Searched defs:verify_result (Results 1 - 25 of 26) sorted by relevance

12

/external/chromium_org/net/cert/
H A Dsingle_request_cert_verifier.cc32 CertVerifyResult* verify_result,
43 cert, hostname, flags, crl_set, verify_result,
28 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, const BoundNetLog& net_log) argument
H A Dcert_verify_proc_android.cc29 // of its result), i.e. if |verify_result| was set. Otherwise returns false.
32 CertVerifyResult* verify_result) {
38 &status, &verify_result->is_issued_by_known_root,
46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID;
53 verify_result->cert_status |= CERT_STATUS_INVALID;
56 verify_result->cert_status |= CERT_STATUS_INVALID;
60 verify_result->cert_status |= CERT_STATUS_INVALID;
73 verify_result->verified_cert = verified_cert;
79 verify_result
30 VerifyFromAndroidTrustManager(const std::vector<std::string>& cert_bytes, const std::string& hostname, CertVerifyResult* verify_result) argument
157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dmock_cert_verifier.cc43 CertVerifyResult* verify_result,
54 *verify_result = it->result;
59 verify_result->verified_cert = cert;
60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_);
69 const CertVerifyResult& verify_result,
71 AddResultForCertAndHost(cert, "*", verify_result, rv);
77 const CertVerifyResult& verify_result,
79 Rule rule(cert, host_pattern, verify_result, rv);
39 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument
68 AddResultForCert(X509Certificate* cert, const CertVerifyResult& verify_result, int rv) argument
74 AddResultForCertAndHost( X509Certificate* cert, const std::string& host_pattern, const CertVerifyResult& verify_result, int rv) argument
H A Dcert_verify_proc_openssl.cc100 CertVerifyResult* verify_result) {
117 verify_result->has_md2 = true;
119 verify_result->has_md4 = true;
122 verify_result->has_md5 = true;
127 verify_result->has_sha1 = true;
132 // Set verify_result->verified_cert and
133 // verify_result->is_issued_by_known_root.
135 verify_result->verified_cert =
142 verify_result->is_issued_by_known_root = true;
152 verify_result
99 GetCertChainInfo(X509_STORE_CTX* store_ctx, CertVerifyResult* verify_result) argument
193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dmulti_threaded_cert_verifier_unittest.cc51 CertVerifyResult* verify_result) OVERRIDE {
52 verify_result->Reset();
53 verify_result->verified_cert = cert;
54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID;
85 CertVerifyResult verify_result; local
93 &verify_result,
110 &verify_result,
155 CertVerifyResult verify_result; local
163 &verify_result,
180 &verify_result,
202 CertVerifyResult verify_result; local
246 CertVerifyResult verify_result; local
295 CertVerifyResult verify_result; local
[all...]
H A Dnss_cert_database_unittest.cc559 CertVerifyResult verify_result; local
565 &verify_result);
567 EXPECT_EQ(0U, verify_result.cert_status);
590 CertVerifyResult verify_result; local
596 &verify_result);
598 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
622 CertVerifyResult verify_result; local
628 &verify_result);
630 EXPECT_EQ(0U, verify_result.cert_status);
658 CertVerifyResult verify_result; local
700 CertVerifyResult verify_result; local
748 CertVerifyResult verify_result; local
824 CertVerifyResult verify_result; local
894 CertVerifyResult verify_result; local
958 CertVerifyResult verify_result; local
[all...]
