/pki/ |
A D | trust_store_in_memory.cc | 62 for (auto it = range.first; it != range.second; ++it) { in SyncGetIssuersOf() local 63 issuers->push_back(it->second.cert); in SyncGetIssuersOf() 101 for (auto it = range.first; it != range.second; ++it) { in GetEntry() local 102 if (cert == it->second.cert.get() || in GetEntry() 103 cert->der_cert() == it->second.cert->der_cert()) { in GetEntry() 105 return &it->second; in GetEntry()
|
A D | pem.cc | 64 std::vector<PEMType>::const_iterator it; in GetNext() local 66 for (it = block_types_.begin(); it != block_types_.end(); ++it) { in GetNext() 67 if (!bssl::string_util::StartsWith(str_.substr(pos_), it->header)) { in GetNext() 73 std::string_view::size_type footer_pos = str_.find(it->footer, pos_); in GetNext() 80 std::string_view::size_type data_begin = pos_ + it->header.size(); in GetNext() 81 pos_ = footer_pos + it->footer.size(); in GetNext() 82 block_type_ = it->type; in GetNext() 100 if (it == block_types_.end()) { in GetNext()
|
A D | cert_issuer_source_static.cc | 44 for (auto it = range.first; it != range.second; ++it) { in SyncGetIssuersOf() local 45 issuers->push_back(it->second); in SyncGetIssuersOf()
|
A D | cert_issuer_source_sync_unittest.h | 109 for (const auto &it : matches) { in IssuersMatch() local 110 der_result_matches.push_back(it->der_cert()); in IssuersMatch() 115 for (const auto &it : expected_matches) { in IssuersMatch() local 116 der_expected_matches.push_back(it->der_cert()); in IssuersMatch()
|
A D | parsed_certificate.cc | 77 auto it = extensions_.find(extension_oid); in GetExtension() local 78 if (it == extensions_.end()) { in GetExtension() 83 *parsed_extension = it->second; in GetExtension()
|
/pki/testdata/verify_certificate_chain_unittest/target-has-ca-basic-constraints/ |
A D | main.test | 7 WARNING: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
|
A D | strict.test | 7 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
|
/pki/testdata/verify_certificate_chain_unittest/target-not-end-entity/ |
A D | main.test | 8 WARNING: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
|
A D | strict-leaf.test | 9 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
|
A D | strict.test | 9 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
|
/pki/testdata/verify_certificate_chain_unittest/ |
A D | README | 12 CERTIFICATE blocks. In most cases it will generate a single chain called 50 certificate in the chain (i.e. whether it is a trust anchor or not). This 67 "errors" - This has special parsing rules: it is interpreted as the 69 error string (this allows embedding newlines in it). 71 Additionally, it is possible to add python-style comments by starting a line
|
/pki/testdata/parse_certificate_unittest/ |
A D | tbs_v1_extensions.pem | 1 This is an otherwise valid TBSCertificate, however it lacks a version (making 2 it v1). As such extensions are not allowed.
|
A D | cert_empty_sequence.pem | 1 This is an empty SEQUENCE. It will fail to be parsed as a Certificate since it
|
A D | serial_not_number.pem | 1 This cert has an invalid serial number - it is NULL rather than being an INTEGER.
|
A D | subject_key_identifier_not_octet_string.pem | 1 This cert has an invalid subjectKeyIdentifier - it is INTEGER rather than being
|
A D | cert_missing_signature.pem | 2 it is missing the final field (signature).
|
A D | extension_critical_0.pem | 4 DER-encoding it should be omitted.
|
A D | serial_not_minimal.pem | 1 This cert has an invalid serial number, as it is a non-minimal DER encoding of 1.
|
A D | tbs_explicit_v1.pem | 2 explicitly as 0. Instead it should have been omitted.
|
/pki/testdata/verify_signed_data_unittest/ |
A D | rsa-pkcs1-sha1-bad-key-der-length.pem | 2 been increased by 2 (which makes it invalid).
|
A D | ecdsa-using-rsa-key.pem | 2 HOWEVER it provides an RSA key. Verification should fail.
|
A D | rsa-using-ec-key.pem | 2 signature), HOWEVER it provides an EC key. Verification should fail.
|
A D | rsa-pkcs1-sha1-bad-key-der-null.pem | 4 The DER can still be parsed, however it should fail due to the unconsumed data
|
A D | README | 6 This script will apply a uniform formatting. For instance it will add a
|
A D | ecdsa-prime256v1-sha512-wrong-signature-format.pem | 3 Rather than encoding the signature into a DER-encoded Ecdsa-Sig-Value, it is a
|