/external/chromium_org/net/cert/ |
H A D | cert_verify_proc_android.cc | 29 // of its result), i.e. if |verify_result| was set. Otherwise returns false. 32 CertVerifyResult* verify_result) { 38 &status, &verify_result->is_issued_by_known_root, 46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID; 50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID; 53 verify_result->cert_status |= CERT_STATUS_INVALID; 56 verify_result->cert_status |= CERT_STATUS_INVALID; 60 verify_result->cert_status |= CERT_STATUS_INVALID; 73 verify_result->verified_cert = verified_cert; 79 verify_result 30 VerifyFromAndroidTrustManager(const std::vector<std::string>& cert_bytes, const std::string& hostname, CertVerifyResult* verify_result) argument 157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | mock_cert_verifier.cc | 43 CertVerifyResult* verify_result, 54 *verify_result = it->result; 59 verify_result->verified_cert = cert; 60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_); 69 const CertVerifyResult& verify_result, 71 AddResultForCertAndHost(cert, "*", verify_result, rv); 77 const CertVerifyResult& verify_result, 79 Rule rule(cert, host_pattern, verify_result, rv); 39 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument 68 AddResultForCert(X509Certificate* cert, const CertVerifyResult& verify_result, int rv) argument 74 AddResultForCertAndHost( X509Certificate* cert, const std::string& host_pattern, const CertVerifyResult& verify_result, int rv) argument
|
H A D | cert_verify_proc_unittest.cc | 51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root| 56 // |verify_result->is_issued_by_known_root| to |is_well_known|. 72 CertVerifyResult* verify_result) OVERRIDE; 85 CertVerifyResult* verify_result) { 86 verify_result->is_issued_by_known_root = is_well_known_; 129 CertVerifyResult* verify_result) { 131 additional_trust_anchors, verify_result); 152 CertVerifyResult verify_result; local 159 &verify_result)); 184 CertVerifyResult verify_result; local 79 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 124 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument 210 CertVerifyResult verify_result; local 262 CertVerifyResult verify_result; local 299 CertVerifyResult verify_result; local 323 CertVerifyResult verify_result; local 397 CertVerifyResult verify_result; local 456 CertVerifyResult verify_result; local 495 CertVerifyResult verify_result; local 571 CertVerifyResult verify_result; local 606 CertVerifyResult verify_result; local 637 CertVerifyResult verify_result; local 670 CertVerifyResult verify_result; local 722 CertVerifyResult verify_result; local 776 CertVerifyResult verify_result; local 818 CertVerifyResult verify_result; local 866 CertVerifyResult verify_result; local 927 CertVerifyResult verify_result; local 975 CertVerifyResult verify_result; local 1017 CertVerifyResult verify_result; local 1071 CertVerifyResult verify_result; local 1169 CertVerifyResult verify_result; local 1235 CertVerifyResult verify_result; local 1324 CertVerifyResult verify_result; local 1562 CertVerifyResult verify_result; local [all...] |
H A D | mock_cert_verifier.h | 32 CertVerifyResult* verify_result, 45 // copying |verify_result| into the verified result. 49 const CertVerifyResult& verify_result, 56 const CertVerifyResult& verify_result,
|
H A D | cert_verify_proc_nss.h | 34 CertVerifyResult* verify_result); 42 CertVerifyResult* verify_result) OVERRIDE;
|
H A D | cert_verify_proc_android.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
H A D | cert_verify_proc_mac.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
H A D | cert_verify_proc_openssl.cc | 100 CertVerifyResult* verify_result) { 117 verify_result->has_md2 = true; 119 verify_result->has_md4 = true; 122 verify_result->has_md5 = true; 127 verify_result->has_sha1 = true; 132 // Set verify_result->verified_cert and 133 // verify_result->is_issued_by_known_root. 135 verify_result->verified_cert = 142 verify_result->is_issued_by_known_root = true; 152 verify_result 99 GetCertChainInfo(X509_STORE_CTX* store_ctx, CertVerifyResult* verify_result) argument 193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verify_proc_openssl.h | 28 CertVerifyResult* verify_result) OVERRIDE;
|
H A D | cert_verify_proc_win.h | 29 CertVerifyResult* verify_result) OVERRIDE;
|
H A D | multi_threaded_cert_verifier.cc | 83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, argument 86 results->SetBoolean("has_md5", verify_result.has_md5); 87 results->SetBoolean("has_md2", verify_result.has_md2); 88 results->SetBoolean("has_md4", verify_result.has_md4); 90 verify_result.is_issued_by_known_root); 92 verify_result.is_issued_by_additional_trust_anchor); 94 verify_result.common_name_fallback_used); 95 results->SetInteger("cert_status", verify_result.cert_status); 97 NetLogX509CertificateCallback(verify_result.verified_cert.get(), 102 verify_result 170 CertVerifierRequest(const CompletionCallback& callback, CertVerifyResult* verify_result, const BoundNetLog& net_log) argument 192 Post(const MultiThreadedCertVerifier::CachedResult& verify_result) argument 381 HandleResult( const MultiThreadedCertVerifier::CachedResult& verify_result, bool is_first_job) argument 405 PostAll(const MultiThreadedCertVerifier::CachedResult& verify_result) argument 456 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument 573 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument [all...] |
H A D | cert_verify_proc_win.cc | 290 // |*verify_result|. The caller MUST initialize |*verify_result| before 293 CertVerifyResult* verify_result) { 330 verify_result->has_md5 = true; 333 verify_result->has_md2 = true; 336 verify_result->has_md4 = true; 343 verify_result->has_sha1 = true; 351 verify_result->verified_cert = 568 CertVerifyResult* verify_result) { 619 verify_result 292 GetCertChainInfo(PCCERT_CHAIN_CONTEXT chain_context, CertVerifyResult* verify_result) argument 562 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | single_request_cert_verifier.h | 25 // Verifies the given certificate, filling out the |verify_result| object 31 CertVerifyResult* verify_result,
