Home
last modified time | relevance | path

Searched refs:issuer (Results 1 – 25 of 30) sorted by relevance

12

/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-c2pamanifest/
A Dmake-chain.go45 func mustStartChain(path string, subject, issuer *templateAndKey) []byte {
46 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
63 func mustAppendToChain(path string, subject, issuer *templateAndKey) []byte {
64 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-c2patimestamping/
A Dmake-chain.go45 func mustStartChain(path string, subject, issuer *templateAndKey) []byte {
46 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
63 func mustAppendToChain(path string, subject, issuer *templateAndKey) []byte {
64 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
/pki/
A Docsp_unittest.cc182 std::shared_ptr<const ParsedCertificate> issuer = ParseCertificate(ca_data); in TEST_P() local
183 ASSERT_TRUE(issuer); in TEST_P()
186 ASSERT_TRUE(CreateOCSPRequest(cert.get(), issuer.get(), &encoded_request)); in TEST_P()
224 std::shared_ptr<const ParsedCertificate> issuer = ParseCertificate(ca_data); in TEST_P() local
225 ASSERT_TRUE(issuer); in TEST_P()
228 CreateOCSPGetURL(cert.get(), issuer.get(), GetParam()); in TEST_P()
A Docsp.h292 const ParsedCertificate *issuer,
297 const ParsedCertificate *cert, const ParsedCertificate *issuer,
A Dpath_builder.cc97 const ParsedCertificate *target, const ParsedCertificate *issuer) { in CalculateKeyIdentifierMatch() argument
107 issuer->subject_key_identifier()) { in CalculateKeyIdentifierMatch()
109 issuer->subject_key_identifier().value()) { in CalculateKeyIdentifierMatch()
122 const ParsedCertificate *issuer, in TrustAndKeyIdentifierMatchToOrder() argument
136 KeyIdentifierMatch key_id_match = CalculateKeyIdentifierMatch(target, issuer); in TrustAndKeyIdentifierMatchToOrder()
308 for (std::shared_ptr<const ParsedCertificate> &issuer : new_issuers) { in AddIssuers()
309 if (present_issuers_.find(BytesAsStringView(issuer->der_cert())) != in AddIssuers()
313 present_issuers_.insert(BytesAsStringView(issuer->der_cert())); in AddIssuers()
317 entry.cert = std::move(issuer); in AddIssuers()
A Docsp.cc1001 const ParsedCertificate *issuer, in CreateOCSPRequest() argument
1072 AppendHashAsOctetString(md, &req_cert, issuer->tbs().subject_tlv); in CreateOCSPRequest()
1075 if (!GetSubjectPublicKeyBytes(issuer->tbs().spki_tlv, &key_tlv)) { in CreateOCSPRequest()
1107 const ParsedCertificate *cert, const ParsedCertificate *issuer, in CreateOCSPGetURL() argument
1110 if (!CreateOCSPRequest(cert, issuer, &ocsp_request_der)) { in CreateOCSPGetURL()
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/
A D4.3.1.txt2 ERROR: subject does not match issuer
A D4.3.2.txt2 ERROR: subject does not match issuer
/pki/testdata/verify_certificate_chain_unittest/target-only/
A Dtrusted_leaf_require_self_signed.test7 ERROR: subject does not match issuer
A Dchain.pem4 issuer.
/pki/testdata/verify_certificate_chain_unittest/intermediate-eku-mlsclientauth/
A Dmake-mls-extensions.go65 func mustGenerateCertificate(path string, subject, issuer *templateAndKey) []byte {
66 …9.CreateCertificate(rand.Reader, &subject.template, &issuer.template, &subject.key.PublicKey, issu…
/pki/testdata/parse_certificate_unittest/
A Dissuer_bad_printable_string.pem31 ERROR: Failed normalizing issuer
A Dtbs_v2_issuer_unique_id.pem1 This is a version 2 certificate containing the issuer unique ID field.
A Dtbs_v2_issuer_and_subject_unique_id.pem1 This is a version 2 certificate containing both the issuer unique ID and
/pki/testdata/crl_unittest/
A Dgood_issuer_no_keyusage.pem3 Leaf covered by CRLs and not revoked, issuer has no keyUsage extension
A Dinvalid_garbage_issuer_name.pem3 CRL issuer is garbage
A Dbad_wrong_issuer.pem3 issuer name in CRL is different
A Dgood_issuer_name_normalization.pem3 Good, non-revoked, but issuer name in CRL requires case folding
A Dinvalid_issuer_keyusage_no_crlsign.pem3 Leaf covered by CRLs and not revoked, issuer has keyUsage extension without the cRLSign bit set
/pki/testdata/path_builder_unittest/key_id_name_and_serial_prioritization/
A Dint_match_name_only.pem3 Intermediate with same issuer name & different serial
A Dint_matching.pem3 Intermediate with matching issuer name & serial
A Dint_mismatch.pem3 Intermediate with different issuer name & serial
/pki/testdata/ocsp_unittest/
A Docsp_sign_direct.pem1 Signed directly by the issuer
/pki/testdata/verify_certificate_chain_unittest/key-rollover/
A Dnewchain.pem5 but is signed by oldroot, all with the same subject and issuer.
6 There are two intermediates with the same key, subject and issuer
A Doldchain.pem5 but is signed by oldroot, all with the same subject and issuer.
6 There are two intermediates with the same key, subject and issuer

Completed in 26 milliseconds

12