/external/chromium/chrome/browser/ssl/ |
H A D | ssl_error_info.cc | 44 std::vector<std::string> dns_names; local 45 cert->GetDNSNames(&dns_names); 46 DCHECK(!dns_names.empty()); 48 for (; i < dns_names.size(); ++i) { 49 if (dns_names[i] == cert->subject().common_name) 52 if (i == dns_names.size()) 57 UTF8ToUTF16(dns_names[i]),
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_error_info.cc | 45 std::vector<std::string> dns_names; local 46 cert->GetDNSNames(&dns_names); 47 DCHECK(!dns_names.empty()); 49 for (; i < dns_names.size(); ++i) { 50 if (dns_names[i] == cert->subject().common_name) 53 if (i == dns_names.size()) 59 UTF8ToUTF16(dns_names[i])),
|
/external/chromium_org/net/cert/ |
H A D | x509_certificate_ios.cc | 89 std::vector<std::string>* dns_names, 94 if (dns_names) 95 dns_names->clear(); 100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs); 88 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate_nss.cc | 117 std::vector<std::string>* dns_names, 119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs); 116 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate_win.cc | 168 std::vector<std::string>* dns_names, 170 if (dns_names) 171 dns_names->clear(); 188 if (dns_names && entry.dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) { 189 dns_names->push_back(WideToASCII(entry.pwszDNSName)); 167 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate.cc | 488 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 489 GetSubjectAltName(dns_names, NULL); 490 if (dns_names->empty()) 491 dns_names->push_back(subject_.common_name); 653 std::vector<std::string> dns_names, ip_addrs; local 654 GetSubjectAltName(&dns_names, &ip_addrs); 655 return VerifyHostname(hostname, subject_.common_name, dns_names, ip_addrs);
|
H A D | x509_certificate_mac.cc | 329 std::vector<std::string>* dns_names, 331 if (dns_names) 332 dns_names->clear(); 357 if (dns_names && name_struct.nameType == GNT_DNSName) { 358 dns_names->push_back(std::string( 328 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate_openssl.cc | 100 std::vector<std::string>* dns_names, 102 DCHECK(dns_names || ip_addresses); 115 if (name->type == GEN_DNS && dns_names) { 120 dns_names->push_back( 366 std::vector<std::string>* dns_names, 368 if (dns_names) 369 dns_names->clear(); 373 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs); 99 ParseSubjectAltName(X509Certificate::OSCertHandle cert, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addresses) argument 365 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate_unittest.cc | 194 std::vector<std::string> dns_names; local 195 google_cert->GetDNSNames(&dns_names); 196 ASSERT_EQ(1U, dns_names.size()); 197 EXPECT_EQ("www.google.com", dns_names[0]); 251 std::vector<std::string> dns_names; local 252 webkit_cert->GetDNSNames(&dns_names); 253 ASSERT_EQ(2U, dns_names.size()); 254 EXPECT_EQ("*.webkit.org", dns_names[0]); 255 EXPECT_EQ("webkit.org", dns_names[1]); 306 std::vector<std::string> dns_names; local 451 std::vector<std::string> dns_names; local 929 const char* dns_names; member in struct:net::CertificateNameVerifyTestData 1098 std::vector<std::string> dns_names, ip_addressses; local [all...] |
H A D | x509_util_nss.cc | 434 std::vector<std::string>* dns_names, 436 if (dns_names) 437 dns_names->clear(); 460 if (dns_names && name->type == certDNSName) { 461 dns_names->push_back(std::string( 433 GetSubjectAltName(CERTCertificate* cert_handle, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) argument
|
/external/chromium/net/base/ |
H A D | x509_certificate.cc | 528 std::vector<std::string> dns_names; local 529 GetDNSNames(&dns_names); 530 return VerifyHostname(hostname, dns_names);
|
H A D | x509_certificate_openssl.cc | 98 std::vector<std::string>* dns_names) { 116 dns_names->push_back( 397 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 398 dns_names->clear(); 400 ParseSubjectAltNames(cert_handle_, dns_names); 402 if (dns_names->empty()) 403 dns_names->push_back(subject_.common_name); 97 ParseSubjectAltNames(X509Certificate::OSCertHandle cert, std::vector<std::string>* dns_names) argument
|
H A D | x509_certificate_unittest.cc | 223 std::vector<std::string> dns_names; local 224 google_cert->GetDNSNames(&dns_names); 225 ASSERT_EQ(1U, dns_names.size()); 226 EXPECT_EQ("www.google.com", dns_names[0]); 289 std::vector<std::string> dns_names; local 290 webkit_cert->GetDNSNames(&dns_names); 291 ASSERT_EQ(2U, dns_names.size()); 292 EXPECT_EQ("*.webkit.org", dns_names[0]); 293 EXPECT_EQ("webkit.org", dns_names[1]); 352 std::vector<std::string> dns_names; local [all...] |
H A D | x509_certificate_mac.cc | 109 std::vector<std::string>* dns_names) { 124 for (std::vector<std::string>::const_iterator name = dns_names->begin(); 125 name != dns_names->end() && !override_hostname_mismatch; ++name) 776 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 777 dns_names->clear(); 780 dns_names); 782 if (dns_names->empty()) 783 dns_names->push_back(subject_.common_name); 108 OverrideHostnameMismatch(const std::string& hostname, std::vector<std::string>* dns_names) argument
|