HomeSort by relevance Sort by last modified time
    Searched full:verify_result (Results 1 - 25 of 59) sorted by null

1 2 3

  /external/chromium_org/net/cert/
cert_verify_proc_android.cc 27 // of its result), i.e. if |verify_result| was set. Otherwise returns false.
30 CertVerifyResult* verify_result) {
36 &status, &verify_result->is_issued_by_known_root,
44 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
48 verify_result->cert_status |= CERT_STATUS_DATE_INVALID;
51 verify_result->cert_status |= CERT_STATUS_INVALID;
54 verify_result->cert_status |= CERT_STATUS_INVALID;
58 verify_result->cert_status |= CERT_STATUS_INVALID;
71 verify_result->verified_cert = verified_cert;
83 verify_result->public_key_hashes.push_back(sha1)
    [all...]
mock_cert_verifier.cc 43 CertVerifyResult* verify_result,
54 *verify_result = it->result;
59 verify_result->verified_cert = cert;
60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_);
69 const CertVerifyResult& verify_result,
71 AddResultForCertAndHost(cert, "*", verify_result, rv);
77 const CertVerifyResult& verify_result,
79 Rule rule(cert, host_pattern, verify_result, rv);
cert_verify_proc_openssl.cc 99 CertVerifyResult* verify_result) {
116 verify_result->has_md2 = true;
118 verify_result->has_md4 = true;
120 verify_result->has_md5 = true;
125 // Set verify_result->verified_cert and
126 // verify_result->is_issued_by_known_root.
128 verify_result->verified_cert =
135 verify_result->is_issued_by_known_root = true;
145 verify_result->is_issued_by_known_root = false;
192 CertVerifyResult* verify_result) {
    [all...]
cert_verify_proc_unittest.cc 49 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root|
54 // |verify_result->is_issued_by_known_root| to |is_well_known|.
70 CertVerifyResult* verify_result) OVERRIDE;
83 CertVerifyResult* verify_result) {
84 verify_result->is_issued_by_known_root = is_well_known_;
127 CertVerifyResult* verify_result) {
129 additional_trust_anchors, verify_result);
150 CertVerifyResult verify_result; local
157 &verify_result));
182 CertVerifyResult verify_result; local
208 CertVerifyResult verify_result; local
260 CertVerifyResult verify_result; local
297 CertVerifyResult verify_result; local
321 CertVerifyResult verify_result; local
395 CertVerifyResult verify_result; local
454 CertVerifyResult verify_result; local
493 CertVerifyResult verify_result; local
569 CertVerifyResult verify_result; local
604 CertVerifyResult verify_result; local
635 CertVerifyResult verify_result; local
668 CertVerifyResult verify_result; local
720 CertVerifyResult verify_result; local
774 CertVerifyResult verify_result; local
814 CertVerifyResult verify_result; local
862 CertVerifyResult verify_result; local
921 CertVerifyResult verify_result; local
967 CertVerifyResult verify_result; local
1009 CertVerifyResult verify_result; local
1063 CertVerifyResult verify_result; local
1208 CertVerifyResult verify_result; local
1271 CertVerifyResult verify_result; local
1354 CertVerifyResult verify_result; local
1590 CertVerifyResult verify_result; local
    [all...]
cert_verify_proc_nss.h 34 CertVerifyResult* verify_result);
42 CertVerifyResult* verify_result) OVERRIDE;
mock_cert_verifier.h 32 CertVerifyResult* verify_result,
45 // copying |verify_result| into the verified result.
49 const CertVerifyResult& verify_result,
56 const CertVerifyResult& verify_result,
multi_threaded_cert_verifier_unittest.cc 51 CertVerifyResult* verify_result) OVERRIDE {
52 verify_result->Reset();
53 verify_result->verified_cert = cert;
54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID;
85 CertVerifyResult verify_result; local
93 &verify_result,
110 &verify_result,
155 CertVerifyResult verify_result; local
163 &verify_result,
180 &verify_result,
202 CertVerifyResult verify_result; local
246 CertVerifyResult verify_result; local
295 CertVerifyResult verify_result; local
    [all...]
cert_verify_proc_android.h 29 CertVerifyResult* verify_result) OVERRIDE;
cert_verify_proc_mac.h 29 CertVerifyResult* verify_result) OVERRIDE;
cert_verify_proc_openssl.h 28 CertVerifyResult* verify_result) OVERRIDE;
cert_verify_proc_win.h 29 CertVerifyResult* verify_result) OVERRIDE;
cert_verify_proc_win.cc 290 // |*verify_result|. The caller MUST initialize |*verify_result| before
293 CertVerifyResult* verify_result) {
330 verify_result->has_md5 = true;
333 verify_result->has_md2 = true;
336 verify_result->has_md4 = true;
344 verify_result->verified_cert =
549 CertVerifyResult* verify_result) {
600 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
630 verify_result->cert_status |= CERT_STATUS_INVALID
    [all...]
cert_verify_proc_mac.cc 179 // |*verify_result|. The caller MUST initialize |*verify_result| before
183 CertVerifyResult* verify_result) {
225 verify_result->has_md2 = true;
227 verify_result->has_md4 = true;
229 verify_result->has_md5 = true;
