Searched refs:verify_result (Results 1 - 25 of 53) sorted by relevance

123

/external/chromium_org/net/cert/
H A Dcert_verify_proc_android.cc29 // of its result), i.e. if |verify_result| was set. Otherwise returns false.
32 CertVerifyResult* verify_result) {
38 &status, &verify_result->is_issued_by_known_root,
46 verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
50 verify_result->cert_status |= CERT_STATUS_DATE_INVALID;
53 verify_result->cert_status |= CERT_STATUS_INVALID;
56 verify_result->cert_status |= CERT_STATUS_INVALID;
60 verify_result->cert_status |= CERT_STATUS_INVALID;
73 verify_result->verified_cert = verified_cert;
79 verify_result
30 VerifyFromAndroidTrustManager(const std::vector<std::string>& cert_bytes, const std::string& hostname, CertVerifyResult* verify_result) argument
157 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dmock_cert_verifier.cc43 CertVerifyResult* verify_result,
54 *verify_result = it->result;
59 verify_result->verified_cert = cert;
60 verify_result->cert_status = MapNetErrorToCertStatus(default_result_);
69 const CertVerifyResult& verify_result,
71 AddResultForCertAndHost(cert, "*", verify_result, rv);
77 const CertVerifyResult& verify_result,
79 Rule rule(cert, host_pattern, verify_result, rv);
39 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument
68 AddResultForCert(X509Certificate* cert, const CertVerifyResult& verify_result, int rv) argument
74 AddResultForCertAndHost( X509Certificate* cert, const std::string& host_pattern, const CertVerifyResult& verify_result, int rv) argument
H A Dcert_verify_proc_unittest.cc51 // Mock CertVerifyProc that will set |verify_result->is_issued_by_known_root|
56 // |verify_result->is_issued_by_known_root| to |is_well_known|.
72 CertVerifyResult* verify_result) OVERRIDE;
85 CertVerifyResult* verify_result) {
86 verify_result->is_issued_by_known_root = is_well_known_;
129 CertVerifyResult* verify_result) {
131 additional_trust_anchors, verify_result);
152 CertVerifyResult verify_result; local
159 &verify_result));
184 CertVerifyResult verify_result; local
79 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
124 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
210 CertVerifyResult verify_result; local
262 CertVerifyResult verify_result; local
299 CertVerifyResult verify_result; local
323 CertVerifyResult verify_result; local
397 CertVerifyResult verify_result; local
456 CertVerifyResult verify_result; local
495 CertVerifyResult verify_result; local
571 CertVerifyResult verify_result; local
606 CertVerifyResult verify_result; local
637 CertVerifyResult verify_result; local
670 CertVerifyResult verify_result; local
722 CertVerifyResult verify_result; local
776 CertVerifyResult verify_result; local
818 CertVerifyResult verify_result; local
866 CertVerifyResult verify_result; local
927 CertVerifyResult verify_result; local
975 CertVerifyResult verify_result; local
1017 CertVerifyResult verify_result; local
1071 CertVerifyResult verify_result; local
1169 CertVerifyResult verify_result; local
1235 CertVerifyResult verify_result; local
1324 CertVerifyResult verify_result; local
1562 CertVerifyResult verify_result; local
[all...]
H A Dmock_cert_verifier.h32 CertVerifyResult* verify_result,
45 // copying |verify_result| into the verified result.
49 const CertVerifyResult& verify_result,
56 const CertVerifyResult& verify_result,
H A Dcert_verify_proc_nss.h34 CertVerifyResult* verify_result);
42 CertVerifyResult* verify_result) OVERRIDE;
H A Dcert_verify_proc_android.h29 CertVerifyResult* verify_result) OVERRIDE;
H A Dcert_verify_proc_mac.h29 CertVerifyResult* verify_result) OVERRIDE;
H A Dcert_verify_proc_openssl.cc100 CertVerifyResult* verify_result) {
117 verify_result->has_md2 = true;
119 verify_result->has_md4 = true;
122 verify_result->has_md5 = true;
127 verify_result->has_sha1 = true;
132 // Set verify_result->verified_cert and
133 // verify_result->is_issued_by_known_root.
