/external/chromium_org/net/cert/ |
cert_verify_proc_android.cc | 27 // of its result), i.e. if |verify_result| was set. Otherwise returns false. 30 CertVerifyResult* verify_result) { 36 &status, &verify_result->is_issued_by_known_root, 44 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 48 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 51 verify_result->cert_status |= CERT_STATUS_INVALID; 54 verify_result->cert_status |= CERT_STATUS_INVALID; 58 verify_result->cert_status |= CERT_STATUS_INVALID; 71 verify_result->verified_cert = verified_cert; 83 verify_result->public_key_hashes.push_back(sha1) [all...] |
mock_cert_verifier.cc | 43 CertVerifyResult* verify_result, 54 *verify_result = it->result; 59 verify_result->verified_cert = cert; 60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_); 69 const CertVerifyResult& verify_result, 71 AddResultForCertAndHost(cert, "*", verify_result, rv); 77 const CertVerifyResult& verify_result, 79 Rule rule(cert, host_pattern, verify_result, rv);
|
cert_verify_proc_openssl.cc | 99 CertVerifyResult* verify_result) { 116 verify_result->has_md2 = true; 118 verify_result->has_md4 = true; 120 verify_result->has_md5 = true; 125 // Set verify_result->verified_cert and 126 // verify_result->is_issued_by_known_root. 128 verify_result->verified_cert = 135 verify_result->is_issued_by_known_root = true; 145 verify_result->is_issued_by_known_root = false; 192 CertVerifyResult* verify_result) { [all...] |
cert_verify_proc_unittest.cc | 49 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root| 54 // |verify_result->is_issued_by_known_root| to |is_well_known|. 70 CertVerifyResult* verify_result) OVERRIDE; 83 CertVerifyResult* verify_result) { 84 verify_result->is_issued_by_known_root = is_well_known_; 127 CertVerifyResult* verify_result) { 129 additional_trust_anchors, verify_result); 150 CertVerifyResult verify_result; local 157 &verify_result)); 182 CertVerifyResult verify_result; local 208 CertVerifyResult verify_result; local 260 CertVerifyResult verify_result; local 297 CertVerifyResult verify_result; local 321 CertVerifyResult verify_result; local 395 CertVerifyResult verify_result; local 454 CertVerifyResult verify_result; local 493 CertVerifyResult verify_result; local 569 CertVerifyResult verify_result; local 604 CertVerifyResult verify_result; local 635 CertVerifyResult verify_result; local 668 CertVerifyResult verify_result; local 720 CertVerifyResult verify_result; local 774 CertVerifyResult verify_result; local 814 CertVerifyResult verify_result; local 862 CertVerifyResult verify_result; local 921 CertVerifyResult verify_result; local 967 CertVerifyResult verify_result; local 1009 CertVerifyResult verify_result; local 1063 CertVerifyResult verify_result; local 1208 CertVerifyResult verify_result; local 1271 CertVerifyResult verify_result; local 1354 CertVerifyResult verify_result; local 1590 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_nss.h | 34 CertVerifyResult* verify_result); 42 CertVerifyResult* verify_result) OVERRIDE;
|
mock_cert_verifier.h | 32 CertVerifyResult* verify_result, 45 // copying |verify_result| into the verified result. 49 const CertVerifyResult& verify_result, 56 const CertVerifyResult& verify_result,
|
multi_threaded_cert_verifier_unittest.cc | 51 CertVerifyResult* verify_result) OVERRIDE { 52 verify_result->Reset(); 53 verify_result->verified_cert = cert; 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; 85 CertVerifyResult verify_result; local 93 &verify_result, 110 &verify_result, 155 CertVerifyResult verify_result; local 163 &verify_result, 180 &verify_result, 202 CertVerifyResult verify_result; local 246 CertVerifyResult verify_result; local 295 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_android.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_mac.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_openssl.h | 28 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_win.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_win.cc | 290 // |*verify_result|. The caller MUST initialize |*verify_result| before 293 CertVerifyResult* verify_result) { 330 verify_result->has_md5 = true; 333 verify_result->has_md2 = true; 336 verify_result->has_md4 = true; 344 verify_result->verified_cert = 549 CertVerifyResult* verify_result) { 600 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; 630 verify_result->cert_status |= CERT_STATUS_INVALID [all...] |
cert_verify_proc_mac.cc | 179 // |*verify_result|. The caller MUST initialize |*verify_result| before 183 CertVerifyResult* verify_result) { 225 verify_result->has_md2 = true; 227 verify_result->has_md4 = true; 229 verify_result->has_md5 = true; 235 verify_result->verified_cert = 532 CertVerifyResult* verify_result) { 567 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; 570 verify_result->cert_status |= CERT_STATUS_REVOKED [all...] |
