/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_error_classification.cc | 248 std::vector<std::string> dns_names; local 249 cert_.GetDNSNames(&dns_names); 250 std::vector<Tokens> dns_name_tokens = GetTokenizedDNSNames(dns_names); 288 std::vector<std::string> dns_names; local 289 cert_.GetDNSNames(&dns_names); 290 std::vector<Tokens> dns_name_tokens = GetTokenizedDNSNames(dns_names); 390 GetTokenizedDNSNames(const std::vector<std::string>& dns_names) { argument 392 for (size_t i = 0; i < dns_names.size(); ++i) { 394 if (dns_names[i].empty() || dns_names[ 434 std::vector<std::string> dns_names; local 499 std::vector<std::string> dns_names; local 526 std::vector<std::string> dns_names; local [all...] |
H A D | ssl_error_info.cc | 41 std::vector<std::string> dns_names; local 42 cert->GetDNSNames(&dns_names); 43 DCHECK(!dns_names.empty()); 45 for (; i < dns_names.size(); ++i) { 46 if (dns_names[i] == cert->subject().common_name) 49 if (i == dns_names.size()) 55 UTF8ToUTF16(dns_names[i])));
|
H A D | ssl_error_classification.h | 109 const std::vector<std::string>& dns_names);
|
/external/chromium_org/net/cert/ |
H A D | cert_verify_proc.cc | 226 std::vector<std::string> dns_names, ip_addrs; local 227 cert->GetSubjectAltName(&dns_names, &ip_addrs); 230 dns_names, 464 // CheckNameConstraints verifies that every name in |dns_names| is in one of 467 static bool CheckNameConstraints(const std::vector<std::string>& dns_names, argument 469 for (std::vector<std::string>::const_iterator i = dns_names.begin(); 470 i != dns_names.end(); ++i) { 520 const std::vector<std::string>& dns_names, 598 if (dns_names.empty() && ip_addrs.empty()) { 599 std::vector<std::string> dns_names; local 517 HasNameConstraintsViolation( const HashValueVector& public_key_hashes, const std::string& common_name, const std::vector<std::string>& dns_names, const std::vector<std::string>& ip_addrs) argument [all...] |
H A D | x509_certificate_unittest.cc | 129 std::vector<std::string> dns_names; local 130 google_cert->GetDNSNames(&dns_names); 131 ASSERT_EQ(1U, dns_names.size()); 132 EXPECT_EQ("www.google.com", dns_names[0]); 186 std::vector<std::string> dns_names; local 187 webkit_cert->GetDNSNames(&dns_names); 188 ASSERT_EQ(2U, dns_names.size()); 189 EXPECT_EQ("*.webkit.org", dns_names[0]); 190 EXPECT_EQ("webkit.org", dns_names[1]); 242 std::vector<std::string> dns_names; local 461 std::vector<std::string> dns_names; local 906 const char* dns_names; member in struct:net::CertificateNameVerifyTestData 1075 std::vector<std::string> dns_names, ip_addressses; local [all...] |
H A D | x509_certificate_openssl.cc | 98 std::vector<std::string>* dns_names, 100 DCHECK(dns_names || ip_addresses); 113 if (name->type == GEN_DNS && dns_names) { 118 dns_names->push_back( 293 std::vector<std::string>* dns_names, 295 if (dns_names) 296 dns_names->clear(); 300 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs); 97 ParseSubjectAltName(X509Certificate::OSCertHandle cert, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addresses) argument 292 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | cert_verify_proc.h | 95 // imposed on it and the names in |dns_names| are not permitted. 99 const std::vector<std::string>& dns_names,
|
H A D | x509_certificate_ios.cc | 89 std::vector<std::string>* dns_names, 94 if (dns_names) 95 dns_names->clear(); 100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs); 88 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_util_nss.h | 41 std::vector<std::string>* dns_names,
|
H A D | x509_certificate_mac.cc | 233 std::vector<std::string>* dns_names, 235 if (dns_names) 236 dns_names->clear(); 261 if (dns_names && name_struct.nameType == GNT_DNSName) { 262 dns_names->push_back(std::string( 232 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate_win.cc | 169 std::vector<std::string>* dns_names, 171 if (dns_names) 172 dns_names->clear(); 189 if (dns_names && entry.dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) { 190 dns_names->push_back(base::UTF16ToASCII(entry.pwszDNSName)); 168 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_certificate.cc | 492 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { 493 GetSubjectAltName(dns_names, NULL); 494 if (dns_names->empty()) 495 dns_names->push_back(subject_.common_name); 659 std::vector<std::string> dns_names, ip_addrs; local 660 GetSubjectAltName(&dns_names, &ip_addrs); 661 return VerifyHostname(hostname, subject_.common_name, dns_names, ip_addrs,
|
H A D | x509_certificate.h | 229 void GetDNSNames(std::vector<std::string>* dns_names) const; 235 void GetSubjectAltName(std::vector<std::string>* dns_names,
|
H A D | x509_certificate_nss.cc | 117 std::vector<std::string>* dns_names, 119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs); 116 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
|
H A D | x509_util_nss.cc | 448 std::vector<std::string>* dns_names, 450 if (dns_names) 451 dns_names->clear(); 474 if (dns_names && name->type == certDNSName) { 475 dns_names->push_back(std::string( 447 GetSubjectAltName(CERTCertificate* cert_handle, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) argument
|
/external/chromium_org/net/quic/ |
H A D | quic_connection_logger.cc | 252 std::vector<std::string> dns_names; local 253 cert->GetDNSNames(&dns_names); 256 for (std::vector<std::string>::const_iterator it = dns_names.begin(); 257 it != dns_names.end(); it++) {
|