/pki/testdata/verify_certificate_chain_unittest/many-names/ |
A D | generate-chains.py | 24 for i in range(num_dns): 25 constraints.set_property('excluded;DNS.%i' % (i + 1), 'x%i.test' % i) 26 for i in range(num_ip): 27 b,c = divmod(i, 256) 37 constraints.set_property('excluded;URI.%i' % (i + 1), 'http://xest/%i' % i) 45 constraints.set_property('permitted;DNS.%i' % (i + 1), 't%i.test' % i) 46 for i in range(num_ip): 47 b,c = divmod(i, 256) 65 sans.set_property('DNS.%i' % (i + 1), 't%i.test' % i) 67 b,c = divmod(i, 256) [all …]
|
/pki/ |
A D | ip_util.cc | 24 for (size_t i = 0; i < mask.size(); i++) { in IsValidNetmask() local 25 uint8_t b = mask[i]; in IsValidNetmask() 34 for (size_t j = i + 1; j < mask.size(); j++) { in IsValidNetmask() 51 for (size_t i = 0; i < addr1.size(); i++) { in IPAddressMatchesWithNetmask() local 52 if ((addr1[i] & mask[i]) != (addr2[i] & mask[i])) { in IPAddressMatchesWithNetmask()
|
A D | ip_util_unittest.cc | 35 for (int i = 0; i < 4; i++) { in TEST() local 37 memset(addr, 0xff, i); in TEST() 39 addr[i] = 0xff << shift; in TEST() 45 for (int i = 0; i < 16; i++) { in TEST() local 47 memset(addr, 0xff, i); in TEST() 49 addr[i] = 0xff << shift; in TEST()
|
A D | cert_errors.cc | 188 for (ptrdiff_t i = -1; i < (ptrdiff_t)cert_errors_.size(); ++i) { in FindSingleHighSeverityError() local 190 (i < 0) ? GetOtherErrors() : GetErrorsForCert(i); in FindSingleHighSeverityError() 195 out_depth = i; in FindSingleHighSeverityError() 211 for (size_t i = 0; i < cert_errors_.size(); ++i) { in ToDebugString() local 214 const CertErrors &errors = cert_errors_[i]; in ToDebugString() 223 if (i < certs.size() && certs[i]) { in ToDebugString() 225 if (ParseName(certs[i]->tbs().subject_tlv, &subject) && in ToDebugString() 230 result << "----- Certificate i=" << i << cert_name_debug_str << " -----\n"; in ToDebugString()
|
A D | path_builder_pkits_unittest.cc | 64 size_t i = certs.size() - reverse_i - 1; in CheckPathAfterVerification() local 85 if (certs[i]->GetExtension(der::Input(kCrlDistributionPointsOid), in CheckPathAfterVerification() 113 CheckCRL(der_crl, certs, i, *cert_dp, verify_time_, max_age_); in CheckPathAfterVerification() 115 path->errors.GetErrorsForCert(i)->AddError( in CheckPathAfterVerification() 130 path->errors.GetErrorsForCert(i)->AddError( in CheckPathAfterVerification() 168 for (size_t i = 1; i < cert_ders.size() - 1; ++i) { in RunTest() local 169 cert_issuer_source.AddCert(certs[i]); in RunTest() 247 for (size_t i = 0; i < result.paths.size(); ++i) { in RunTest() local 249 result.paths[i].get(); in RunTest() 250 msg << "path " << i << " errors:\n" in RunTest()
|
A D | string_util.cc | 96 std::string NumberToDecimalString(int i) { in NumberToDecimalString() argument 98 out << std::dec << i; in NumberToDecimalString() 112 size_t i = str.find(split_char); in SplitString() local 115 out.push_back(str.substr(0, i)); in SplitString() 117 if (i == str.npos) { in SplitString() 122 str = str.substr(i + 1); in SplitString() 143 for (auto i = text.begin(); i != text.end(); ++i) { in CollapseWhitespaceASCII() local 144 if (IsUnicodeWhitespace(*i)) { in CollapseWhitespaceASCII() 151 ((*i == '\n') || (*i == '\r'))) { in CollapseWhitespaceASCII() 160 result[chars_written++] = *i; in CollapseWhitespaceASCII()
