/external/chromium_org/net/cert/ |
cert_verify_proc_android.cc | 29 // of its result), i.e. if |verify_result| was set. Otherwise returns false. 32 CertVerifyResult* verify_result) { 38 &status, &verify_result->is_issued_by_known_root, 46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 53 verify_result->cert_status |= CERT_STATUS_INVALID; 56 verify_result->cert_status |= CERT_STATUS_INVALID; 60 verify_result->cert_status |= CERT_STATUS_INVALID; 73 verify_result->verified_cert = verified_cert; 79 verify_result->verified_cert->GetIntermediateCertificates() [all...] |
mock_cert_verifier.cc | 43 CertVerifyResult* verify_result, 54 *verify_result = it->result; 59 verify_result->verified_cert = cert; 60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_); 69 const CertVerifyResult& verify_result, 71 AddResultForCertAndHost(cert, "*", verify_result, rv); 77 const CertVerifyResult& verify_result, 79 Rule rule(cert, host_pattern, verify_result, rv);
|
cert_verify_proc_unittest.cc | 51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root| 56 // |verify_result->is_issued_by_known_root| to |is_well_known|. 72 CertVerifyResult* verify_result) OVERRIDE; 85 CertVerifyResult* verify_result) { 86 verify_result->is_issued_by_known_root = is_well_known_; 129 CertVerifyResult* verify_result) { 131 additional_trust_anchors, verify_result); 152 CertVerifyResult verify_result; local 159 &verify_result)); 184 CertVerifyResult verify_result; local 210 CertVerifyResult verify_result; local 262 CertVerifyResult verify_result; local 299 CertVerifyResult verify_result; local 323 CertVerifyResult verify_result; local 397 CertVerifyResult verify_result; local 456 CertVerifyResult verify_result; local 495 CertVerifyResult verify_result; local 571 CertVerifyResult verify_result; local 606 CertVerifyResult verify_result; local 637 CertVerifyResult verify_result; local 670 CertVerifyResult verify_result; local 722 CertVerifyResult verify_result; local 776 CertVerifyResult verify_result; local 818 CertVerifyResult verify_result; local 866 CertVerifyResult verify_result; local 927 CertVerifyResult verify_result; local 975 CertVerifyResult verify_result; local 1017 CertVerifyResult verify_result; local 1071 CertVerifyResult verify_result; local 1169 CertVerifyResult verify_result; local 1235 CertVerifyResult verify_result; local 1324 CertVerifyResult verify_result; local 1562 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_nss.h | 34 CertVerifyResult* verify_result); 42 CertVerifyResult* verify_result) OVERRIDE;
|
mock_cert_verifier.h | 32 CertVerifyResult* verify_result, 45 // copying |verify_result| into the verified result. 49 const CertVerifyResult& verify_result, 56 const CertVerifyResult& verify_result,
|
cert_verify_proc_android.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_mac.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_openssl.cc | 100 CertVerifyResult* verify_result) { 117 verify_result->has_md2 = true; 119 verify_result->has_md4 = true; 122 verify_result->has_md5 = true; 127 verify_result->has_sha1 = true; 132 // Set verify_result->verified_cert and 133 // verify_result->is_issued_by_known_root. 135 verify_result->verified_cert = 142 verify_result->is_issued_by_known_root = true; 152 verify_result->is_issued_by_known_root = false [all...] |
cert_verify_proc_openssl.h | 28 CertVerifyResult* verify_result) OVERRIDE;
|
cert_verify_proc_win.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
multi_threaded_cert_verifier.cc | 83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, 86 results->SetBoolean("has_md5", verify_result.has_md5); 87 results->SetBoolean("has_md2", verify_result.has_md2); 88 results->SetBoolean("has_md4", verify_result.has_md4); 90 verify_result.is_issued_by_known_root); 92 verify_result.is_issued_by_additional_trust_anchor); 94 verify_result.common_name_fallback_used); 95 results->SetInteger("cert_status", verify_result.cert_status); 97 NetLogX509CertificateCallback(verify_result.verified_cert.get(), 102 verify_result.public_key_hashes.begin() [all...] |
cert_verify_proc_win.cc | 290 // |*verify_result|. The caller MUST initialize |*verify_result| before 293 CertVerifyResult* verify_result) { 330 verify_result->has_md5 = true; 333 verify_result->has_md2 = true; 336 verify_result->has_md4 = true; 343 verify_result->has_sha1 = true; 351 verify_result->verified_cert = 568 CertVerifyResult* verify_result) { 619 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED [all...] |