|
H A D | cert_verify_proc_mac.cc | 179 // |*verify_result|. The caller MUST initialize |*verify_result| before 183 CertVerifyResult* verify_result) { 225 verify_result->has_md2 = true; 227 verify_result->has_md4 = true; 229 verify_result->has_md5 = true; 236 verify_result->has_sha1 = true; 242 verify_result->verified_cert = 539 CertVerifyResult* verify_result) { 574 verify_result 181 GetCertChainInfo(CFArrayRef cert_chain, CSSM_TP_APPLE_EVIDENCE_INFO* chain_info, CertVerifyResult* verify_result) argument 533 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | multi_threaded_cert_verifier_unittest.cc | 51 CertVerifyResult* verify_result) OVERRIDE { 52 verify_result->Reset(); 53 verify_result->verified_cert = cert; 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; 85 CertVerifyResult verify_result; local 93 &verify_result, 110 &verify_result, 155 CertVerifyResult verify_result; local 163 &verify_result, 180 &verify_result, 202 CertVerifyResult verify_result; local 246 CertVerifyResult verify_result; local 295 CertVerifyResult verify_result; local [all...] |
H A D | cert_verify_proc.cc | 193 CertVerifyResult* verify_result) { 194 verify_result->Reset(); 195 verify_result->verified_cert = cert; 198 verify_result->cert_status |= CERT_STATUS_REVOKED; 210 additional_trust_anchors, verify_result); 213 verify_result->common_name_fallback_used); 214 if (!verify_result->is_issued_by_known_root) { 216 verify_result->common_name_fallback_used); 221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) { 222 verify_result 188 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
H A D | cert_verifier.h | 78 // The |*verify_result| structure, including the |verify_result->cert_status| 81 // |verify_result->cert_status|, and the error code for the most serious 108 CertVerifyResult* verify_result,
|
H A D | cert_verify_proc.h | 35 // The |*verify_result| structure, including the |verify_result->cert_status| 38 // |verify_result->cert_status|, and the error code for the most serious 62 CertVerifyResult* verify_result); 84 CertVerifyResult* verify_result) = 0;
|
H A D | single_request_cert_verifier.cc | 32 CertVerifyResult* verify_result, 43 cert, hostname, flags, crl_set, verify_result, 28 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, const BoundNetLog& net_log) argument
|
H A D | nss_cert_database_unittest.cc | 559 CertVerifyResult verify_result; local 565 &verify_result); 567 EXPECT_EQ(0U, verify_result.cert_status); 590 CertVerifyResult verify_result; local 596 &verify_result); 598 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status); 622 CertVerifyResult verify_result; local 628 &verify_result); 630 EXPECT_EQ(0U, verify_result.cert_status); 658 CertVerifyResult verify_result; local 700 CertVerifyResult verify_result; local 748 CertVerifyResult verify_result; local 824 CertVerifyResult verify_result; local 894 CertVerifyResult verify_result; local 958 CertVerifyResult verify_result; local [all...] |
H A D | cert_verify_proc_nss.cc | 151 // *verify_result. The caller MUST initialize *verify_result before calling 156 CertVerifyResult* verify_result) { 198 verify_result->has_md5 = true; 201 verify_result->has_md2 = true; 204 verify_result->has_md4 = true; 210 verify_result->has_sha1 = true; 220 verify_result->verified_cert = 223 verify_result->verified_cert = 774 CertVerifyResult* verify_result) { 154 GetCertChainInfo(CERTCertList* cert_list, CERTCertificate* root_cert, CertVerifyResult* verify_result) argument 767 VerifyInternalImpl( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CertVerifyResult* verify_result) argument 928 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_verifier.cc | 20 const net::CertVerifyResult& verify_result) { 22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor || 32 const net::CertVerifyResult* verify_result, 35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result); 76 net::CertVerifyResult* verify_result, 86 verify_result); 87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result, 89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result); 18 MaybeSignalAnchorUse(int error, const base::Closure& anchor_used_callback, const net::CertVerifyResult& verify_result) argument 29 CompleteAndSignalAnchorUse( const base::Closure& anchor_used_callback, const net::CompletionCallback& completion_callback, const net::CertVerifyResult* verify_result, int error) argument 71 Verify( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, net::CertVerifyResult* verify_result, const net::CompletionCallback& completion_callback, RequestHandle* out_req, const net::BoundNetLog& net_log) argument
|
H A D | policy_cert_verifier_browsertest.cc | 68 net::CertVerifyResult* verify_result, 74 verify_result, 129 net::CertVerifyResult verify_result; local 132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 142 net::CertVerifyResult verify_result; local 145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 165 net::CertVerifyResult verify_result; local 168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); 184 net::CertVerifyResult verify_result; local 187 int error = VerifyTestServerCert(callback, &verify_result, 67 VerifyTestServerCert(const net::TestCompletionCallback& test_callback, net::CertVerifyResult* verify_result, net::CertVerifier::RequestHandle* request_handle) argument 198 net::CertVerifyResult verify_result; local 212 net::CertVerifyResult verify_result; local 223 net::CertVerifyResult verify_result; local [all...] |
/external/chromium_org/chrome/browser/chromeos/net/ |
H A D | cert_verify_proc_chromeos.h | 41 net::CertVerifyResult* verify_result) OVERRIDE;
|
H A D | cert_verify_proc_chromeos.cc | 46 net::CertVerifyResult* verify_result) { 61 verify_result); 40 VerifyInternal( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, const net::CertificateList& additional_trust_anchors, net::CertVerifyResult* verify_result) argument
|