/third_party/openssl/test/certs/ |
H A D | mkcert.sh | 100 local cn=$1; shift 113 csr=$(req "$key" "CN = $cn") || return 1 127 *) echo "Usage: $0 genca [-p EKU][-c policyoid] cn keyname certname cakeyname cacertname" >&2 133 local cn=$1; shift 154 csr=$(req "$key" "CN = $cn") || return 1 161 local cn=$1; shift 175 csr=$(req "$key" "CN = $cn") || return 1 246 *) echo "Usage: $0 genee [-p EKU] cn keyname certname cakeyname cacertname" >&2 252 local cn=$1; shift 263 "subjectAltName = @alts" "DNS=${cn}") [all...] |
/third_party/selinux/libsepol/src/ |
H A D | conditional.c | 193 cond_node_t * cn) in cond_node_search() 196 cond_node_t *result = cond_node_find(p, cn, list, &was_created); in cond_node_search() 344 int cond_normalize_expr(policydb_t * p, cond_node_t * cn) in cond_normalize_expr() argument 353 cn->nbools = 0; in cond_normalize_expr() 355 memset(cn->bool_ids, 0, sizeof(cn->bool_ids)); in cond_normalize_expr() 356 cn->expr_pre_comp = 0x0; in cond_normalize_expr() 360 e = cn->expr; in cond_normalize_expr() 375 tmp = cn->true_list; in cond_normalize_expr() 376 cn in cond_normalize_expr() 192 cond_node_search(policydb_t * p, cond_node_t * list, cond_node_t * cn) cond_node_search() argument [all...] |
/third_party/pulseaudio/src/pulsecore/ |
H A D | auth-cookie.c | 43 pa_auth_cookie* pa_auth_cookie_get(pa_core *core, const char *cn, bool create, size_t size) { in pa_auth_cookie_get() argument 50 t = pa_sprintf_malloc("auth-cookie%s%s", cn ? "@" : "", cn ? cn : ""); in pa_auth_cookie_get() 70 if (pa_authkey_load(cn, create, (uint8_t*) c + PA_ALIGN(sizeof(pa_auth_cookie)), size) < 0) { in pa_auth_cookie_get()
|
/third_party/mbedtls/library/ |
H A D | x509_crt.c | 274 static int x509_check_wildcard(const char *cn, const mbedtls_x509_buf *name) in x509_check_wildcard() argument 277 size_t cn_idx = 0, cn_len = strlen(cn); in x509_check_wildcard() 285 if (cn[i] == '.') { in x509_check_wildcard() 296 x509_memcasecmp(name->p + 1, cn + cn_idx, name->len - 1) == 0) { in x509_check_wildcard() 2875 size_t mbedtls_x509_crt_parse_cn_inet_pton(const char *cn, void *dst) in mbedtls_x509_crt_parse_cn_inet_pton() argument 2877 return strchr(cn, ':') == NULL in mbedtls_x509_crt_parse_cn_inet_pton() 2878 ? x509_inet_pton_ipv4(cn, dst) == 0 ? 4 : 0 in mbedtls_x509_crt_parse_cn_inet_pton() 2879 : x509_inet_pton_ipv6(cn, dst) == 0 ? 16 : 0; in mbedtls_x509_crt_parse_cn_inet_pton() 2886 const char *cn, size_t cn_len) in x509_crt_check_cn() 2890 x509_memcasecmp(cn, nam in x509_crt_check_cn() 2885 x509_crt_check_cn(const mbedtls_x509_buf *name, const char *cn, size_t cn_len) x509_crt_check_cn() argument 2902 x509_crt_check_san_ip(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san_ip() argument 2923 x509_crt_check_san_uri(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san_uri() argument 2941 x509_crt_check_san(const mbedtls_x509_sequence *san, const char *cn, size_t cn_len) x509_crt_check_san() argument 2982 x509_crt_verify_name(const mbedtls_x509_crt *crt, const char *cn, uint32_t *flags) x509_crt_verify_name() argument 3053 x509_crt_verify_restartable_ca_cb(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy, mbedtls_x509_crt_restart_ctx *rs_ctx) x509_crt_verify_restartable_ca_cb() argument 3149 mbedtls_x509_crt_verify(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify() argument 3166 mbedtls_x509_crt_verify_with_profile(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify_with_profile() argument 3185 mbedtls_x509_crt_verify_with_ca_cb(mbedtls_x509_crt *crt, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) mbedtls_x509_crt_verify_with_ca_cb() argument 3200 mbedtls_x509_crt_verify_restartable(mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy, mbedtls_x509_crt_restart_ctx *rs_ctx) mbedtls_x509_crt_verify_restartable() argument [all...] |
/third_party/mesa3d/src/mesa/math/ |
