Home
last modified time | relevance | path

Searched refs:cn (Results 1 - 25 of 60) sorted by relevance

123

/third_party/openssl/test/certs/
H A Dmkcert.sh100 local cn=$1; shift
113 csr=$(req "$key" "CN = $cn") || return 1
127 *) echo "Usage: $0 genca [-p EKU][-c policyoid] cn keyname certname cakeyname cacertname" >&2
133 local cn=$1; shift
154 csr=$(req "$key" "CN = $cn") || return 1
161 local cn=$1; shift
175 csr=$(req "$key" "CN = $cn") || return 1
246 *) echo "Usage: $0 genee [-p EKU] cn keyname certname cakeyname cacertname" >&2
252 local cn=$1; shift
263 "subjectAltName = @alts" "DNS=${cn}")
[all...]
/third_party/selinux/libsepol/src/
H A Dconditional.c193 cond_node_t * cn) in cond_node_search()
196 cond_node_t *result = cond_node_find(p, cn, list, &was_created); in cond_node_search()
344 int cond_normalize_expr(policydb_t * p, cond_node_t * cn) in cond_normalize_expr() argument
353 cn->nbools = 0; in cond_normalize_expr()
355 memset(cn->bool_ids, 0, sizeof(cn->bool_ids)); in cond_normalize_expr()
356 cn->expr_pre_comp = 0x0; in cond_normalize_expr()
360 e = cn->expr; in cond_normalize_expr()
375 tmp = cn->true_list; in cond_normalize_expr()
376 cn in cond_normalize_expr()
192 cond_node_search(policydb_t * p, cond_node_t * list, cond_node_t * cn) cond_node_search() argument
[all...]
/third_party/pulseaudio/src/pulsecore/
H A Dauth-cookie.c43 pa_auth_cookie* pa_auth_cookie_get(pa_core *core, const char *cn, bool create, size_t size) { in pa_auth_cookie_get() argument
50 t = pa_sprintf_malloc("auth-cookie%s%s", cn ? "@" : "", cn ? cn : ""); in pa_auth_cookie_get()
70 if (pa_authkey_load(cn, create, (uint8_t*) c + PA_ALIGN(sizeof(pa_auth_cookie)), size) < 0) { in pa_auth_cookie_get()
/third_party/mbedtls/library/
H A Dx509_crt.c274 static int x509_check_wildcard(const char *cn, const mbedtls_x509_buf *name) in x509_check_wildcard() argument
277 size_t cn_idx = 0, cn_len = strlen(cn); in x509_check_wildcard()
285 if (cn[i] == '.') { in x509_check_wildcard()
296 x509_memcasecmp(name->p + 1, cn + cn_idx, name->len - 1) == 0) { in x509_check_wildcard()
2875 size_t mbedtls_x509_crt_parse_cn_inet_pton(const char *cn, void *dst) in mbedtls_x509_crt_parse_cn_inet_pton() argument
2877 return strchr(cn, ':') == NULL in mbedtls_x509_crt_parse_cn_inet_pton()
2878 ? x509_inet_pton_ipv4(cn, dst) == 0 ? 4 : 0 in mbedtls_x509_crt_parse_cn_inet_pton()
2879 : x509_inet_pton_ipv6(cn, dst) == 0 ? 16 : 0; in mbedtls_x509_crt_parse_cn_inet_pton()
2886 const char *cn, size_t cn_len) in x509_crt_check_cn()
2890 x509_memcasecmp(cn, nam in x509_crt_check_cn()
2885 x509_crt_check_cn(const mbedtls_x509_buf *name, const char *cn, size_t cn_len) x509_crt_check_cn() argument
2902 x509_crt_check_san_ip(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san_ip() argument
2923 x509_crt_check_san_uri(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san_uri() argument
2941 x509_crt_check_san(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san() argument
2982 x509_crt_verify_name(const mbedtls_x509_crt *crt, const char *cn, uint32_t *flags) x509_crt_verify_name() argument
3053 x509_crt_verify_restartable_ca_cb(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy, mbedtls_x509_crt_restart_ctx *rs_ctx) x509_crt_verify_restartable_ca_cb() argument
3149 mbedtls_x509_crt_verify(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify() argument
3166 mbedtls_x509_crt_verify_with_profile(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify_with_profile() argument
3185 mbedtls_x509_crt_verify_with_ca_cb(mbedtls_x509_crt *crt, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify_with_ca_cb() argument
3200 mbedtls_x509_crt_verify_restartable(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy, mbedtls_x509_crt_restart_ctx *rs_ctx) mbedtls_x509_crt_verify_restartable() argument
[all...]
/third_party/mesa3d/src/mesa/math/
H A Dm_eval.c114 * control net cn.
118 _math_horner_bezier_surf(GLfloat * cn, GLfloat * out, GLfloat u, GLfloat v, in _math_horner_bezier_surf() argument
121 GLfloat *cp = cn + uorder * vorder * dim; in _math_horner_bezier_surf()
131 GLfloat *ucp = &cn[j * dim]; in _math_horner_bezier_surf()
155 else /* uorder=1 -> cn defines a curve in v */ in _math_horner_bezier_surf()
