/external/chromium_org/net/cert/ |
H A D | cert_database_ios.cc | 13 CertDatabase::CertDatabase() function in class:net::CertDatabase 16 CertDatabase::~CertDatabase() {} 18 int CertDatabase::CheckUserCert(X509Certificate* cert_obj) { 24 int CertDatabase::AddUserCert(X509Certificate* cert_obj) {
|
H A D | cert_database_android.cc | 13 CertDatabase::CertDatabase() function in class:net::CertDatabase 17 CertDatabase::~CertDatabase() {} 19 int CertDatabase::CheckUserCert(X509Certificate* cert) { 32 int CertDatabase::AddUserCert(X509Certificate* cert) { 39 void CertDatabase::OnAndroidKeyChainChanged() {
|
H A D | cert_database_openssl.cc | 19 CertDatabase::CertDatabase() function in class:net::CertDatabase 23 CertDatabase::~CertDatabase() {} 36 int CertDatabase::CheckUserCert(X509Certificate* cert) { 52 int CertDatabase::AddUserCert(X509Certificate* cert) {
|
H A D | cert_database.cc | 13 CertDatabase* CertDatabase::GetInstance() { 14 return Singleton<CertDatabase>::get(); 17 void CertDatabase::AddObserver(Observer* observer) { 21 void CertDatabase::RemoveObserver(Observer* observer) { 25 void CertDatabase::NotifyObserversOfCertAdded(const X509Certificate* cert) { 29 void CertDatabase::NotifyObserversOfCertRemoved(const X509Certificate* cert) { 33 void CertDatabase::NotifyObserversOfCACertChanged(
|
H A D | cert_database_win.cc | 17 CertDatabase::CertDatabase() function in class:net::CertDatabase 21 CertDatabase::~CertDatabase() {} 23 int CertDatabase::CheckUserCert(X509Certificate* cert) { 37 int CertDatabase::AddUserCert(X509Certificate* cert) { 38 // TODO(rsleevi): Would it be more appropriate to have the CertDatabase take
|
H A D | cert_database_nss.cc | 23 // the given CertDatabase. 24 class CertDatabase::Notifier : public NSSCertDatabase::Observer { 26 explicit Notifier(CertDatabase* cert_db) : cert_db_(cert_db) { 48 CertDatabase* cert_db_; 53 CertDatabase::CertDatabase() function in class:net::CertDatabase 56 // CertDatabase. This also makes sure that NSS has been initialized. 60 CertDatabase::~CertDatabase() {} 62 int CertDatabase [all...] |
H A D | cert_database_mac.cc | 23 // given CertDatabase. 24 class CertDatabase::Notifier { 29 Notifier(CertDatabase* cert_db, base::MessageLoop* message_loop) 76 CertDatabase* const cert_db_; 83 OSStatus CertDatabase::Notifier::KeychainCallback( 113 void CertDatabase::SetMessageLoopForKeychainEvents() { 121 CertDatabase::CertDatabase() function in class:net::CertDatabase 125 CertDatabase::~CertDatabase() { [all...] |
H A D | cert_database.h | 26 class NET_EXPORT CertDatabase { class in namespace:net 28 // A CertDatabase::Observer will be notified on certificate database changes. 31 // via CertDatabase::AddObserver, and can un-register with 32 // CertDatabase::RemoveObserver. 54 // Returns the CertDatabase singleton. 55 static CertDatabase* GetInstance(); 89 friend struct DefaultSingletonTraits<CertDatabase>; 91 CertDatabase(); 92 ~CertDatabase(); 107 DISALLOW_COPY_AND_ASSIGN(CertDatabase); [all...] |
H A D | x509_util_android.cc | 14 CertDatabase::GetInstance()->OnAndroidKeyChainChanged();
|
/external/chromium/net/base/ |
H A D | cert_database.cc | 13 CertDatabase::ImportCertFailure::ImportCertFailure( 18 CertDatabase::ImportCertFailure::~ImportCertFailure() { 26 : observer_list_(new ObserverListThreadSafe<CertDatabase::Observer>) { 34 friend class CertDatabase; 37 const scoped_refptr<ObserverListThreadSafe<CertDatabase::Observer> > 41 void CertDatabase::AddObserver(Observer* observer) { 45 void CertDatabase::RemoveObserver(Observer* observer) { 49 void CertDatabase::NotifyObserversOfUserCertAdded(const X509Certificate* cert) { 51 &CertDatabase::Observer::OnUserCertAdded, make_scoped_refptr(cert)); 54 void CertDatabase [all...] |
