HomeSort by relevance Sort by last modified time
    Searched defs:cert_handle (Results 1 - 16 of 16) sorted by null

  /external/chromium_org/net/cert/
cert_verify_proc_android.cc 127 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local
133 if (cert_handles.empty() || cert_handles[0] != cert_handle)
134 cert_handles.insert(cert_handles.begin(), cert_handle);
test_root_certs_nss.cc 57 CERTCertificate* cert_handle = nss_certificate.cert_handle(); local
59 CERTCertificate* cert_handle = certificate->os_cert_handle();
64 SECStatus rv = CERT_GetCertTrust(cert_handle, &original_trust);
83 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert_handle, &new_trust);
89 trust_cache_.push_back(new TrustEntry(cert_handle, original_trust));
x509_certificate_ios.cc 43 // Returns true if a given |cert_handle| is actually a valid X.509 certificate
52 bool IsValidOSCertHandle(SecCertificateRef cert_handle) {
54 SecCertificateCopySubjectSummary(cert_handle));
61 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
62 if (cert_handle) {
63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_);
64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_);
65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_);
66 x509_util::ParseDate(&cert_handle->validity.notAfter, &valid_expiry_)
92 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
    [all...]
x509_util_ios.cc 49 SecCertificateRef cert_handle) {
50 ScopedCFTypeRef<CFDataRef> cert_data(SecCertificateCopyData(cert_handle));
64 CERTCertificate* cert_handle,
67 CreateOSCertHandleFromNSSHandle(cert_handle));
101 NSSCertificate::NSSCertificate(SecCertificateRef cert_handle) {
102 nss_cert_handle_ = CreateNSSCertHandleFromOSHandle(cert_handle);
103 DLOG_IF(INFO, cert_handle && !nss_cert_handle_)
111 CERTCertificate* NSSCertificate::cert_handle() const { function in class:net::x509_util_ios::NSSCertificate
132 CERTCertificate* NSSCertChain::cert_handle() const { function in class:net::x509_util_ios::NSSCertChain
x509_certificate_nss.cc 46 OSCertHandle cert_handle = CreateOSCertHandleFromBytesWithNickname(data, local
49 if (!cert_handle)
52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles());
53 FreeOSCertHandle(cert_handle);
142 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
144 if (!cert_handle || !cert_handle->derCert.len)
146 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data),
147 cert_handle->derCert.len);
202 OSCertHandle cert_handle) {
    [all...]
x509_certificate_mac.cc 46 bool IsCertIssuerInEncodedList(X509Certificate::OSCertHandle cert_handle,
49 if (cached_cert.Init(cert_handle) != CSSM_OK)
126 // Test that a given |cert_handle| is actually a valid X.509 certificate, and
137 bool IsValidOSCertHandle(SecCertificateRef cert_handle) {
139 OSStatus status = SecCertificateGetSubject(cert_handle, &sanity_check);
274 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
277 if (!cert_handle || SecCertificateGetData(cert_handle, &der_data) != noErr)
306 OSCertHandle cert_handle = NULL; local
310 &cert_handle);
    [all...]
x509_certificate_win.cc 236 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle,
238 if (!cert_handle || !cert_handle->pbCertEncoded ||
239 !cert_handle->cbCertEncoded) {
242 encoded->assign(reinterpret_cast<char*>(cert_handle->pbCertEncoded),
243 cert_handle->cbCertEncoded);
260 OSCertHandle cert_handle = NULL; local
263 length, CERT_STORE_ADD_USE_EXISTING, &cert_handle))
266 return cert_handle;
292 OSCertHandle cert_handle) {
    [all...]
x509_util_nss.cc 313 void* cert_handle; local
314 if ((cert_handle = CERT_StartCertExtensions(cert)) == NULL) {
340 cert_handle,
351 if (CERT_FinishExtensions(cert_handle) != SECSuccess){
447 void GetSubjectAltName(CERTCertificate* cert_handle,
456 SECStatus rv = CERT_FindCertExtension(cert_handle,
cert_verify_proc_nss.cc 347 CERTCertificate* cert_handle, int num_policy_oids,
350 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle);
352 // Call CERT_PKIXVerifyCert for the cert_handle.