135 verify_result->verified_cert =
142 verify_result->is_issued_by_known_root = true;
152 verify_result
99 GetCertChainInfo(X509_STORE_CTX* store_ctx, CertVerifyResult* verify_result) argument
193 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dcert_verify_proc_openssl.h28 CertVerifyResult* verify_result) OVERRIDE;
H A Dcert_verify_proc_win.h29 CertVerifyResult* verify_result) OVERRIDE;
H A Dmulti_threaded_cert_verifier.cc83 base::Value* CertVerifyResultCallback(const CertVerifyResult& verify_result, argument
86 results->SetBoolean("has_md5", verify_result.has_md5);
87 results->SetBoolean("has_md2", verify_result.has_md2);
88 results->SetBoolean("has_md4", verify_result.has_md4);
90 verify_result.is_issued_by_known_root);
92 verify_result.is_issued_by_additional_trust_anchor);
94 verify_result.common_name_fallback_used);
95 results->SetInteger("cert_status", verify_result.cert_status);
97 NetLogX509CertificateCallback(verify_result.verified_cert.get(),
102 verify_result
170 CertVerifierRequest(const CompletionCallback& callback, CertVerifyResult* verify_result, const BoundNetLog& net_log) argument
192 Post(const MultiThreadedCertVerifier::CachedResult& verify_result) argument
381 HandleResult( const MultiThreadedCertVerifier::CachedResult& verify_result, bool is_first_job) argument
405 PostAll(const MultiThreadedCertVerifier::CachedResult& verify_result) argument
456 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, RequestHandle* out_req, const BoundNetLog& net_log) argument
573 HandleResult( X509Certificate* cert, const std::string& hostname, int flags, const CertificateList& additional_trust_anchors, int error, const CertVerifyResult& verify_result) argument
[all...]
H A Dcert_verify_proc_win.cc290 // |*verify_result|. The caller MUST initialize |*verify_result| before
293 CertVerifyResult* verify_result) {
330 verify_result->has_md5 = true;
333 verify_result->has_md2 = true;
336 verify_result->has_md4 = true;
343 verify_result->has_sha1 = true;
351 verify_result->verified_cert =
568 CertVerifyResult* verify_result) {
619 verify_result
292 GetCertChainInfo(PCCERT_CHAIN_CONTEXT chain_context, CertVerifyResult* verify_result) argument
562 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dsingle_request_cert_verifier.h25 // Verifies the given certificate, filling out the |verify_result| object
31 CertVerifyResult* verify_result,
H A Dcert_verify_proc_mac.cc179 // |*verify_result|. The caller MUST initialize |*verify_result| before
183 CertVerifyResult* verify_result) {
225 verify_result->has_md2 = true;
227 verify_result->has_md4 = true;
229 verify_result->has_md5 = true;
236 verify_result->has_sha1 = true;
242 verify_result->verified_cert =
539 CertVerifyResult* verify_result) {
574 verify_result
181 GetCertChainInfo(CFArrayRef cert_chain, CSSM_TP_APPLE_EVIDENCE_INFO* chain_info, CertVerifyResult* verify_result) argument
533 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dmulti_threaded_cert_verifier_unittest.cc51 CertVerifyResult* verify_result) OVERRIDE {
52 verify_result->Reset();
53 verify_result->verified_cert = cert;
54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID;
85 CertVerifyResult verify_result; local
93 &verify_result,
110 &verify_result,
155 CertVerifyResult verify_result; local
163 &verify_result,
180 &verify_result,
202 CertVerifyResult verify_result; local
246 CertVerifyResult verify_result; local
295 CertVerifyResult verify_result; local
[all...]
