/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/ |
H A D | cert_status_flags.cc | 59 int MapCertStatusToNetError(CertStatus cert_status) { in MapCertStatusToNetError() argument 64 if (cert_status & CERT_STATUS_INVALID) in MapCertStatusToNetError() 66 if (cert_status & CERT_STATUS_PINNED_KEY_MISSING) in MapCertStatusToNetError() 72 if (cert_status & CERT_STATUS_REVOKED) in MapCertStatusToNetError() 74 if (cert_status & CERT_STATUS_AUTHORITY_INVALID) in MapCertStatusToNetError() 76 if (cert_status & CERT_STATUS_COMMON_NAME_INVALID) in MapCertStatusToNetError() 80 if (cert_status & CERT_STATUS_SYMANTEC_LEGACY) in MapCertStatusToNetError() 88 if (cert_status & CERT_STATUS_WEAK_KEY) in MapCertStatusToNetError() 90 if (cert_status & CERT_STATUS_DATE_INVALID) in MapCertStatusToNetError() 92 if (cert_status & CERT_STATUS_VALIDITY_TOO_LONG) in MapCertStatusToNetError() [all …]
|
H A D | cert_verify_proc_win.cc | 113 CertStatus cert_status = 0; in MapCertChainErrorStatusToCertStatus() local 120 cert_status |= CERT_STATUS_DATE_INVALID; in MapCertChainErrorStatusToCertStatus() 126 cert_status |= CERT_STATUS_AUTHORITY_INVALID; in MapCertChainErrorStatusToCertStatus() 130 cert_status |= CERT_STATUS_NO_REVOCATION_MECHANISM; in MapCertChainErrorStatusToCertStatus() 136 cert_status |= CERT_STATUS_REVOKED; in MapCertChainErrorStatusToCertStatus() 142 cert_status |= CERT_STATUS_INVALID; in MapCertChainErrorStatusToCertStatus() 154 cert_status |= CERT_STATUS_WEAK_KEY; in MapCertChainErrorStatusToCertStatus() 156 cert_status |= CERT_STATUS_AUTHORITY_INVALID; in MapCertChainErrorStatusToCertStatus() 175 cert_status |= CERT_STATUS_INVALID; in MapCertChainErrorStatusToCertStatus() 177 return cert_status; in MapCertChainErrorStatusToCertStatus() [all …]
|
H A D | cert_verify_proc.cc | 568 verify_result->cert_status |= CERT_STATUS_INVALID; in Verify() 569 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 574 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 594 if (verify_result->cert_status & CERT_STATUS_REVOKED) { in Verify() 615 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 623 verify_result->cert_status |= CERT_STATUS_WEAK_KEY; in Verify() 628 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 633 verify_result->cert_status |= CERT_STATUS_INVALID; in Verify() 634 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 659 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() [all …]
|
H A D | cert_verify_proc_mac.cc | 357 verify_result->cert_status |= CERT_STATUS_INVALID; in CopyCertChainToVerifyResult() 367 verify_result->cert_status |= CERT_STATUS_INVALID; in CopyCertChainToVerifyResult() 965 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1068 verify_result->cert_status |= CERT_STATUS_REVOKED; in VerifyWithGivenFlags() 1180 verify_result->cert_status |= mapped_status; in VerifyWithGivenFlags() 1189 if (!IsCertStatusError(verify_result->cert_status)) { in VerifyWithGivenFlags() 1191 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1200 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1221 if (IsCertStatusError(verify_result->cert_status)) in VerifyWithGivenFlags() 1331 verify_result->cert_status |= CERT_STATUS_IS_EV; in VerifyInternal() [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/ |
