Home
last modified time | relevance | path

Searched refs:it (Results 1 – 25 of 38) sorted by relevance

12

/pki/
A Dtrust_store_in_memory.cc62 for (auto it = range.first; it != range.second; ++it) { in SyncGetIssuersOf() local
63 issuers->push_back(it->second.cert); in SyncGetIssuersOf()
101 for (auto it = range.first; it != range.second; ++it) { in GetEntry() local
102 if (cert == it->second.cert.get() || in GetEntry()
103 cert->der_cert() == it->second.cert->der_cert()) { in GetEntry()
105 return &it->second; in GetEntry()
A Dpem.cc64 std::vector<PEMType>::const_iterator it; in GetNext() local
66 for (it = block_types_.begin(); it != block_types_.end(); ++it) { in GetNext()
67 if (!bssl::string_util::StartsWith(str_.substr(pos_), it->header)) { in GetNext()
73 std::string_view::size_type footer_pos = str_.find(it->footer, pos_); in GetNext()
80 std::string_view::size_type data_begin = pos_ + it->header.size(); in GetNext()
81 pos_ = footer_pos + it->footer.size(); in GetNext()
82 block_type_ = it->type; in GetNext()
100 if (it == block_types_.end()) { in GetNext()
A Dcert_issuer_source_static.cc44 for (auto it = range.first; it != range.second; ++it) { in SyncGetIssuersOf() local
45 issuers->push_back(it->second); in SyncGetIssuersOf()
A Dcert_issuer_source_sync_unittest.h109 for (const auto &it : matches) { in IssuersMatch() local
110 der_result_matches.push_back(it->der_cert()); in IssuersMatch()
115 for (const auto &it : expected_matches) { in IssuersMatch() local
116 der_expected_matches.push_back(it->der_cert()); in IssuersMatch()
A Dparsed_certificate.cc77 auto it = extensions_.find(extension_oid); in GetExtension() local
78 if (it == extensions_.end()) { in GetExtension()
83 *parsed_extension = it->second; in GetExtension()
/pki/testdata/verify_certificate_chain_unittest/target-has-ca-basic-constraints/
A Dmain.test7 WARNING: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
A Dstrict.test7 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
/pki/testdata/verify_certificate_chain_unittest/target-not-end-entity/
A Dmain.test8 WARNING: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
A Dstrict-leaf.test9 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
A Dstrict.test9 ERROR: Certificate has Basic Constraints indicating it is a CA when it should not be a CA
/pki/testdata/verify_certificate_chain_unittest/
A DREADME12 CERTIFICATE blocks. In most cases it will generate a single chain called
50 certificate in the chain (i.e. whether it is a trust anchor or not). This
67 "errors" - This has special parsing rules: it is interpreted as the
69 error string (this allows embedding newlines in it).
71 Additionally, it is possible to add python-style comments by starting a line
/pki/testdata/parse_certificate_unittest/
A Dtbs_v1_extensions.pem1 This is an otherwise valid TBSCertificate, however it lacks a version (making
2 it v1). As such extensions are not allowed.
A Dcert_empty_sequence.pem1 This is an empty SEQUENCE. It will fail to be parsed as a Certificate since it
A Dserial_not_number.pem1 This cert has an invalid serial number - it is NULL rather than being an INTEGER.
A Dsubject_key_identifier_not_octet_string.pem1 This cert has an invalid subjectKeyIdentifier - it is INTEGER rather than being
A Dcert_missing_signature.pem2 it is missing the final field (signature).
A Dextension_critical_0.pem4 DER-encoding it should be omitted.
A Dserial_not_minimal.pem1 This cert has an invalid serial number, as it is a non-minimal DER encoding of 1.
A Dtbs_explicit_v1.pem2 explicitly as 0. Instead it should have been omitted.
/pki/testdata/verify_signed_data_unittest/
A Drsa-pkcs1-sha1-bad-key-der-length.pem2 been increased by 2 (which makes it invalid).
A Decdsa-using-rsa-key.pem2 HOWEVER it provides an RSA key. Verification should fail.
A Drsa-using-ec-key.pem2 signature), HOWEVER it provides an EC key. Verification should fail.
A Drsa-pkcs1-sha1-bad-key-der-null.pem4 The DER can still be parsed, however it should fail due to the unconsumed data
A DREADME6 This script will apply a uniform formatting. For instance it will add a
A Decdsa-prime256v1-sha512-wrong-signature-format.pem3 Rather than encoding the signature into a DER-encoded Ecdsa-Sig-Value, it is a

Completed in 32 milliseconds

12