Home
last modified time | relevance | path

Searched refs:i (Results 1 – 25 of 322) sorted by relevance

12345678910>>...13

/pki/testdata/verify_certificate_chain_unittest/many-names/
A Dgenerate-chains.py24 for i in range(num_dns):
25 constraints.set_property('excluded;DNS.%i' % (i + 1), 'x%i.test' % i)
26 for i in range(num_ip):
27 b,c = divmod(i, 256)
37 constraints.set_property('excluded;URI.%i' % (i + 1), 'http://xest/%i' % i)
45 constraints.set_property('permitted;DNS.%i' % (i + 1), 't%i.test' % i)
46 for i in range(num_ip):
47 b,c = divmod(i, 256)
65 sans.set_property('DNS.%i' % (i + 1), 't%i.test' % i)
67 b,c = divmod(i, 256)
[all …]
/pki/
A Dip_util.cc24 for (size_t i = 0; i < mask.size(); i++) { in IsValidNetmask() local
25 uint8_t b = mask[i]; in IsValidNetmask()
34 for (size_t j = i + 1; j < mask.size(); j++) { in IsValidNetmask()
51 for (size_t i = 0; i < addr1.size(); i++) { in IPAddressMatchesWithNetmask() local
52 if ((addr1[i] & mask[i]) != (addr2[i] & mask[i])) { in IPAddressMatchesWithNetmask()
A Dip_util_unittest.cc35 for (int i = 0; i < 4; i++) { in TEST() local
37 memset(addr, 0xff, i); in TEST()
39 addr[i] = 0xff << shift; in TEST()
45 for (int i = 0; i < 16; i++) { in TEST() local
47 memset(addr, 0xff, i); in TEST()
49 addr[i] = 0xff << shift; in TEST()
A Dcert_errors.cc188 for (ptrdiff_t i = -1; i < (ptrdiff_t)cert_errors_.size(); ++i) { in FindSingleHighSeverityError() local
190 (i < 0) ? GetOtherErrors() : GetErrorsForCert(i); in FindSingleHighSeverityError()
195 out_depth = i; in FindSingleHighSeverityError()
211 for (size_t i = 0; i < cert_errors_.size(); ++i) { in ToDebugString() local
214 const CertErrors &errors = cert_errors_[i]; in ToDebugString()
223 if (i < certs.size() && certs[i]) { in ToDebugString()
225 if (ParseName(certs[i]->tbs().subject_tlv, &subject) && in ToDebugString()
230 result << "----- Certificate i=" << i << cert_name_debug_str << " -----\n"; in ToDebugString()
A Dpath_builder_pkits_unittest.cc64 size_t i = certs.size() - reverse_i - 1; in CheckPathAfterVerification() local
85 if (certs[i]->GetExtension(der::Input(kCrlDistributionPointsOid), in CheckPathAfterVerification()
113 CheckCRL(der_crl, certs, i, *cert_dp, verify_time_, max_age_); in CheckPathAfterVerification()
115 path->errors.GetErrorsForCert(i)->AddError( in CheckPathAfterVerification()
130 path->errors.GetErrorsForCert(i)->AddError( in CheckPathAfterVerification()
168 for (size_t i = 1; i < cert_ders.size() - 1; ++i) { in RunTest() local
169 cert_issuer_source.AddCert(certs[i]); in RunTest()
247 for (size_t i = 0; i < result.paths.size(); ++i) { in RunTest() local
249 result.paths[i].get(); in RunTest()
250 msg << "path " << i << " errors:\n" in RunTest()
A Dstring_util.cc96 std::string NumberToDecimalString(int i) { in NumberToDecimalString() argument
98 out << std::dec << i; in NumberToDecimalString()
112 size_t i = str.find(split_char); in SplitString() local
115 out.push_back(str.substr(0, i)); in SplitString()
117 if (i == str.npos) { in SplitString()
122 str = str.substr(i + 1); in SplitString()