H A Dcert_verify_proc.cc193 CertVerifyResult* verify_result) {
194 verify_result->Reset();
195 verify_result->verified_cert = cert;
198 verify_result->cert_status |= CERT_STATUS_REVOKED;
210 additional_trust_anchors, verify_result);
213 verify_result->common_name_fallback_used);
214 if (!verify_result->is_issued_by_known_root) {
216 verify_result->common_name_fallback_used);
221 if (IsPublicKeyBlacklisted(verify_result->public_key_hashes)) {
222 verify_result
188 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
H A Dcert_verifier.h78 // The |*verify_result| structure, including the |verify_result->cert_status|
81 // |verify_result->cert_status|, and the error code for the most serious
108 CertVerifyResult* verify_result,
H A Dcert_verify_proc.h35 // The |*verify_result| structure, including the |verify_result->cert_status|
38 // |verify_result->cert_status|, and the error code for the most serious
62 CertVerifyResult* verify_result);
84 CertVerifyResult* verify_result) = 0;
H A Dsingle_request_cert_verifier.cc32 CertVerifyResult* verify_result,
43 cert, hostname, flags, crl_set, verify_result,
28 Verify(X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, CertVerifyResult* verify_result, const CompletionCallback& callback, const BoundNetLog& net_log) argument
H A Dnss_cert_database_unittest.cc559 CertVerifyResult verify_result; local
565 &verify_result);
567 EXPECT_EQ(0U, verify_result.cert_status);
590 CertVerifyResult verify_result; local
596 &verify_result);
598 EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, verify_result.cert_status);
622 CertVerifyResult verify_result; local
628 &verify_result);
630 EXPECT_EQ(0U, verify_result.cert_status);
658 CertVerifyResult verify_result; local
700 CertVerifyResult verify_result; local
748 CertVerifyResult verify_result; local
824 CertVerifyResult verify_result; local
894 CertVerifyResult verify_result; local
958 CertVerifyResult verify_result; local
[all...]
H A Dcert_verify_proc_nss.cc151 // *verify_result. The caller MUST initialize *verify_result before calling
156 CertVerifyResult* verify_result) {
198 verify_result->has_md5 = true;
201 verify_result->has_md2 = true;
204 verify_result->has_md4 = true;
210 verify_result->has_sha1 = true;
220 verify_result->verified_cert =
223 verify_result->verified_cert =
774 CertVerifyResult* verify_result) {
154 GetCertChainInfo(CERTCertList* cert_list, CERTCertificate* root_cert, CertVerifyResult* verify_result) argument
767 VerifyInternalImpl( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CERTChainVerifyCallback* chain_verify_callback, CertVerifyResult* verify_result) argument
928 VerifyInternal( X509Certificate* cert, const std::string& hostname, int flags, CRLSet* crl_set, const CertificateList& additional_trust_anchors, CertVerifyResult* verify_result) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dpolicy_cert_verifier.cc20 const net::CertVerifyResult& verify_result) {
22 if (error != net::OK || !verify_result.is_issued_by_additional_trust_anchor ||
32 const net::CertVerifyResult* verify_result,
35 MaybeSignalAnchorUse(error, anchor_used_callback, *verify_result);
76 net::CertVerifyResult* verify_result,
86 verify_result);
87 int error = delegate_->Verify(cert, hostname, flags, crl_set, verify_result,
89 MaybeSignalAnchorUse(error, anchor_used_callback_, *verify_result);
18 MaybeSignalAnchorUse(int error, const base::Closure& anchor_used_callback, const net::CertVerifyResult& verify_result) argument
29 CompleteAndSignalAnchorUse( const base::Closure& anchor_used_callback, const net::CompletionCallback& completion_callback, const net::CertVerifyResult* verify_result, int error) argument
71 Verify( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, net::CertVerifyResult* verify_result, const net::CompletionCallback& completion_callback, RequestHandle* out_req, const net::BoundNetLog& net_log) argument
H A Dpolicy_cert_verifier_browsertest.cc68 net::CertVerifyResult* verify_result,
74 verify_result,
129 net::CertVerifyResult verify_result; local
132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
142 net::CertVerifyResult verify_result; local
145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
165 net::CertVerifyResult verify_result; local
168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle);
184 net::CertVerifyResult verify_result; local
187 int error = VerifyTestServerCert(callback, &verify_result,
67 VerifyTestServerCert(const net::TestCompletionCallback& test_callback, net::CertVerifyResult* verify_result, net::CertVerifier::RequestHandle* request_handle) argument
198 net::CertVerifyResult verify_result; local
212 net::CertVerifyResult verify_result; local
223 net::CertVerifyResult verify_result; local
[all...]
/external/chromium_org/chrome/browser/chromeos/net/
H A Dcert_verify_proc_chromeos.h41 net::CertVerifyResult* verify_result) OVERRIDE;
H A Dcert_verify_proc_chromeos.cc46 net::CertVerifyResult* verify_result) {
61 verify_result);
40 VerifyInternal( net::X509Certificate* cert, const std::string& hostname, int flags, net::CRLSet* crl_set, const net::CertificateList& additional_trust_anchors, net::CertVerifyResult* verify_result) argument

Completed in 306 milliseconds

123