/external/chromium_org/net/cert/ |
H A D | cert_verify_proc_android.cc | 92 const CertificateList& additional_trust_anchors, 87 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_openssl.cc | 171 const CertificateList& additional_trust_anchors, 166 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc.cc | 189 const CertificateList& additional_trust_anchors, 207 additional_trust_anchors, verify_result); 185 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_mac.cc | 532 const CertificateList& additional_trust_anchors, 527 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_nss.cc | 243 bool IsAdditionalTrustAnchor(CERTCertList* additional_trust_anchors, argument 245 if (!additional_trust_anchors || !root) 247 for (CERTCertListNode* node = CERT_LIST_HEAD(additional_trust_anchors); 248 !CERT_LIST_END(node, additional_trust_anchors); 352 // additional_trust_anchors is an optional list of certificates that can be 361 CERTCertList* additional_trust_anchors, 443 if (additional_trust_anchors) { 445 in_param.value.pointer.chain = additional_trust_anchors; 671 CERTCertList* additional_trust_anchors) { 692 additional_trust_anchors, 355 PKIXVerifyCert(CERTCertificate* cert_handle, bool check_revocation, bool hard_fail, bool cert_io_enabled, const SECOidTag* policy_oids, int num_policy_oids, CERTCertList* additional_trust_anchors, CERTValOutParam* cvout) argument 665 VerifyEV(CERTCertificate* cert_handle, int flags, CRLSet* crl_set, bool rev_checking_enabled, EVRootCAMetadata* metadata, SECOidTag ev_policy_oid, CERTCertList* additional_trust_anchors) argument 750 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_unittest.cc | 66 const CertificateList& additional_trust_anchors, 79 const CertificateList& additional_trust_anchors, 103 const CertificateList& additional_trust_anchors, 106 additional_trust_anchors, verify_result); 74 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 99 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_win.cc | 548 const CertificateList& additional_trust_anchors, 543 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | multi_threaded_cert_verifier.cc | 191 const CertificateList& additional_trust_anchors, 198 additional_trust_anchors_(additional_trust_anchors), 431 const CertificateList& additional_trust_anchors = local 436 hostname, flags, additional_trust_anchors); 463 additional_trust_anchors, 497 const CertificateList& additional_trust_anchors) 500 hash_values.reserve(2 + additional_trust_anchors.size()); 503 for (size_t i = 0; i < additional_trust_anchors.size(); ++i) 504 hash_values.push_back(additional_trust_anchors[i]->fingerprint()); 530 const CertificateList& additional_trust_anchors, 186 CertVerifierWorker(CertVerifyProc* verify_proc, X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, MultiThreadedCertVerifier* cert_verifier) argument 492 RequestParams( const SHA1HashValue& cert_fingerprint_arg, const SHA1HashValue& ca_fingerprint_arg, const std::string& hostname_arg, int flags_arg, const CertificateList& additional_trust_anchors) argument 526 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_verifier_browsertest.cc | 215 net::CertificateList additional_trust_anchors; local 216 additional_trust_anchors.push_back(ca_cert); 219 // |additional_trust_anchors|. 224 .WillOnce(ReturnRef(additional_trust_anchors)); 260 net::CertificateList additional_trust_anchors; local 261 additional_trust_anchors.push_back(ca_cert); 290 .WillOnce(ReturnRef(additional_trust_anchors));
|