Home | History | Annotate | Download | only in cert

Lines Matching refs:cert_handle

347     CERTCertificate* cert_handle, int num_policy_oids,
350 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle);
352 // Call CERT_PKIXVerifyCert for the cert_handle.
365 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle,
470 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
473 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
483 CERTCertificate* cert_handle, int num_policy_oids,
511 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
537 SECOidTag policy = GetFirstCertPolicy(cert_handle);
547 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
564 CERTCertificate* cert_handle) {
566 SECStatus rv = CERT_FindCertExtension(cert_handle,
580 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle) {
581 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
645 // Returns true if |cert_handle| contains a policy OID that is an EV policy
651 CERTCertificate* cert_handle,
653 DCHECK(cert_handle);
654 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
681 bool VerifyEV(CERTCertificate* cert_handle,
703 cert_handle,
779 CERTCertificate* cert_handle = scoped_chain.cert_handle();
781 CERTCertificate* cert_handle = cert->os_cert_handle();
791 cert_handle, PR_Now(), PR_TRUE);
812 IsEVCandidate(metadata, cert_handle, &ev_policy_oid);
826 SECStatus status = PKIXVerifyCert(cert_handle,
844 status = PKIXVerifyCert(cert_handle,
913 if (VerifyEV(cert_handle,