Lines Matching refs:cert_handle

338     CERTCertificate* cert_handle, int num_policy_oids,
341 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle);
343 // Call CERT_PKIXVerifyCert for the cert_handle.
356 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle,
455 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
458 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
468 CERTCertificate* cert_handle, int num_policy_oids,
496 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
522 SECOidTag policy = GetFirstCertPolicy(cert_handle);
532 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
549 CERTCertificate* cert_handle) {
551 SECStatus rv = CERT_FindCertExtension(cert_handle,
565 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle) {
566 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
630 // Returns true if |cert_handle| contains a policy OID that is an EV policy
636 CERTCertificate* cert_handle,
638 DCHECK(cert_handle);
639 ScopedCERTCertificatePolicies policies(DecodeCertPolicies(cert_handle));
666 bool VerifyEV(CERTCertificate* cert_handle,
687 cert_handle,
762 CERTCertificate* cert_handle = scoped_chain.cert_handle();
764 CERTCertificate* cert_handle = cert->os_cert_handle();
774 cert_handle, PR_Now(), PR_TRUE);
795 IsEVCandidate(metadata, cert_handle, &ev_policy_oid);
809 SECStatus status = PKIXVerifyCert(cert_handle, check_revocation, false,
821 status = PKIXVerifyCert(cert_handle, true, true,
884 if (VerifyEV(cert_handle, flags, crl_set, check_revocation, metadata,