/pki/ |
A D | parsed_certificate.cc | 103 result->cert_ = der::Input(CRYPTO_BUFFER_data(result->cert_data_.get()), in Create() 106 if (!ParseCertificate(result->cert_, &result->tbs_certificate_tlv_, in Create() 113 if (!ParseTbsCertificate(result->tbs_certificate_tlv_, options, &result->tbs_, in Create() 120 result->signature_algorithm_ = in Create() 143 if (result->tbs_.extensions_tlv) { in Create() 166 result->has_key_usage_ = true; in Create() 207 result->name_constraints_ = in Create() 209 if (!result->name_constraints_) { in Create() 221 &result->ca_issuers_uris_, &result->ocsp_uris_)) { in Create() 229 result->has_policy_oids_ = true; in Create() [all …]
|
A D | trust_store.h | 51 CertificateTrust result; in ForTrustAnchor() local 53 return result; in ForTrustAnchor() 57 CertificateTrust result; in ForTrustAnchorOrLeaf() local 59 return result; in ForTrustAnchorOrLeaf() 65 return result; in ForTrustedLeaf() 70 return result; in ForUnspecified() 76 return result; in ForDistrusted() 82 return result; 89 return result; 96 return result; [all …]
|
A D | path_builder_unittest.cc | 181 if (!*result) { in ReadTestCert() 1322 EXPECT_TRUE(result.paths[result.best_result_index]->IsValid()); in TEST_F() 1323 const auto &path = *result.paths[result.best_result_index]; in TEST_F() 1473 const auto &path = *result.paths[result.paths.size() - 1]; in TEST_F() 2141 ASSERT_LT(result.best_result_index, result.paths.size()); in TEST_F() 2156 ASSERT_LT(result.best_result_index, result.paths.size()); in TEST_F() 2172 ASSERT_LT(result.best_result_index, result.paths.size()); in TEST_F() 2362 ASSERT_LT(result.best_result_index, result.paths.size()); in TEST_F() 2364 result.paths[result.best_result_index].get(); in TEST_F() 2394 ASSERT_LT(result.best_result_index, result.paths.size()); in TEST_F() [all …]
|
A D | trust_store.cc | 100 std::string result; in ToDebugString() local 103 result = kUnspecifiedStr; in ToDebugString() 106 result = kDistrustedStr; in ToDebugString() 109 result = kTrustedAnchorStr; in ToDebugString() 115 result = kTrustedLeafStr; in ToDebugString() 119 result += '+'; in ToDebugString() 120 result += kEnforceAnchorExpiry; in ToDebugString() 123 result += '+'; in ToDebugString() 127 result += '+'; in ToDebugString() 131 result += '+'; in ToDebugString() [all …]
|
A D | parse_name_unittest.cc | 37 {"NAME", result}, in LoadTestData() 53 std::string result; in TEST() local 66 std::string result; in TEST() local 79 std::string result; in TEST() local 93 std::string result; in TEST() local 103 std::string result; in TEST() local 119 std::string result; in TEST() local 132 std::string result; in TEST() local 145 std::string result; in TEST() local 154 std::string result; in TEST() local [all …]
|
A D | cert_errors.cc | 53 std::string result; in ToDebugString() local 56 result += "WARNING: "; in ToDebugString() 59 result += "ERROR: "; in ToDebugString() 63 result += +"\n"; in ToDebugString() 69 return result; in ToDebugString() 97 std::string result; in ToDebugString() local 99 result += node.ToDebugString(); in ToDebugString() 102 return result; in ToDebugString() 209 std::ostringstream result; in ToDebugString() local 239 result << other_errors << "\n"; in ToDebugString() [all …]
|
A D | pem_unittest.cc | 206 std::optional<std::string> result = PEMDecodeSingle(data, "SINGLE"); in TEST() local 207 ASSERT_TRUE(result); in TEST() 208 EXPECT_EQ(*result, "block body"); in TEST() 223 std::vector<PEMToken> result = PEMDecode(data, accepted_types); in TEST() local 224 EXPECT_EQ(result.size(), 2u); in TEST() 225 EXPECT_EQ(result[0].type, "MULTI-1"); in TEST() 226 EXPECT_EQ(result[0].data, "block body 1"); in TEST() 227 EXPECT_EQ(result[1].type, "MULTI-2"); in TEST() 228 EXPECT_EQ(result[1].data, "block body 2"); in TEST() 237 EXPECT_FALSE(result); in TEST() [all …]
|
A D | trust_store_collection.cc | 38 CertificateTrust result = CertificateTrust::ForUnspecified(); in GetTrust() local 47 result = cur_trust; in GetTrust() 48 if (result.IsDistrusted()) { in GetTrust() 54 return result; in GetTrust()
|
A D | cert_issuer_source_static.cc | 32 std::vector<std::shared_ptr<const ParsedCertificate>> result; in Certs() local 33 result.reserve(intermediates_.size()); in Certs() 35 result.push_back(cert); in Certs() 37 return result; in Certs()
|
A D | path_builder_verify_certificate_chain_unittest.cc | 49 CertPathBuilder::Result result = path_builder.Run(); in Verify() local 50 EXPECT_EQ(!test.HasHighSeverityErrors(), result.HasValidPath()); in Verify() 51 if (result.HasValidPath()) { in Verify() 54 result.GetBestValidPath()->user_constrained_policy_set, in Verify()
|
