/external/chromium_org/net/cert/ |
cert_verify_proc_android.h | 27 CRLSet* crl_set,
|
cert_verify_proc_mac.h | 27 CRLSet* crl_set,
|
cert_verify_proc_nss.h | 27 CRLSet* crl_set,
|
cert_verify_proc_openssl.h | 26 CRLSet* crl_set,
|
cert_verify_proc_win.h | 27 CRLSet* crl_set,
|
cert_verify_proc.h | 46 // |crl_set| is given. 51 // |crl_set| points to an optional CRLSet structure which can be used to 60 CRLSet* crl_set, 82 CRLSet* crl_set,
|
cert_verifier.h | 93 // |crl_set| points to an optional CRLSet structure which can be used to 107 CRLSet* crl_set,
|
single_request_cert_verifier.h | 30 CRLSet* crl_set,
|
crl_set.cc | 15 #include "net/cert/crl_set.h" 241 scoped_refptr<CRLSet> crl_set(new CRLSet); 242 crl_set->sequence_ = static_cast<uint32>(sequence); 243 crl_set->not_after_ = static_cast<uint64>(not_after); 251 crl_set->crls_.push_back(std::make_pair(parent_spki_sha256, serials)); 252 crl_set->crls_index_by_issuer_[parent_spki_sha256] = crl_index; 255 if (!crl_set->CopyBlockedSPKIsFromHeader(header_dict.get())) 258 *out_crl_set = crl_set; 379 scoped_refptr<CRLSet> crl_set(new CRLSet); 380 crl_set->sequence_ = static_cast<uint32>(sequence) 595 CRLSet* crl_set = new CRLSet; local [all...] |
single_request_cert_verifier.cc | 31 CRLSet* crl_set, 43 cert, hostname, flags, crl_set, verify_result,
|
mock_cert_verifier.h | 31 CRLSet* crl_set,
|
mock_cert_verifier.cc | 42 CRLSet* crl_set,
|
cert_verify_proc_android.cc | 91 CRLSet* crl_set,
|
cert_verify_proc_nss.cc | 26 #include "net/cert/crl_set.h" 264 // against |crl_set|. It returns: 272 CRLSet* crl_set) { 309 CRLSet::Result result = crl_set->CheckSPKI(spki_hash); 312 result = crl_set->CheckSerial(serial_number, issuer_spki_hash); 331 if (!covered || crl_set->IsExpired()) 668 CRLSet* crl_set, 706 if (crl_set) { 710 crl_set); 755 CRLSet* crl_set, [all...] |
cert_verify_proc_win.cc | 22 #include "net/cert/crl_set.h" 386 // against |crl_set|. It returns: 393 CRLSet* crl_set) { 433 CRLSet::Result result = crl_set->CheckSPKI(spki_hash); 436 result = crl_set->CheckSerial(serial, issuer_spki_hash); 455 if (!covered || crl_set->IsExpired()) 547 CRLSet* crl_set, 635 if (crl_set) 636 crl_set_result = CheckRevocationWithCRLSet(chain_context, crl_set);
|
cert_verify_proc_mac.cc | 28 #include "net/cert/crl_set.h" 266 bool CheckRevocationWithCRLSet(CFArrayRef chain, CRLSet* crl_set) { 308 CRLSet::Result result = crl_set->CheckSPKI(spki_hash); 311 result = crl_set->CheckSerial(serial, issuer_spki_hash); 531 CRLSet* crl_set, 570 if (crl_set && !CheckRevocationWithCRLSet(completed_chain, crl_set))
|
multi_threaded_cert_verifier.cc | 22 #include "net/cert/crl_set.h" 190 CRLSet* crl_set, 197 crl_set_(crl_set), 416 CRLSet* crl_set, 462 crl_set,
|
multi_threaded_cert_verifier.h | 60 CRLSet* crl_set,
|
/external/chromium_org/net/tools/crl_set_dump/ |
crl_set_dump.cc | 18 #include "net/cert/crl_set.h" 48 scoped_refptr<net::CRLSet> crl_set, final_crl_set; local 49 if (!net::CRLSet::Parse(crl_set_bytes, &crl_set)) { 55 if (!crl_set->ApplyDelta(delta_bytes, &final_crl_set)) { 60 final_crl_set = crl_set;
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.h | 51 net::CRLSet* crl_set,
|
policy_cert_verifier.cc | 76 net::CRLSet* crl_set, 88 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/chrome/browser/net/ |
crl_set_fetcher.h | 60 void SetCRLSetIfNewer(scoped_refptr<net::CRLSet> crl_set);
|
crl_set_fetcher.cc | 19 #include "net/cert/crl_set.h" 97 scoped_refptr<net::CRLSet> crl_set) { 101 if (old_crl_set.get() && old_crl_set->sequence() > crl_set->sequence()) { 105 << crl_set->sequence(); 107 net::SSLConfigService::SetCRLSet(crl_set); 108 VLOG(1) << "Installed CRL set #" << crl_set->sequence();
|
/external/chromium_org/net/ssl/ |
ssl_config_service.h | 16 #include "net/cert/crl_set.h" 194 static void SetCRLSet(scoped_refptr<CRLSet> crl_set);
|
ssl_config_service.cc | 10 #include "net/cert/crl_set.h" 107 void SSLConfigService::SetCRLSet(scoped_refptr<CRLSet> crl_set) { 109 g_crl_set.Get().Set(crl_set);
|