Searched refs:cert_handle (Results 1 - 25 of 27) sorted by relevance

12

/external/chromium_org/chrome/common/net/
H A Dx509_certificate_model_nss.cc72 std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle) { argument
74 if (cert_handle->nickname) {
75 name = cert_handle->nickname;
110 string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { argument
112 Stringize(CERT_GetCommonName(&cert_handle->subject), std::string()));
115 return GetNickname(cert_handle);
118 string GetTokenName(X509Certificate::OSCertHandle cert_handle) { argument
119 return psm::GetCertTokenName(cert_handle);
122 string GetVersion(X509Certificate::OSCertHandle cert_handle) { argument
126 if (cert_handle
133 GetType(X509Certificate::OSCertHandle cert_handle) argument
137 GetUsageStrings(X509Certificate::OSCertHandle cert_handle, std::vector<string>* usages) argument
142 GetSerialNumberHexified(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
148 GetIssuerCommonName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
153 GetIssuerOrgName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
158 GetIssuerOrgUnitName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
163 GetSubjectOrgName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
168 GetSubjectOrgUnitName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
174 GetSubjectCommonName(X509Certificate::OSCertHandle cert_handle, const string& alternative_text) argument
179 GetTimes(X509Certificate::OSCertHandle cert_handle, base::Time* issued, base::Time* expires) argument
190 GetTitle(X509Certificate::OSCertHandle cert_handle) argument
194 GetIssuerName(X509Certificate::OSCertHandle cert_handle) argument
198 GetSubjectName(X509Certificate::OSCertHandle cert_handle) argument
202 GetExtensions( const string& critical_label, const string& non_critical_label, X509Certificate::OSCertHandle cert_handle, Extensions* extensions) argument
218 HashCertSHA256(X509Certificate::OSCertHandle cert_handle) argument
222 HashCertSHA1(X509Certificate::OSCertHandle cert_handle) argument
277 ProcessSecAlgorithmSignature(X509Certificate::OSCertHandle cert_handle) argument
281 ProcessSecAlgorithmSubjectPublicKey( X509Certificate::OSCertHandle cert_handle) argument
287 ProcessSecAlgorithmSignatureWrap( X509Certificate::OSCertHandle cert_handle) argument
293 ProcessSubjectPublicKeyInfo(X509Certificate::OSCertHandle cert_handle) argument
297 ProcessRawBitsSignatureWrap(X509Certificate::OSCertHandle cert_handle) argument
[all...]
H A Dx509_certificate_model.h19 net::X509Certificate::OSCertHandle cert_handle);
21 std::string GetTokenName(net::X509Certificate::OSCertHandle cert_handle);
23 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle);
25 net::CertType GetType(net::X509Certificate::OSCertHandle cert_handle);
28 net::X509Certificate::OSCertHandle cert_handle,
32 net::X509Certificate::OSCertHandle cert_handle,
36 net::X509Certificate::OSCertHandle cert_handle,
40 net::X509Certificate::OSCertHandle cert_handle,
44 net::X509Certificate::OSCertHandle cert_handle,
48 net::X509Certificate::OSCertHandle cert_handle,
[all...]