|
A D | parse_name.cc | 128 for (unsigned int i = 0; i < unescaped.length(); ++i) { in AsRFC2253String() local 129 uint8_t c = static_cast<uint8_t>(unescaped[i]); in AsRFC2253String() 130 if (i == 0 && c == '#') { in AsRFC2253String() 132 } else if (i == 0 && c == ' ') { in AsRFC2253String() 134 } else if (i == unescaped.length() - 1 && c == ' ') { in AsRFC2253String() 221 for (size_t i = 0; i < size; ++i) { in ConvertToRFC2253() local 222 RelativeDistinguishedName rdn = rdn_sequence[size - i - 1]; in ConvertToRFC2253()
|
A D | path_builder_verify_certificate_chain_unittest.cc | 37 for (size_t i = 1; i < test.chain.size(); ++i) { in Verify() local 38 intermediate_cert_issuer_source.AddCert(test.chain[i]); in Verify()
|
A D | trust_store.cc | 163 for (auto i = ++split.begin(); i != split.end(); ++i) { in FromDebugString() local 164 if (string_util::IsEqualNoCase(*i, kEnforceAnchorExpiry)) { in FromDebugString() 166 } else if (string_util::IsEqualNoCase(*i, kEnforceAnchorConstraints)) { in FromDebugString() 168 } else if (string_util::IsEqualNoCase(*i, kRequireAnchorBasicConstraints)) { in FromDebugString() 170 } else if (string_util::IsEqualNoCase(*i, kRequireLeafSelfsigned)) { in FromDebugString()
|
A D | parse_values_unittest.cc | 226 for (size_t i = 0; i < std::size(kUint64TestData); i++) { in TEST() local 227 const Uint64TestData &test_case = kUint64TestData[i]; in TEST() 228 SCOPED_TRACE(i); in TEST() 263 for (size_t i = 0; i < std::size(kUint8TestData); i++) { in TEST() local 264 const Uint8TestData &test_case = kUint8TestData[i]; in TEST() 265 SCOPED_TRACE(i); in TEST() 309 for (size_t i = 0; i < std::size(kIsValidIntegerTestData); i++) { in TEST() local 310 const auto &test_case = kIsValidIntegerTestData[i]; in TEST() 311 SCOPED_TRACE(i); in TEST()
|
A D | verify_certificate_chain_pkits_unittest.cc | 48 for (auto i = cert_ders.rbegin(); i != cert_ders.rend(); ++i) { in RunTest() local 51 CRYPTO_BUFFER_new(reinterpret_cast<const uint8_t *>(i->data()), in RunTest() 52 i->size(), nullptr)), in RunTest()
|
A D | parse_values.cc | 62 for (size_t i = 0; i < digits; ++i) { in DecimalStringToUint() local 417 for (size_t i = 0; i < in.size(); i++) { in ParseTeletexStringAsLatin1() local 418 if (in[i] > 0x7f) { in ParseTeletexStringAsLatin1() 423 for (size_t i = 0; i < in.size(); i++) { in ParseTeletexStringAsLatin1() local 424 uint8_t u = in[i]; in ParseTeletexStringAsLatin1()
|
/pki/testdata/nist-pkits/ |
A D | generate_tests.py | 174 i += 1 183 i += 1 192 i += 1 198 if TEST_MATCHER.match(lines[i]) or SECTION_MATCHER.match(lines[i]): 201 i += 1 203 return i, result 1133 i, test_sections = parse_main_test_sections(lines, i) 1197 return i 1236 i = 0 1240 i += 1 [all …]
|
/pki/testdata/certificate_policies_unittest/ |