H A Dcert_verify_proc.cc193 CertVerifyResult* verify_result) {
194 verify_result->Reset();
195 verify_result->verified_cert = cert;
198 verify_result->cert_status |= CERT_STATUS_REVOKED;
210 additional_trust_anchors, verify_result);
213 verify_result->common_name_fallback_used);
214 if (!verify_result->is_issued_by_known_root) {
216 verify_result->common_name_fallback_used);
221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) {
222 verify_result
188 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dcert_verify_proc_mac.cc179 // |*verify_result|. The caller MUST initialize |*verify_result| before
183 CertVerifyResult* verify_result) {
225 verify_result->has_md2 = true;
227 verify_result->has_md4 = true;
229 verify_result->has_md5 = true;
236 verify_result->has_sha1 = true;
242 verify_result->verified_cert =
539 CertVerifyResult* verify_result) {
574 verify_result
181 GetCertChainInfo(CFArrayRef cert_chain, CSSM_TP_APPLE_EVIDENCE_INFO* chain_info, CertVerifyResult* verify_result) argument
533 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dcert_verify_proc_nss.cc151 // *verify_result. The caller MUST initialize *verify_result before calling
156 CertVerifyResult* verify_result) {
198 verify_result->has_md5 = true;
201 verify_result->has_md2 = true;
204 verify_result->has_md4 = true;
210 verify_result->has_sha1 = true;
220 verify_result->verified_cert =
223 verify_result->verified_cert =
774 CertVerifyResult* verify_result) {
154 GetCertChainInfo(CERTCertList* cert_list, CERTCertificate* root_cert, CertVerifyResult* verify_result) argument
767 VerifyInternalImpl( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CertVerifyResult* verify_result) argument
928 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dcert_verify_proc_win.cc290 // |*verify_result|. The caller MUST initialize |*verify_result| before
293 CertVerifyResult* verify_result) {
330 verify_result->has_md5 = true;
333 verify_result->has_md2 = true;
336 verify_result->has_md4 = true;
343 verify_result->has_sha1 = true;
351 verify_result->verified_cert =
568 CertVerifyResult* verify_result) {
619 verify_result
292 GetCertChainInfo(PCCERT_CHAIN_CONTEXT chain_context, CertVerifyResult* verify_result) argument
562 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dmulti_threaded_cert_verifier.cc83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, argument
86 results->SetBoolean("has_md5", verify_result.has_md5);
87 results->SetBoolean("has_md2", verify_result.has_md2);
88 results->SetBoolean("has_md4", verify_result.has_md4);
90 verify_result.is_issued_by_known_root);
92 verify_result.is_issued_by_additional_trust_anchor);
94 verify_result.common_name_fallback_used);
95 results->SetInteger("cert_status", verify_result.cert_status);
97 NetLogX509CertificateCallback(verify_result.verified_cert.get(),
102 verify_result
170 CertVerifierRequest(const CompletionCallback& callback, CertVerifyResult* verify_result, const BoundNetLog& net_log) argument
192 Post(const MultiThreadedCertVerifier::CachedResult& verify_result) argument
381 HandleResult( const MultiThreadedCertVerifier::CachedResult& verify_result, bool is_first_job) argument
405 PostAll(const MultiThreadedCertVerifier::CachedResult& verify_result) argument
456 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument
573 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument
[all...]
H A Dcert_verify_proc_unittest.cc51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root|
56 // |verify_result->is_issued_by_known_root| to |is_well_known|.
72 CertVerifyResult* verify_result) OVERRIDE;
85 CertVerifyResult* verify_result) {
86 verify_result->is_issued_by_known_root = is_well_known_;
129 CertVerifyResult* verify_result) {
131 additional_trust_anchors, verify_result);
152 CertVerifyResult verify_result; local
159 &verify_result));
184 CertVerifyResult verify_result; local
79 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
124 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
210 CertVerifyResult verify_result; local
262 CertVerifyResult verify_result; local
299 CertVerifyResult verify_result; local
323 CertVerifyResult verify_result; local
397 CertVerifyResult verify_result; local
456 CertVerifyResult verify_result; local
495 CertVerifyResult verify_result; local
571 CertVerifyResult verify_result; local
606 CertVerifyResult verify_result; local
637 CertVerifyResult verify_result; local
670 CertVerifyResult verify_result; local
722 CertVerifyResult verify_result; local
776 CertVerifyResult verify_result; local
818 CertVerifyResult verify_result; local
866 CertVerifyResult verify_result; local
927 CertVerifyResult verify_result; local
975 CertVerifyResult verify_result; local
1017 CertVerifyResult verify_result; local
1071 CertVerifyResult verify_result; local
1169 CertVerifyResult verify_result; local
1235 CertVerifyResult verify_result; local
1324 CertVerifyResult verify_result; local
1562 CertVerifyResult verify_result; local
[all...]
