Lines Matching full:ca
89 ROOT_CA = CreateCert('Test CA', None)
90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable
91 CA_LINK = CreateCert('Test OCSP Signer', CA, True)
92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False)
93 CERT = CreateCert('Test Cert', CA)
197 signer = CA
290 def Store(fname, description, ca, data): argument
291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1])
299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'),
308 CA,
314 CA,
319 CA,
324 CA,
329 CA,
331 Store('ocsp_sign_direct', 'Signed directly by the issuer', CA,
332 Create(signer=CA, certs=[]))
333 Store('ocsp_sign_indirect', 'Signed indirectly through an intermediate', CA,
336 'Signed indirectly through a missing intermediate', CA,
339 'Signed through an intermediate without the correct key usage', CA,
341 Store('ocsp_extra_certs', 'Includes extra certs', CA,
342 Create(signer=CA, certs=[CA, CA_LINK]))
343 Store('has_version', 'Includes a default version V1', CA, Create(version=1))
347 CA,
348 Create(responder=GetName(CA)))
359 CA,
360 Create(responder=GetKeyHash(CA)))
364 CA,
370 CA,
373 'Is a valid response for the cert with a SHA256 signature', CA,
378 CA,
383 CA,
388 CA,
395 CA,
400 CA,
408 CA,
416 CA,
422 'Has a critical extension in the SingleResponse', CA,
429 'Has a critical extension in the ResponseData', CA,
435 'Has a critical CT extension in the SingleResponse', CA,
445 Store('missing_response', 'Missing a response for the cert', CA,