single_request_cert_verifier.cc | 32 CertVerifyResult* verify_result, 43 cert, hostname, flags, crl_set, verify_result,
|
single_request_cert_verifier.h | 25 // Verifies the given certificate, filling out the |verify_result| object 31 CertVerifyResult* verify_result,
|
cert_verify_proc.h | 35 // The |*verify_result| structure, including the |verify_result->cert_status| 38 // |verify_result->cert_status|, and the error code for the most serious 62 CertVerifyResult* verify_result); 84 CertVerifyResult* verify_result) = 0;
|
multi_threaded_cert_verifier.cc | 83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, 86 results->SetBoolean("has_md5", verify_result.has_md5); 87 results->SetBoolean("has_md2", verify_result.has_md2); 88 results->SetBoolean("has_md4", verify_result.has_md4); 90 verify_result.is_issued_by_known_root); 92 verify_result.is_issued_by_additional_trust_anchor); 94 verify_result.common_name_fallback_used); 95 results->SetInteger("cert_status", verify_result.cert_status); 98 NetLogX509CertificateCallback(verify_result.verified_cert, log_level)); 102 verify_result.public_key_hashes.begin() [all...] |
cert_verify_proc.cc | 193 CertVerifyResult* verify_result) { 194 verify_result->Reset(); 195 verify_result->verified_cert = cert; 198 verify_result->cert_status |= CERT_STATUS_REVOKED; 210 additional_trust_anchors, verify_result); 213 verify_result->common_name_fallback_used); 214 if (!verify_result->is_issued_by_known_root) { 216 verify_result->common_name_fallback_used); 221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 222 verify_result->cert_status |= CERT_STATUS_REVOKED [all...] |
cert_verify_proc_nss.cc | 151 // *verify_result. The caller MUST initialize *verify_result before calling 156 CertVerifyResult* verify_result) { 198 verify_result->has_md5 = true; 201 verify_result->has_md2 = true; 204 verify_result->has_md4 = true; 214 verify_result->verified_cert = 217 verify_result->verified_cert = 756 CertVerifyResult* verify_result) { 767 &verify_result->common_name_fallback_used)) [all...] |
nss_cert_database_unittest.cc | 579 CertVerifyResult verify_result; local 585 &verify_result); 587 EXPECT_EQ(0U, verify_result.cert_status); 610 CertVerifyResult verify_result; local 616 &verify_result); 618 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status); 642 CertVerifyResult verify_result; local 648 &verify_result); 650 EXPECT_EQ(0U, verify_result.cert_status); 678 CertVerifyResult verify_result; local 720 CertVerifyResult verify_result; local 768 CertVerifyResult verify_result; local 844 CertVerifyResult verify_result; local 914 CertVerifyResult verify_result; local 978 CertVerifyResult verify_result; local [all...] |
cert_verifier.h | 78 // The |*verify_result| structure, including the |verify_result->cert_status| 81 // |verify_result->cert_status|, and the error code for the most serious 108 CertVerifyResult* verify_result,
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 20 const net::CertVerifyResult& verify_result) { 22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor || 32 const net::CertVerifyResult* verify_result, 35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result); 76 net::CertVerifyResult* verify_result, 86 verify_result); 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result, 89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
|
policy_cert_verifier_browsertest.cc | 66 net::CertVerifyResult* verify_result, 72 verify_result, 127 net::CertVerifyResult verify_result; local 130 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 140 net::CertVerifyResult verify_result; local 143 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 163 net::CertVerifyResult verify_result; local 166 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 182 net::CertVerifyResult verify_result; local 185 int error = VerifyTestServerCert(callback, &verify_result, &request_handle) 196 net::CertVerifyResult verify_result; local 210 net::CertVerifyResult verify_result; local 221 net::CertVerifyResult verify_result; local [all...] |
/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos.cc | 43 net::CertVerifyResult* verify_result) { 58 verify_result);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_asn1.c | 107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 233 if (in->verify_result != X509_V_OK) 235 a.verify_result.length=LSIZE2; 236 a.verify_result.type=V_ASN1_INTEGER; 237 a.verify_result.data=ibuf5; 238 ASN1_INTEGER_set(&a.verify_result,in->verify_result); 303 if (in->verify_result != X509_V_OK) 304 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); 350 if (in->verify_result != X509_V_OK [all...] |