365 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle,
470 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
473 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
483 CERTCertificate* cert_handle, int num_policy_oids,
511 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
537 SECOidTag policy = GetFirstCertPolicy(cert_handle);
547 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer
779 CERTCertificate* cert_handle = scoped_chain.cert_handle(); local
    [all...]
cert_verify_proc_win.cc 569 PCCERT_CONTEXT cert_handle = cert->os_cert_handle(); local
570 if (!cert_handle)
595 GetCertPoliciesInfo(cert_handle, &policies_info);
741 if (CertSubjectCommonNameHasNull(cert_handle))
x509_certificate.cc 65 // for the same certificate data as |*cert_handle| already exists in the
66 // cache, the original |*cert_handle| will be freed and |cert_handle|
70 // reference to |*cert_handle| will be added to the cache. In either case,
71 // upon return, the caller fully owns |*cert_handle| and is responsible for
73 void InsertOrUpdate(X509Certificate::OSCertHandle* cert_handle);
75 // Decrements the cache reference count for |cert_handle|, a handle that was
78 // caller retains ownership of |cert_handle| and remains responsible for
80 void Remove(X509Certificate::OSCertHandle cert_handle);
87 Entry() : cert_handle(NULL), ref_count(0) {
89 X509Certificate::OSCertHandle cert_handle; member in struct:net::__anon13733::X509CertificateCache::Entry
299 OSCertHandle cert_handle = CreateOSCertHandleFromBytes(data, length); local
331 OSCertHandle cert_handle = ReadOSCertHandleFromPickle(pickle_iter); local
    [all...]
  /external/chromium_org/chromeos/
cert_loader.cc 123 CERTCertificateStr* cert_handle = cert.os_cert_handle(); local
125 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */);
  /external/chromium_org/net/http/
disk_based_cert_cache_unittest.cc 76 const X509Certificate::OSCertHandle& cert_handle() const { function in class:net::__anon13873::TestGetCallback
221 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
259 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
275 EXPECT_FALSE(get_callback.cert_handle());
289 EXPECT_EQ(NULL, get_callback.cert_handle());
361 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
404 get_callback1.cert_handle()));
406 get_callback2.cert_handle()));
431 EXPECT_EQ(NULL, get_callback.cert_handle());
459 get_callback.cert_handle()));
    [all...]
  /external/chromium_org/net/ssl/
client_cert_store_mac.cc 38 OSStatus CopyCertChain(SecCertificateRef cert_handle,
40 DCHECK(cert_handle);
52 NULL, const_cast<const void**>(reinterpret_cast<void**>(&cert_handle)),
89 X509Certificate::OSCertHandle cert_handle = (*cert)->os_cert_handle(); local
91 OSStatus result = CopyCertChain(cert_handle, &cert_chain);
109 cert_handle, intermediates));
228 SecCertificateRef cert_handle; local
229 err = SecIdentityCopyCertificate(identity, &cert_handle);
232 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
235 X509Certificate::CreateFromHandle(cert_handle,
    [all...]
  /external/chromium_org/chrome/browser/chromeos/options/
cert_library.cc 216 net::X509Certificate::OSCertHandle cert_handle = local
218 net::CertType type = x509_certificate_model::GetType(cert_handle);
229 x509_certificate_model::GetTokenName(cert_handle);
  /external/chromium_org/chrome/browser/chromeos/platform_keys/
platform_keys_nss.cc 429 net::X509Certificate::OSCertHandle cert_handle = (*it)->os_cert_handle(); local
430 crypto::ScopedPK11Slot cert_slot(PK11_KeyForCertExists(cert_handle,

Completed in 748 milliseconds