143 for (auto i = text.begin(); i != text.end(); ++i) { in CollapseWhitespaceASCII() local
144 if (IsUnicodeWhitespace(*i)) { in CollapseWhitespaceASCII()
151 ((*i == '\n') || (*i == '\r'))) { in CollapseWhitespaceASCII()
160 result[chars_written++] = *i; in CollapseWhitespaceASCII()
A Dparse_name.cc128 for (unsigned int i = 0; i < unescaped.length(); ++i) { in AsRFC2253String() local
129 uint8_t c = static_cast<uint8_t>(unescaped[i]); in AsRFC2253String()
130 if (i == 0 && c == '#') { in AsRFC2253String()
132 } else if (i == 0 && c == ' ') { in AsRFC2253String()
134 } else if (i == unescaped.length() - 1 && c == ' ') { in AsRFC2253String()
221 for (size_t i = 0; i < size; ++i) { in ConvertToRFC2253() local
222 RelativeDistinguishedName rdn = rdn_sequence[size - i - 1]; in ConvertToRFC2253()
A Dpath_builder_verify_certificate_chain_unittest.cc37 for (size_t i = 1; i < test.chain.size(); ++i) { in Verify() local
38 intermediate_cert_issuer_source.AddCert(test.chain[i]); in Verify()
A Dtrust_store.cc163 for (auto i = ++split.begin(); i != split.end(); ++i) { in FromDebugString() local
164 if (string_util::IsEqualNoCase(*i, kEnforceAnchorExpiry)) { in FromDebugString()
166 } else if (string_util::IsEqualNoCase(*i, kEnforceAnchorConstraints)) { in FromDebugString()
168 } else if (string_util::IsEqualNoCase(*i, kRequireAnchorBasicConstraints)) { in FromDebugString()
170 } else if (string_util::IsEqualNoCase(*i, kRequireLeafSelfsigned)) { in FromDebugString()
A Dparse_values_unittest.cc226 for (size_t i = 0; i < std::size(kUint64TestData); i++) { in TEST() local
227 const Uint64TestData &test_case = kUint64TestData[i]; in TEST()
228 SCOPED_TRACE(i); in TEST()
263 for (size_t i = 0; i < std::size(kUint8TestData); i++) { in TEST() local
264 const Uint8TestData &test_case = kUint8TestData[i]; in TEST()
265 SCOPED_TRACE(i); in TEST()
309 for (size_t i = 0; i < std::size(kIsValidIntegerTestData); i++) { in TEST() local
310 const auto &test_case = kIsValidIntegerTestData[i]; in TEST()
311 SCOPED_TRACE(i); in TEST()
A Dverify_certificate_chain_pkits_unittest.cc48 for (auto i = cert_ders.rbegin(); i != cert_ders.rend(); ++i) { in RunTest() local
51 CRYPTO_BUFFER_new(reinterpret_cast<const uint8_t *>(i->data()), in RunTest()
52 i->size(), nullptr)), in RunTest()
A Dparse_values.cc62 for (size_t i = 0; i < digits; ++i) { in DecimalStringToUint() local
417 for (size_t i = 0; i < in.size(); i++) { in ParseTeletexStringAsLatin1() local
418 if (in[i] > 0x7f) { in ParseTeletexStringAsLatin1()
423 for (size_t i = 0; i < in.size(); i++) { in ParseTeletexStringAsLatin1() local
424 uint8_t u = in[i]; in ParseTeletexStringAsLatin1()
/pki/testdata/nist-pkits/
A Dgenerate_tests.py174 i += 1
183 i += 1
192 i += 1
198 if TEST_MATCHER.match(lines[i]) or SECTION_MATCHER.match(lines[i]):
201 i += 1
203 return i, result
1133 i, test_sections = parse_main_test_sections(lines, i)
1197 return i
1236 i = 0
1240 i += 1
[all …]
/pki/testdata/certificate_policies_unittest/
A Dgenerate_policies.py68 i = random.randint(0, sys.maxint)