H A Dx509_certificate_model_openssl.cc969 std::string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) { argument
971 ProcessIDN(GetSubjectCommonName(cert_handle, std::string()));
979 X509_get_subject_name(cert_handle),
985 std::string GetTokenName(X509Certificate::OSCertHandle cert_handle) { argument
990 std::string GetVersion(net::X509Certificate::OSCertHandle cert_handle) { argument
991 unsigned long version = X509_get_version(cert_handle);
1002 void GetUsageStrings(X509Certificate::OSCertHandle cert_handle, argument
1008 X509Certificate::OSCertHandle cert_handle,
1010 ASN1_INTEGER* num = X509_get_serialNumber(cert_handle);
1018 X509Certificate::OSCertHandle cert_handle,
1007 GetSerialNumberHexified( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1017 GetIssuerCommonName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1026 GetIssuerOrgName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1035 GetIssuerOrgUnitName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1044 GetSubjectOrgName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1053 GetSubjectOrgUnitName( X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1062 GetSubjectCommonName(X509Certificate::OSCertHandle cert_handle, const std::string& alternative_text) argument
1070 GetTimes(X509Certificate::OSCertHandle cert_handle, base::Time* issued, base::Time* expires) argument
1076 GetTitle(net::X509Certificate::OSCertHandle cert_handle) argument
1095 GetIssuerName(net::X509Certificate::OSCertHandle cert_handle) argument
1099 GetSubjectName(net::X509Certificate::OSCertHandle cert_handle) argument
1103 GetExtensions( const std::string& critical_label, const std::string& non_critical_label, net::X509Certificate::OSCertHandle cert_handle, Extensions* extensions) argument
1121 HashCertSHA256(net::X509Certificate::OSCertHandle cert_handle) argument
1130 HashCertSHA1(net::X509Certificate::OSCertHandle cert_handle) argument
1166 ProcessSecAlgorithmSignature( net::X509Certificate::OSCertHandle cert_handle) argument
1171 ProcessSecAlgorithmSubjectPublicKey( net::X509Certificate::OSCertHandle cert_handle) argument
1177 ProcessSecAlgorithmSignatureWrap( net::X509Certificate::OSCertHandle cert_handle) argument
1182 ProcessSubjectPublicKeyInfo( net::X509Certificate::OSCertHandle cert_handle) argument
1209 ProcessRawBitsSignatureWrap( net::X509Certificate::OSCertHandle cert_handle) argument
[all...]
/external/chromium_org/net/cert/
H A Dx509_util_ios.h27 CERTCertificate* CreateNSSCertHandleFromOSHandle(SecCertificateRef cert_handle);
39 CERTCertificate* cert_handle,
45 // The constructor copies the certificate data from |cert_handle| and
49 explicit NSSCertificate(SecCertificateRef cert_handle);
51 CERTCertificate* cert_handle() const;
63 CERTCertificate* cert_handle() const;
H A Dx509_certificate_ios.cc43 // Returns true if a given |cert_handle| is actually a valid X.509 certificate
52 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { argument
54 SecCertificateCopySubjectSummary(cert_handle));
61 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
62 if (cert_handle) {
63 x509_util::ParsePrincipal(&cert_handle->subject, &subject_);
64 x509_util::ParsePrincipal(&cert_handle->issuer, &issuer_);
65 x509_util::ParseDate(&cert_handle->validity.notBefore, &valid_start_);
66 x509_util::ParseDate(&cert_handle
92 CERTCertificate* cert_handle = nss_cert.cert_handle(); local
104 GetDEREncoded(OSCertHandle cert_handle, std::string* encoded) argument
167 FreeOSCertHandle(OSCertHandle cert_handle) argument
218 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument
230 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument
[all...]
H A Dx509_util_ios.cc49 SecCertificateRef cert_handle) {
50 ScopedCFTypeRef<CFDataRef> cert_data(SecCertificateCopyData(cert_handle));
64 CERTCertificate* cert_handle,
67 CreateOSCertHandleFromNSSHandle(cert_handle));
101 NSSCertificate::NSSCertificate(SecCertificateRef cert_handle) { argument
102 nss_cert_handle_ = CreateNSSCertHandleFromOSHandle(cert_handle);
103 DLOG_IF(INFO, cert_handle && !nss_cert_handle_)
111 CERTCertificate* NSSCertificate::cert_handle() const { function in class:net::x509_util_ios::NSSCertificate
132 CERTCertificate* NSSCertChain::cert_handle() const { function in class:net::x509_util_ios::NSSCertChain
48 CreateNSSCertHandleFromOSHandle( SecCertificateRef cert_handle) argument
63 CreateCertFromNSSHandles( CERTCertificate* cert_handle, const std::vector<CERTCertificate*>& intermediates) argument
H A Dtest_root_certs_nss.cc57 CERTCertificate* cert_handle = nss_certificate.cert_handle(); local
59 CERTCertificate* cert_handle = certificate->os_cert_handle();
64 SECStatus rv = CERT_GetCertTrust(cert_handle, &original_trust);
83 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert_handle, &new_trust);
89 trust_cache_.push_back(new TrustEntry(cert_handle, original_trust));
H A Dx509_certificate_nss.cc46 OSCertHandle cert_handle = CreateOSCertHandleFromBytesWithNickname(data, local
49 if (!cert_handle)
52 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles());
53 FreeOSCertHandle(cert_handle);
142 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument
144 if (!cert_handle || !cert_handle->derCert.len)
146 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data),
147 cert_handle->derCert.len);
202 OSCertHandle cert_handle) {
201 DupOSCertHandle( OSCertHandle cert_handle) argument
207 FreeOSCertHandle(OSCertHandle cert_handle) argument
255 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument
263 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument
[all...]