156 _math_horner_bezier_curve(cn, out, v, dim, vorder); in _math_horner_bezier_surf()
164 for (i = 0; i < uorder; i++, cn += uinc) { in _math_horner_bezier_surf()
165 /* For constant i all cn[i][j] (j=0..vorder) are located */ in _math_horner_bezier_surf()
169 _math_horner_bezier_curve(cn, &cp[i * dim], v, dim, vorder); in _math_horner_bezier_surf()
175 else /* vorder=1 -> cn define in _math_horner_bezier_surf()
195 _math_de_casteljau_surf(GLfloat * cn, GLfloat * out, GLfloat * du, GLfloat * dv, GLfloat u, GLfloat v, GLuint dim, GLuint uorder, GLuint vorder) _math_de_casteljau_surf() argument
[all...]
H A Dm_eval.h75 * control net cn.
79 _math_horner_bezier_surf(GLfloat *cn, GLfloat *out, GLfloat u, GLfloat v,
94 * values in the control net cn.
98 _math_de_casteljau_surf(GLfloat *cn, GLfloat *out, GLfloat *du, GLfloat *dv,
/third_party/node/lib/
H A Dtls.js322 const cn = subject.CN;
324 if (ArrayIsArray(cn))
325 valid = ArrayPrototypeSome(cn, wildcard);
326 else if (cn)
327 valid = wildcard(cn);
330 reason = `Host: ${hostname}. is not cert's CN: ${cn}`;
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/
H A Dcipher_cts.c137 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs1_decrypt() local
158 memcpy(cn.c, in + residue, CTS_BLOCK_SIZE); in cts128_cs1_decrypt()
192 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs1_decrypt()
239 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs3_decrypt() local
264 memcpy(cn.c, in, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
298 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
/third_party/openssl/providers/implementations/ciphers/
H A Dcipher_cts.c137 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs1_decrypt() local
158 memcpy(cn.c, in + residue, CTS_BLOCK_SIZE); in cts128_cs1_decrypt()
192 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs1_decrypt()
239 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs3_decrypt() local
264 memcpy(cn.c, in, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
298 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
/third_party/node/deps/openssl/openssl/crypto/chacha/asm/
H A Dchacha-x86.pl74 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next
93 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn));
99 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_-$j++)&3),($an,$bn,$cn,$dn));
108 &mov ($c_,&DWP(4*$cn,"esp")) if ($ai>0 && $ai<3);
382 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next
401 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn));
407 ($an,$bn,$cn,
[all...]
/third_party/openssl/crypto/chacha/asm/
H A Dchacha-x86.pl74 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next
93 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn));
99 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_-$j++)&3),($an,$bn,$cn,$dn));
108 &mov ($c_,&DWP(4*$cn,"esp")) if ($ai>0 && $ai<3);
382 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next
401 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn));
407 ($an,$bn,$cn,
[all...]
/third_party/pulseaudio/src/modules/raop/
H A Dmodule-raop-discover.c168 char *tp = NULL, *et = NULL, *cn = NULL; in resolver_cb() local
227 } else if (pa_streq(key, "cn")) { in resolver_cb()
233 pa_xfree(cn); in resolver_cb()
235 cn = pa_xstrdup("ALAC"); in resolver_cb()
237 cn = pa_xstrdup("PCM"); in resolver_cb()
278 pa_xfree(cn); in resolver_cb()
321 if (cn != NULL) { in resolver_cb()
323 args = pa_sprintf_malloc("%s codec=%s", args, cn); in resolver_cb()
324 pa_xfree(cn); in resolver_cb()
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dtests.rs97 let cn = subject.entries_by_nid(Nid::COMMONNAME).next().unwrap(); in test_subject_read_cn()
98 assert_eq!(cn.data().as_slice(), b"foobar.com") in test_subject_read_cn()
107 let cn = subject.entries_by_nid(Nid::COMMONNAME).next().unwrap(); in test_nid_values()
108 assert_eq!(cn.data().as_slice(), b"example.com"); in test_nid_values()
134 let cn = all_entries.next().unwrap(); in test_nameref_iterator()
135 assert_eq!(cn.object().nid().as_raw(), Nid::COMMONNAME.as_raw()); in test_nameref_iterator()
136 assert_eq!(cn.data().as_slice(), b"example.com"); in test_nameref_iterator()
153 let cn = subject.entries_by_nid(Nid::USERID).next().unwrap(); in test_nid_uid_value()