69 s = "asn1 = SEQUENCE:PolicyQualifierInfoSequence%i\n" % i
70 s += "[PolicyQualifierInfoSequence%i]\n" % i
81 i = random.randint(0, sys.maxint)
82 s = "policyInformation = SEQUENCE:PolicyInformationSequence%i\n" % i
83 s += "[PolicyInformationSequence%i]\n" % i
87 s += "policyQualifiers = SEQUENCE:PolicyQualifiersSequence%i\n" % i
88 s += "[PolicyQualifiersSequence%i]\n" % i
/pki/testdata/ocsp_unittest/
A Dmake_ocsp.py113 for i in range(len(subject)):
114 rn.setComponentByPosition(i, subject.getComponentByPosition(i))
181 for i in range(len(extensions)):
182 elist.setComponentByPosition(i, extensions[i])
218 for i in range(len(responses)):
219 rlist.setComponentByPosition(i, responses[i])
224 for i in range(len(extensions)):
225 elist.setComponentByPosition(i, extensions[i])
244 for i in range(len(certs)):
245 cs.setComponentByPosition(i, certs[i][0])
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/
A D4.1.5.txt1 ----- Certificate i=1 (CN=DSA Parameters Inherited CA,O=Test Certificates 2011,C=US) -----
4 ----- Certificate i=2 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
A D4.1.4.txt1 ----- Certificate i=0 (CN=Valid DSA Signatures EE Certificate Test4,O=Test Certificates 2011,C=US) …
4 ----- Certificate i=1 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
A D4.1.6.txt1 ----- Certificate i=0 (CN=Invalid DSA Signature EE Certificate Test6,O=Test Certificates 2011,C=US)…
4 ----- Certificate i=1 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
A D4.12.3.txt1 ----- Certificate i=0 (CN=inhibitAnyPolicy EE Certificate Test3,O=Test Certificates 2011,C=US) -----
5 ----- Certificate i=1 (CN=inhibitAnyPolicy1 subCA1,O=Test Certificates 2011,C=US) -----
A D4.8.3.txt1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test3,O=Test Certificates 2011,C=US) --…
5 ----- Certificate i=1 (CN=Policies P2 subCA,O=Test Certificates 2011,C=US) -----
A D4.8.8.txt1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test8,O=Test Certificates 2011,C=US) --…
5 ----- Certificate i=1 (CN=Policies P12 subsubCAP1P2,O=Test Certificates 2011,C=US) -----
A D4.8.9.txt1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test9,O=Test Certificates 2011,C=US) --…
5 ----- Certificate i=1 (CN=Policies P123 subsubsubCAP12P2P1,O=Test Certificates 2011,C=US) -----
A D4.12.8.txt1 ----- Certificate i=0 (CN=Invalid Self-Issued inhibitAnyPolicy EE Certificate Test8,O=Test Certific…
5 ----- Certificate i=1 (CN=inhibitAnyPolicy1 subsubCA2,O=Test Certificates 2011,C=US) -----
A D4.8.2.txt1 ----- Certificate i=0 (CN=All Certificates No Policies EE Certificate Test2,O=Test Certificates 201…
5 ----- Certificate i=1 (CN=No Policies CA,O=Test Certificates 2011,C=US) -----
/pki/testdata/parse_certificate_unittest/
A Dtbs_v3_extensions.pem6 $ openssl asn1parse -i < [TBS CERTIFICATE]
34 $ openssl asn1parse -i < [SIGNATURE ALGORITHM]
41 $ openssl asn1parse -i < [ISSUER]
60 $ openssl asn1parse -i < [SUBJECT]
67 $ openssl asn1parse -i < [SPKI]
74 $ openssl asn1parse -i < [EXTENSIONS]

Completed in 23 milliseconds

12345678910>>...13