A D | generate_policies.py | 68 i = random.randint(0, sys.maxint) 69 s = "asn1 = SEQUENCE:PolicyQualifierInfoSequence%i\n" % i 70 s += "[PolicyQualifierInfoSequence%i]\n" % i 81 i = random.randint(0, sys.maxint) 82 s = "policyInformation = SEQUENCE:PolicyInformationSequence%i\n" % i 83 s += "[PolicyInformationSequence%i]\n" % i 87 s += "policyQualifiers = SEQUENCE:PolicyQualifiersSequence%i\n" % i 88 s += "[PolicyQualifiersSequence%i]\n" % i
|
/pki/testdata/ocsp_unittest/ |
A D | make_ocsp.py | 113 for i in range(len(subject)): 114 rn.setComponentByPosition(i, subject.getComponentByPosition(i)) 181 for i in range(len(extensions)): 182 elist.setComponentByPosition(i, extensions[i]) 218 for i in range(len(responses)): 219 rlist.setComponentByPosition(i, responses[i]) 224 for i in range(len(extensions)): 225 elist.setComponentByPosition(i, extensions[i]) 244 for i in range(len(certs)): 245 cs.setComponentByPosition(i, certs[i][0])
|
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/ |
A D | 4.1.5.txt | 1 ----- Certificate i=1 (CN=DSA Parameters Inherited CA,O=Test Certificates 2011,C=US) ----- 4 ----- Certificate i=2 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
|
A D | 4.1.4.txt | 1 ----- Certificate i=0 (CN=Valid DSA Signatures EE Certificate Test4,O=Test Certificates 2011,C=US) … 4 ----- Certificate i=1 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
|
A D | 4.1.6.txt | 1 ----- Certificate i=0 (CN=Invalid DSA Signature EE Certificate Test6,O=Test Certificates 2011,C=US)… 4 ----- Certificate i=1 (CN=DSA CA,O=Test Certificates 2011,C=US) -----
|
A D | 4.12.3.txt | 1 ----- Certificate i=0 (CN=inhibitAnyPolicy EE Certificate Test3,O=Test Certificates 2011,C=US) ----- 5 ----- Certificate i=1 (CN=inhibitAnyPolicy1 subCA1,O=Test Certificates 2011,C=US) -----
|
A D | 4.8.3.txt | 1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test3,O=Test Certificates 2011,C=US) --… 5 ----- Certificate i=1 (CN=Policies P2 subCA,O=Test Certificates 2011,C=US) -----
|
A D | 4.8.8.txt | 1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test8,O=Test Certificates 2011,C=US) --… 5 ----- Certificate i=1 (CN=Policies P12 subsubCAP1P2,O=Test Certificates 2011,C=US) -----
|
A D | 4.8.9.txt | 1 ----- Certificate i=0 (CN=Different Policies EE Certificate Test9,O=Test Certificates 2011,C=US) --… 5 ----- Certificate i=1 (CN=Policies P123 subsubsubCAP12P2P1,O=Test Certificates 2011,C=US) -----
|
A D | 4.12.8.txt | 1 ----- Certificate i=0 (CN=Invalid Self-Issued inhibitAnyPolicy EE Certificate Test8,O=Test Certific… 5 ----- Certificate i=1 (CN=inhibitAnyPolicy1 subsubCA2,O=Test Certificates 2011,C=US) -----
|
A D | 4.8.2.txt | 1 ----- Certificate i=0 (CN=All Certificates No Policies EE Certificate Test2,O=Test Certificates 201… 5 ----- Certificate i=1 (CN=No Policies CA,O=Test Certificates 2011,C=US) -----
|
/pki/testdata/parse_certificate_unittest/ |
A D | tbs_v3_extensions.pem | 6 $ openssl asn1parse -i < [TBS CERTIFICATE] 34 $ openssl asn1parse -i < [SIGNATURE ALGORITHM] 41 $ openssl asn1parse -i < [ISSUER] 60 $ openssl asn1parse -i < [SUBJECT] 67 $ openssl asn1parse -i < [SPKI] 74 $ openssl asn1parse -i < [EXTENSIONS]
|