/external/chromium_org/net/cert/ |
H A D | cert_status_flags.cc | 12 bool IsCertStatusMinorError(CertStatus cert_status) { argument 16 cert_status &= CERT_STATUS_ALL_ERRORS; 17 return cert_status != 0 && (cert_status & ~kMinorErrors) == 0; 57 int MapCertStatusToNetError(CertStatus cert_status) { argument 62 if (cert_status & CERT_STATUS_REVOKED) 64 if (cert_status & CERT_STATUS_INVALID) 66 if (cert_status & CERT_STATUS_PINNED_KEY_MISSING) 70 if (cert_status & CERT_STATUS_AUTHORITY_INVALID) 72 if (cert_status [all...] |
H A D | cert_verify_result.cc | 20 cert_status = 0;
|
H A D | cert_status_flags.h | 32 // IsCertStatusMinorError returns true iff |cert_status| indicates a condition 35 NET_EXPORT bool IsCertStatusMinorError(CertStatus cert_status); 43 NET_EXPORT int MapCertStatusToNetError(CertStatus cert_status);
|
H A D | cert_verify_proc_android.cc | 46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 53 verify_result->cert_status |= CERT_STATUS_INVALID; 56 verify_result->cert_status |= CERT_STATUS_INVALID; 60 verify_result->cert_status |= CERT_STATUS_INVALID; 166 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 176 if (IsCertStatusError(verify_result->cert_status)) 177 return MapCertStatusToNetError(verify_result->cert_status);
|
H A D | cert_verify_result.h | 44 CertStatus cert_status; member in class:net::CertVerifyResult
|
H A D | cert_verify_proc_win.cc | 116 CertStatus cert_status = 0; local 123 cert_status |= CERT_STATUS_DATE_INVALID; 129 cert_status |= CERT_STATUS_AUTHORITY_INVALID; 133 cert_status |= CERT_STATUS_NO_REVOCATION_MECHANISM; 136 cert_status |= CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; 139 cert_status |= CERT_STATUS_REVOKED; 145 cert_status |= CERT_STATUS_INVALID; 157 cert_status |= CERT_STATUS_WEAK_KEY; 159 cert_status |= CERT_STATUS_INVALID; 178 cert_status | [all...] |
H A D | cert_verify_proc_mac.cc | 574 verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; 577 verify_result->cert_status |= CERT_STATUS_REVOKED; 602 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 613 verify_result->cert_status |= CertStatusFromOSStatus(cssm_result); 621 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 622 if (!IsCertStatusError(verify_result->cert_status) && 652 verify_result->cert_status |= mapped_status; 658 verify_result->cert_status |= CertStatusFromOSStatus(cssm_result); 660 if (!IsCertStatusError(verify_result->cert_status)) { 662 verify_result->cert_status | [all...] |
H A D | test_root_certs_unittest.cc | 99 EXPECT_NE(0u, bad_verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID); 116 EXPECT_EQ(0u, good_verify_result.cert_status); 133 restored_verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID); 135 EXPECT_EQ(bad_verify_result.cert_status, restored_verify_result.cert_status);
|
H A D | cert_verify_proc_openssl.cc | 204 verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID; 230 CertStatus cert_status = MapCertErrorToCertStatus(x509_error); local 235 << " : " << cert_status; 236 verify_result->cert_status |= cert_status; 241 if (IsCertStatusError(verify_result->cert_status)) 242 return MapCertStatusToNetError(verify_result->cert_status);
|
H A D | cert_verify_proc_unittest.cc | 193 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV); 228 EXPECT_TRUE(verify_result.cert_status & 270 EXPECT_EQ(0u, verify_result.cert_status); 309 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV); 408 verify_result.cert_status & CERT_STATUS_WEAK_KEY); 410 verify_result.cert_status & CERT_STATUS_INVALID); 413 EXPECT_EQ(0U, verify_result.cert_status & CERT_STATUS_WEAK_KEY); 579 EXPECT_EQ(0U, verify_result.cert_status); 615 verify_result.cert_status & CERT_STATUS_NAME_CONSTRAINT_VIOLATION); 647 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); [all...] |
