/external/chromium_org/net/cert/ |
H A D | x509_certificate_nss.cc | 29 x509_util::ParsePrincipal(&cert_handle_->subject, &subject_); 30 x509_util::ParsePrincipal(&cert_handle_->issuer, &issuer_); 32 x509_util::ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 33 x509_util::ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); 35 fingerprint_ = CalculateFingerprint(cert_handle_); 38 serial_number_ = x509_util::ParseSerialNumber(cert_handle_); 66 if (type == USER_CERT && cert_handle_->slot) { 71 cert_handle_->slot, 72 cert_handle_, 88 char* nickname = CERT_MakeCANickname(cert_handle_); [all...] |
H A D | x509_certificate_win.cc | 147 DCHECK(cert_handle_); 148 subject_.ParseDistinguishedName(cert_handle_->pCertInfo->Subject.pbData, 149 cert_handle_->pCertInfo->Subject.cbData); 150 issuer_.ParseDistinguishedName(cert_handle_->pCertInfo->Issuer.pbData, 151 cert_handle_->pCertInfo->Issuer.cbData); 153 valid_start_ = Time::FromFileTime(cert_handle_->pCertInfo->NotBefore); 154 valid_expiry_ = Time::FromFileTime(cert_handle_->pCertInfo->NotAfter); 156 fingerprint_ = CalculateFingerprint(cert_handle_); 159 const CRYPT_INTEGER_BLOB* serial = &cert_handle_->pCertInfo->SerialNumber; 175 if (!cert_handle_) [all...] |
H A D | x509_certificate_openssl.cc | 266 fingerprint_ = CalculateFingerprint(cert_handle_); 269 ASN1_INTEGER* serial_num = X509_get_serialNumber(cert_handle_); 284 ParsePrincipal(cert_handle_, X509_get_subject_name(cert_handle_), &subject_); 285 ParsePrincipal(cert_handle_, X509_get_issuer_name(cert_handle_), &issuer_); 286 x509_util::ParseDate(X509_get_notBefore(cert_handle_), &valid_start_); 287 x509_util::ParseDate(X509_get_notAfter(cert_handle_), &valid_expiry_); 373 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs); 494 X509_NAME* issuer = X509_get_issuer_name(cert_handle_); [all...] |
H A D | x509_certificate.cc | 245 cert_handle_(NULL) { 468 DCHECK(cert_handle_); 476 !WriteOSCertHandleToPickle(cert_handle_, pickle)) { 499 return IsSameOSCert(cert_handle_, other->cert_handle_); 708 : cert_handle_(DupOSCertHandle(cert_handle)) { 709 InsertOrUpdateCache(&cert_handle_); 724 if (cert_handle_) { 725 RemoveFromCache(cert_handle_); 726 FreeOSCertHandle(cert_handle_); [all...] |
H A D | x509_certificate_ios.cc | 60 x509_util_ios::NSSCertificate nss_cert(cert_handle_); 69 fingerprint_ = CalculateFingerprint(cert_handle_); 91 x509_util_ios::NSSCertificate nss_cert(cert_handle_);
|
H A D | x509_certificate.h | 282 // result, intermediates for |cert_handle_| cannot be located simply via 283 // |cert_handle_->hCertStore|, as it refers to a magic value indicating 354 OSCertHandle os_cert_handle() const { return cert_handle_; } 468 OSCertHandle cert_handle_; member in class:net::X509Certificate
|
H A D | x509_certificate_mac.cc | 299 if (cached_cert.Init(cert_handle_) == CSSM_OK) { 311 fingerprint_ = CalculateFingerprint(cert_handle_); 317 if (IsCertIssuerInEncodedList(cert_handle_, valid_issuers)) 337 OSStatus status = cached_cert.Init(cert_handle_); 495 OSStatus status = cached_cert.Init(cert_handle_);
|
/external/chromium/net/base/ |
H A D | x509_certificate_openssl_android.cc | 30 if (cert_handles.empty() || cert_handles[0] != cert_handle_) 31 cert_handles.insert(cert_handles.begin(), cert_handle_);
|
H A D | x509_certificate_win.cc | 500 DCHECK(cert_handle_); 501 name_size = CertNameToStr(cert_handle_->dwCertEncodingType, 502 &cert_handle_->pCertInfo->Subject, 505 name_size = CertNameToStr(cert_handle_->dwCertEncodingType, 506 &cert_handle_->pCertInfo->Subject, 509 name_size = CertNameToStr(cert_handle_->dwCertEncodingType, 510 &cert_handle_->pCertInfo->Issuer, 513 name_size = CertNameToStr(cert_handle_->dwCertEncodingType, 514 &cert_handle_->pCertInfo->Issuer, 520 valid_start_ = Time::FromFileTime(cert_handle_ [all...] |
H A D | x509_certificate_openssl.cc | 314 fingerprint_ = CalculateFingerprint(cert_handle_); 316 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle_); 326 ParsePrincipal(cert_handle_, X509_get_subject_name(cert_handle_), &subject_); 327 ParsePrincipal(cert_handle_, X509_get_issuer_name(cert_handle_), &issuer_); 328 nxou::ParseDate(X509_get_notBefore(cert_handle_), &valid_start_); 329 nxou::ParseDate(X509_get_notAfter(cert_handle_), &valid_expiry_); 400 ParseSubjectAltNames(cert_handle_, dns_names); 444 cert_handle_, intermediate [all...] |
H A D | x509_certificate_nss.cc | 636 ParsePrincipal(&cert_handle_->subject, &subject_); 637 ParsePrincipal(&cert_handle_->issuer, &issuer_); 639 ParseDate(&cert_handle_->validity.notBefore, &valid_start_); 640 ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); 642 fingerprint_ = CalculateFingerprint(cert_handle_); 645 reinterpret_cast<char*>(cert_handle_->serialNumber.data), 646 cert_handle_->serialNumber.len); 758 GetCertSubjectAltNamesOfType(cert_handle_, certDNSName, dns_names); 775 SECStatus status = CERT_VerifyCertName(cert_handle_, hostname.c_str()); 781 cert_handle_, PR_No [all...] |
H A D | x509_certificate_mac.cc | 605 OSStatus status = SecCertificateGetSubject(cert_handle_, &name); 609 status = SecCertificateGetIssuer(cert_handle_, &name); 613 GetCertDateForOID(cert_handle_, CSSMOID_X509V1ValidityNotBefore, 615 GetCertDateForOID(cert_handle_, CSSMOID_X509V1ValidityNotAfter, 618 fingerprint_ = CalculateFingerprint(cert_handle_); 619 serial_number_ = GetCertSerialNumber(cert_handle_); 779 GetCertGeneralNamesForOID(cert_handle_, CSSMOID_SubjectAltName, GNT_DNSName, 810 CFArrayAppendValue(cert_array, cert_handle_); 1027 if(SecCertificateGetData(cert_handle_, &der_data) == noErr) { 1136 if (GetCertFields(cert_handle_, [all...] |
H A D | x509_certificate.h | 328 OSCertHandle os_cert_handle() const { return cert_handle_; } 458 OSCertHandle cert_handle_; member in class:net::X509Certificate
|
H A D | x509_certificate.cc | 151 cert_handle_(NULL), 365 DCHECK(cert_handle_); 366 if (!WriteCertHandleToPickle(cert_handle_, pickle)) { 389 return IsSameOSCert(cert_handle_, other->cert_handle_); 537 : cert_handle_(DupOSCertHandle(cert_handle)), 548 if (cert_handle_) 549 FreeOSCertHandle(cert_handle_);
|