H A Dx509_certificate.cc65 // for the same certificate data as |*cert_handle| already exists in the
66 // cache, the original |*cert_handle| will be freed and |cert_handle|
70 // reference to |*cert_handle| will be added to the cache. In either case,
71 // upon return, the caller fully owns |*cert_handle| and is responsible for
73 void InsertOrUpdate(X509Certificate::OSCertHandle* cert_handle);
75 // Decrements the cache reference count for |cert_handle|, a handle that was
78 // caller retains ownership of |cert_handle| and remains responsible for
80 void Remove(X509Certificate::OSCertHandle cert_handle);
87 Entry() : cert_handle(NUL
89 X509Certificate::OSCertHandle cert_handle; member in struct:net::__anon9108::X509CertificateCache::Entry
117 InsertOrUpdate( X509Certificate::OSCertHandle* cert_handle) argument
167 Remove(X509Certificate::OSCertHandle cert_handle) argument
193 InsertOrUpdateCache(X509Certificate::OSCertHandle* cert_handle) argument
200 RemoveFromCache(X509Certificate::OSCertHandle cert_handle) argument
255 CreateFromHandle( OSCertHandle cert_handle, const OSCertHandles& intermediates) argument
299 OSCertHandle cert_handle = CreateOSCertHandleFromBytes(data, length); local
331 OSCertHandle cert_handle = ReadOSCertHandleFromPickle(pickle_iter); local
688 GetPEMEncoded(OSCertHandle cert_handle, std::string* pem_encoded) argument
743 X509Certificate(OSCertHandle cert_handle, const OSCertHandles& intermediates) argument
[all...]
H A Dx509_certificate_win.cc236 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument
238 if (!cert_handle || !cert_handle->pbCertEncoded ||
239 !cert_handle->cbCertEncoded) {
242 encoded->assign(reinterpret_cast<char*>(cert_handle->pbCertEncoded),
243 cert_handle->cbCertEncoded);
260 OSCertHandle cert_handle = NULL; local
263 length, CERT_STORE_ADD_USE_EXISTING, &cert_handle))
266 return cert_handle;
292 OSCertHandle cert_handle) {
291 DupOSCertHandle( OSCertHandle cert_handle) argument
297 FreeOSCertHandle(OSCertHandle cert_handle) argument
381 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument
389 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument
[all...]
H A Dx509_certificate_mac.cc46 bool IsCertIssuerInEncodedList(X509Certificate::OSCertHandle cert_handle, argument
49 if (cached_cert.Init(cert_handle) != CSSM_OK)
126 // Test that a given |cert_handle| is actually a valid X.509 certificate, and
137 bool IsValidOSCertHandle(SecCertificateRef cert_handle) { argument
139 OSStatus status = SecCertificateGetSubject(cert_handle, &sanity_check);
274 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument
277 if (!cert_handle || SecCertificateGetData(cert_handle, &der_data) != noErr)
306 OSCertHandle cert_handle = NULL; local
310 &cert_handle);
352 FreeOSCertHandle(OSCertHandle cert_handle) argument
460 WriteOSCertHandleToPickle(OSCertHandle cert_handle, Pickle* pickle) argument
472 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument
[all...]
