/external/chromium_org/net/cert/ |
H A D | single_request_cert_verifier.cc | 32 CertVerifyResult* verify_result, 43 cert, hostname, flags, crl_set, verify_result, 28 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, const BoundNetLog& net_log) argument
|
H A D | cert_verify_proc_android.cc | 29 // of its result), i.e. if |verify_result| was set. Otherwise returns false. 32 CertVerifyResult* verify_result) { 38 &status, &verify_result->is_issued_by_known_root, 46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 53 verify_result->cert_status |= CERT_STATUS_INVALID; 56 verify_result->cert_status |= CERT_STATUS_INVALID; 60 verify_result->cert_status |= CERT_STATUS_INVALID; 73 verify_result->verified_cert = verified_cert; 79 verify_result 30 VerifyFromAndroidTrustManager(const std::vector<std::string>& cert_bytes, const std::string& hostname, CertVerifyResult* verify_result) argument 157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | mock_cert_verifier.cc | 43 CertVerifyResult* verify_result, 54 *verify_result = it->result; 59 verify_result->verified_cert = cert; 60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_); 69 const CertVerifyResult& verify_result, 71 AddResultForCertAndHost(cert, "*", verify_result, rv); 77 const CertVerifyResult& verify_result, 79 Rule rule(cert, host_pattern, verify_result, rv); 39 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument 68 AddResultForCert(X509Certificate* cert, const CertVerifyResult& verify_result, int rv) argument 74 AddResultForCertAndHost( X509Certificate* cert, const std::string& host_pattern, const CertVerifyResult& verify_result, int rv) argument
|
H A D | cert_verify_proc_openssl.cc | 100 CertVerifyResult* verify_result) { 117 verify_result->has_md2 = true; 119 verify_result->has_md4 = true; 122 verify_result->has_md5 = true; 127 verify_result->has_sha1 = true; 132 // Set verify_result->verified_cert and 133 // verify_result->is_issued_by_known_root. 135 verify_result->verified_cert = 142 verify_result->is_issued_by_known_root = true; 152 verify_result 99 GetCertChainInfo(X509_STORE_CTX* store_ctx, CertVerifyResult* verify_result) argument 193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | multi_threaded_cert_verifier_unittest.cc | 51 CertVerifyResult* verify_result) OVERRIDE { 52 verify_result->Reset(); 53 verify_result->verified_cert = cert; 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; 85 CertVerifyResult verify_result; local 93 &verify_result, 110 &verify_result, 155 CertVerifyResult verify_result; local 163 &verify_result, 180 &verify_result, 202 CertVerifyResult verify_result; local 246 CertVerifyResult verify_result; local 295 CertVerifyResult verify_result; local [all...] |
H A D | nss_cert_database_unittest.cc | 559 CertVerifyResult verify_result; local 565 &verify_result); 567 EXPECT_EQ(0U, verify_result.cert_status); 590 CertVerifyResult verify_result; local 596 &verify_result); 598 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status); 622 CertVerifyResult verify_result; local 628 &verify_result); 630 EXPECT_EQ(0U, verify_result.cert_status); 658 CertVerifyResult verify_result; local 700 CertVerifyResult verify_result; local 748 CertVerifyResult verify_result; local 824 CertVerifyResult verify_result; local 894 CertVerifyResult verify_result; local 958 CertVerifyResult verify_result; local [all...] |
H A D | cert_verify_proc.cc | 193 CertVerifyResult* verify_result) { 194 verify_result->Reset(); 195 verify_result->verified_cert = cert; 198 verify_result->cert_status |= CERT_STATUS_REVOKED; 210 additional_trust_anchors, verify_result); 213 verify_result->common_name_fallback_used); 214 if (!verify_result->is_issued_by_known_root) { 216 verify_result->common_name_fallback_used); 221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 222 verify_result 188 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_mac.cc | 179 // |*verify_result|. The caller MUST initialize |*verify_result| before 183 CertVerifyResult* verify_result) { 225 verify_result->has_md2 = true; 227 verify_result->has_md4 = true; 229 verify_result->has_md5 = true; 236 verify_result->has_sha1 = true; 242 verify_result->verified_cert = 539 CertVerifyResult* verify_result) { 574 verify_result 181 GetCertChainInfo(CFArrayRef cert_chain, CSSM_TP_APPLE_EVIDENCE_INFO* chain_info, CertVerifyResult* verify_result) argument 533 