/external/chromium/net/base/ |
x509_certificate_openssl_android.cc | 17 CertVerifyResult* verify_result) const { 18 verify_result->Reset(); 23 verify_result->cert_status |= ERR_CERT_INVALID; 24 return MapCertStatusToNetError(verify_result->cert_status); 41 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 42 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 43 return MapCertStatusToNetError(verify_result->cert_status); 53 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 56 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 60 verify_result->cert_status |= ERR_CERT_INVALID [all...] |
cert_verifier.cc | 91 CertVerifyResult* verify_result) 93 verify_result_(verify_result) { 102 // Copies the contents of |verify_result| to the caller's 104 void Post(const CachedCertVerifyResult& verify_result) { 106 *verify_result_ = verify_result.result; 107 callback_->Run(verify_result.error); 251 void HandleResult(const CachedCertVerifyResult& verify_result) { 253 PostAll(verify_result); 257 void PostAll(const CachedCertVerifyResult& verify_result) { 263 (*i)->Post(verify_result); [all...] |
cert_verifier_unittest.cc | 52 CertVerifyResult verify_result; local 56 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 66 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 90 CertVerifyResult verify_result; local 97 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 127 CertVerifyResult verify_result; local 131 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 142 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 156 error = verifier.Verify(google_cert, "www.example.com", 0, &verify_result, 181 CertVerifyResult verify_result; local 236 CertVerifyResult verify_result; local 270 CertVerifyResult verify_result; local [all...] |
x509_certificate_win.cc | 295 // *verify_result. The caller MUST initialize *verify_result before calling 298 CertVerifyResult* verify_result) { 312 verify_result->has_md5 = true; 314 verify_result->has_md5_ca = true; 317 verify_result->has_md2 = true; 319 verify_result->has_md2_ca = true; 322 verify_result->has_md4 = true; 668 CertVerifyResult* verify_result) const { 669 verify_result->Reset() [all...] |
/external/chromium_org/net/cert/ |
cert_verify_proc_android.cc | 23 // of its result), i.e. if |verify_result| was set. Otherwise returns false. 25 CertVerifyResult* verify_result) { 35 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 39 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 42 verify_result->cert_status |= CERT_STATUS_INVALID; 45 verify_result->cert_status |= CERT_STATUS_INVALID; 49 verify_result->cert_status |= CERT_STATUS_INVALID; 93 CertVerifyResult* verify_result) { 95 &verify_result->common_name_fallback_used)) { 96 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID [all...] |
mock_cert_verifier.cc | 43 CertVerifyResult* verify_result, 54 *verify_result = it->result; 59 verify_result->verified_cert = cert; 60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_); 69 const CertVerifyResult& verify_result, 71 AddResultForCertAndHost(cert, "*", verify_result, rv); 77 const CertVerifyResult& verify_result, 79 Rule rule(cert, host_pattern, verify_result, rv);
|
cert_verify_proc_openssl.cc | 98 CertVerifyResult* verify_result) { 115 verify_result->has_md2 = true; 117 verify_result->has_md4 = true; 119 verify_result->has_md5 = true; 125 verify_result->verified_cert = 172 CertVerifyResult* verify_result) { 176 &verify_result->common_name_fallback_used)) { 177 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 209 verify_result->cert_status |= cert_status; 212 GetCertChainInfo(ctx.get(), verify_result); [all...] |
mock_cert_verifier.h | 32 CertVerifyResult* verify_result, 45 // copying |verify_result| into the verified result. 49 const CertVerifyResult& verify_result, 56 const CertVerifyResult& verify_result,
|
cert_verify_proc_unittest.cc | 47 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root| 52 // |verify_result->is_issued_by_known_root| to |is_well_known|. 68 CertVerifyResult* verify_result) OVERRIDE; 81 CertVerifyResult* verify_result) { 82 verify_result->is_issued_by_known_root = is_well_known_; 105 CertVerifyResult* verify_result) { 107 additional_trust_anchors, verify_result); 128 CertVerifyResult verify_result; local 135 &verify_result)); 160 CertVerifyResult verify_result; local 186 CertVerifyResult verify_result; local 238 CertVerifyResult verify_result; local 275 CertVerifyResult verify_result; local 299 CertVerifyResult verify_result; local 373 CertVerifyResult verify_result; local 431 CertVerifyResult verify_result; local 470 CertVerifyResult verify_result; local 546 CertVerifyResult verify_result; local 582 CertVerifyResult verify_result; local 609 CertVerifyResult verify_result; local 637 CertVerifyResult verify_result; local 689 CertVerifyResult verify_result; local 738 CertVerifyResult verify_result; local 781 CertVerifyResult verify_result; local 824 CertVerifyResult verify_result; local 878 CertVerifyResult verify_result; local 924 CertVerifyResult verify_result; local 991 CertVerifyResult verify_result; local 1134 CertVerifyResult verify_result; local 1197 CertVerifyResult verify_result; local 1280 CertVerifyResult verify_result; local 1516 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_android.