Home
last modified time | relevance | path

Searched refs:name_constraints (Results 1 – 25 of 36) sorted by relevance

12

/external/cronet/tot/third_party/boringssl/src/pki/
Dname_constraints_unittest.cc61 const NameConstraints *name_constraints, der::Input subject_rdn_sequence, in IsPermittedCert() argument
64 name_constraints->IsPermittedCert(subject_rdn_sequence, subject_alt_names, in IsPermittedCert()
106 std::unique_ptr<NameConstraints> name_constraints( in TEST_P() local
108 ASSERT_TRUE(name_constraints); in TEST_P()
110 EXPECT_TRUE(name_constraints->IsPermittedDNSName("permitted.example.com")); in TEST_P()
111 EXPECT_TRUE(name_constraints->IsPermittedDNSName("permitted.example.com.")); in TEST_P()
112 EXPECT_TRUE(name_constraints->IsPermittedDNSName("a.permitted.example.com")); in TEST_P()
113 EXPECT_FALSE(name_constraints->IsPermittedDNSName("apermitted.example.com")); in TEST_P()
114 EXPECT_FALSE(name_constraints->IsPermittedDNSName("apermitted.example.com.")); in TEST_P()
116 name_constraints->IsPermittedDNSName("alsopermitted.example.com")); in TEST_P()
[all …]
Dname_constraints.cc285 auto name_constraints = std::make_unique<NameConstraints>(); in Create() local
286 if (!name_constraints->Parse(extension_value, is_critical, errors)) { in Create()
289 return name_constraints; in Create()
294 auto name_constraints = std::make_unique<NameConstraints>(); in CreateFromPermittedSubtrees() local
296 name_constraints->constrained_name_types_ = in CreateFromPermittedSubtrees()
298 name_constraints->permitted_subtrees_ = std::move(permitted_subtrees); in CreateFromPermittedSubtrees()
300 return name_constraints; in CreateFromPermittedSubtrees()
Dparsed_certificate.h174 const NameConstraints &name_constraints() const { in name_constraints() function
Dverify_certificate_chain.cc1117 name_constraints_list_.push_back(&cert.name_constraints()); in PrepareForNextCertificate()
1336 name_constraints_list_.push_back(&cert.name_constraints()); in ApplyTrustAnchorConstraints()
/external/cronet/stable/third_party/boringssl/src/pki/
Dname_constraints_unittest.cc61 const NameConstraints *name_constraints, der::Input subject_rdn_sequence, in IsPermittedCert() argument
64 name_constraints->IsPermittedCert(subject_rdn_sequence, subject_alt_names, in IsPermittedCert()
106 std::unique_ptr<NameConstraints> name_constraints( in TEST_P() local
108 ASSERT_TRUE(name_constraints); in TEST_P()
110 EXPECT_TRUE(name_constraints->IsPermittedDNSName("permitted.example.com")); in TEST_P()
111 EXPECT_TRUE(name_constraints->IsPermittedDNSName("permitted.example.com.")); in TEST_P()
112 EXPECT_TRUE(name_constraints->IsPermittedDNSName("a.permitted.example.com")); in TEST_P()
113 EXPECT_FALSE(name_constraints->IsPermittedDNSName("apermitted.example.com")); in TEST_P()
114 EXPECT_FALSE(name_constraints->IsPermittedDNSName("apermitted.example.com.")); in TEST_P()
116 name_constraints->IsPermittedDNSName("alsopermitted.example.com")); in TEST_P()
[all …]
Dname_constraints.cc285 auto name_constraints = std::make_unique<NameConstraints>(); in Create() local
286 if (!name_constraints->Parse(extension_value, is_critical, errors)) { in Create()
289 return name_constraints; in Create()
294 auto name_constraints = std::make_unique<NameConstraints>(); in CreateFromPermittedSubtrees() local
296 name_constraints->constrained_name_types_ = in CreateFromPermittedSubtrees()
298 name_constraints->permitted_subtrees_ = std::move(permitted_subtrees); in CreateFromPermittedSubtrees()
300 return name_constraints; in CreateFromPermittedSubtrees()