H A D | cert_database_openssl.cc | 17 CertDatabase::CertDatabase() { function in class:net::CertDatabase 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { 33 int CertDatabase::AddUserCert(X509Certificate* cert) { 39 void CertDatabase::ListCerts(CertificateList* certs) { 44 CryptoModule* CertDatabase::GetPublicModule() const { 50 CryptoModule* CertDatabase::GetPrivateModule() const { 56 void CertDatabase::ListModules(CryptoModuleList* modules, bool need_rw) const { 62 int CertDatabase::ImportFromPKCS12(CryptoModule* module, 70 int CertDatabase [all...] |
H A D | cert_database_win.cc | 16 CertDatabase::CertDatabase() { function in class:net::CertDatabase 19 int CertDatabase::CheckUserCert(X509Certificate* cert) { 33 int CertDatabase::AddUserCert(X509Certificate* cert) { 34 // TODO(rsleevi): Would it be more appropriate to have the CertDatabase take 53 CertDatabase::NotifyObserversOfUserCertAdded(cert);
|
H A D | cert_database_mac.cc | 17 CertDatabase::CertDatabase() { function in class:net::CertDatabase 20 int CertDatabase::CheckUserCert(X509Certificate* cert) { 31 LOG(ERROR) << "CertDatabase couldn't find private key for user cert"; 43 int CertDatabase::AddUserCert(X509Certificate* cert) { 51 CertDatabase::NotifyObserversOfUserCertAdded(cert); 56 LOG(ERROR) << "CertDatabase failed to add cert to keychain: " << err;
|
H A D | cert_database_nss.cc | 29 CertDatabase::CertDatabase() { function in class:net::CertDatabase 34 int CertDatabase::CheckUserCert(X509Certificate* cert_obj) { 58 int CertDatabase::AddUserCert(X509Certificate* cert_obj) { 92 CertDatabase::NotifyObserversOfUserCertAdded(cert_obj); 96 void CertDatabase::ListCerts(CertificateList* certs) { 112 CryptoModule* CertDatabase::GetPublicModule() const { 122 CryptoModule* CertDatabase::GetPrivateModule() const { 132 void CertDatabase::ListModules(CryptoModuleList* modules, bool need_rw) const { 156 int CertDatabase [all...] |
H A D | ssl_client_auth_cache.cc | 13 CertDatabase::AddObserver(this); 17 CertDatabase::RemoveObserver(this);
|
H A D | cert_database_nss_unittest.cc | 68 CertDatabase cert_db; 130 CertDatabase cert_db_; 196 CertDatabase::ImportCertFailureList failed; 197 EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_SSL, 207 EXPECT_EQ(CertDatabase::TRUSTED_SSL, 228 CertDatabase::ImportCertFailureList failed; 229 EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_EMAIL, 239 EXPECT_EQ(CertDatabase::TRUSTED_EMAIL, 259 CertDatabase::ImportCertFailureList failed; 260 EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase [all...] |
H A D | cert_database.h | 32 class CertDatabase { class in namespace:net 35 // A CertDatabase::Observer will be notified on certificate database changes. 38 // via CertDatabase::AddObserver, and can un-register with 39 // CertDatabase::RemoveObserver. 86 CertDatabase(); 187 DISALLOW_COPY_AND_ASSIGN(CertDatabase);
|
H A D | ssl_client_auth_cache.h | 26 class SSLClientAuthCache : public CertDatabase::Observer { 48 // CertDatabase::Observer methods:
|
/external/chromium_org/net/ssl/ |
H A D | ssl_client_auth_cache.cc | 13 CertDatabase::GetInstance()->AddObserver(this); 17 CertDatabase::GetInstance()->RemoveObserver(this);
|
H A D | ssl_client_auth_cache.h | 27 class NET_EXPORT_PRIVATE SSLClientAuthCache : public CertDatabase::Observer { 49 // CertDatabase::Observer methods:
|
/external/chromium/net/socket/ |
H A D | client_socket_factory.cc | 34 public CertDatabase::Observer { 37 CertDatabase::AddObserver(this); 41 CertDatabase::RemoveObserver(this);
|
/external/chromium_org/net/socket/ |
H A D | client_socket_factory.cc | 38 public CertDatabase::Observer { 50 CertDatabase::GetInstance()->AddObserver(this); 56 CertDatabase::GetInstance()->RemoveObserver(this);
|
/external/chromium/chrome/browser/chromeos/options/ |
H A D | wifi_config_model.h | 57 net::CertDatabase cert_db_;
|
/external/chromium/chrome/browser/ssl/ |
H A D | ssl_add_cert_handler.cc | 40 net::CertDatabase db; 68 net::CertDatabase db;
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_add_cert_handler.cc | 41 int cert_error = net::CertDatabase::GetInstance()->CheckUserCert(cert_.get()); 73 cert_error = net::CertDatabase::GetInstance()->AddUserCert(cert_.get());
|