Searched refs:dns_names (Results 1 - 16 of 16) sorted by relevance

/external/chromium_org/chrome/browser/ssl/
H A Dssl_error_classification.cc248 std::vector<std::string> dns_names; local
249 cert_.GetDNSNames(&dns_names);
250 std::vector<Tokens> dns_name_tokens = GetTokenizedDNSNames(dns_names);
288 std::vector<std::string> dns_names; local
289 cert_.GetDNSNames(&dns_names);
290 std::vector<Tokens> dns_name_tokens = GetTokenizedDNSNames(dns_names);
390 GetTokenizedDNSNames(const std::vector<std::string>& dns_names) { argument
392 for (size_t i = 0; i < dns_names.size(); ++i) {
394 if (dns_names[i].empty() || dns_names[
434 std::vector<std::string> dns_names; local
499 std::vector<std::string> dns_names; local
526 std::vector<std::string> dns_names; local
[all...]
H A Dssl_error_info.cc41 std::vector<std::string> dns_names; local
42 cert->GetDNSNames(&dns_names);
43 DCHECK(!dns_names.empty());
45 for (; i < dns_names.size(); ++i) {
46 if (dns_names[i] == cert->subject().common_name)
49 if (i == dns_names.size())
55 UTF8ToUTF16(dns_names[i])));
H A Dssl_error_classification.h109 const std::vector<std::string>& dns_names);
/external/chromium_org/net/cert/
H A Dcert_verify_proc.cc226 std::vector<std::string> dns_names, ip_addrs; local
227 cert->GetSubjectAltName(&dns_names, &ip_addrs);
230 dns_names,
464 // CheckNameConstraints verifies that every name in |dns_names| is in one of
467 static bool CheckNameConstraints(const std::vector<std::string>& dns_names, argument
469 for (std::vector<std::string>::const_iterator i = dns_names.begin();
470 i != dns_names.end(); ++i) {
520 const std::vector<std::string>& dns_names,
598 if (dns_names.empty() && ip_addrs.empty()) {
599 std::vector<std::string> dns_names; local
517 HasNameConstraintsViolation( const HashValueVector& public_key_hashes, const std::string& common_name, const std::vector<std::string>& dns_names, const std::vector<std::string>& ip_addrs) argument
[all...]
H A Dx509_certificate_unittest.cc129 std::vector<std::string> dns_names; local
130 google_cert->GetDNSNames(&dns_names);
131 ASSERT_EQ(1U, dns_names.size());
132 EXPECT_EQ("www.google.com", dns_names[0]);
186 std::vector<std::string> dns_names; local
187 webkit_cert->GetDNSNames(&dns_names);
188 ASSERT_EQ(2U, dns_names.size());
189 EXPECT_EQ("*.webkit.org", dns_names[0]);
190 EXPECT_EQ("webkit.org", dns_names[1]);
242 std::vector<std::string> dns_names; local
461 std::vector<std::string> dns_names; local
906 const char* dns_names; member in struct:net::CertificateNameVerifyTestData
1075 std::vector<std::string> dns_names, ip_addressses; local
[all...]
H A Dx509_certificate_openssl.cc98 std::vector<std::string>* dns_names,
100 DCHECK(dns_names || ip_addresses);
113 if (name->type == GEN_DNS && dns_names) {
118 dns_names->push_back(
293 std::vector<std::string>* dns_names,
295 if (dns_names)
296 dns_names->clear();
300 ParseSubjectAltName(cert_handle_, dns_names, ip_addrs);
97 ParseSubjectAltName(X509Certificate::OSCertHandle cert, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addresses) argument
292 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
H A Dcert_verify_proc.h95 // imposed on it and the names in |dns_names| are not permitted.
99 const std::vector<std::string>& dns_names,
H A Dx509_certificate_ios.cc89 std::vector<std::string>* dns_names,
94 if (dns_names)
95 dns_names->clear();
100 x509_util::GetSubjectAltName(cert_handle, dns_names, ip_addrs);
88 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
H A Dx509_util_nss.h41 std::vector<std::string>* dns_names,
H A Dx509_certificate_mac.cc233 std::vector<std::string>* dns_names,
235 if (dns_names)
236 dns_names->clear();
261 if (dns_names && name_struct.nameType == GNT_DNSName) {
262 dns_names->push_back(std::string(
232 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
H A Dx509_certificate_win.cc169 std::vector<std::string>* dns_names,
171 if (dns_names)
172 dns_names->clear();
189 if (dns_names && entry.dwAltNameChoice == CERT_ALT_NAME_DNS_NAME) {
190 dns_names->push_back(base::UTF16ToASCII(entry.pwszDNSName));
168 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
H A Dx509_certificate.cc492 void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const {
493 GetSubjectAltName(dns_names, NULL);
494 if (dns_names->empty())
495 dns_names->push_back(subject_.common_name);
659 std::vector<std::string> dns_names, ip_addrs; local
660 GetSubjectAltName(&dns_names, &ip_addrs);
661 return VerifyHostname(hostname, subject_.common_name, dns_names, ip_addrs,
H A Dx509_certificate.h229 void GetDNSNames(std::vector<std::string>* dns_names) const;
235 void GetSubjectAltName(std::vector<std::string>* dns_names,
H A Dx509_certificate_nss.cc117 std::vector<std::string>* dns_names,
119 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs);
116 GetSubjectAltName( std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) const argument
H A Dx509_util_nss.cc448 std::vector<std::string>* dns_names,
450 if (dns_names)
451 dns_names->clear();
474 if (dns_names && name->type == certDNSName) {
475 dns_names->push_back(std::string(
447 GetSubjectAltName(CERTCertificate* cert_handle, std::vector<std::string>* dns_names, std::vector<std::string>* ip_addrs) argument
/external/chromium_org/net/quic/
H A Dquic_connection_logger.cc252 std::vector<std::string> dns_names; local
253 cert->GetDNSNames(&dns_names);
256 for (std::vector<std::string>::const_iterator it = dns_names.begin();
257 it != dns_names.end(); it++) {

Completed in 3739 milliseconds