HomeSort by relevance Sort by last modified time
    Searched refs:cert_status (Results 1 - 25 of 74) sorted by null

1 2 3

  /external/chromium_org/net/cert/
cert_status_flags.cc 12 bool IsCertStatusMinorError(CertStatus cert_status) {
16 cert_status &= CERT_STATUS_ALL_ERRORS;
17 return cert_status != 0 && (cert_status & ~kMinorErrors) == 0;
57 int MapCertStatusToNetError(CertStatus cert_status) {
62 if (cert_status & CERT_STATUS_REVOKED)
64 if (cert_status & CERT_STATUS_INVALID)
66 if (cert_status & CERT_STATUS_PINNED_KEY_MISSING)
70 if (cert_status & CERT_STATUS_AUTHORITY_INVALID)
72 if (cert_status & CERT_STATUS_COMMON_NAME_INVALID
    [all...]
cert_verify_result.cc 20 cert_status = 0;
cert_status_flags.h 32 // IsCertStatusMinorError returns true iff |cert_status| indicates a condition
35 NET_EXPORT bool IsCertStatusMinorError(CertStatus cert_status);
43 NET_EXPORT int MapCertStatusToNetError(CertStatus cert_status);
cert_verify_result.h 44 CertStatus cert_status; member in class:net::CertVerifyResult
cert_verify_proc_android.cc 46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID;
53 verify_result->cert_status |= CERT_STATUS_INVALID;
56 verify_result->cert_status |= CERT_STATUS_INVALID;
60 verify_result->cert_status |= CERT_STATUS_INVALID;
166 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
176 if (IsCertStatusError(verify_result->cert_status))
177 return MapCertStatusToNetError(verify_result->cert_status);
cert_verify_proc_win.cc 116 CertStatus cert_status = 0; local
123 cert_status |= CERT_STATUS_DATE_INVALID;
129 cert_status |= CERT_STATUS_AUTHORITY_INVALID;
133 cert_status |= CERT_STATUS_NO_REVOCATION_MECHANISM;
136 cert_status |= CERT_STATUS_UNABLE_TO_CHECK_REVOCATION;
139 cert_status |= CERT_STATUS_REVOKED;
145 cert_status |= CERT_STATUS_INVALID;
157 cert_status |= CERT_STATUS_WEAK_KEY;
159 cert_status |= CERT_STATUS_INVALID;
178 cert_status |= CERT_STATUS_INVALID
    [all...]
cert_verify_proc_mac.cc 574 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
577 verify_result->cert_status |= CERT_STATUS_REVOKED;
602 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
613 verify_result->cert_status |= CertStatusFromOSStatus(cssm_result);
621 verify_result->cert_status |= CERT_STATUS_DATE_INVALID;
622 if (!IsCertStatusError(verify_result->cert_status) &&
652 verify_result->cert_status |= mapped_status;
658 verify_result->cert_status |= CertStatusFromOSStatus(cssm_result);
660 if (!IsCertStatusError(verify_result->cert_status)) {
662 verify_result->cert_status |= CERT_STATUS_INVALID
    [all...]
test_root_certs_unittest.cc 99 EXPECT_NE(0u, bad_verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
116 EXPECT_EQ(0u, good_verify_result.cert_status);
133 restored_verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
135 EXPECT_EQ(bad_verify_result.cert_status, restored_verify_result.cert_status);
cert_verify_proc_openssl.cc 204 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
230 CertStatus cert_status = MapCertErrorToCertStatus(x509_error); local
235 << " : " << cert_status;
236 verify_result->cert_status |= cert_status;
241 if (IsCertStatusError(verify_result->cert_status))
242 return MapCertStatusToNetError(verify_result->cert_status);
cert_verify_proc_unittest.cc 193 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
228 EXPECT_TRUE(verify_result.cert_status &
270 EXPECT_EQ(0u, verify_result.cert_status);
