/external/chromium_org/chrome/common/net/ |
H A D | x509_certificate_model_nss.cc | 72 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle) { argument 74 if (cert_handle->nickname) { 75 name = cert_handle->nickname; 110 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { argument 112 Stringize(CERT_GetCommonName(&cert_handle->subject), std::string())); 115 return GetNickname(cert_handle); 118 string GetTokenName(X509Certificate::OSCertHandle cert_handle) { argument 119 return psm::GetCertTokenName(cert_handle); 122 string GetVersion(X509Certificate::OSCertHandle cert_handle) { argument 126 if (cert_handle 133 GetType(X509Certificate::OSCertHandle cert_handle) argument 137 GetUsageStrings(X509Certificate::OSCertHandle cert_handle, std::vector<string>* usages) argument 142 GetSerialNumberHexified(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 148 GetIssuerCommonName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 153 GetIssuerOrgName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 158 GetIssuerOrgUnitName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 163 GetSubjectOrgName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 168 GetSubjectOrgUnitName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 174 GetSubjectCommonName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument 179 GetTimes(X509Certificate::OSCertHandle cert_handle, base::Time* issued, base::Time* expires) argument 190 GetTitle(X509Certificate::OSCertHandle cert_handle) argument 194 GetIssuerName(X509Certificate::OSCertHandle cert_handle) argument 198 GetSubjectName(X509Certificate::OSCertHandle cert_handle) argument 202 GetExtensions( const string& critical_label, const string& non_critical_label, X509Certificate::OSCertHandle cert_handle, Extensions* extensions) argument 218 HashCertSHA256(X509Certificate::OSCertHandle cert_handle) argument 222 HashCertSHA1(X509Certificate::OSCertHandle cert_handle) argument 277 ProcessSecAlgorithmSignature(X509Certificate::OSCertHandle cert_handle) argument 281 ProcessSecAlgorithmSubjectPublicKey( X509Certificate::OSCertHandle cert_handle) argument 287 ProcessSecAlgorithmSignatureWrap( X509Certificate::OSCertHandle cert_handle) argument 293 ProcessSubjectPublicKeyInfo(X509Certificate::OSCertHandle cert_handle) argument 297 ProcessRawBitsSignatureWrap(X509Certificate::OSCertHandle cert_handle) argument [all...] |
H A D | x509_certificate_model.h | 19 net::X509Certificate::OSCertHandle cert_handle); 21 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle); 23 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle); 25 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle); 28 net::X509Certificate::OSCertHandle cert_handle, 32 net::X509Certificate::OSCertHandle cert_handle, 36 net::X509Certificate::OSCertHandle cert_handle, 40 net::X509Certificate::OSCertHandle cert_handle, 44 net::X509Certificate::OSCertHandle cert_handle, 48 net::X509Certificate::OSCertHandle cert_handle, [all...] |
H A D | x509_certificate_model_openssl.cc | 969 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { argument 971 ProcessIDN(GetSubjectCommonName(cert_handle, std::string())); 979 X509_get_subject_name(cert_handle), 985 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) { argument 990 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) { argument 991 unsigned long version = X509_get_version(cert_handle); 1002 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle, argument 1008 X509Certificate::OSCertHandle cert_handle, 1010 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle); 1018 X509Certificate::OSCertHandle cert_handle, 1007 GetSerialNumberHexified( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1017 GetIssuerCommonName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1026 GetIssuerOrgName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1035 GetIssuerOrgUnitName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1044 GetSubjectOrgName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1053 GetSubjectOrgUnitName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1062 GetSubjectCommonName(X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument 1070 GetTimes(X509Certificate::OSCertHandle cert_handle, base::Time* issued, base::Time* expires) argument 1076 GetTitle(net::X509Certificate::OSCertHandle cert_handle) argument 1095 GetIssuerName(net::X509Certificate::OSCertHandle cert_handle) argument 1099 GetSubjectName(net::X509Certificate::OSCertHandle cert_handle) argument 1103 GetExtensions( const std::string& critical_label, const std::string& non_critical_label, net::X509Certificate::OSCertHandle