names) const; 235 void GetSubjectAltName(std::vector<std::string>* dns_names,
|
/external/chromium/net/base/ |
x509_certificate_openssl.cc | 98 std::vector<std::string>* dns_names) { 116 dns_names->push_back( 397 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 398 dns_names->clear(); 400 ParseSubjectAltNames(cert_handle_, dns_names); 402 if (dns_names->empty()) 403 dns_names->push_back(subject_.common_name);
|
x509_certificate_unittest.cc | 223 std::vector<std::string> dns_names; local 224 google_cert->GetDNSNames(&dns_names); 225 ASSERT_EQ(1U, dns_names.size()); 226 EXPECT_EQ("www.google.com", dns_names[0]); 289 std::vector<std::string> dns_names; local 290 webkit_cert->GetDNSNames(&dns_names); 291 ASSERT_EQ(2U, dns_names.size()); 292 EXPECT_EQ("*.webkit.org", dns_names[0]); 293 EXPECT_EQ("webkit.org", dns_names[1]); 352 std::vector<std::string> dns_names; local [all...] |
x509_certificate_mac.cc | 109 std::vector<std::string>* dns_names) { 124 for (std::vector<std::string>::const_iterator name = dns_names->begin(); 125 name != dns_names->end() && !override_hostname_mismatch; ++name) 776 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 777 dns_names->clear(); 780 dns_names); 782 if (dns_names->empty()) 783 dns_names->push_back(subject_.common_name); [all...] |
x509_certificate_nss.cc | 754 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 755 dns_names->clear(); 758 GetCertSubjectAltNamesOfType(cert_handle_, certDNSName, dns_names); 760 if (dns_names->empty()) 761 dns_names->push_back(subject_.common_name); [all...] |
x509_certificate_win.cc | 615 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 616 dns_names->clear(); 627 dns_names->push_back( 632 if (dns_names->empty()) 633 dns_names->push_back(subject_.common_name); [all...] |
x509_certificate.h | 226 void GetDNSNames(std::vector<std::string>* dns_names) const;
|
x509_certificate.cc | 528 std::vector<std::string> dns_names; local 529 GetDNSNames(&dns_names); 530 return VerifyHostname(hostname, dns_names); [all...] |