H A D | cert_verify_proc.cc | 198 verify_result->cert_status |= CERT_STATUS_REVOKED; 222 verify_result->cert_status |= CERT_STATUS_REVOKED; 223 rv = MapCertStatusToNetError(verify_result->cert_status); 232 verify_result->cert_status |= CERT_STATUS_NAME_CONSTRAINT_VIOLATION; 233 rv = MapCertStatusToNetError(verify_result->cert_status); 241 verify_result->cert_status |= CERT_STATUS_WEAK_KEY; 246 rv = MapCertStatusToNetError(verify_result->cert_status); 251 verify_result->cert_status |= CERT_STATUS_INVALID; 252 rv = MapCertStatusToNetError(verify_result->cert_status); 257 verify_result->cert_status | [all...] |
/external/chromium_org/content/public/browser/ |
H A D | load_from_memory_cache_details.cc | 13 net::CertStatus cert_status, 20 cert_status(cert_status), 9 LoadFromMemoryCacheDetails( const GURL& url, int pid, int cert_id, net::CertStatus cert_status, const std::string& http_method, const std::string& mime_type, ResourceType resource_type) argument
|
H A D | load_from_memory_cache_details.h | 20 net::CertStatus cert_status, 29 net::CertStatus cert_status; member in struct:content::LoadFromMemoryCacheDetails
|
H A D | resource_request_details.cc | 23 ssl_cert_status(request->ssl_info().cert_status),
|
/external/chromium_org/content/public/common/ |
H A D | ssl_status.cc | 12 cert_status(0),
|
H A D | ssl_status.h | 38 cert_status == status.cert_status && 47 net::CertStatus cert_status; member in struct:content::SSLStatus
|
/external/chromium_org/content/common/ |
H A D | ssl_status_serialization.h | 19 net::CertStatus cert_status, 28 net::CertStatus* cert_status,
|
H A D | ssl_status_serialization.cc | 14 net::CertStatus cert_status, 21 pickle.WriteUInt32(cert_status); 37 net::CertStatus* cert_status, 41 DCHECK(cert_id && cert_status && security_bits && ssl_connection_status && 47 *cert_status = 0; 58 !pickle.ReadUInt32(&iter, cert_status) || 12 SerializeSecurityInfo( int cert_id, net::CertStatus cert_status, int security_bits, int ssl_connection_status, const SignedCertificateTimestampIDStatusList& signed_certificate_timestamp_ids) argument 34 DeserializeSecurityInfo( const std::string& state, int* cert_id, net::CertStatus* cert_status, int* security_bits, int* ssl_connection_status, SignedCertificateTimestampIDStatusList* signed_certificate_timestamp_ids) argument
|
/external/chromium_org/net/ssl/ |
H A D | ssl_config.cc | 30 SSLConfig::CertAndStatus::CertAndStatus() : cert_status(0) {} 53 CertStatus* cert_status) const { 57 return IsAllowedBadCert(der_cert, cert_status); 61 CertStatus* cert_status) const { 64 if (cert_status) 65 *cert_status = allowed_bad_certs[i].cert_status;
|
H A D | ssl_info.cc | 27 cert_status = info.cert_status; 43 cert_status = 0; 56 cert_status |= MapNetErrorToCertStatus(error);
|
H A D | ssl_config.h | 46 // The expected cert status is written to |cert_status|. |*cert_status| can 48 bool IsAllowedBadCert(X509Certificate* cert, CertStatus* cert_status) const; 53 CertStatus* cert_status) const; 127 CertStatus cert_status; member in struct:net::SSLConfig::CertAndStatus
|
H A D | ssl_info.h | 54 CertStatus cert_status; member in class:net::SSLInfo
|
/external/chromium_org/content/browser/ssl/ |
H A D | ssl_cert_error_handler.cc | 30 cert_error_(net::MapCertStatusToNetError(ssl_info.cert_status)), 42 if (net::IsCertStatusMinorError(ssl_info().cert_status)) {
|
H A D | ssl_manager.cc | 61 << net::MapCertStatusToNetError(ssl_info.cert_status) << " id: " 65 << " cert_status: " << std::hex << ssl_info.cert_status; 140 entry->GetSSL().cert_status = ssl_cert_status; 177 details.cert_status));
|
/external/chromium_org/chrome/browser/ssl/ |
H A D | ssl_error_info.h | 52 // |cert_status|. Returns the number of errors found. 56 net::CertStatus cert_status,
|