235 verify_result->verified_cert =
532 CertVerifyResult* verify_result) {
567 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
570 verify_result->cert_status |= CERT_STATUS_REVOKED
    [all...]
single_request_cert_verifier.cc 32 CertVerifyResult* verify_result,
43 cert, hostname, flags, crl_set, verify_result,
single_request_cert_verifier.h 25 // Verifies the given certificate, filling out the |verify_result| object
31 CertVerifyResult* verify_result,
cert_verify_proc.h 35 // The |*verify_result| structure, including the |verify_result->cert_status|
38 // |verify_result->cert_status|, and the error code for the most serious
62 CertVerifyResult* verify_result);
84 CertVerifyResult* verify_result) = 0;
multi_threaded_cert_verifier.cc 83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result,
86 results->SetBoolean("has_md5", verify_result.has_md5);
87 results->SetBoolean("has_md2", verify_result.has_md2);
88 results->SetBoolean("has_md4", verify_result.has_md4);
90 verify_result.is_issued_by_known_root);
92 verify_result.is_issued_by_additional_trust_anchor);
94 verify_result.common_name_fallback_used);
95 results->SetInteger("cert_status", verify_result.cert_status);
98 NetLogX509CertificateCallback(verify_result.verified_cert, log_level));
102 verify_result.public_key_hashes.begin()
    [all...]
cert_verify_proc.cc 193 CertVerifyResult* verify_result) {
194 verify_result->Reset();
195 verify_result->verified_cert = cert;
198 verify_result->cert_status |= CERT_STATUS_REVOKED;
210 additional_trust_anchors, verify_result);
213 verify_result->common_name_fallback_used);
214 if (!verify_result->is_issued_by_known_root) {
216 verify_result->common_name_fallback_used);
221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) {
222 verify_result->cert_status |= CERT_STATUS_REVOKED
    [all...]
cert_verify_proc_nss.cc 151 // *verify_result. The caller MUST initialize *verify_result before calling
156 CertVerifyResult* verify_result) {
198 verify_result->has_md5 = true;
201 verify_result->has_md2 = true;
204 verify_result->has_md4 = true;
214 verify_result->verified_cert =
217 verify_result->verified_cert =
756 CertVerifyResult* verify_result) {
767 &verify_result->common_name_fallback_used))
    [all...]
nss_cert_database_unittest.cc 579 CertVerifyResult verify_result; local
585 &verify_result);
587 EXPECT_EQ(0U, verify_result.cert_status);
610 CertVerifyResult verify_result; local
616 &verify_result);
618 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
642 CertVerifyResult verify_result; local
648 &verify_result);
650 EXPECT_EQ(0U, verify_result.cert_status);
678 CertVerifyResult verify_result; local
720 CertVerifyResult verify_result; local
768 CertVerifyResult verify_result; local
844 CertVerifyResult verify_result; local
914 CertVerifyResult verify_result; local
978 CertVerifyResult verify_result; local
    [all...]
cert_verifier.h 78 // The |*verify_result| structure, including the |verify_result->cert_status|
81 // |verify_result->cert_status|, and the error code for the most serious
108 CertVerifyResult* verify_result,
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_verifier.cc 20 const net::CertVerifyResult& verify_result) {
22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor ||
32 const net::CertVerifyResult* verify_result,
35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result);
76 net::CertVerifyResult* verify_result,
86 verify_result);
87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
policy_cert_verifier_browsertest.cc 66 net::CertVerifyResult* verify_result,
72 verify_result,
127 net::CertVerifyResult verify_result; local
130 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
140 net::CertVerifyResult verify_result; local
143 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
163 net::CertVerifyResult verify_result; local
166 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
182 net::CertVerifyResult verify_result; local
185 int error = VerifyTestServerCert(callback, &verify_result, &request_handle)
196 net::CertVerifyResult verify_result; local
210 net::CertVerifyResult verify_result; local
221 net::CertVerifyResult verify_result; local
    [all...]
  /external/chromium_org/chrome/browser/chromeos/net/
cert_verify_proc_chromeos.cc 43 net::CertVerifyResult* verify_result) {
58 verify_result);
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_asn1.c 107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st
233 if (in->verify_result != X509_V_OK)
235 a.verify_result.length=LSIZE2;
236 a.verify_result.type=V_ASN1_INTEGER;
237 a.verify_result.data=ibuf5;
238 ASN1_INTEGER_set(&a.verify_result,in->verify_result);
303 if (in->verify_result != X509_V_OK)
304 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5);
350 if (in->verify_result != X509_V_OK
    [all...]

Completed in 430 milliseconds

1 2 3