cert_handle, Extensions* extensions) argument 1121 HashCertSHA256(net::X509Certificate::OSCertHandle cert_handle) argument 1130 HashCertSHA1(net::X509Certificate::OSCertHandle cert_handle) argument 1166 ProcessSecAlgorithmSignature( net::X509Certificate::OSCertHandle cert_handle) argument 1171 ProcessSecAlgorithmSubjectPublicKey( net::X509Certificate::OSCertHandle cert_handle) argument 1177 ProcessSecAlgorithmSignatureWrap( net::X509Certificate::OSCertHandle cert_handle) argument 1182 ProcessSubjectPublicKeyInfo( net::X509Certificate::OSCertHandle cert_handle) argument 1209 ProcessRawBitsSignatureWrap( net::X509Certificate::OSCertHandle cert_handle) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_util_ios.h | 27 CERTCertificate* CreateNSSCertHandleFromOSHandle(SecCertificateRef cert_handle); 39 CERTCertificate* cert_handle, 45 // The constructor copies the certificate data from |cert_handle| and 49 explicit NSSCertificate(SecCertificateRef cert_handle); 51 CERTCertificate* cert_handle() const; 63 CERTCertificate* cert_handle() const;
|
H A D | x509_certificate_ios.cc | 43 // Returns true if a given |cert_handle| is actually a valid X.509 certificate 52 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { argument 54 SecCertificateCopySubjectSummary(cert_handle)); 61 CERTCertificate* cert_handle = nss_cert.cert_handle(); local 62 if (cert_handle) { 63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_); 64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_); 65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_); 66 x509_util::ParseDate(&cert_handle 92 CERTCertificate* cert_handle = nss_cert.cert_handle(); local 104 GetDEREncoded(OSCertHandle cert_handle, std::string* encoded) argument 167 FreeOSCertHandle(OSCertHandle cert_handle) argument 218 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument 230 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument [all...] |
H A D | x509_util_ios.cc | 49 SecCertificateRef cert_handle) { 50 ScopedCFTypeRef<CFDataRef> cert_data(SecCertificateCopyData(cert_handle)); 64 CERTCertificate* cert_handle, 67 CreateOSCertHandleFromNSSHandle(cert_handle)); 101 NSSCertificate::NSSCertificate(SecCertificateRef cert_handle) { argument 102 nss_cert_handle_ = CreateNSSCertHandleFromOSHandle(cert_handle); 103 DLOG_IF(INFO, cert_handle && !nss_cert_handle_) 111 CERTCertificate* NSSCertificate::cert_handle() const { function in class:net::x509_util_ios::NSSCertificate 132 CERTCertificate* NSSCertChain::cert_handle() const { function in class:net::x509_util_ios::NSSCertChain 48 CreateNSSCertHandleFromOSHandle( SecCertificateRef cert_handle) argument 63 CreateCertFromNSSHandles( CERTCertificate* cert_handle, const std::vector<CERTCertificate*>& intermediates) argument
|
H A D | test_root_certs_nss.cc | 57 CERTCertificate* cert_handle = nss_certificate.cert_handle(); local 59 CERTCertificate* cert_handle = certificate->os_cert_handle(); 64 SECStatus rv = CERT_GetCertTrust(cert_handle, &original_trust); 83 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert_handle, &new_trust); 89 trust_cache_.push_back(new TrustEntry(cert_handle, original_trust));
|
H A D | x509_certificate_nss.cc | 46 OSCertHandle cert_handle = CreateOSCertHandleFromBytesWithNickname(data, local 49 if (!cert_handle) 52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); 53 FreeOSCertHandle(cert_handle); 142 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument 144 if (!cert_handle || !cert_handle->derCert.len) 146 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data), 147 cert_handle->derCert.len); 202 OSCertHandle cert_handle) { 201 DupOSCertHandle( OSCertHandle cert_handle) argument 207 FreeOSCertHandle(OSCertHandle cert_handle) argument 255 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument 263 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument [all...] |
H A D | x509_certificate.cc | 65 // for the same certificate data as |*cert_handle| already exists in the 66 // cache, the original |*cert_handle| will be freed and |cert_handle| 70 // reference to |*cert_handle| will be added to the cache. In either case, 71 // upon return, the caller fully owns |*cert_handle| and is responsible for 73 void InsertOrUpdate(X509Certificate::OSCertHandle* cert_handle); 75 // Decrements the cache reference count for |cert_handle|, a handle that was 78 // caller retains ownership of |cert_handle| and remains responsible for 80 void Remove(X509Certificate::OSCertHandle cert_handle); 87 Entry() : cert_handle(NUL 89 X509Certificate::OSCertHandle cert_handle; member in struct:net::__anon9108::X509CertificateCache::Entry 117 InsertOrUpdate( X509Certificate::OSCertHandle* cert_handle) argument 167 Remove(X509Certificate::OSCertHandle cert_handle) argument 193 InsertOrUpdateCache(X509Certificate::OSCertHandle* cert_handle) argument 200 RemoveFromCache(X509Certificate::OSCertHandle cert_handle) argument 255 CreateFromHandle( OSCertHandle cert_handle, const OSCertHandles& intermediates) argument 299 OSCertHandle cert_handle = CreateOSCertHandleFromBytes(data, length); local 331 OSCertHandle cert_handle = ReadOSCertHandleFromPickle(pickle_iter); local 688 GetPEMEncoded(OSCertHandle cert_handle, std::string* pem_encoded) argument 743 X509Certificate(OSCertHandle cert_handle, const OSCertHandles& intermediates) argument [all...] |
