/pki/testdata/parse_certificate_unittest/ |
A D | regenerate_pem_from_ascii.py | 49 def replace_string(original, start, end, replacement): argument 51 return original[0:start] + replacement + original[end:] 64 return replace_string(template, m.start(1), m.end(1), value) 108 modified = replace_string(orig, m.start(1), m.end(1),
|
A D | rebase-errors.py | 82 def replace_string(original, start, end, replacement): argument 84 return original[0:start] + replacement + original[end:] 107 contents = replace_string(contents, m.start(1), m.end(1),
|
A D | v3_certificate_template.txt | 127 # (For adding in another extension at the end of the list)
|
/pki/ |
A D | nist_pkits_unittest.cc | 50 size_t end = line.find_last_not_of(" \n\t\r\f\v"); in SetPolicySetFromString() local 51 if (end == std::string::npos) { in SetPolicySetFromString() 54 std::string policy_name = line.substr(start, end + 1); in SetPolicySetFromString()
|
A D | verify_name_match.cc | 74 for (; read_iter != output->end() && *read_iter == ' '; ++read_iter) { in NormalizeDirectoryString() 78 for (; read_iter != output->end(); ++read_iter) { in NormalizeDirectoryString() 85 if (next_iter != output->end() && *next_iter != ' ') { in NormalizeDirectoryString() 114 if (write_iter != output->end()) { in NormalizeDirectoryString() 115 output->erase(write_iter, output->end()); in NormalizeDirectoryString() 231 for (; b_iter != b_type_and_values.end(); ++b_iter) { in VerifyRdnMatch() 237 if (b_iter == b_type_and_values.end()) { in VerifyRdnMatch()
|
A D | test_helpers.cc | 91 size_t end = str.find_last_not_of(' '); in StripString() local 92 if (end != str.npos) { in StripString() 93 ++end; in StripString() 95 return std::string(str.substr(0, end)); in StripString() 276 size_t end = line.find_last_not_of(" \n\t\r\f\v"); in ReadVerifyCertChainTestFromFile() local 277 if (end == std::string::npos) { in ReadVerifyCertChainTestFromFile() 280 line = line.substr(start, end + 1); in ReadVerifyCertChainTestFromFile() 387 std::set<std::string>(split_value.begin(), split_value.end()); in ReadVerifyCertChainTestFromFile()
|
A D | mock_signature_verify_cache.cc | 34 if (iter == cache_.end()) { in Check()
|
A D | string_util.cc | 38 return std::equal(str1.begin(), str1.end(), str2.begin(), str2.end(), in IsEqualNoCase() 143 for (auto i = text.begin(); i != text.end(); ++i) { in CollapseWhitespaceASCII()
|
A D | certificate_policies.cc | 220 std::sort(policy_oids->begin(), policy_oids->end()); in ParseCertificatePoliciesExtensionImpl() 222 std::adjacent_find(policy_oids->begin(), policy_oids->end()); in ParseCertificatePoliciesExtensionImpl() 223 if (dupe_policy_iter != policy_oids->end()) { in ParseCertificatePoliciesExtensionImpl()
|
A D | input.h | 91 constexpr Span<const uint8_t>::iterator end() const { return data_.end(); } in end() function
|
A D | crl.cc | 52 std::sort(a.begin(), a.end()); in ContainsExactMatchingName() 53 std::sort(b.begin(), b.end()); in ContainsExactMatchingName() 55 std::set_intersection(a.begin(), a.end(), b.begin(), b.end(), in ContainsExactMatchingName()
|
A D | pem.cc | 66 for (it = block_types_.begin(); it != block_types_.end(); ++it) { in GetNext() 100 if (it == block_types_.end()) { in GetNext()
|
A D | cert_issuer_source_sync_unittest.h | 112 std::sort(der_result_matches.begin(), der_result_matches.end()); in IssuersMatch() 118 std::sort(der_expected_matches.begin(), der_expected_matches.end()); in IssuersMatch()
|
A D | trust_store_in_memory.cc | 70 distrusted_spkis_.end()) { in GetTrust()
|
A D | trust_store.cc | 163 for (auto i = ++split.begin(); i != split.end(); ++i) { in FromDebugString()
|
A D | path_builder.cc | 310 present_issuers_.end()) { in AddIssuers() 346 issuers_.begin() + cur_issuer_, issuers_.end(), in SortRemainingIssuers() 380 return present_certs_.find(GetKey(cert)) != present_certs_.end(); in IsPresent()
|
A D | parsed_certificate.cc | 78 if (it == extensions_.end()) { in GetExtension()
|
A D | verify_certificate_chain.cc | 641 if (iter != levels_[i - 1].end()) { in GetUserConstrainedPolicySet() 682 if (issuer_policy_iter == levels_.back().end()) { in AddPolicyMapping() 937 if (iter != previous_level.expected_policy_map.end()) { in VerifyPolicies()
|
A D | parse_certificate.cc | 726 if (it == unconsumed_extensions->end()) { in ConsumeExtension()
|
/pki/testdata/verify_signed_data_unittest/ |
A D | rsa-pkcs1-sha1-bad-key-der-null.pem | 5 at the end.
|
A D | annotate_test_data.py | 153 comment_start = match.end()
|
A D | ecdsa-secp384r1-sha256.pem | 23 # Find the offset of the signature algorithm near the end (496 in this case)
|
A D | rsa-pkcs1-sha256.pem | 23 # Find the offset of the signature algorithm near the end (491 in this case)
|
A D | rsa2048-pkcs1-sha512.pem | 23 # Find the offset of the signature algorithm near the end (589 in this case)
|
/pki/testdata/ocsp_unittest/ |
A D | annotate_test_data.py | 206 comment_start = match.end()
|