H A Dx509_certificate.h142 static X509Certificate* CreateFromHandle(OSCertHandle cert_handle,
322 // Obtains the DER encoded certificate data for |cert_handle|. On success,
324 static bool GetDEREncoded(OSCertHandle cert_handle,
335 static bool GetPEMEncoded(OSCertHandle cert_handle,
348 static void GetPublicKeyInfo(OSCertHandle cert_handle,
385 static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle);
388 static void FreeOSCertHandle(OSCertHandle cert_handle);
396 static SHA1HashValue CalculateFingerprint(OSCertHandle cert_handle);
433 X509Certificate(OSCertHandle cert_handle,
H A Dx509_certificate_openssl.cc178 OSCertHandle cert_handle) {
179 DCHECK(cert_handle);
180 return X509_up_ref(cert_handle);
184 void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) { argument
188 X509_free(cert_handle);
309 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, argument
312 if (!cert_handle || !x509_util::GetDER(cert_handle, &der))
347 bool X509Certificate::WriteOSCertHandleToPickle(OSCertHandle cert_handle, argument
350 if (!x509_util::GetDER(cert_handle,
177 DupOSCertHandle( OSCertHandle cert_handle) argument
357 GetPublicKeyInfo(OSCertHandle cert_handle, size_t* size_bits, PublicKeyType* type) argument
[all...]
H A Dcert_verify_proc_nss.cc347 CERTCertificate* cert_handle, int num_policy_oids,
350 SECOidTag GetFirstCertPolicy(CERTCertificate* cert_handle);
352 // Call CERT_PKIXVerifyCert for the cert_handle.
365 SECStatus PKIXVerifyCert(CERTCertificate* cert_handle, argument
470 SECStatus rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
473 rv = RetryPKIXVerifyCertWithWorkarounds(cert_handle, num_policy_oids,
483 CERTCertificate* cert_handle, int num_policy_oids,
511 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServer,
537 SECOidTag policy = GetFirstCertPolicy(cert_handle);
547 rv = CERT_PKIXVerifyCert(cert_handle, certificateUsageSSLServe
482 RetryPKIXVerifyCertWithWorkarounds( CERTCertificate* cert_handle, int num_policy_oids, bool cert_io_enabled, std::vector<CERTValInParam>* cvin, CERTValOutParam* cvout) argument
563 DecodeCertPolicies( CERTCertificate* cert_handle) argument
580 GetFirstCertPolicy(CERTCertificate* cert_handle) argument
650 IsEVCandidate(EVRootCAMetadata* metadata, CERTCertificate* cert_handle, SECOidTag* ev_policy_oid) argument
681 VerifyEV(CERTCertificate* cert_handle, int flags, CRLSet* crl_set, bool rev_checking_enabled, EVRootCAMetadata* metadata, SECOidTag ev_policy_oid, CERTCertList* additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback) argument
779 CERTCertificate* cert_handle = scoped_chain.cert_handle(); local
[all...]
H A Dcert_verify_proc_android.cc127 X509Certificate::OSCertHandle cert_handle = cert->os_cert_handle(); local
133 if (cert_handles.empty() || cert_handles[0] != cert_handle)
134 cert_handles.insert(cert_handles.begin(), cert_handle);
H A Dx509_util_nss.h40 void GetSubjectAltName(CERTCertificate* cert_handle,
H A Dx509_util_nss.cc313 void* cert_handle; local
314 if ((cert_handle = CERT_StartCertExtensions(cert)) == NULL) {
340 cert_handle,
351 if (CERT_FinishExtensions(cert_handle) != SECSuccess){
447 void GetSubjectAltName(CERTCertificate* cert_handle, argument
456 SECStatus rv = CERT_FindCertExtension(cert_handle,
H A Dct_objects_extractor_nss.cc37 explicit NSSCertWrapper(X509Certificate::OSCertHandle cert_handle);
43 NSSCertWrapper::NSSCertWrapper(X509Certificate::OSCertHandle cert_handle) { argument
45 cert.reset(CERT_DupCertificate(cert_handle));
49 if (!X509Certificate::GetDEREncoded(cert_handle, &der_data))
H A Dcert_verify_proc_win.cc569 PCCERT_CONTEXT cert_handle = cert->os_cert_handle(); local
570 if (!cert_handle)
595 GetCertPoliciesInfo(cert_handle, &policies_info);
741 if (CertSubjectCommonNameHasNull(cert_handle))
/external/chromium_org/net/http/
H A Ddisk_based_cert_cache.h28 typedef base::Callback<void(const X509Certificate::OSCertHandle cert_handle)>
44 // Stores |cert_handle| in the cache. If |cert_handle| is successfully stored,
46 // string, then |cert_handle| was not stored.
