/pki/ |
A D | cert_errors.cc | 62 result += CertErrorIdToDebugString(id); in ToDebugString() 82 void CertErrors::AddError(CertErrorId id, in AddError() argument 87 void CertErrors::AddError(CertErrorId id) { AddError(id, nullptr); } in AddError() argument 89 void CertErrors::AddWarning(CertErrorId id, in AddWarning() argument 94 void CertErrors::AddWarning(CertErrorId id) { AddWarning(id, nullptr); } in AddWarning() argument 108 if (node.id == id && node.severity == severity) { in ContainsErrorWithSeverity() 115 bool CertErrors::ContainsError(CertErrorId id) const { in ContainsError() 158 if (errors.ContainsError(id)) { in ContainsError() 163 if (other_errors_.ContainsError(id)) { in ContainsError() 194 id_seen = node.id; in FindSingleHighSeverityError() [all …]
|
A D | cert_errors.h | 80 CertError(Severity severity, CertErrorId id, 90 CertErrorId id; member 104 void Add(CertError::Severity severity, CertErrorId id, 108 void AddError(CertErrorId id, std::unique_ptr<CertErrorParams> params); 109 void AddError(CertErrorId id); 112 void AddWarning(CertErrorId id, std::unique_ptr<CertErrorParams> params); 113 void AddWarning(CertErrorId id); 120 bool ContainsErrorWithSeverity(CertErrorId id, 125 bool ContainsError(CertErrorId id) const; 163 bool ContainsError(CertErrorId id) const;
|
A D | cert_error_id.cc | 19 const char *CertErrorIdToDebugString(CertErrorId id) { in CertErrorIdToDebugString() argument 21 return reinterpret_cast<const char *>(id); in CertErrorIdToDebugString()
|
A D | cert_error_id.h | 43 OPENSSL_EXPORT const char *CertErrorIdToDebugString(CertErrorId id);
|
A D | ocsp.cc | 561 const OCSPCertID &id, const ParsedCertificate *certificate, in CheckCertIDMatchesCertificate() argument 564 switch (id.hash_algorithm) { in CheckCertIDMatchesCertificate() 584 if (!VerifyHash(type, id.issuer_name_hash, certificate->tbs().issuer_tlv)) { in CheckCertIDMatchesCertificate() 593 if (!VerifyHash(type, id.issuer_key_hash, key_tlv)) { in CheckCertIDMatchesCertificate() 597 return id.serial_number == certificate->tbs().serial_number; in CheckCertIDMatchesCertificate() 625 const OCSPResponseData::ResponderID &id, const ParsedCertificate *cert) { in CheckResponderIDMatchesCertificate() argument 626 switch (id.type) { in CheckResponderIDMatchesCertificate() 630 if (!der::Parser(id.name).ReadTag(CBS_ASN1_SEQUENCE, &name_rdn) || in CheckResponderIDMatchesCertificate() 642 return VerifyHash(EVP_sha1(), id.key_hash, key); in CheckResponderIDMatchesCertificate()
|
A D | verify_certificate_chain.cc | 346 auto add_error_if_strict = [&](CertErrorId id) { in VerifyExtendedKeyUsage() argument 349 errors->AddError(id); in VerifyExtendedKeyUsage() 351 errors->AddWarning(id); in VerifyExtendedKeyUsage()
|
/pki/testdata/verify_name_match_unittest/scripts/ |
A D | generate_names.py | 36 n, id(self), n) 41 s += '[attrTypeAndValueSequence%i_%i]\n' % (id(self), n) 67 id(self), id(self)) 69 s += 'rdn%i = SET:rdnSet%i_%i\n' % (n, id(self), n) 74 s += '[rdnSet%i_%i]\n%s\n' % (id(self), n, rdn)
|
/pki/testdata/verify_signed_data_unittest/ |
A D | ecdsa-prime256v1-sha512-using-ecdh-key.pem | 2 algorithm OID for the public key has been changed from id-ecPublicKey 3 (1.2.840.10045.2.1) to id-ecDH (1.3.132.1.12)
|
A D | ecdsa-prime256v1-sha512-using-ecmqv-key.pem | 2 algorithm OID for the public key has been changed from id-ecPublicKey 3 (1.2.840.10045.2.1) to id-ecMQV (1.3.132.1.13)
|
A D | ecdsa-secp384r1-sha256-corrupted-data.pem | 10 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | ecdsa-prime256v1-sha512-spki-params-null.pem | 9 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | ecdsa-prime256v1-sha512-using-rsa-algorithm.pem | 11 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | rsa-using-ec-key.pem | 8 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | ecdsa-prime256v1-sha512-wrong-signature-format.pem | 11 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | ecdsa-prime256v1-sha512.pem | 13 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | rsa-pkcs1-sha256-using-id-ea-rsa.pem | 3 id-ea-rsa (2.5.8.1.1).
|
A D | ecdsa-prime256v1-sha512-unused-bits-signature.pem | 17 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
A D | ecdsa-secp384r1-sha256.pem | 41 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
|
/pki/testdata/verify_certificate_chain_unittest/target-serverauth-various-keyusages/ |
A D | ec-decipherOnly.pem | 17 Public Key Algorithm: id-ecPublicKey
|
A D | ec-digitalSignature.pem | 17 Public Key Algorithm: id-ecPublicKey
|
A D | ec-keyAgreement.pem | 17 Public Key Algorithm: id-ecPublicKey
|
A D | ec-keyEncipherment.pem | 17 Public Key Algorithm: id-ecPublicKey
|
/pki/testdata/verify_certificate_chain_unittest/target-signed-using-ecdsa/ |
A D | chain.pem | 98 Public Key Algorithm: id-ecPublicKey
|
/pki/testdata/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/ |
A D | chain.pem | 260 /Xa4hFF5ElpllYfsPRmwqwSUZKq85b/id/0HKDy1INpVLHkE8nFuMbRjFIBOw4Me
|