H A D | cert_status_flags.cc | 60 int MapCertStatusToNetError(CertStatus cert_status) { in MapCertStatusToNetError() argument 65 if (cert_status & CERT_STATUS_INVALID) in MapCertStatusToNetError() 67 if (cert_status & CERT_STATUS_PINNED_KEY_MISSING) in MapCertStatusToNetError() 73 if (cert_status & CERT_STATUS_REVOKED) in MapCertStatusToNetError() 75 if (cert_status & CERT_STATUS_AUTHORITY_INVALID) in MapCertStatusToNetError() 77 if (cert_status & CERT_STATUS_COMMON_NAME_INVALID) in MapCertStatusToNetError() 81 if (cert_status & CERT_STATUS_SYMANTEC_LEGACY) in MapCertStatusToNetError() 89 if (cert_status & CERT_STATUS_WEAK_KEY) in MapCertStatusToNetError() 91 if (cert_status & CERT_STATUS_DATE_INVALID) in MapCertStatusToNetError() 93 if (cert_status & CERT_STATUS_VALIDITY_TOO_LONG) in MapCertStatusToNetError() [all …]
|
H A D | cert_verify_proc_win.cc | 113 CertStatus cert_status = 0; in MapCertChainErrorStatusToCertStatus() local 120 cert_status |= CERT_STATUS_DATE_INVALID; in MapCertChainErrorStatusToCertStatus() 126 cert_status |= CERT_STATUS_AUTHORITY_INVALID; in MapCertChainErrorStatusToCertStatus() 130 cert_status |= CERT_STATUS_NO_REVOCATION_MECHANISM; in MapCertChainErrorStatusToCertStatus() 136 cert_status |= CERT_STATUS_REVOKED; in MapCertChainErrorStatusToCertStatus() 142 cert_status |= CERT_STATUS_INVALID; in MapCertChainErrorStatusToCertStatus() 154 cert_status |= CERT_STATUS_WEAK_KEY; in MapCertChainErrorStatusToCertStatus() 156 cert_status |= CERT_STATUS_AUTHORITY_INVALID; in MapCertChainErrorStatusToCertStatus() 175 cert_status |= CERT_STATUS_INVALID; in MapCertChainErrorStatusToCertStatus() 177 return cert_status; in MapCertChainErrorStatusToCertStatus() [all …]
|
H A D | cert_verify_proc.cc | 562 verify_result->cert_status |= CERT_STATUS_INVALID; in Verify() 563 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 568 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 588 if (verify_result->cert_status & CERT_STATUS_REVOKED) { in Verify() 609 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 617 verify_result->cert_status |= CERT_STATUS_WEAK_KEY; in Verify() 622 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 627 verify_result->cert_status |= CERT_STATUS_INVALID; in Verify() 628 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() 653 rv = MapCertStatusToNetError(verify_result->cert_status); in Verify() [all …]
|
H A D | cert_verify_proc_mac.cc | 349 verify_result->cert_status |= CERT_STATUS_INVALID; in CopyCertChainToVerifyResult() 359 verify_result->cert_status |= CERT_STATUS_INVALID; in CopyCertChainToVerifyResult() 957 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1060 verify_result->cert_status |= CERT_STATUS_REVOKED; in VerifyWithGivenFlags() 1172 verify_result->cert_status |= mapped_status; in VerifyWithGivenFlags() 1181 if (!IsCertStatusError(verify_result->cert_status)) { in VerifyWithGivenFlags() 1183 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1192 verify_result->cert_status |= CERT_STATUS_INVALID; in VerifyWithGivenFlags() 1213 if (IsCertStatusError(verify_result->cert_status)) in VerifyWithGivenFlags() 1323 verify_result->cert_status |= CERT_STATUS_IS_EV; in VerifyInternal() [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/ios/web_view/internal/ |
