Lines Matching refs:get
427 PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr)); in CertFromPEM()
435 PEM_read_bio_X509_CRL(bio.get(), nullptr, nullptr, nullptr)); in CRLFromPEM()
444 PEM_read_bio_PrivateKey(bio.get(), nullptr, nullptr, nullptr)); in PrivateKeyFromPEM()
456 if (!sk_X509_push(stack.get(), cert)) { in CertsToStack()
474 if (!sk_X509_CRL_push(stack.get(), crl)) { in CRLsToStack()
507 X509_STORE_set0_additional_untrusted(store.get(), in Verify()
508 intermediates_stack.get()); in Verify()
512 ctx.get(), store.get(), leaf, in Verify()
513 use_additional_untrusted ? nullptr : intermediates_stack.get())) { in Verify()
517 X509_STORE_CTX_trusted_stack(ctx.get(), roots_stack.get()); in Verify()
518 X509_STORE_CTX_set0_crls(ctx.get(), crls_stack.get()); in Verify()
529 X509_STORE_CTX_set0_param(ctx.get(), param); in Verify()
532 if (X509_verify_cert(ctx.get()) != 1) { in Verify()
533 return X509_STORE_CTX_get_error(ctx.get()); in Verify()
580 Verify(leaf.get(), empty, empty, empty_crls)); in TEST()
582 Verify(leaf.get(), empty, {intermediate.get()}, empty_crls)); in TEST()
585 Verify(leaf.get(), {root.get()}, {intermediate.get()}, empty_crls)); in TEST()
587 Verify(leaf.get(), {cross_signing_root.get()}, in TEST()
588 {intermediate.get(), root_cross_signed.get()}, empty_crls)); in TEST()
590 Verify(leaf.get(), {cross_signing_root.get(), root.get()}, in TEST()
591 {intermediate.get(), root_cross_signed.get()}, empty_crls)); in TEST()
596 Verify(leaf.get(), {root.get()}, in TEST()
597 {intermediate.get(), root_cross_signed.get()}, empty_crls)); in TEST()
599 Verify(leaf.get(), {root.get()}, in TEST()
600 {intermediate.get(), root_cross_signed.get()}, empty_crls, in TEST()
603 Verify(forgery.get(), {intermediate_self_signed.get()}, in TEST()
604 {leaf_no_key_usage.get()}, empty_crls)); in TEST()
609 Verify(forgery.get(), in TEST()
610 {intermediate_self_signed.get(), root_cross_signed.get()}, in TEST()
611 {leaf_no_key_usage.get(), intermediate.get()}, empty_crls)); in TEST()
635 ASSERT_EQ(X509_V_OK, Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
636 {basic_crl.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
639 Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
640 {basic_crl.get(), revoked_crl.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
644 Verify(leaf.get(), {root.get()}, {root.get()}, empty_crls, in TEST()
647 Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
648 {bad_issuer_crl.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
650 Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
651 {known_critical_crl.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
653 Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
654 {unknown_critical_crl.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
656 Verify(leaf.get(), {root.get()}, {root.get()}, in TEST()
657 {unknown_critical_crl2.get()}, X509_V_FLAG_CRL_CHECK)); in TEST()
664 bssl::UniquePtr<EVP_PKEY> pkey(X509_get_pubkey(cert.get())); in TEST()
667 ASSERT_TRUE(X509_verify(cert.get(), pkey.get())); in TEST()
