/external/chromium_org/chrome/browser/chromeos/net/ |
H A D | cert_verify_proc_chromeos.cc | 23 const net::CertificateList& additional_trust_anchors; member in struct:chromeos::__anon3372::ChainVerifyArgs 45 const net::CertificateList& additional_trust_anchors, 47 ChainVerifyArgs chain_verify_args = {this, additional_trust_anchors}; 59 additional_trust_anchors, 83 args->additional_trust_anchors.begin(); 84 i != args->additional_trust_anchors.end(); 87 // Certs in the additional_trust_anchors should always be allowed, even if 40 VerifyInternal( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, const net::CertificateList& additional_trust_anchors, net::CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_chromeos_unittest.cc | 78 const net::CertificateList& additional_trust_anchors, 87 additional_trust_anchors, 103 net::CertificateList additional_trust_anchors; local 105 verify_proc, additional_trust_anchors, cert, root_subject_name); 192 // Test that roots specified through additional_trust_anchors are trusted for 201 net::CertificateList additional_trust_anchors; local 207 additional_trust_anchors, 212 additional_trust_anchors, 217 additional_trust_anchors.push_back(root_1_[0]); 220 additional_trust_anchors, 76 VerifyWithAdditionalTrustAnchors( net::CertVerifyProc* verify_proc, const net::CertificateList& additional_trust_anchors, net::X509Certificate* cert, std::string* root_subject_name) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | cert_verify_proc_android.cc | 162 const CertificateList& additional_trust_anchors, 157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_openssl.cc | 198 const CertificateList& additional_trust_anchors, 193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc.cc | 192 const CertificateList& additional_trust_anchors, 210 additional_trust_anchors, verify_result); 188 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_mac.cc | 538 const CertificateList& additional_trust_anchors, 533 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_nss.cc | 241 bool IsAdditionalTrustAnchor(CERTCertList* additional_trust_anchors, argument 243 if (!additional_trust_anchors || !root) 245 for (CERTCertListNode* node = CERT_LIST_HEAD(additional_trust_anchors); 246 !CERT_LIST_END(node, additional_trust_anchors); 362 // additional_trust_anchors is an optional list of certificates that can be 371 CERTCertList* additional_trust_anchors, 454 if (additional_trust_anchors) { 456 in_param.value.pointer.chain = additional_trust_anchors; 687 CERTCertList* additional_trust_anchors, 709 additional_trust_anchors, 365 PKIXVerifyCert(CERTCertificate* cert_handle, bool check_revocation, bool hard_fail, bool cert_io_enabled, const SECOidTag* policy_oids, int num_policy_oids, CERTCertList* additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CERTValOutParam* cvout) argument 681 VerifyEV(CERTCertificate* cert_handle, int flags, CRLSet* crl_set, bool rev_checking_enabled, EVRootCAMetadata* metadata, SECOidTag ev_policy_oid, CERTCertList* additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback) argument 767 VerifyInternalImpl( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CertVerifyResult* verify_result) argument 928 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_win.cc | 567 const CertificateList& additional_trust_anchors, 562 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|
H A D | multi_threaded_cert_verifier.cc | 222 const CertificateList& additional_trust_anchors, 229 additional_trust_anchors_(additional_trust_anchors), 474 const CertificateList& additional_trust_anchors = local 479 hostname, flags, additional_trust_anchors); 506 additional_trust_anchors, 544 const CertificateList& additional_trust_anchors) 547 hash_values.reserve(2 + additional_trust_anchors.size()); 550 for (size_t i = 0; i < additional_trust_anchors.size(); ++i) 551 hash_values.push_back(additional_trust_anchors[i]->fingerprint()); 577 const CertificateList& additional_trust_anchors, 217 CertVerifierWorker(CertVerifyProc* verify_proc, X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, MultiThreadedCertVerifier* cert_verifier) argument 539 RequestParams( const SHA1HashValue& cert_fingerprint_arg, const SHA1HashValue& ca_fingerprint_arg, const std::string& hostname_arg, int flags_arg, const CertificateList& additional_trust_anchors) argument 573 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument [all...] |
H A D | cert_verify_proc_unittest.cc | 71 const CertificateList& additional_trust_anchors, 84 const CertificateList& additional_trust_anchors, 128 const CertificateList& additional_trust_anchors, 131 additional_trust_anchors, verify_result); 79 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 124 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
|