H A D | cwv_ssl_status.mm | 33 if (cert_status & net::CERT_STATUS_COMMON_NAME_INVALID) { 36 if (cert_status & net::CERT_STATUS_DATE_INVALID) { 39 if (cert_status & net::CERT_STATUS_AUTHORITY_INVALID) { 42 if (cert_status & net::CERT_STATUS_NO_REVOCATION_MECHANISM) { 48 if (cert_status & net::CERT_STATUS_REVOKED) { 51 if (cert_status & net::CERT_STATUS_INVALID) { 57 if (cert_status & net::CERT_STATUS_NON_UNIQUE_NAME) { 60 if (cert_status & net::CERT_STATUS_WEAK_KEY) { 63 if (cert_status & net::CERT_STATUS_PINNED_KEY_MISSING) { 69 if (cert_status & net::CERT_STATUS_VALIDITY_TOO_LONG) { [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/ssl/ |
H A D | ocsp_browsertest.cc | 175 return entry->GetSSL().cert_status; in GetCurrentCertStatus() 233 net::CertStatus cert_status = GetCurrentCertStatus(); in IN_PROC_BROWSER_TEST_P() local 252 net::CertStatus cert_status = GetCurrentCertStatus(); in IN_PROC_BROWSER_TEST_P() local 274 net::CertStatus cert_status = GetCurrentCertStatus(); in IN_PROC_BROWSER_TEST_P() local 275 EXPECT_FALSE(cert_status & net::CERT_STATUS_IS_EV); in IN_PROC_BROWSER_TEST_P() 292 net::CertStatus cert_status = GetCurrentCertStatus(); in IN_PROC_BROWSER_TEST_P() local 293 EXPECT_FALSE(cert_status & net::CERT_STATUS_IS_EV); in IN_PROC_BROWSER_TEST_P() 418 EXPECT_EQ(0u, cert_status & net::CERT_STATUS_IS_EV); in IN_PROC_BROWSER_TEST_P() 480 EXPECT_FALSE(cert_status & net::CERT_STATUS_IS_EV); in IN_PROC_BROWSER_TEST_P() 509 EXPECT_FALSE(cert_status & net::CERT_STATUS_IS_EV); in IN_PROC_BROWSER_TEST_P() [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/security_interstitials/content/ |
H A D | ssl_error_navigation_throttle.cc | 38 handle->GetSSLInfo().value_or(net::SSLInfo()).cert_status)) { in WillFailRequest() 49 int cert_status = info.cert_status; in WillFailRequest() local 52 cert_status, info, handle->GetURL(), in WillFailRequest() 63 int cert_status = info.cert_status; in WillProcessResponse() local 64 if (!net::IsCertStatusError(cert_status)) { in WillProcessResponse() 86 net::MapCertStatusToNetError(cert_status), cert_status, info, in WillProcessResponse() 103 int cert_status, in QueueShowInterstitial() argument
|
/dports/databases/pecl-mongodb/mongodb-1.9.1/src/libmongoc/src/libmongoc/src/mongoc/ |
H A D | mongoc-ocsp-cache.c | 29 int cert_status, reason; member 72 int cert_status, in update_entry() argument 80 entry->cert_status = cert_status; in update_entry() 105 int cert_status, in _mongoc_ocsp_cache_set_resp() argument 118 update_entry (entry, cert_status, reason, this_update, next_update); in _mongoc_ocsp_cache_set_resp() 120 update_entry (entry, cert_status, reason, this_update, next_update); in _mongoc_ocsp_cache_set_resp() 149 int *cert_status, in _mongoc_ocsp_cache_get_status() argument 170 BSON_ASSERT_PARAM (cert_status); in _mongoc_ocsp_cache_get_status() 175 *cert_status = entry->cert_status; in _mongoc_ocsp_cache_get_status()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/security_interstitials/content/ |
H A D | ssl_error_navigation_throttle.cc | 38 handle->GetSSLInfo().value_or(net::SSLInfo()).cert_status)) { in WillFailRequest() 49 int cert_status = info.cert_status; in WillFailRequest() local 52 cert_status, info, handle->GetURL(), in WillFailRequest() 63 int cert_status = info.cert_status; in WillProcessResponse() local 64 if (!net::IsCertStatusError(cert_status)) { in WillProcessResponse() 86 net::MapCertStatusToNetError(cert_status), cert_status, info, in WillProcessResponse() 103 int cert_status, in QueueShowInterstitial() argument
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/content/public/browser/ |