H A D | x509_certificate_win.cc | 236 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument 238 if (!cert_handle || !cert_handle->pbCertEncoded || 239 !cert_handle->cbCertEncoded) { 242 encoded->assign(reinterpret_cast<char*>(cert_handle->pbCertEncoded), 243 cert_handle->cbCertEncoded); 260 OSCertHandle cert_handle = NULL; local 263 length, CERT_STORE_ADD_USE_EXISTING, &cert_handle)) 266 return cert_handle; 292 OSCertHandle cert_handle) { 291 DupOSCertHandle( OSCertHandle cert_handle) argument 297 FreeOSCertHandle(OSCertHandle cert_handle) argument 381 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument 389 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument [all...] |
H A D | x509_certificate_mac.cc | 46 bool IsCertIssuerInEncodedList(X509Certificate::OSCertHandle cert_handle, argument 49 if (cached_cert.Init(cert_handle) != CSSM_OK) 126 // Test that a given |cert_handle| is actually a valid X.509 certificate, and 137 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { argument 139 OSStatus status = SecCertificateGetSubject(cert_handle, &sanity_check); 274 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument 277 if (!cert_handle || SecCertificateGetData(cert_handle, &der_data) != noErr) 306 OSCertHandle cert_handle = NULL; local 310 &cert_handle); 352 FreeOSCertHandle(OSCertHandle cert_handle) argument 460 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument 472 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument [all...] |
H A D | x509_certificate.h | 142 static X509Certificate* CreateFromHandle(OSCertHandle cert_handle, 322 // Obtains the DER encoded certificate data for |cert_handle|. On success, 324 static bool GetDEREncoded(OSCertHandle cert_handle, 335 static bool GetPEMEncoded(OSCertHandle cert_handle, 348 static void GetPublicKeyInfo(OSCertHandle cert_handle, 385 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle); 388 static void FreeOSCertHandle(OSCertHandle cert_handle); 396 static SHA1HashValue CalculateFingerprint(OSCertHandle cert_handle); 433 X509Certificate(OSCertHandle cert_handle,
|
H A D | x509_certificate_openssl.cc | 178 OSCertHandle cert_handle) { 179 DCHECK(cert_handle); 180 return X509_up_ref(cert_handle); 184 void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) { argument 188 X509_free(cert_handle); 309 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument 312 if (!cert_handle || !x509_util::GetDER(cert_handle, &der)) 347 bool X509Certificate::WriteOSCertHandleToPickle(OSCertHandle cert_handle, argument 350 if (!x509_util::GetDER(cert_handle, 177 DupOSCertHandle( OSCertHandle cert_handle) argument 357 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument [all...] |
H A D | cert_verify_proc_nss.cc | 347 CERTCertificate* cert_handle, int num_policy_oids, 350 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle); 352 // Call CERT_PKIXVerifyCert for the cert_handle. 365 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle, argument 470 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer, 473 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids, 483 CERTCertificate* cert_handle, int num_policy_oids, 511 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer, 537 SECOidTag policy = GetFirstCertPolicy(cert_handle); 547 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServe 482 RetryPKIXVerifyCertWithWorkarounds( CERTCertificate* cert_handle, int num_policy_oids, bool cert_io_enabled, std::vector<CERTValInParam>* cvin, CERTValOutParam* cvout) argument 563 DecodeCertPolicies( CERTCertificate* cert_handle) argument 580 GetFirstCertPolicy(CERTCertificate* cert_handle) argument 650 IsEVCandidate(EVRootCAMetadata* metadata, CERTCertificate* cert_handle, SECOidTag* ev_policy_oid) argument 681 VerifyEV(CERTCertificate* cert_handle, int flags, CRLSet* crl_set, bool rev_checking_enabled, EVRootCAMetadata* metadata, SECOidTag ev_policy_oid, CERTCertList* additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback) argument 779 CERTCertificate* cert_handle = scoped_chain.cert_handle(); local [all...] |