cert_verify_proc.h | 35 // The |*verify_result| structure, including the |verify_result->cert_status| 38 // |verify_result->cert_status|, and the error code for the most serious 62 CertVerifyResult* verify_result); 84 CertVerifyResult* verify_result) = 0;
|
cert_verifier.h | 78 // The |*verify_result| structure, including the |verify_result->cert_status| 81 // |verify_result->cert_status|, and the error code for the most serious 108 CertVerifyResult* verify_result,
|
single_request_cert_verifier.h | 25 // Verifies the given certificate, filling out the |verify_result| object 31 CertVerifyResult* verify_result,
|
cert_verify_proc_mac.cc | 179 // |*verify_result|. The caller MUST initialize |*verify_result| before 183 CertVerifyResult* verify_result) { 225 verify_result->has_md2 = true; 227 verify_result->has_md4 = true; 229 verify_result->has_md5 = true; 236 verify_result->has_sha1 = true; 242 verify_result->verified_cert = 539 CertVerifyResult* verify_result) { 574 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED [all...] |
multi_threaded_cert_verifier_unittest.cc | 51 CertVerifyResult* verify_result) OVERRIDE { 52 verify_result->Reset(); 53 verify_result->verified_cert = cert; 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; 85 CertVerifyResult verify_result; local 93 &verify_result, 110 &verify_result, 155 CertVerifyResult verify_result; local 163 &verify_result, 180 &verify_result, 202 CertVerifyResult verify_result; local 246 CertVerifyResult verify_result; local 295 CertVerifyResult verify_result; local [all...] |
cert_verify_proc.cc | 193 CertVerifyResult* verify_result) { 194 verify_result->Reset(); 195 verify_result->verified_cert = cert; 198 verify_result->cert_status |= CERT_STATUS_REVOKED; 210 additional_trust_anchors, verify_result); 213 verify_result->common_name_fallback_used); 214 if (!verify_result->is_issued_by_known_root) { 216 verify_result->common_name_fallback_used); 221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 222 verify_result->cert_status |= CERT_STATUS_REVOKED [all...] |
single_request_cert_verifier.cc | 32 CertVerifyResult* verify_result, 43 cert, hostname, flags, crl_set, verify_result,
|
nss_cert_database_unittest.cc | 559 CertVerifyResult verify_result; local 565 &verify_result); 567 EXPECT_EQ(0U, verify_result.cert_status); 590 CertVerifyResult verify_result; local 596 &verify_result); 598 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status); 622 CertVerifyResult verify_result; local 628 &verify_result); 630 EXPECT_EQ(0U, verify_result.cert_status); 658 CertVerifyResult verify_result; local 700 CertVerifyResult verify_result; local 748 CertVerifyResult verify_result; local 824 CertVerifyResult verify_result; local 894 CertVerifyResult verify_result; local 958 CertVerifyResult verify_result; local [all...] |
cert_verify_proc_nss.cc | 151 // *verify_result. The caller MUST initialize *verify_result before calling 156 CertVerifyResult* verify_result) { 198 verify_result->has_md5 = true; 201 verify_result->has_md2 = true; 204 verify_result->has_md4 = true; 210 verify_result->has_sha1 = true; 220 verify_result->verified_cert = 223 verify_result->verified_cert = 774 CertVerifyResult* verify_result) { [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier.cc | 20 const net::CertVerifyResult& verify_result) { 22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor || 32 const net::CertVerifyResult* verify_result, 35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result); 76 net::CertVerifyResult* verify_result, 86 verify_result); 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result, 89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
|
policy_cert_verifier_browsertest.cc | 68 net::CertVerifyResult* verify_result, 74 verify_result, 129 net::CertVerifyResult verify_result; local 132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 142 net::CertVerifyResult verify_result; local 145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 165 net::CertVerifyResult verify_result; local 168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 184 net::CertVerifyResult verify_result; local 187 int error = VerifyTestServerCert(callback, &verify_result, &request_handle) 198 net::CertVerifyResult verify_result; local 212 net::CertVerifyResult verify_result; local 223 net::CertVerifyResult verify_result; local [all...] |
policy_cert_verifier.h | 54 net::CertVerifyResult* verify_result,
|
/external/chromium_org/chrome/browser/chromeos/net/ |
cert_verify_proc_chromeos.h | 41 net::CertVerifyResult* verify_result) OVERRIDE;
|