H A D | m_eval.c | 114 * control net cn. 118 _math_horner_bezier_surf(GLfloat * cn, GLfloat * out, GLfloat u, GLfloat v, in _math_horner_bezier_surf() argument 121 GLfloat *cp = cn + uorder * vorder * dim; in _math_horner_bezier_surf() 131 GLfloat *ucp = &cn[j * dim]; in _math_horner_bezier_surf() 155 else /* uorder=1 -> cn defines a curve in v */ in _math_horner_bezier_surf() 156 _math_horner_bezier_curve(cn, out, v, dim, vorder); in _math_horner_bezier_surf() 164 for (i = 0; i < uorder; i++, cn += uinc) { in _math_horner_bezier_surf() 165 /* For constant i all cn[i][j] (j=0..vorder) are located */ in _math_horner_bezier_surf() 169 _math_horner_bezier_curve(cn, &cp[i * dim], v, dim, vorder); in _math_horner_bezier_surf() 175 else /* vorder=1 -> cn define in _math_horner_bezier_surf() 195 _math_de_casteljau_surf(GLfloat * cn, GLfloat * out, GLfloat * du, GLfloat * dv, GLfloat u, GLfloat v, GLuint dim, GLuint uorder, GLuint vorder) _math_de_casteljau_surf() argument [all...] |
H A D | m_eval.h | 75 * control net cn. 79 _math_horner_bezier_surf(GLfloat *cn, GLfloat *out, GLfloat u, GLfloat v, 94 * values in the control net cn. 98 _math_de_casteljau_surf(GLfloat *cn, GLfloat *out, GLfloat *du, GLfloat *dv,
|
/third_party/node/lib/ |
H A D | tls.js | 322 const cn = subject.CN; 324 if (ArrayIsArray(cn)) 325 valid = ArrayPrototypeSome(cn, wildcard); 326 else if (cn) 327 valid = wildcard(cn); 330 reason = `Host: ${hostname}. is not cert's CN: ${cn}`;
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | cipher_cts.c | 137 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs1_decrypt() local 158 memcpy(cn.c, in + residue, CTS_BLOCK_SIZE); in cts128_cs1_decrypt() 192 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs1_decrypt() 239 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs3_decrypt() local 264 memcpy(cn.c, in, CTS_BLOCK_SIZE); in cts128_cs3_decrypt() 298 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | cipher_cts.c | 137 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs1_decrypt() local 158 memcpy(cn.c, in + residue, CTS_BLOCK_SIZE); in cts128_cs1_decrypt() 192 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs1_decrypt() 239 aligned_16bytes mid_iv, ct_mid, cn, pt_last; in cts128_cs3_decrypt() local 264 memcpy(cn.c, in, CTS_BLOCK_SIZE); in cts128_cs3_decrypt() 298 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); in cts128_cs3_decrypt()
|
/third_party/node/deps/openssl/openssl/crypto/chacha/asm/ |
H A D | chacha-x86.pl | 74 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next 93 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn)); 99 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_-$j++)&3),($an,$bn,$cn,$dn)); 108 &mov ($c_,&DWP(4*$cn,"esp")) if ($ai>0 && $ai<3); 382 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next 401 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn)); 407 ($an,$bn,$cn, [all...] |
/third_party/openssl/crypto/chacha/asm/ |
H A D | chacha-x86.pl | 74 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next 93 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn)); 99 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_-$j++)&3),($an,$bn,$cn,$dn)); 108 &mov ($c_,&DWP(4*$cn,"esp")) if ($ai>0 && $ai<3); 382 my ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+1)&3),($ai,$bi,$ci,$di)); # next 401 ($an,$bn,$cn,$dn)=map(($_&~3)+(($_+$j++)&3),($an,$bn,$cn,$dn)); 407 ($an,$bn,$cn, [all...] |
/third_party/pulseaudio/src/modules/raop/ |
H A D | module-raop-discover.c | 168 char *tp = NULL, *et = NULL, *cn = NULL; in resolver_cb() local 227 } else if (pa_streq(key, "cn")) { in resolver_cb() 233 pa_xfree(cn); in resolver_cb() 235 cn = pa_xstrdup("ALAC"); in resolver_cb() 237 cn = pa_xstrdup("PCM"); in resolver_cb() 278 pa_xfree(cn); in resolver_cb() 321 if (cn != NULL) { in resolver_cb() 323 args = pa_sprintf_malloc("%s codec=%s", args, cn); in resolver_cb() 324 pa_xfree(cn); in resolver_cb()
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | tests.rs | 97 let cn = subject.entries_by_nid(Nid::COMMONNAME).next().unwrap(); in test_subject_read_cn() 98 assert_eq!(cn.data().as_slice(), b"foobar.com") in test_subject_read_cn() 107 let cn = subject.entries_by_nid(Nid::COMMONNAME).next().unwrap(); in test_nid_values() 108 assert_eq!(cn.data().as_slice(), b"example.com"); in test_nid_values() 134 let cn = all_entries.next().unwrap(); in test_nameref_iterator() 135 assert_eq!(cn.object().nid().as_raw(), Nid::COMMONNAME.as_raw()); in test_nameref_iterator() 136 assert_eq!(cn.data().as_slice(), b"example.com"); in test_nameref_iterator() 153 let cn = subject.entries_by_nid(Nid::USERID).next().unwrap(); in test_nid_uid_value() 154 assert_eq!