/external/chromium_org/net/ssl/ |
H A D | signed_certificate_timestamp_and_status.cc | 12 const scoped_refptr<ct::SignedCertificateTimestamp>& sct, 14 : sct(sct), status(status) {} 11 SignedCertificateTimestampAndStatus( const scoped_refptr<ct::SignedCertificateTimestamp>& sct, const ct::SCTVerifyStatus status) argument
|
H A D | signed_certificate_timestamp_and_status.h | 19 const scoped_refptr<ct::SignedCertificateTimestamp>& sct, 24 scoped_refptr<ct::SignedCertificateTimestamp> sct; member in struct:net::SignedCertificateTimestampAndStatus
|
/external/chromium_org/content/browser/ |
H A D | signed_certificate_timestamp_store_impl.cc | 28 net::ct::SignedCertificateTimestamp* sct, 30 return store_.Store(sct, process_id); 35 scoped_refptr<net::ct::SignedCertificateTimestamp>* sct) { 36 return store_.Retrieve(sct_id, sct); 27 Store( net::ct::SignedCertificateTimestamp* sct, int process_id) argument 33 Retrieve( int sct_id, scoped_refptr<net::ct::SignedCertificateTimestamp>* sct) argument
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier.cc | 24 const ct::SignedCertificateTimestamp& sct) { 25 if (sct.log_id != key_id()) { 30 if (!SignatureParametersMatch(sct.signature)) 39 if (!ct::EncodeV1SCTSignedData(sct.timestamp, serialized_log_entry, 40 sct.extensions, &serialized_data)) { 45 return VerifySignature(serialized_data, sct.signature.signature_data); 23 Verify(const ct::LogEntry& entry, const ct::SignedCertificateTimestamp& sct) argument
|
H A D | ct_serialization_unittest.cc | 138 scoped_refptr<ct::SignedCertificateTimestamp> sct; local 139 ASSERT_TRUE(ct::DecodeSignedCertificateTimestamp(&encoded_sct, &sct)); 140 EXPECT_EQ(0, sct->version); 141 EXPECT_EQ(ct::GetTestPublicKeyId(), sct->log_id); 144 EXPECT_EQ(expected_time, sct->timestamp); 147 EXPECT_EQ((size_t) 71, sct->signature.signature_data.size()); 148 EXPECT_TRUE(sct->extensions.empty()); 154 scoped_refptr<ct::SignedCertificateTimestamp> sct; local 157 ct::DecodeSignedCertificateTimestamp(&invalid_version_sct, &sct)); 162 ct::DecodeSignedCertificateTimestamp(&invalid_length_sct, &sct)); [all...] |
H A D | ct_objects_extractor_unittest.cc | 39 scoped_refptr<SignedCertificateTimestamp>* sct) { 48 EXPECT_TRUE(DecodeSignedCertificateTimestamp(&parsed_scts[0], sct)); 60 scoped_refptr<ct::SignedCertificateTimestamp> sct( 62 ExtractEmbeddedSCT(precert_chain_[0], &sct); 64 EXPECT_EQ(sct->version, SignedCertificateTimestamp::SCT_VERSION_1); 65 EXPECT_EQ(ct::GetTestPublicKeyId(), sct->log_id); 70 EXPECT_EQ(expected_timestamp, sct->timestamp); 101 scoped_refptr<ct::SignedCertificateTimestamp> sct( 103 ExtractEmbeddedSCT(precert_chain_[0], &sct); 110 EXPECT_TRUE(log_->Verify(entry, *sct 38 ExtractEmbeddedSCT(scoped_refptr<X509Certificate> cert, scoped_refptr<SignedCertificateTimestamp>* sct) argument [all...] |
H A D | ct_signed_certificate_timestamp_log_param.cc | 93 const ct::SignedCertificateTimestamp& sct) { 96 out->SetString("origin", OriginToString(sct.origin)); 97 out->SetInteger("version", sct.version); 99 SetBinaryData("log_id", sct.log_id, out); 101 sct.timestamp - base::Time::UnixEpoch(); 104 SetBinaryData("extensions", sct.extensions, out); 107 HashAlgorithmToString(sct.signature.hash_algorithm)); 109 SignatureAlgorithmToString(sct.signature.signature_algorithm)); 111 "signature_data", sct.signature.signature_data, out); 92 SCTToDictionary( const ct::SignedCertificateTimestamp& sct) argument
|
H A D | multi_log_ct_verifier.cc | 201 scoped_refptr<ct::SignedCertificateTimestamp> sct, 206 IDToLogMap::iterator it = logs_.find(sct->log_id); 209 result->unknown_logs_scts.push_back(sct); 214 sct->log_description = it->second->description(); 216 if (!it->second->Verify(expected_entry, *sct.get())) { 218 result->invalid_scts.push_back(sct); 224 if (sct->timestamp > base::Time::Now()) { 226 result->invalid_scts.push_back(sct); 232 result->verified_scts.push_back(sct); 200 VerifySingleSCT( scoped_refptr<ct::SignedCertificateTimestamp> sct, const ct::LogEntry& expected_entry, ct::CTVerifyResult* result) argument
|
H A D | ct_serialization.cc | 377 bool EncodeSCTListForTesting(const base::StringPiece& sct, argument 380 return WriteVariableBytes(kSerializedSCTLengthBytes, sct, &encoded_sct) &&
|
/external/chromium_org/chrome/browser/ui/views/ |
H A D | signed_certificate_timestamp_info_view.cc | 89 int SCTOriginToResourceID(const net::ct::SignedCertificateTimestamp& sct) { argument 90 switch (sct.origin) { 121 const net::ct::SignedCertificateTimestamp& sct, 126 l10n_util::GetStringUTF16(chrome::ct::SCTOriginToResourceID(sct))); 128 l10n_util::GetStringUTF16(VersionToResourceID(sct.version))); 129 log_description_value_field_->SetText(base::UTF8ToUTF16(sct.log_description)); 131 base::TimeFormatFriendlyDateAndTime(sct.timestamp)); 134 HashAlgorithmToResourceID(sct.signature.hash_algorithm))); 136 SignatureAlgorithmToResourceID(sct.signature.signature_algorithm))); 142 reinterpret_cast<const unsigned char*>(sct 120 SetSignedCertificateTimestamp( const net::ct::SignedCertificateTimestamp& sct, net::ct::SCTVerifyStatus status) argument [all...] |
H A D | signed_certificate_timestamps_views.cc | 33 scoped_refptr<net::ct::SignedCertificateTimestamp> sct; local 35 &sct); 37 net::SignedCertificateTimestampAndStatus(sct, it->status)); 82 chrome::ct::SCTOriginToResourceID(*(sct_list_[index].sct.get()))); 155 sct_info_view_->SetSignedCertificateTimestamp(*(sct_list_[0].sct.get()), 164 *(sct_list_[sct_index].sct.get()), sct_list_[sct_index].status);
|