47 void SetCertificate(const X509Certificate::OSCertHandle cert_handle,
66 void operator()(X509Certificate::OSCertHandle cert_handle);
84 X509Certificate::OSCertHandle cert_handle);
86 X509Certificate::OSCertHandle cert_handle);
H A Ddisk_based_cert_cache.cc29 const X509Certificate::OSCertHandle cert_handle) {
31 X509Certificate::CalculateFingerprint(cert_handle);
64 X509Certificate::OSCertHandle cert_handle,
126 X509Certificate::OSCertHandle cert_handle,
129 cert_handle_(X509Certificate::DupOSCertHandle(cert_handle)),
497 X509Certificate::OSCertHandle cert_handle) {
498 X509Certificate::FreeOSCertHandle(cert_handle);
528 // Note, this will also bring the cert_handle to the front of the recency
557 const X509Certificate::OSCertHandle cert_handle,
560 DCHECK(cert_handle);
28 GetCacheKeyForCert( const X509Certificate::OSCertHandle cert_handle) argument
123 WriteWorker( disk_cache::Backend* backend, const std::string& key, X509Certificate::OSCertHandle cert_handle, const base::Closure& cleanup_callback) argument
496 operator ()( X509Certificate::OSCertHandle cert_handle) argument
556 SetCertificate( const X509Certificate::OSCertHandle cert_handle, const SetCallback& cb) argument
582 FinishedReadOperation( const std::string& key, X509Certificate::OSCertHandle cert_handle) argument
590 FinishedWriteOperation( const std::string& key, X509Certificate::OSCertHandle cert_handle) argument
[all...]
H A Ddisk_based_cert_cache_unittest.cc76 const X509Certificate::OSCertHandle& cert_handle() const { function in class:net::__anon9248::TestGetCallback
221 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
259 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
275 EXPECT_FALSE(get_callback.cert_handle());
289 EXPECT_EQ(NULL, get_callback.cert_handle());
361 EXPECT_TRUE(X509Certificate::IsSameOSCert(get_callback.cert_handle(),
404 get_callback1.cert_handle()));
406 get_callback2.cert_handle()));
431 EXPECT_EQ(NULL, get_callback.cert_handle());
459 get_callback.cert_handle()));
[all...]
/external/chromium_org/net/ssl/
H A Dclient_cert_store_mac.cc38 OSStatus CopyCertChain(SecCertificateRef cert_handle, argument
40 DCHECK(cert_handle);
52 NULL, const_cast<const void**>(reinterpret_cast<void**>(&cert_handle)),
89 X509Certificate::OSCertHandle cert_handle = (*cert)->os_cert_handle(); local
91 OSStatus result = CopyCertChain(cert_handle, &cert_chain);
109 cert_handle, intermediates));
228 SecCertificateRef cert_handle; local
229 err = SecIdentityCopyCertificate(identity, &cert_handle);
232 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
235 X509Certificate::CreateFromHandle(cert_handle,
[all...]
/external/chromium_org/chromeos/
H A Dcert_loader.cc123 CERTCertificateStr* cert_handle = cert.os_cert_handle(); local
125 PK11_FindKeyByAnyCert(cert_handle, NULL /* wincx */);
/external/chromium_org/chrome/browser/chromeos/options/
H A Dcert_library.cc216 net::X509Certificate::OSCertHandle cert_handle = local
218 net::CertType type = x509_certificate_model::GetType(cert_handle);
229 x509_certificate_model::GetTokenName(cert_handle);

Completed in 326 milliseconds

12