674 bssl::UniquePtr<EVP_PKEY> pkey(X509_get_pubkey(cert.get())); in TEST()
677 ASSERT_FALSE(X509_verify(cert.get(), pkey.get())); in TEST()
685 bssl::UniquePtr<EVP_PKEY> pkey(X509_get_pubkey(cert.get())); in TEST()
688 ASSERT_TRUE(X509_verify(cert.get(), pkey.get())); in TEST()
695 bssl::UniquePtr<EVP_PKEY> pkey(X509_get_pubkey(cert.get())); in TEST()
698 ASSERT_FALSE(X509_verify(cert.get(), pkey.get())); in TEST()
709 if (!cert || !X509_sign_ctx(cert.get(), md_ctx)) { in SignatureRoundTrips()
715 return !!X509_verify(cert.get(), pkey); in SignatureRoundTrips()
724 EVP_DigestSignInit(md_ctx.get(), NULL, EVP_sha256(), NULL, pkey.get())); in TEST()
725 ASSERT_TRUE(SignatureRoundTrips(md_ctx.get(), pkey.get())); in TEST()
730 ASSERT_TRUE(EVP_DigestSignInit(md_ctx.get(), &pkey_ctx, EVP_sha256(), NULL, in TEST()
731 pkey.get())); in TEST()
734 ASSERT_TRUE(SignatureRoundTrips(md_ctx.get(), pkey.get())); in TEST()
748 EVP_DigestSignInit(md_ctx.get(), nullptr, nullptr, nullptr, priv.get())); in TEST()
749 ASSERT_TRUE(SignatureRoundTrips(md_ctx.get(), pub.get())); in TEST()
762 if (!PEM_read_bio(bio.get(), &name, &header, &data, &data_len)) { in PEMToDER()
781 CRYPTO_BUFFER_new(data.get(), data_len, nullptr)); in TEST()
783 bssl::UniquePtr<X509> root(X509_parse_from_buffer(buf.get())); in TEST()
787 const uint8_t *buf_pointer = CRYPTO_BUFFER_data(buf.get()); in TEST()
789 ASSERT_LT(enc_pointer, buf_pointer + CRYPTO_BUFFER_len(buf.get())); in TEST()
803 OPENSSL_memcpy(trailing_data.get(), data.get(), data_len); in TEST()
806 CRYPTO_BUFFER_new(trailing_data.get(), data_len + 1, nullptr)); in TEST()
810 X509_parse_from_buffer(buf_trailing_data.get())); in TEST()
820 CRYPTO_BUFFER_new(data.get(), data_len, nullptr)); in TEST()
823 bssl::UniquePtr<X509> root(X509_parse_from_buffer(buf.get())); in TEST()
827 ASN1_INTEGER_set(fourty_two.get(), 42); in TEST()
828 X509_set_serialNumber(root.get(), fourty_two.get()); in TEST()
830 ASSERT_EQ(static_cast<long>(data_len), i2d_X509(root.get(), nullptr)); in TEST()
834 ASSERT_NE(static_cast<long>(data_len), i2d_X509(root.get(), nullptr)); in TEST()
843 CRYPTO_BUFFER_new(data.get(), data_len, nullptr)); in TEST()
846 bssl::UniquePtr<X509> root(X509_parse_from_buffer(buf.get())); in TEST()
853 X509 *x509p = root.get(); in TEST()
854 const uint8_t *inp = data2.get(); in TEST()
856 ASSERT_EQ(root.get(), ret); in TEST()
864 int i2d_len = i2d_X509(root.get(), &i2d); in TEST()
871 ASSERT_EQ(0, OPENSSL_memcmp(data2.get(), i2d, i2d_len)); in TEST()
882 bssl::UniquePtr<X509> cert(X509_parse_from_buffer(buf.get())); in TEST()
892 OPENSSL_memcpy(data_with_trailing_byte.get(), data.get(), data_len); in TEST()
896 CRYPTO_BUFFER_new(data_with_trailing_byte.get(), data_len + 1, nullptr)); in TEST()
900 X509_parse_from_buffer(buf_with_trailing_byte.get())); in TEST()
945 ASSERT_TRUE(ASN1_STRING_set(tm.get(), t.val, strlen(t.val))); in TEST()
946 const int ok = ASN1_UTCTIME_print(bio.get(), tm.get()); in TEST()
950 ASSERT_TRUE(BIO_mem_contents(bio.get(), &contents, &len)); in TEST()