H A D | cert_verify_proc_android.cc | 127 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local 133 if (cert_handles.empty() || cert_handles[0] != cert_handle) 134 cert_handles.insert(cert_handles.begin(), cert_handle);
|
H A D | x509_util_nss.h | 40 void GetSubjectAltName(CERTCertificate* cert_handle,
|
H A D | x509_util_nss.cc | 313 void* cert_handle; local 314 if ((cert_handle = CERT_StartCertExtensions(cert)) == NULL) { 340 cert_handle, 351 if (CERT_FinishExtensions(cert_handle) != SECSuccess){ 447 void GetSubjectAltName(CERTCertificate* cert_handle, argument 456 SECStatus rv = CERT_FindCertExtension(cert_handle,
|
H A D | ct_objects_extractor_nss.cc | 37 explicit NSSCertWrapper(X509Certificate::OSCertHandle cert_handle); 43 NSSCertWrapper::NSSCertWrapper(X509Certificate::OSCertHandle cert_handle) { argument 45 cert.reset(CERT_DupCertificate(cert_handle)); 49 if (!X509Certificate::GetDEREncoded(cert_handle, &der_data))
|
H A D | cert_verify_proc_win.cc | 569 PCCERT_CONTEXT cert_handle = cert->os_cert_handle(); local 570 if (!cert_handle) 595 GetCertPoliciesInfo(cert_handle, &policies_info); 741 if (CertSubjectCommonNameHasNull(cert_handle))
|
/external/chromium_org/net/http/ |
H A D | disk_based_cert_cache.h | 28 typedef base::Callback<void(const X509Certificate::OSCertHandle cert_handle)> 44 // Stores |cert_handle| in the cache. If |cert_handle| is successfully stored, 46 // string, then |cert_handle| was not stored. 47 void SetCertificate(const X509Certificate::OSCertHandle cert_handle, 66 void operator()(X509Certificate::OSCertHandle cert_handle); 84 X509Certificate::OSCertHandle cert_handle); 86 X509Certificate::OSCertHandle cert_handle);
|
H A D | disk_based_cert_cache.cc | 29 const X509Certificate::OSCertHandle cert_handle) { 31 X509Certificate::CalculateFingerprint(cert_handle); 64 X509Certificate::OSCertHandle cert_handle, 126 X509Certificate::OSCertHandle cert_handle, 129 cert_handle_(X509Certificate::DupOSCertHandle(cert_handle)), 497 X509Certificate::OSCertHandle cert_handle) { 498 X509Certificate::FreeOSCertHandle(cert_handle); 528 // Note, this will also bring the cert_handle to the front of the recency 557 const X509Certificate::OSCertHandle cert_handle, 560 DCHECK(cert_handle); 28 GetCacheKeyForCert( const X509Certificate::OSCertHandle cert_handle) argument 123 WriteWorker( disk_cache::Backend* backend, const std::string& key, X509Certificate::OSCertHandle cert_handle, const base::Closure& cleanup_callback) argument 496 operator ()( X509Certificate::OSCertHandle cert_handle) argument 556 SetCertificate( const X509Certificate::OSCertHandle cert_handle, const SetCallback& cb) argument 582 FinishedReadOperation( const std::string& key, X509Certificate::OSCertHandle cert_handle) argument 590 FinishedWriteOperation( const std::string& key, X509Certificate::OSCertHandle cert_handle) argument [all...] |
H A D | disk_based_cert_cache_unittest.cc | 76 const X509Certificate::OSCertHandle& cert_handle() const { function in class:net::__anon9248::TestGetCallback 221 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(), 259 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(), 275 EXPECT_FALSE(get_callback.cert_handle()); 289 EXPECT_EQ(NULL, get_callback.cert_handle()); 361 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(), 404 get_callback1.cert_handle())); 406 get_callback2.cert_handle())); 431 EXPECT_EQ(NULL, get_callback.cert_handle()); 459 get_callback.cert_handle())); [all...] |
/external/chromium_org/net/ssl/ |
H A D | client_cert_store_mac.cc | 38 OSStatus CopyCertChain(SecCertificateRef cert_handle, argument 40 DCHECK(cert_handle); 52 NULL, const_cast<const void**>(reinterpret_cast<void**>(&cert_handle)), 89 X509Certificate::OSCertHandle cert_handle = (*cert)->os_cert_handle(); local 91 OSStatus result = CopyCertChain(cert_handle, &cert_chain); 109 cert_handle, intermediates)); 228 SecCertificateRef cert_handle; local 229 err = SecIdentityCopyCertificate(identity, &cert_handle); 232 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle); 235 X509Certificate::CreateFromHandle(cert_handle, [all...] |
/external/chromium_org/chromeos/ |
H A D | cert_loader.cc | 123 CERTCertificateStr* cert_handle = cert.os_cert_handle(); local 125 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */);
|
/external/chromium_org/chrome/browser/chromeos/options/ |
H A D | cert_library.cc | 216 net::X509Certificate::OSCertHandle cert_handle = local 218 net::CertType type = x509_certificate_model::GetType(cert_handle); 229 x509_certificate_model::GetTokenName(cert_handle);
|