154 assert_eq!(cn.data().as_slice(), b"this is the userId"); in test_nid_uid_value()
228 let mut cn in test_authority_issuer_and_serial() variables
[all...]
/third_party/nghttp2/src/
H A Dshrpx_tls.cc1863 auto cn = get_common_name(cert); in verify_numeric_hostname() local
1864 if (cn.empty()) { in verify_numeric_hostname()
1868 // cn is not NULL terminated in verify_numeric_hostname()
1869 auto rv = util::streq(hostname, cn); in verify_numeric_hostname()
1870 OPENSSL_free(const_cast<char *>(cn.c_str())); in verify_numeric_hostname()
1928 auto cn = get_common_name(cert); in verify_dns_hostname() local
1929 if (cn.empty()) { in verify_dns_hostname()
1933 if (cn[cn.size() - 1] == '.') { in verify_dns_hostname()
1934 if (cn in verify_dns_hostname()
2191 auto cn = get_common_name(cert); cert_lookup_tree_add_ssl_ctx() local
[all...]
/third_party/ffmpeg/libavfilter/
H A Dvf_chromanr.c138 int cn = 1; \
159 cn++; \
164 out_uptr[x] = (su + (cn >> 1)) / cn; \
165 out_vptr[x] = (sv + (cn >> 1)) / cn; \
/third_party/toybox/toys/pending/
H A Dtcpsvd.c46 long cn;
185 if (TT.cn > 1) xprintf("%s: status %d/%d\n",toys.which->name, TT.count_all, TT.cn); in handle_exit()
307 if (TT.count_all < TT.cn) { in tcpsvd_main()
381 if (TT.cn > 1) in tcpsvd_main()
382 xprintf("%s: status %d/%d\n",toys.which->name, TT.count_all, TT.cn); in tcpsvd_main()
/third_party/libcoap/src/
H A Dcoap_mbedtls.c365 char *cn = NULL; in cert_verify_callback_mbedtls() local
370 cn = get_san_or_cn_from_cert(crt); in cert_verify_callback_mbedtls()
377 "The certificate has expired", cn ? cn : "?", depth); in cert_verify_callback_mbedtls()
385 "The certificate has a future date", cn ? cn : "?", depth); in cert_verify_callback_mbedtls()
393 "The certificate has a bad MD hash", cn ? cn : "?", depth); in cert_verify_callback_mbedtls()
401 "The certificate has a short RSA length", cn ? cn in cert_verify_callback_mbedtls()
[all...]
H A Dcoap_openssl.c1860 char *cn; in get_san_or_cn_from_cert() local
1878 cn = OPENSSL_strdup(dns_name); in get_san_or_cn_from_cert()
1880 return cn; in get_san_or_cn_from_cert()
1890 cn = buffer; in get_san_or_cn_from_cert()
1892 if (((cn[0] == 'C') || (cn[0] == 'c')) && in get_san_or_cn_from_cert()
1893 ((cn[1] == 'N') || (cn[1] == 'n')) && in get_san_or_cn_from_cert()
1894 (cn[2] == '=')) { in get_san_or_cn_from_cert()
1895 cn in get_san_or_cn_from_cert()
1924 char *cn = get_san_or_cn_from_cert(x509); tls_verify_call_back() local
[all...]
/third_party/musl/libc-test/src/functionalext/supplement/stdio/
H A Dfwrite.c104 int cn = read(fds[pipeRead], buf, sizeof(buf)); in fwrite_0400() local
105 EXPECT_MT("fwrite_0400", cn, 0); in fwrite_0400()
/third_party/mbedtls/include/mbedtls/
H A Dx509_crt.h644 * \param cn The expected Common Name. This will be checked to be
673 const char *cn, uint32_t *flags,
692 * \param cn The expected Common Name. This may be \c NULL if the
715 const char *cn, uint32_t *flags,
730 * \param cn The expected Common Name. This may be \c NULL if the
749 const char *cn, uint32_t *flags,
800 * \param cn The expected Common Name. This may be \c NULL if the
815 const char *cn, uint32_t *flags,
/third_party/selinux/libsepol/include/sepol/policydb/
H A Dconditional.h101 extern int cond_normalize_expr(policydb_t * p, cond_node_t * cn);
112 cond_node_t * cn);
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dv3_ncons.c313 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen)
341 if ((utf8_length = ASN1_STRING_to_UTF8(&utf8_value, cn)) < 0)
425 ASN1_STRING *cn;
433 cn = X509_NAME_ENTRY_get_data(ne);
436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK)
/third_party/openssl/crypto/x509/
H A Dv3_ncons.c313 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen)
341 if ((utf8_length = ASN1_STRING_to_UTF8(&utf8_value, cn)) < 0)
425 ASN1_STRING *cn;
433 cn = X509_NAME_ENTRY_get_data(ne);
436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK)
/third_party/libevdev/doc/html/search/
H A Dsearch.js31 var cn = c.charCodeAt(0);
36 else if (cn<16)
38 result+="_0"+cn.toString(16);
42 result+="_"+cn.toString(16);
/third_party/skia/third_party/externals/oboe/docs/reference/search/
H A Dsearch.js30 var cn = c.charCodeAt(0);
35 else if (cn<16)
37 result+="_0"+cn.toString(16);
41 result+="_"+cn.toString(16);

Completed in 26 milliseconds

123