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_nss.cc | 151 // *verify_result. The caller MUST initialize *verify_result before calling 156 CertVerifyResult* verify_result) { 198 verify_result->has_md5 = true; 201 verify_result->has_md2 = true; 204 verify_result->has_md4 = true; 210 verify_result->has_sha1 = true; 220 verify_result->verified_cert = 223 verify_result->verified_cert = 774 CertVerifyResult* verify_result) { 154 GetCertChainInfo(CERTCertList* cert_list, CERTCertificate* root_cert, CertVerifyResult* verify_result) argument 767 VerifyInternalImpl( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CertVerifyResult* verify_result) argument 928 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_win.cc | 290 // |*verify_result|. The caller MUST initialize |*verify_result| before 293 CertVerifyResult* verify_result) { 330 verify_result->has_md5 = true; 333 verify_result->has_md2 = true; 336 verify_result->has_md4 = true; 343 verify_result->has_sha1 = true; 351 verify_result->verified_cert = 568 CertVerifyResult* verify_result) { 619 verify_result 292 GetCertChainInfo(PCCERT_CHAIN_CONTEXT chain_context, CertVerifyResult* verify_result) argument 562 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | multi_threaded_cert_verifier.cc | 83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, argument 86 results->SetBoolean("has_md5", verify_result.has_md5); 87 results->SetBoolean("has_md2", verify_result.has_md2); 88 results->SetBoolean("has_md4", verify_result.has_md4); 90 verify_result.is_issued_by_known_root); 92 verify_result.is_issued_by_additional_trust_anchor); 94 verify_result.common_name_fallback_used); 95 results->SetInteger("cert_status", verify_result.cert_status); 97 NetLogX509CertificateCallback(verify_result.verified_cert.get(), 102 verify_result 170 CertVerifierRequest(const CompletionCallback& callback, CertVerifyResult* verify_result, const BoundNetLog& net_log) argument 192 Post(const MultiThreadedCertVerifier::CachedResult& verify_result) argument 381 HandleResult( const MultiThreadedCertVerifier::CachedResult& verify_result, bool is_first_job) argument 405 PostAll(const MultiThreadedCertVerifier::CachedResult& verify_result) argument 456 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument 573 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument [all...] |
H A D | cert_verify_proc_unittest.cc | 51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root| 56 // |verify_result->is_issued_by_known_root| to |is_well_known|. 72 CertVerifyResult* verify_result) OVERRIDE; 85 CertVerifyResult* verify_result) { 86 verify_result->is_issued_by_known_root = is_well_known_; 129 CertVerifyResult* verify_result) { 131 additional_trust_anchors, verify_result); 152 CertVerifyResult verify_result; local 159 &verify_result)); 184 CertVerifyResult verify_result; local 79 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 124 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 210 CertVerifyResult verify_result; local 262 CertVerifyResult verify_result; local 299 CertVerifyResult verify_result; local 323 CertVerifyResult verify_result; local 397 CertVerifyResult verify_result; local 456 CertVerifyResult verify_result; local 495 CertVerifyResult verify_result; local 571 CertVerifyResult verify_result; local 606 CertVerifyResult verify_result; local 637 CertVerifyResult verify_result; local 670 CertVerifyResult verify_result; local 722 CertVerifyResult verify_result; local 776 CertVerifyResult verify_result; local 818 CertVerifyResult verify_result; local 866 CertVerifyResult verify_result; local 927 CertVerifyResult verify_result; local 975 CertVerifyResult verify_result; local 1017 CertVerifyResult verify_result; local 1071 CertVerifyResult verify_result; local 1169 CertVerifyResult verify_result; local 1235 CertVerifyResult verify_result; local 1324 CertVerifyResult verify_result; local 1562 CertVerifyResult verify_result; local [all...] |
/external/chromium_org/chrome/browser/chromeos/net/ |
H A D | cert_verify_proc_chromeos.cc | 46 net::CertVerifyResult* verify_result) { 61 verify_result); 40 VerifyInternal( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, const net::CertificateList& additional_trust_anchors, net::CertVerifyResult* verify_result) argument
|
