Home
last modified time | relevance | path

Searched refs:id (Results 1 – 24 of 24) sorted by relevance

/pki/
A Dcert_errors.cc62 result += CertErrorIdToDebugString(id); in ToDebugString()
82 void CertErrors::AddError(CertErrorId id, in AddError() argument
87 void CertErrors::AddError(CertErrorId id) { AddError(id, nullptr); } in AddError() argument
89 void CertErrors::AddWarning(CertErrorId id, in AddWarning() argument
94 void CertErrors::AddWarning(CertErrorId id) { AddWarning(id, nullptr); } in AddWarning() argument
108 if (node.id == id && node.severity == severity) { in ContainsErrorWithSeverity()
115 bool CertErrors::ContainsError(CertErrorId id) const { in ContainsError()
158 if (errors.ContainsError(id)) { in ContainsError()
163 if (other_errors_.ContainsError(id)) { in ContainsError()
194 id_seen = node.id; in FindSingleHighSeverityError()
[all …]
A Dcert_errors.h80 CertError(Severity severity, CertErrorId id,
90 CertErrorId id; member
104 void Add(CertError::Severity severity, CertErrorId id,
108 void AddError(CertErrorId id, std::unique_ptr<CertErrorParams> params);
109 void AddError(CertErrorId id);
112 void AddWarning(CertErrorId id, std::unique_ptr<CertErrorParams> params);
113 void AddWarning(CertErrorId id);
120 bool ContainsErrorWithSeverity(CertErrorId id,
125 bool ContainsError(CertErrorId id) const;
163 bool ContainsError(CertErrorId id) const;
A Dcert_error_id.cc19 const char *CertErrorIdToDebugString(CertErrorId id) { in CertErrorIdToDebugString() argument
21 return reinterpret_cast<const char *>(id); in CertErrorIdToDebugString()
A Dcert_error_id.h43 OPENSSL_EXPORT const char *CertErrorIdToDebugString(CertErrorId id);
A Docsp.cc561 const OCSPCertID &id, const ParsedCertificate *certificate, in CheckCertIDMatchesCertificate() argument
564 switch (id.hash_algorithm) { in CheckCertIDMatchesCertificate()
584 if (!VerifyHash(type, id.issuer_name_hash, certificate->tbs().issuer_tlv)) { in CheckCertIDMatchesCertificate()
593 if (!VerifyHash(type, id.issuer_key_hash, key_tlv)) { in CheckCertIDMatchesCertificate()
597 return id.serial_number == certificate->tbs().serial_number; in CheckCertIDMatchesCertificate()
625 const OCSPResponseData::ResponderID &id, const ParsedCertificate *cert) { in CheckResponderIDMatchesCertificate() argument
626 switch (id.type) { in CheckResponderIDMatchesCertificate()
630 if (!der::Parser(id.name).ReadTag(CBS_ASN1_SEQUENCE, &name_rdn) || in CheckResponderIDMatchesCertificate()
642 return VerifyHash(EVP_sha1(), id.key_hash, key); in CheckResponderIDMatchesCertificate()
A Dverify_certificate_chain.cc346 auto add_error_if_strict = [&](CertErrorId id) { in VerifyExtendedKeyUsage() argument
349 errors->AddError(id); in VerifyExtendedKeyUsage()
351 errors->AddWarning(id); in VerifyExtendedKeyUsage()
/pki/testdata/verify_name_match_unittest/scripts/
A Dgenerate_names.py36 n, id(self), n)
41 s += '[attrTypeAndValueSequence%i_%i]\n' % (id(self), n)
67 id(self), id(self))
69 s += 'rdn%i = SET:rdnSet%i_%i\n' % (n, id(self), n)
74 s += '[rdnSet%i_%i]\n%s\n' % (id(self), n, rdn)
/pki/testdata/verify_signed_data_unittest/
A Decdsa-prime256v1-sha512-using-ecdh-key.pem2 algorithm OID for the public key has been changed from id-ecPublicKey
3 (1.2.840.10045.2.1) to id-ecDH (1.3.132.1.12)
A Decdsa-prime256v1-sha512-using-ecmqv-key.pem2 algorithm OID for the public key has been changed from id-ecPublicKey
3 (1.2.840.10045.2.1) to id-ecMQV (1.3.132.1.13)
A Decdsa-secp384r1-sha256-corrupted-data.pem10 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Decdsa-prime256v1-sha512-spki-params-null.pem9 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Decdsa-prime256v1-sha512-using-rsa-algorithm.pem11 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Drsa-using-ec-key.pem8 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Decdsa-prime256v1-sha512-wrong-signature-format.pem11 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Decdsa-prime256v1-sha512.pem13 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Drsa-pkcs1-sha256-using-id-ea-rsa.pem3 id-ea-rsa (2.5.8.1.1).
A Decdsa-prime256v1-sha512-unused-bits-signature.pem17 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
A Decdsa-secp384r1-sha256.pem41 4:d=2 hl=2 l= 7 prim: OBJECT :id-ecPublicKey
/pki/testdata/verify_certificate_chain_unittest/target-serverauth-various-keyusages/
A Dec-decipherOnly.pem17 Public Key Algorithm: id-ecPublicKey
A Dec-digitalSignature.pem17 Public Key Algorithm: id-ecPublicKey
A Dec-keyAgreement.pem17 Public Key Algorithm: id-ecPublicKey
A Dec-keyEncipherment.pem17 Public Key Algorithm: id-ecPublicKey
/pki/testdata/verify_certificate_chain_unittest/target-signed-using-ecdsa/
A Dchain.pem98 Public Key Algorithm: id-ecPublicKey
/pki/testdata/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/
A Dchain.pem260 /Xa4hFF5ElpllYfsPRmwqwSUZKq85b/id/0HKDy1INpVLHkE8nFuMbRjFIBOw4Me

Completed in 21 milliseconds