(cn.data().as_slice(), b"this is the userId"); in test_nid_uid_value() 228 let mut cn in test_authority_issuer_and_serial() variables [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_tls.cc | 1863 auto cn = get_common_name(cert); in verify_numeric_hostname() local 1864 if (cn.empty()) { in verify_numeric_hostname() 1868 // cn is not NULL terminated in verify_numeric_hostname() 1869 auto rv = util::streq(hostname, cn); in verify_numeric_hostname() 1870 OPENSSL_free(const_cast<char *>(cn.c_str())); in verify_numeric_hostname() 1928 auto cn = get_common_name(cert); in verify_dns_hostname() local 1929 if (cn.empty()) { in verify_dns_hostname() 1933 if (cn[cn.size() - 1] == '.') { in verify_dns_hostname() 1934 if (cn in verify_dns_hostname() 2191 auto cn = get_common_name(cert); cert_lookup_tree_add_ssl_ctx() local [all...] |
/third_party/ffmpeg/libavfilter/ |
H A D | vf_chromanr.c | 138 int cn = 1; \ 159 cn++; \ 164 out_uptr[x] = (su + (cn >> 1)) / cn; \ 165 out_vptr[x] = (sv + (cn >> 1)) / cn; \
|
/third_party/toybox/toys/pending/ |
H A D | tcpsvd.c | 46 long cn; 185 if (TT.cn > 1) xprintf("%s: status %d/%d\n",toys.which->name, TT.count_all, TT.cn); in handle_exit() 307 if (TT.count_all < TT.cn) { in tcpsvd_main() 381 if (TT.cn > 1) in tcpsvd_main() 382 xprintf("%s: status %d/%d\n",toys.which->name, TT.count_all, TT.cn); in tcpsvd_main()
|
/third_party/libcoap/src/ |
H A D | coap_mbedtls.c | 365 char *cn = NULL; in cert_verify_callback_mbedtls() local 370 cn = get_san_or_cn_from_cert(crt); in cert_verify_callback_mbedtls() 377 "The certificate has expired", cn ? cn : "?", depth); in cert_verify_callback_mbedtls() 385 "The certificate has a future date", cn ? cn : "?", depth); in cert_verify_callback_mbedtls() 393 "The certificate has a bad MD hash", cn ? cn : "?", depth); in cert_verify_callback_mbedtls() 401 "The certificate has a short RSA length", cn ? cn in cert_verify_callback_mbedtls() [all...] |
H A D | coap_openssl.c | 1860 char *cn; in get_san_or_cn_from_cert() local 1878 cn = OPENSSL_strdup(dns_name); in get_san_or_cn_from_cert() 1880 return cn; in get_san_or_cn_from_cert() 1890 cn = buffer; in get_san_or_cn_from_cert() 1892 if (((cn[0] == 'C') || (cn[0] == 'c')) && in get_san_or_cn_from_cert() 1893 ((cn[1] == 'N') || (cn[1] == 'n')) && in get_san_or_cn_from_cert() 1894 (cn[2] == '=')) { in get_san_or_cn_from_cert() 1895 cn in get_san_or_cn_from_cert() 1924 char *cn = get_san_or_cn_from_cert(x509); tls_verify_call_back() local [all...] |
/third_party/musl/libc-test/src/functionalext/supplement/stdio/ |
H A D | fwrite.c | 104 int cn = read(fds[pipeRead], buf, sizeof(buf)); in fwrite_0400() local 105 EXPECT_MT("fwrite_0400", cn, 0); in fwrite_0400()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | x509_crt.h | 644 * \param cn The expected Common Name. This will be checked to be 673 const char *cn, uint32_t *flags, 692 * \param cn The expected Common Name. This may be \c NULL if the 715 const char *cn, uint32_t *flags, 730 * \param cn The expected Common Name. This may be \c NULL if the 749 const char *cn, uint32_t *flags, 800 * \param cn The expected Common Name. This may be \c NULL if the 815 const char *cn, uint32_t *flags,
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | conditional.h | 101 extern int cond_normalize_expr(policydb_t * p, cond_node_t * cn); 112 cond_node_t * cn);
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_ncons.c | 313 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) 341 if ((utf8_length = ASN1_STRING_to_UTF8(&utf8_value, cn)) < 0) 425 ASN1_STRING *cn; 433 cn = X509_NAME_ENTRY_get_data(ne); 436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK)
|
/third_party/openssl/crypto/x509/ |
H A D | v3_ncons.c | 313 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) 341 if ((utf8_length = ASN1_STRING_to_UTF8(&utf8_value, cn)) < 0) 425 ASN1_STRING *cn; 433 cn = X509_NAME_ENTRY_get_data(ne); 436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK)
|
/third_party/libevdev/doc/html/search/ |
H A D | search.js | 31 var cn = c.charCodeAt(0); 36 else if (cn<16) 38 result+="_0"+cn.toString(16); 42 result+="_"+cn.toString(16);
|
/third_party/skia/third_party/externals/oboe/docs/reference/search/ |
H A D | search.js | 30 var cn = c.charCodeAt(0); 35 else if (cn<16) 37 result+="_0"+cn.toString(16); 41 result+="_"+cn.toString(16);
|