H A D | cert_verify_proc_chromeos_unittest.cc | 82 net::CertVerifyResult verify_result; local 88 &verify_result); 89 if (verify_result.verified_cert.get() && 90 !verify_result.verified_cert->GetIntermediateCertificates().empty()) { 92 verify_result.verified_cert->GetIntermediateCertificates().back();
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_verifier.cc | 20 const net::CertVerifyResult& verify_result) { 22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor || 32 const net::CertVerifyResult* verify_result, 35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result); 76 net::CertVerifyResult* verify_result, 86 verify_result); 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result, 89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result); 18 MaybeSignalAnchorUse(int error, const base::Closure& anchor_used_callback, const net::CertVerifyResult& verify_result) argument 29 CompleteAndSignalAnchorUse( const base::Closure& anchor_used_callback, const net::CompletionCallback& completion_callback, const net::CertVerifyResult* verify_result, int error) argument 71 Verify( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, net::CertVerifyResult* verify_result, const net::CompletionCallback& completion_callback, RequestHandle* out_req, const net::BoundNetLog& net_log) argument
|
H A D | policy_cert_verifier_browsertest.cc | 68 net::CertVerifyResult* verify_result, 74 verify_result, 129 net::CertVerifyResult verify_result; local 132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 142 net::CertVerifyResult verify_result; local 145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 165 net::CertVerifyResult verify_result; local 168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 184 net::CertVerifyResult verify_result; local 187 int error = VerifyTestServerCert(callback, &verify_result, 67 VerifyTestServerCert(const net::TestCompletionCallback& test_callback, net::CertVerifyResult* verify_result, net::CertVerifier::RequestHandle* request_handle) argument 198 net::CertVerifyResult verify_result; local 212 net::CertVerifyResult verify_result; local 223 net::CertVerifyResult verify_result; local [all...] |
/external/chromium_org/content/child/webcrypto/test/ |
H A D | aes_kw_unittest.cc | 315 bool verify_result; local 321 &verify_result)); local
|
/external/chromium_org/net/ocsp/ |
H A D | nss_ocsp_unittest.cc | 141 CertVerifyResult verify_result; local 150 &verify_result,
|
/external/chromium_org/sync/engine/ |
H A D | process_updates_util.cc | 302 VerifyResult verify_result = VerifyUpdate(trans, **update_it, type); local 303 if (verify_result != VERIFY_SUCCESS && verify_result != VERIFY_UNDELETE)
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_asn1.c | 114 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 210 if (in->verify_result != X509_V_OK) 212 a.verify_result.length=LSIZE2; 213 a.verify_result.type=V_ASN1_INTEGER; 214 a.verify_result.data=ibuf5; 215 ASN1_INTEGER_set(&a.verify_result,in->verify_result); 294 if (in->verify_result != X509_V_OK) 295 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); 334 if (in->verify_result ! [all...] |
/external/openssl/ssl/ |
H A D | ssl_asn1.c | 107 ASN1_INTEGER verify_result; member in struct:ssl_session_asn1_st 234 if (in->verify_result != X509_V_OK) 236 a.verify_result.length=LSIZE2; 237 a.verify_result.type=V_ASN1_INTEGER; 238 a.verify_result.data=ibuf5; 239 ASN1_INTEGER_set(&a.verify_result,in->verify_result); 311 if (in->verify_result != X509_V_OK) 312 M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); 360 if (in->verify_result ! [all...] |
/external/chromium_org/content/child/webcrypto/ |
H A D | webcrypto_impl.cc | 286 verify_result(false) {} 293 bool verify_result; member in struct:content::__anon7555::VerifySignatureState 520 state->result.completeWithBoolean(state->verify_result); 532 &state->verify_result);
|
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_unittest.cc | 2462 // verify_result, instead. 2479 CertVerifyResult verify_result; local 2480 verify_result.verified_cert = X509Certificate::CreateFromHandle( 2485 cert_verifier_->AddResultForCert(certs[0].get(), verify_result, OK);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 426 long verify_result; /* only for servers */ member in struct:ssl_session_st 1359 long verify_result; member in struct:ssl_st
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 512 long verify_result; /* only for servers */ member in struct:ssl_session_st 1363 long verify_result; member in struct:ssl_st
|