Dparsed_certificate.h174 const NameConstraints &name_constraints() const { in name_constraints() function
Dverify_certificate_chain.cc1117 name_constraints_list_.push_back(&cert.name_constraints()); in PrepareForNextCertificate()
1336 name_constraints_list_.push_back(&cert.name_constraints()); in ApplyTrustAnchorConstraints()
/external/rust/android-crates-io/crates/webpki/src/
Dtrust_anchor.rs26 pub name_constraints: Option<&'a [u8]>, field
81 name_constraints: cert.name_constraints.map(|nc| nc.as_slice_less_safe()), in from()
104 name_constraints: None, in parse_cert_v1()
Dverify_cert.rs188 let mut name_constraints = trust_anchor.name_constraints.map(untrusted::Input::from); in check_signed_chain_name_constraints() localVariable
191 untrusted::read_all_optional(name_constraints, Error::BadDer, |value| { in check_signed_chain_name_constraints()
197 name_constraints = cert.name_constraints; in check_signed_chain_name_constraints()
Dcert.rs33 pub name_constraints: Option<untrusted::Input<'a>>, field
94 name_constraints: None, in parse_cert_internal()
200 30 => &mut cert.name_constraints, in remember_extension()
/external/tpm2-tss/script/ekca/
Droot-ca.cnf81 nameConstraints = critical, @name_constraints
115 [ name_constraints ]
/external/openscreen/cast/common/certificate/
Dcast_cert_validator_internal.cc193 for (const auto& name_constraints : path_name_constraints) { in VerifyCertificateChain() local
194 if (NAME_CONSTRAINTS_check(subject, name_constraints.get()) != in VerifyCertificateChain()
286 for (const auto& name_constraints : path_name_constraints) { in VerifyCertificateChain() local
287 if (NAME_CONSTRAINTS_check(path.back().cert, name_constraints.get()) != in VerifyCertificateChain()
/external/rust/android-crates-io/crates/h2/examples/
Dakamai.rs23 ta.name_constraints, in main()
/external/cronet/stable/net/test/
Dcert_builder.cc493 CBB name_constraints; in SetNameConstraintsDnsNames() local
495 ASSERT_TRUE(CBB_add_asn1(cbb.get(), &name_constraints, CBS_ASN1_SEQUENCE)); in SetNameConstraintsDnsNames()
498 AddNameConstraintsSubTrees(&name_constraints, permitted_dns_names)); in SetNameConstraintsDnsNames()
502 AddNameConstraintsSubTrees(&name_constraints, excluded_dns_names)); in SetNameConstraintsDnsNames()
/external/cronet/tot/net/test/
Dcert_builder.cc493 CBB name_constraints; in SetNameConstraintsDnsNames() local
495 ASSERT_TRUE(CBB_add_asn1(cbb.get(), &name_constraints, CBS_ASN1_SEQUENCE)); in SetNameConstraintsDnsNames()
498 AddNameConstraintsSubTrees(&name_constraints, permitted_dns_names)); in SetNameConstraintsDnsNames()
502 AddNameConstraintsSubTrees(&name_constraints, excluded_dns_names)); in SetNameConstraintsDnsNames()
/external/pigweed/third_party/chromium_verifier/
Dsources.gni40 "net/cert/internal/name_constraints.cc",
/external/cronet/stable/third_party/boringssl/src/crypto/obj/
Dobj_mac.num660 name_constraints 666
/external/boringssl/src/crypto/obj/
Dobj_mac.num660 name_constraints 666
/external/cronet/tot/third_party/boringssl/src/crypto/obj/
Dobj_mac.num660 name_constraints 666
/external/boringssl/
DBUILD.generated.bzl738 "src/pki/name_constraints.h",
779 "src/pki/name_constraints.cc",
Dsources.bp870 "src/pki/name_constraints.cc",
/external/cronet/tot/third_party/boringssl/
Dsources.bp875 "src/pki/name_constraints.cc",
/external/cronet/stable/third_party/boringssl/
Dsources.bp875 "src/pki/name_constraints.cc",
/external/google-cloud-java/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/
Dresources.proto927 NameConstraints name_constraints = 6 [(google.api.field_behavior) = OPTIONAL]; field

12