H A D | ssl_status.cc | 14 cert_status(0), in SSLStatus() 26 cert_status(ssl_info.cert_status), in SSLStatus() 37 cert_status(other.cert_status), in SSLStatus() 49 cert_status = other.cert_status; in operator =()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/content/public/browser/ |
H A D | ssl_status.cc | 14 cert_status(0), in SSLStatus() 26 cert_status(ssl_info.cert_status), in SSLStatus() 38 cert_status(other.cert_status), in SSLStatus() 51 cert_status = other.cert_status; in operator =()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/ios/web/security/ |
H A D | ssl_status.cc | 11 cert_status(0), in SSLStatus() 17 cert_status(other.cert_status), in SSLStatus() 25 cert_status = other.cert_status; in operator =()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/ssl/ |
H A D | ssl_config.cc | 20 : cert(std::move(cert_arg)), cert_status(status) {} in CertAndStatus() 31 CertStatus* cert_status) const { in IsAllowedBadCert() 34 if (cert_status) in IsAllowedBadCert() 35 *cert_status = allowed_bad_cert.cert_status; in IsAllowedBadCert()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/ssl/ |
H A D | ssl_config.cc | 20 : cert(std::move(cert_arg)), cert_status(status) {} in CertAndStatus() 31 CertStatus* cert_status) const { in IsAllowedBadCert() 34 if (cert_status) in IsAllowedBadCert() 35 *cert_status = allowed_bad_cert.cert_status; in IsAllowedBadCert()
|
/dports/comms/pear-Horde_ActiveSync/Horde_ActiveSync-2.41.4/lib/Horde/ActiveSync/Request/ |
H A D | ValidateCert.php | 100 $cert_status = array(); 109 $cert_status[$key] = self::STATUS_MISSING_INFO; 116 $cert_status[$key] = self::STATUS_EXPIRED; 128 $cert_status[$key] = self::STATUS_PURPOSE_INVALID; 131 $cert_status[$key] = self::STATUS_UNKNOWN; 134 $cert_status[$key] = self::STATUS_SUCCESS; 149 $this->_encoder->content($cert_status[$key]);
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/android/policy/ |
H A D | policy_auditor.cc | 41 if (net::IsCertStatusError(ssl.cert_status)) { in JNI_PolicyAuditor_GetCertificateFailure() 42 if (ssl.cert_status & net::CERT_STATUS_AUTHORITY_INVALID) { in JNI_PolicyAuditor_GetCertificateFailure() 45 if (ssl.cert_status & net::CERT_STATUS_REVOKED) { in JNI_PolicyAuditor_GetCertificateFailure() 49 if (ssl.cert_status & net::CERT_STATUS_DATE_INVALID) { in JNI_PolicyAuditor_GetCertificateFailure() 52 if (ssl.cert_status & net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION) { in JNI_PolicyAuditor_GetCertificateFailure()
|
/dports/security/libressl-static/libressl-3.3.5/tls/ |
H A D | tls_ocsp.c | 74 tls_ocsp_fill_info(struct tls *ctx, int response_status, int cert_status, in tls_ocsp_fill_info() argument 88 info->cert_status = cert_status; in tls_ocsp_fill_info() 93 } else if (info->cert_status != V_OCSP_CERTSTATUS_REVOKED) { in tls_ocsp_fill_info() 94 info->result_msg = OCSP_cert_status_str(info->cert_status); in tls_ocsp_fill_info() 203 int response_status=0, cert_status=0, crl_reason=0; in tls_ocsp_verify_response() local 240 if (OCSP_resp_find_status(br, cid, &cert_status, &crl_reason, in tls_ocsp_verify_response() 253 if (tls_ocsp_fill_info(ctx, response_status, cert_status, in tls_ocsp_verify_response() 258 if (cert_status != V_OCSP_CERTSTATUS_GOOD && cert_status != in tls_ocsp_verify_response() 403 return ctx->ocsp->ocsp_result->cert_status; in tls_peer_ocsp_cert_status()
|
/dports/security/libretls/libretls-3.4.2/ |
