/external/chromium_org/net/cert/ |
cert_verify_proc_nss.h | 32 const CertificateList& additional_trust_anchors, 41 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_android.h | 28 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_mac.h | 28 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_openssl.h | 27 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_win.h | 28 const CertificateList& additional_trust_anchors,
|
cert_verify_proc.h | 54 // |additional_trust_anchors| lists certificates that can be trusted when 61 const CertificateList& additional_trust_anchors, 65 // anchors to the Verify() call. The |additional_trust_anchors| parameter 83 const CertificateList& additional_trust_anchors,
|
multi_threaded_cert_verifier.cc | 222 const CertificateList& additional_trust_anchors, 229 additional_trust_anchors_(additional_trust_anchors), 474 const CertificateList& additional_trust_anchors = local 479 hostname, flags, additional_trust_anchors); 506 additional_trust_anchors, 544 const CertificateList& additional_trust_anchors) 547 hash_values.reserve(2 + additional_trust_anchors.size()); 550 for (size_t i = 0; i < additional_trust_anchors.size(); ++i) 551 hash_values.push_back(additional_trust_anchors[i]->fingerprint()); 577 const CertificateList& additional_trust_anchors, [all...] |
multi_threaded_cert_verifier.h | 88 const CertificateList& additional_trust_anchors); 135 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_nss.cc | 235 bool IsAdditionalTrustAnchor(CERTCertList* additional_trust_anchors, 237 if (!additional_trust_anchors || !root) 239 for (CERTCertListNode* node = CERT_LIST_HEAD(additional_trust_anchors); 240 !CERT_LIST_END(node, additional_trust_anchors); 344 // additional_trust_anchors is an optional list of certificates that can be 353 CERTCertList* additional_trust_anchors, 436 if (additional_trust_anchors) { 438 in_param.value.pointer.chain = additional_trust_anchors; 669 CERTCertList* additional_trust_anchors, 691 additional_trust_anchors, [all...] |
cert_verify_proc_android.cc | 130 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_openssl.cc | 191 const CertificateList& additional_trust_anchors,
|
cert_verify_proc.cc | 192 const CertificateList& additional_trust_anchors, 210 additional_trust_anchors, verify_result);
|
cert_verify_proc_unittest.cc | 69 const CertificateList& additional_trust_anchors, 82 const CertificateList& additional_trust_anchors, 126 const CertificateList& additional_trust_anchors, 129 additional_trust_anchors, verify_result); [all...] |
multi_threaded_cert_verifier_unittest.cc | 50 const CertificateList& additional_trust_anchors, 378 { // Different additional_trust_anchors.
|
cert_verify_proc_mac.cc | 531 const CertificateList& additional_trust_anchors,
|
cert_verify_proc_win.cc | 548 const CertificateList& additional_trust_anchors,
|
/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos.cc | 23 const net::CertificateList& additional_trust_anchors; member in struct:chromeos::__anon7894::ChainVerifyArgs 42 const net::CertificateList& additional_trust_anchors, 44 ChainVerifyArgs chain_verify_args = {this, additional_trust_anchors}; 56 additional_trust_anchors, 80 args->additional_trust_anchors.begin(); 81 i != args->additional_trust_anchors.end(); 84 // Certs in the additional_trust_anchors should always be allowed, even if
|
cert_verify_proc_chromeos.h | 40 const net::CertificateList& additional_trust_anchors,
|
cert_verify_proc_chromeos_unittest.cc | 78 const net::CertificateList& additional_trust_anchors, 87 additional_trust_anchors, 103 net::CertificateList additional_trust_anchors; local 105 verify_proc, additional_trust_anchors, cert, root_subject_name); 192 // Test that roots specified through additional_trust_anchors are trusted for 201 net::CertificateList additional_trust_anchors; local 207 additional_trust_anchors, 212 additional_trust_anchors, 217 additional_trust_anchors.push_back(root_1_[0]); 220 additional_trust_anchors, [all...] |