/external/chromium_org/chrome/browser/chromeos/net/
H A Dcert_verify_proc_chromeos.cc46 net::CertVerifyResult* verify_result) {
61 verify_result);
40 VerifyInternal( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, const net::CertificateList& additional_trust_anchors, net::CertVerifyResult* verify_result) argument
H A Dcert_verify_proc_chromeos_unittest.cc82 net::CertVerifyResult verify_result; local
88 &verify_result);
89 if (verify_result.verified_cert.get() &&
90 !verify_result.verified_cert->GetIntermediateCertificates().empty()) {
92 verify_result.verified_cert->GetIntermediateCertificates().back();
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dpolicy_cert_verifier.cc20 const net::CertVerifyResult& verify_result) {
22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor ||
32 const net::CertVerifyResult* verify_result,
35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result);
76 net::CertVerifyResult* verify_result,
86 verify_result);
87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
18 MaybeSignalAnchorUse(int error, const base::Closure& anchor_used_callback, const net::CertVerifyResult& verify_result) argument
29 CompleteAndSignalAnchorUse( const base::Closure& anchor_used_callback, const net::CompletionCallback& completion_callback, const net::CertVerifyResult* verify_result, int error) argument
71 Verify( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, net::CertVerifyResult* verify_result, const net::CompletionCallback& completion_callback, RequestHandle* out_req, const net::BoundNetLog& net_log) argument
H A Dpolicy_cert_verifier_browsertest.cc68 net::CertVerifyResult* verify_result,
74 verify_result,
129 net::CertVerifyResult verify_result; local
132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
142 net::CertVerifyResult verify_result; local
145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
165 net::CertVerifyResult verify_result; local
168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
184 net::CertVerifyResult verify_result; local
187 int error = VerifyTestServerCert(callback, &verify_result,
67 VerifyTestServerCert(const net::TestCompletionCallback& test_callback, net::CertVerifyResult* verify_result, net::CertVerifier::RequestHandle* request_handle) argument
198 net::CertVerifyResult verify_result; local
212 net::CertVerifyResult verify_result; local
223 net::CertVerifyResult verify_result; local
[all...]
/external/chromium_org/content/child/webcrypto/test/
H A Daes_kw_unittest.cc315 bool verify_result; local
321 &verify_result)); local
/external/chromium_org/net/ocsp/
H A Dnss_ocsp_unittest.cc141 CertVerifyResult verify_result; local
150 &verify_result,
/external/chromium_org/sync/engine/
H A Dprocess_updates_util.cc302 VerifyResult verify_result = VerifyUpdate(trans, **update_it, type); local
303 if (verify_result != VERIFY_SUCCESS && verify_result != VERIFY_UNDELETE)
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_asn1.c114 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st
210 if (in->verify_result != X509_V_OK)
212 a.verify_result.length=LSIZE2;
213 a.verify_result.type=V_ASN1_INTEGER;
214 a.verify_result.data=ibuf5;
215 ASN1_INTEGER_set(&a.verify_result,in->verify_result);
294 if (in->verify_result != X509_V_OK)
295 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5);
334 if (in->verify_result !
[all...]
/external/openssl/ssl/
H A Dssl_asn1.c107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st
234 if (in->verify_result != X509_V_OK)
236 a.verify_result.length=LSIZE2;
237 a.verify_result.type=V_ASN1_INTEGER;
238 a.verify_result.data=ibuf5;
239 ASN1_INTEGER_set(&a.verify_result,in->verify_result);
311 if (in->verify_result != X509_V_OK)
312 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5);
360 if (in->verify_result !
[all...]
/external/chromium_org/content/child/webcrypto/
H A Dwebcrypto_impl.cc286 verify_result(false) {}
293 bool verify_result; member in struct:content::__anon7555::VerifySignatureState
520 state->result.completeWithBoolean(state->verify_result);
532 &state->verify_result);
/external/chromium_org/net/socket/
H A Dssl_client_socket_unittest.cc2462 // verify_result, instead.
2479 CertVerifyResult verify_result; local
2480 verify_result.verified_cert = X509Certificate::CreateFromHandle(
2485 cert_verifier_->AddResultForCert(certs[0].get(), verify_result, OK);
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dssl.h426 long verify_result; /* only for servers */ member in struct:ssl_session_st
1359 long verify_result; member in struct:ssl_st
/external/openssl/include/openssl/
H A Dssl.h512 long verify_result; /* only for servers */ member in struct:ssl_session_st
1363 long verify_result; member in struct:ssl_st

Completed in 446 milliseconds

12