A D | cert_error_params.cc | 43 std::string result; in ToDebugString() local 44 AppendDer(name1_, der1_, &result); in ToDebugString() 46 result += "\n"; in ToDebugString() 47 AppendDer(name2_, der2_, &result); in ToDebugString() 49 return result; in ToDebugString()
|
A D | path_builder_pkits_unittest.cc | 243 CertPathBuilder::Result result = path_builder.Run(); in RunTest() local 245 if (info.should_validate != result.HasValidPath()) { in RunTest() 247 for (size_t i = 0; i < result.paths.size(); ++i) { in RunTest() 249 result.paths[i].get(); in RunTest() 253 ASSERT_EQ(info.should_validate, result.HasValidPath()) << msg; in RunTest() 256 if (result.HasValidPath()) { in RunTest() 258 result.GetBestValidPath()->user_constrained_policy_set); in RunTest()
|
A D | string_util.cc | 134 std::string result; in CollapseWhitespaceASCII() local 135 result.resize(text.size()); in CollapseWhitespaceASCII() 148 result[chars_written++] = L' '; in CollapseWhitespaceASCII() 160 result[chars_written++] = *i; in CollapseWhitespaceASCII() 169 result.resize(chars_written); in CollapseWhitespaceASCII() 170 return result; in CollapseWhitespaceASCII()
|
A D | certificate.cc | 75 std::shared_ptr<const bssl::ParsedCertificate> result = in FromDER() local 77 if (result == nullptr) { in FromDER() 82 internals->cert = std::move(result); in FromDER()
|
A D | verify.cc | 312 CertPathBuilder::Result result = path_builder.Run(); in CertificateVerifyInternal() local 315 out_status->iteration_count_ = result.iteration_count; in CertificateVerifyInternal() 316 out_status->max_depth_seen_ = result.max_depth_seen; in CertificateVerifyInternal() 319 *out_error = result.GetBestPathVerifyError(); in CertificateVerifyInternal() 321 if (result.HasValidPath()) { in CertificateVerifyInternal() 324 auto best_path = result.GetBestValidPath(); in CertificateVerifyInternal() 331 for (const auto &path : result.paths) { in CertificateVerifyInternal()
|
A D | cert_issuer_source_sync_unittest.h | 32 std::string *result) { in ReadTestPem() argument 34 {block_name.c_str(), result}, in ReadTestPem() 42 std::shared_ptr<const ParsedCertificate> *result) { in ReadTestCert() argument 51 *result = ParsedCertificate::Create( in ReadTestCert() 55 if (!*result) { in ReadTestCert()
|
A D | parse_values_unittest.cc | 230 uint64_t result; in TEST() local 232 ParseUint64(Input(test_case.input, test_case.length), &result)); in TEST() 234 EXPECT_EQ(test_case.expected_value, result); in TEST() 267 uint8_t result; in TEST() local 269 ParseUint8(Input(test_case.input, test_case.length), &result)); in TEST() 271 EXPECT_EQ(test_case.expected_value, result); in TEST()
|
A D | encode_values.h | 38 const der::GeneralizedTime &generalized, int64_t *result);
|
A D | encode_values.cc | 68 int64_t *result) { in GeneralizedTimeToPosixTime() argument 81 return OPENSSL_tm_to_posix(&tmp_tm, result); in GeneralizedTimeToPosixTime()
|
A D | certificate_policies_unittest.cc | 29 std::string *result) { in LoadTestData() argument 33 {"CERTIFICATE POLICIES", result}, in LoadTestData() 139 bool result = ParseCertificatePoliciesExtensionOids( in TEST_P() local 144 EXPECT_FALSE(result); in TEST_P() 146 EXPECT_TRUE(result); in TEST_P()
|
A D | general_names_unittest.cc | 28 std::string *result) { in LoadTestData() argument 32 {token, result}, in LoadTestData() 39 const std::string &basename, std::string *result) { in LoadTestSubjectAltNameData() argument 40 return LoadTestData("SUBJECT ALTERNATIVE NAME", basename, result); in LoadTestSubjectAltNameData()
|
/pki/testdata/verify_signed_data_unittest/ |
A D | annotate_test_data.py | 35 result = '' 38 if len(result) != 0: 39 result += '\n' 45 result += user_comment 53 result += generated_comment + '\n' 58 return result 103 result = '' 106 result += text[pos : pos + column_width] + '\n' 108 return result 112 result = base64.b64encode(data) [all …]
|
/pki/testdata/ocsp_unittest/ |
A D | annotate_test_data.py | 36 result = '' 39 if len(result) != 0: 40 result += '\n' 46 result += user_comment 49 result += generated_comment + '\n' 54 return result 156 result = '' 159 result += text[pos : pos + column_width] + '\n' 161 return result 165 result = base64.b64encode(data) [all …]
|
/pki/testdata/nist-pkits/ |
A D | generate_tests.py | 165 result = TestSections() 169 result.description_lines = [] 173 result.description_lines.append(lines[i]) 178 result.procedure_lines = [] 182 result.procedure_lines.append(lines[i]) 187 result.expected_result_lines = [] 191 result.expected_result_lines.append(lines[i]) 196 result.cert_path_lines = [] 200 result.cert_path_lines.append(lines[i]) 203 return i, result
|
/pki/testdata/crl_unittest/ |
A D | generate_crl_test_data.py | 109 result = dict(cert=cert, pkey=pkey) 111 signer = result 112 result['signer'] = signer 113 return result
|