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_mac.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_nss.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_openssl.h | 28 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_win.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc.h | 35 // The |*verify_result| structure, including the |verify_result->cert_status| 38 // |verify_result->cert_status|, and the error code for the most serious 62 CertVerifyResult* verify_result); 84 CertVerifyResult* verify_result) = 0;
|
cert_verify_proc_win.cc | 291 // |*verify_result|. The caller MUST initialize |*verify_result| before 294 CertVerifyResult* verify_result) { 331 verify_result->has_md5 = true; 334 verify_result->has_md2 = true; 337 verify_result->has_md4 = true; 345 verify_result->verified_cert = 549 CertVerifyResult* verify_result) { 600 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; 630 verify_result->cert_status |= CERT_STATUS_INVALID [all...] |
cert_verifier.h | 78 // The |*verify_result| structure, including the |verify_result->cert_status| 81 // |verify_result->cert_status|, and the error code for the most serious 108 CertVerifyResult* verify_result,
|
single_request_cert_verifier.h | 25 // Verifies the given certificate, filling out the |verify_result| object 31 CertVerifyResult* verify_result,
|
multi_threaded_cert_verifier_unittest.cc | 51 CertVerifyResult* verify_result) OVERRIDE { 52 verify_result->Reset(); 53 verify_result->verified_cert = cert; 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; 85 CertVerifyResult verify_result; local 93 &verify_result, 110 &verify_result, 155 CertVerifyResult verify_result; local 163 &verify_result, 180 &verify_result, 202 CertVerifyResult verify_result; local 246 CertVerifyResult verify_result; local 295 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_mac.cc | 180 // |*verify_result|. The caller MUST initialize |*verify_result| before 184 CertVerifyResult* verify_result) { 226 verify_result->has_md2 = true; 228 verify_result->has_md4 = true; 230 verify_result->has_md5 = true; 236 verify_result->verified_cert = 533 CertVerifyResult* verify_result) { 568 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; 571 verify_result->cert_status |= CERT_STATUS_REVOKED [all...] |
cert_verify_proc.cc | 192 CertVerifyResult* verify_result) { 193 verify_result->Reset(); 194 verify_result->verified_cert = cert; 197 verify_result->cert_status |= CERT_STATUS_REVOKED; 209 additional_trust_anchors, verify_result); 212 verify_result->common_name_fallback_used); 213 if (!verify_result->is_issued_by_known_root) { 215 verify_result->common_name_fallback_used); 220 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 221 verify_result->cert_status |= CERT_STATUS_REVOKED [all...] |
multi_threaded_cert_verifier.cc | 140 CertVerifyResult* verify_result, 143 verify_result_(verify_result), 159 // Copies the contents of |verify_result| to the caller's 161 void Post(const MultiThreadedCertVerifier::CachedResult& verify_result) { 164 *verify_result_ = verify_result.result; 165 callback_.Run(verify_result.error); 351 const MultiThreadedCertVerifier::CachedResult& verify_result) { 359 PostAll(verify_result); 363 void PostAll(const MultiThreadedCertVerifier::CachedResult& verify_result) { 369 (*i)->Post(verify_result); [all...] |
single_request_cert_verifier.cc | 32 CertVerifyResult* verify_result, 43 cert, hostname, flags, crl_set, verify_result,
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 20 const net::CertVerifyResult& verify_result) { 22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor || 32 const net::CertVerifyResult* verify_result, 35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result); 77 net::CertVerifyResult* verify_result, 87 verify_result); 88 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result, 90 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
|
policy_cert_verifier_browsertest.cc | 64 net::CertVerifyResult* verify_result, 70 verify_result, 125 net::CertVerifyResult verify_result; local 128 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 138 net::CertVerifyResult verify_result; local 141 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 161 net::CertVerifyResult verify_result; local 164 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 183 net::CertVerifyResult verify_result; local 186 int error = VerifyTestServerCert(callback, &verify_result, &request_handle) 197 net::CertVerifyResult verify_result; local 211 net::CertVerifyResult verify_result; local 222 net::CertVerifyResult verify_result; local [all...] |