309 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
408 verify_result.cert_status & CERT_STATUS_WEAK_KEY);
410 verify_result.cert_status & CERT_STATUS_INVALID);
413 EXPECT_EQ(0U, verify_result.cert_status & CERT_STATUS_WEAK_KEY);
579 EXPECT_EQ(0U, verify_result.cert_status);
615 verify_result.cert_status & CERT_STATUS_NAME_CONSTRAINT_VIOLATION);
647 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
    [all...]
cert_verify_proc.cc 198 verify_result->cert_status |= CERT_STATUS_REVOKED;
222 verify_result->cert_status |= CERT_STATUS_REVOKED;
223 rv = MapCertStatusToNetError(verify_result->cert_status);
232 verify_result->cert_status |= CERT_STATUS_NAME_CONSTRAINT_VIOLATION;
233 rv = MapCertStatusToNetError(verify_result->cert_status);
241 verify_result->cert_status |= CERT_STATUS_WEAK_KEY;
246 rv = MapCertStatusToNetError(verify_result->cert_status);
251 verify_result->cert_status |= CERT_STATUS_INVALID;
252 rv = MapCertStatusToNetError(verify_result->cert_status);
257 verify_result->cert_status |= CERT_STATUS_WEAK_SIGNATURE_ALGORITHM
    [all...]
  /external/chromium_org/content/public/browser/
load_from_memory_cache_details.cc 13 net::CertStatus cert_status,
20 cert_status(cert_status),
load_from_memory_cache_details.h 20 net::CertStatus cert_status,
29 net::CertStatus cert_status; member in struct:content::LoadFromMemoryCacheDetails
resource_request_details.cc 23 ssl_cert_status(request->ssl_info().cert_status),
  /external/chromium_org/content/public/common/
ssl_status.cc 12 cert_status(0),
ssl_status.h 38 cert_status == status.cert_status &&
47 net::CertStatus cert_status; member in struct:content::SSLStatus
  /external/chromium_org/content/common/
ssl_status_serialization.h 19 net::CertStatus cert_status,
28 net::CertStatus* cert_status,
ssl_status_serialization.cc 14 net::CertStatus cert_status,
21 pickle.WriteUInt32(cert_status);
37 net::CertStatus* cert_status,
41 DCHECK(cert_id && cert_status && security_bits && ssl_connection_status &&
47 *cert_status = 0;
58 !pickle.ReadUInt32(&iter, cert_status) ||
  /external/chromium_org/net/ssl/
ssl_config.cc 30 SSLConfig::CertAndStatus::CertAndStatus() : cert_status(0) {}
53 CertStatus* cert_status) const {
57 return IsAllowedBadCert(der_cert, cert_status);
61 CertStatus* cert_status) const {
64 if (cert_status)
65 *cert_status = allowed_bad_certs[i].cert_status;
ssl_info.cc 27 cert_status = info.cert_status;
43 cert_status = 0;
56 cert_status |= MapNetErrorToCertStatus(error);
ssl_config.h 46 // The expected cert status is written to |cert_status|. |*cert_status| can
48 bool IsAllowedBadCert(X509Certificate* cert, CertStatus* cert_status) const;
53 CertStatus* cert_status) const;
127 CertStatus cert_status; member in struct:net::SSLConfig::CertAndStatus
ssl_info.h 54 CertStatus cert_status; member in class:net::SSLInfo
  /external/chromium_org/content/browser/ssl/
ssl_cert_error_handler.cc 30 cert_error_(net::MapCertStatusToNetError(ssl_info.cert_status)),
42 if (net::IsCertStatusMinorError(ssl_info().cert_status)) {
ssl_manager.cc 61 << net::MapCertStatusToNetError(ssl_info.cert_status) << " id: "
65 << " cert_status: " << std::hex << ssl_info.cert_status;
140 entry->GetSSL().cert_status = ssl_cert_status;
177 details.cert_status));
  /external/chromium_org/chrome/browser/ssl/
ssl_error_info.h 52 // |cert_status|. Returns the number of errors found.
56 net::CertStatus cert_status,

Completed in 385 milliseconds

1 2 3