/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-c2pamanifest/ |
A D | make-chain.go | 45 func mustStartChain(path string, subject, issuer *templateAndKey) []byte { 46 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu… 63 func mustAppendToChain(path string, subject, issuer *templateAndKey) []byte { 64 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
|
/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-c2patimestamping/ |
A D | make-chain.go | 45 func mustStartChain(path string, subject, issuer *templateAndKey) []byte { 46 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu… 63 func mustAppendToChain(path string, subject, issuer *templateAndKey) []byte { 64 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
|
/pki/ |
A D | ocsp_unittest.cc | 182 std::shared_ptr<const ParsedCertificate> issuer = ParseCertificate(ca_data); in TEST_P() local 183 ASSERT_TRUE(issuer); in TEST_P() 186 ASSERT_TRUE(CreateOCSPRequest(cert.get(), issuer.get(), &encoded_request)); in TEST_P() 224 std::shared_ptr<const ParsedCertificate> issuer = ParseCertificate(ca_data); in TEST_P() local 225 ASSERT_TRUE(issuer); in TEST_P() 228 CreateOCSPGetURL(cert.get(), issuer.get(), GetParam()); in TEST_P()
|
A D | ocsp.h | 292 const ParsedCertificate *issuer, 297 const ParsedCertificate *cert, const ParsedCertificate *issuer,
|
A D | path_builder.cc | 97 const ParsedCertificate *target, const ParsedCertificate *issuer) { in CalculateKeyIdentifierMatch() argument 107 issuer->subject_key_identifier()) { in CalculateKeyIdentifierMatch() 109 issuer->subject_key_identifier().value()) { in CalculateKeyIdentifierMatch() 122 const ParsedCertificate *issuer, in TrustAndKeyIdentifierMatchToOrder() argument 136 KeyIdentifierMatch key_id_match = CalculateKeyIdentifierMatch(target, issuer); in TrustAndKeyIdentifierMatchToOrder() 308 for (std::shared_ptr<const ParsedCertificate> &issuer : new_issuers) { in AddIssuers() 309 if (present_issuers_.find(BytesAsStringView(issuer->der_cert())) != in AddIssuers() 313 present_issuers_.insert(BytesAsStringView(issuer->der_cert())); in AddIssuers() 317 entry.cert = std::move(issuer); in AddIssuers()
|
A D | ocsp.cc | 1001 const ParsedCertificate *issuer, in CreateOCSPRequest() argument 1072 AppendHashAsOctetString(md, &req_cert, issuer->tbs().subject_tlv); in CreateOCSPRequest() 1075 if (!GetSubjectPublicKeyBytes(issuer->tbs().spki_tlv, &key_tlv)) { in CreateOCSPRequest() 1107 const ParsedCertificate *cert, const ParsedCertificate *issuer, in CreateOCSPGetURL() argument 1110 if (!CreateOCSPRequest(cert, issuer, &ocsp_request_der)) { in CreateOCSPGetURL()
|
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/ |
A D | 4.3.1.txt | 2 ERROR: subject does not match issuer
|
A D | 4.3.2.txt | 2 ERROR: subject does not match issuer
|
/pki/testdata/verify_certificate_chain_unittest/target-only/ |
A D | trusted_leaf_require_self_signed.test | 7 ERROR: subject does not match issuer
|
A D | chain.pem | 4 issuer.
|
/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-mlsclientauth/ |
A D | make-mls-extensions.go | 65 func mustGenerateCertificate(path string, subject, issuer *templateAndKey) []byte { 66 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
|
/pki/testdata/parse_certificate_unittest/ |
A D | issuer_bad_printable_string.pem | 31 ERROR: Failed normalizing issuer
|
A D | tbs_v2_issuer_unique_id.pem | 1 This is a version 2 certificate containing the issuer unique ID field.
|
A D | tbs_v2_issuer_and_subject_unique_id.pem | 1 This is a version 2 certificate containing both the issuer unique ID and
|
/pki/testdata/crl_unittest/ |
A D | good_issuer_no_keyusage.pem | 3 Leaf covered by CRLs and not revoked, issuer has no keyUsage extension
|
A D | invalid_garbage_issuer_name.pem | 3 CRL issuer is garbage
|
A D | bad_wrong_issuer.pem | 3 issuer name in CRL is different
|
A D | good_issuer_name_normalization.pem | 3 Good, non-revoked, but issuer name in CRL requires case folding
|
A D | invalid_issuer_keyusage_no_crlsign.pem | 3 Leaf covered by CRLs and not revoked, issuer has keyUsage extension without the cRLSign bit set
|
/pki/testdata/path_builder_unittest/key_id_name_and_serial_prioritization/ |
A D | int_match_name_only.pem | 3 Intermediate with same issuer name & different serial
|
A D | int_matching.pem | 3 Intermediate with matching issuer name & serial
|
A D | int_mismatch.pem | 3 Intermediate with different issuer name & serial
|
/pki/testdata/ocsp_unittest/ |
A D | ocsp_sign_direct.pem | 1 Signed directly by the issuer
|
/pki/testdata/verify_certificate_chain_unittest/key-rollover/ |
A D | newchain.pem | 5 but is signed by oldroot, all with the same subject and issuer. 6 There are two intermediates with the same key, subject and issuer
|
A D | oldchain.pem | 5 but is signed by oldroot, all with the same subject and issuer. 6 There are two intermediates with the same key, subject and issuer
|