Lines Matching defs:verify_result

51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root|
56 // |verify_result->is_issued_by_known_root| to |is_well_known|.
72 CertVerifyResult* verify_result) OVERRIDE;
85 CertVerifyResult* verify_result) {
86 verify_result->is_issued_by_known_root = is_well_known_;
129 CertVerifyResult* verify_result) {
131 additional_trust_anchors, verify_result);
152 CertVerifyResult verify_result;
159 &verify_result));
184 CertVerifyResult verify_result;
191 &verify_result);
193 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
210 CertVerifyResult verify_result;
216 &verify_result);
228 EXPECT_TRUE(verify_result.cert_status &
262 CertVerifyResult verify_result;
268 &verify_result);
270 EXPECT_EQ(0u, verify_result.cert_status);
299 CertVerifyResult verify_result;
307 &verify_result);
309 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
323 CertVerifyResult verify_result;
324 Verify(cert.get(), "127.0.0.1", 0, NULL, empty_cert_list_, &verify_result);
326 // We don't check verify_result because the certificate is signed by an
397 CertVerifyResult verify_result;
403 &verify_result);
408 verify_result.cert_status & CERT_STATUS_WEAK_KEY);
410 verify_result.cert_status & CERT_STATUS_INVALID);
413 EXPECT_EQ(0U, verify_result.cert_status & CERT_STATUS_WEAK_KEY);
456 CertVerifyResult verify_result;
463 &verify_result);
467 ASSERT_TRUE(verify_result.verified_cert.get());
469 verify_result.verified_cert->GetIntermediateCertificates().size());
471 verify_result.verified_cert->GetIntermediateCertificates().front(),
474 EXPECT_FALSE(verify_result.has_md5);
495 CertVerifyResult verify_result;
502 &verify_result);
513 &verify_result);
571 CertVerifyResult verify_result;
577 &verify_result);
579 EXPECT_EQ(0U, verify_result.cert_status);
606 CertVerifyResult verify_result;
612 &verify_result);
615 verify_result.cert_status & CERT_STATUS_NAME_CONSTRAINT_VIOLATION);
637 CertVerifyResult verify_result;
645 &verify_result);
647 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
648 EXPECT_TRUE(verify_result.is_issued_by_known_root);
670 CertVerifyResult verify_result;
679 &verify_result);
681 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
682 ASSERT_LE(2U, verify_result.public_key_hashes.size());
685 for (size_t i = 0; i < verify_result.public_key_hashes.size(); ++i) {
686 if (verify_result.public_key_hashes[i].tag != HASH_VALUE_SHA1)
688 sha1_hashes.push_back(verify_result.public_key_hashes[i]);
698 for (size_t i = 0; i < verify_result.public_key_hashes.size(); ++i) {
699 if (verify_result.public_key_hashes[i].tag != HASH_VALUE_SHA256)
701 sha256_hashes.push_back(verify_result.public_key_hashes[i]);
722 CertVerifyResult verify_result;
728 &verify_result);
736 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID);
742 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
776 CertVerifyResult verify_result;
778 verify_result.verified_cert.get());
784 &verify_result);
787 verify_result.verified_cert.get());
789 EXPECT_NE(google_full_chain, verify_result.verified_cert);
792 verify_result.verified_cert->os_cert_handle()));
794 verify_result.verified_cert->GetIntermediateCertificates();
818 CertVerifyResult verify_result;
824 Verify(cert.get(), "intranet", 0, NULL, empty_cert_list_, &verify_result);
826 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_NON_UNIQUE_NAME);
831 Verify(cert.get(), "intranet", 0, NULL, empty_cert_list_, &verify_result);
833 EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_NON_UNIQUE_NAME);
866 CertVerifyResult verify_result;
868 verify_result.verified_cert.get());
874 &verify_result);
877 verify_result.verified_cert.get());
879 EXPECT_NE(google_full_chain, verify_result.verified_cert);
882 verify_result.verified_cert->os_cert_handle()));
884 verify_result.verified_cert->GetIntermediateCertificates();
927 CertVerifyResult verify_result;
929 verify_result.verified_cert.get());
935 &verify_result);
938 verify_result.verified_cert.get());
940 EXPECT_NE(google_full_chain, verify_result.verified_cert);
943 verify_result.verified_cert->os_cert_handle()));
945 verify_result.verified_cert->GetIntermediateCertificates();
975 CertVerifyResult verify_result;
977 cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_, &verify_result);
979 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
980 EXPECT_FALSE(verify_result.is_issued_by_additional_trust_anchor);
986 cert.get(), "127.0.0.1", flags, NULL, trust_anchors, &verify_result);
988 EXPECT_EQ(0U, verify_result.cert_status);
989 EXPECT_TRUE(verify_result.is_issued_by_additional_trust_anchor);
994 cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_, &verify_result);
996 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
997 EXPECT_FALSE(verify_result.is_issued_by_additional_trust_anchor);
1017 CertVerifyResult verify_result;
1019 cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_, &verify_result);
1021 EXPECT_EQ(0U, verify_result.cert_status);
1023 EXPECT_FALSE(verify_result.is_issued_by_known_root);
1071 CertVerifyResult verify_result;
1077 &verify_result);
1079 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1100 &verify_result);
1102 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1123 &verify_result);
1125 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1143 &verify_result);
1145 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1169 CertVerifyResult verify_result;
1171 cert.get(), "127.0.0.1", flags, NULL, empty_cert_list_, &verify_result);
1173 EXPECT_EQ(0U, verify_result.cert_status);
1189 &verify_result);
1205 &verify_result);
1235 CertVerifyResult verify_result;
1241 &verify_result);
1243 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1258 &verify_result);
1324 CertVerifyResult verify_result;
1330 &verify_result);
1331 EXPECT_EQ(!!(data.expected_algorithms & EXPECT_MD2), verify_result.has_md2);
1332 EXPECT_EQ(!!(data.expected_algorithms & EXPECT_MD4), verify_result.has_md4);
1333 EXPECT_EQ(!!(data.expected_algorithms & EXPECT_MD5), verify_result.has_md5);
1334 EXPECT_EQ(!!(data.expected_algorithms & EXPECT_SHA1), verify_result.has_sha1);
1336 EXPECT_FALSE(verify_result.is_issued_by_additional_trust_anchor);
1341 verify_result.cert_status & CERT_STATUS_INVALID);
1348 verify_result.cert_status & CERT_STATUS_WEAK_SIGNATURE_ALGORITHM);
1562 CertVerifyResult verify_result;
1564 &verify_result);
1567 EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_COMMON_NAME_INVALID);
1570 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_COMMON_NAME_INVALID);