H A D | tls_ocsp.c | 76 tls_ocsp_fill_info(struct tls *ctx, int response_status, int cert_status, in tls_ocsp_fill_info() argument 90 info->cert_status = cert_status; in tls_ocsp_fill_info() 95 } else if (info->cert_status != V_OCSP_CERTSTATUS_REVOKED) { in tls_ocsp_fill_info() 96 info->result_msg = OCSP_cert_status_str(info->cert_status); in tls_ocsp_fill_info() 214 int response_status=0, cert_status=0, crl_reason=0; in tls_ocsp_verify_response() local 251 if (OCSP_resp_find_status(br, cid, &cert_status, &crl_reason, in tls_ocsp_verify_response() 264 if (tls_ocsp_fill_info(ctx, response_status, cert_status, in tls_ocsp_verify_response() 269 if (cert_status != V_OCSP_CERTSTATUS_GOOD && cert_status != in tls_ocsp_verify_response() 414 return ctx->ocsp->ocsp_result->cert_status; in tls_peer_ocsp_cert_status()
|
/dports/security/libressl/libressl-3.4.3/tls/ |
H A D | tls_ocsp.c | 74 tls_ocsp_fill_info(struct tls *ctx, int response_status, int cert_status, in tls_ocsp_fill_info() argument 88 info->cert_status = cert_status; in tls_ocsp_fill_info() 93 } else if (info->cert_status != V_OCSP_CERTSTATUS_REVOKED) { in tls_ocsp_fill_info() 94 info->result_msg = OCSP_cert_status_str(info->cert_status); in tls_ocsp_fill_info() 203 int response_status=0, cert_status=0, crl_reason=0; in tls_ocsp_verify_response() local 240 if (OCSP_resp_find_status(br, cid, &cert_status, &crl_reason, in tls_ocsp_verify_response() 253 if (tls_ocsp_fill_info(ctx, response_status, cert_status, in tls_ocsp_verify_response() 258 if (cert_status != V_OCSP_CERTSTATUS_GOOD && cert_status != in tls_ocsp_verify_response() 403 return ctx->ocsp->ocsp_result->cert_status; in tls_peer_ocsp_cert_status()
|
/dports/emulators/citra/citra-ac98458e0/externals/libressl/tls/ |
H A D | tls_ocsp.c | 74 tls_ocsp_fill_info(struct tls *ctx, int response_status, int cert_status, in tls_ocsp_fill_info() argument 88 info->cert_status = cert_status; in tls_ocsp_fill_info() 93 } else if (info->cert_status != V_OCSP_CERTSTATUS_REVOKED) { in tls_ocsp_fill_info() 94 info->result_msg = OCSP_cert_status_str(info->cert_status); in tls_ocsp_fill_info() 203 int response_status=0, cert_status=0, crl_reason=0; in tls_ocsp_verify_response() local 240 if (OCSP_resp_find_status(br, cid, &cert_status, &crl_reason, in tls_ocsp_verify_response() 253 if (tls_ocsp_fill_info(ctx, response_status, cert_status, in tls_ocsp_verify_response() 258 if (cert_status != V_OCSP_CERTSTATUS_GOOD && cert_status != in tls_ocsp_verify_response() 403 return ctx->ocsp->ocsp_result->cert_status; in tls_peer_ocsp_cert_status()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/tls/ |
H A D | tls_ocsp.c | 74 tls_ocsp_fill_info(struct tls *ctx, int response_status, int cert_status, in tls_ocsp_fill_info() argument 88 info->cert_status = cert_status; in tls_ocsp_fill_info() 93 } else if (info->cert_status != V_OCSP_CERTSTATUS_REVOKED) { in tls_ocsp_fill_info() 94 info->result_msg = OCSP_cert_status_str(info->cert_status); in tls_ocsp_fill_info() 203 int response_status=0, cert_status=0, crl_reason=0; in tls_ocsp_verify_response() local 240 if (OCSP_resp_find_status(br, cid, &cert_status, &crl_reason, in tls_ocsp_verify_response() 253 if (tls_ocsp_fill_info(ctx, response_status, cert_status, in tls_ocsp_verify_response() 258 if (cert_status != V_OCSP_CERTSTATUS_GOOD && cert_status != in tls_ocsp_verify_response() 403 return ctx->ocsp->ocsp_result->cert_status; in tls_peer_ocsp_cert_status()
|