/third_party/mbedtls/library/ |
H A D | x509.c | 1394 mbedtls_x509_subject_alternative_name *san) in mbedtls_x509_parse_subject_alt_name() 1412 memset(san, 0, sizeof(mbedtls_x509_subject_alternative_name)); in mbedtls_x509_parse_subject_alt_name() 1413 san->type = MBEDTLS_X509_SAN_OTHER_NAME; in mbedtls_x509_parse_subject_alt_name() 1414 memcpy(&san->san.other_name, in mbedtls_x509_parse_subject_alt_name() 1424 memset(san, 0, sizeof(mbedtls_x509_subject_alternative_name)); in mbedtls_x509_parse_subject_alt_name() 1425 san->type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER; in mbedtls_x509_parse_subject_alt_name() 1427 memcpy(&san->san.unstructured_name, in mbedtls_x509_parse_subject_alt_name() 1437 memset(san, in mbedtls_x509_parse_subject_alt_name() 1393 mbedtls_x509_parse_subject_alt_name(const mbedtls_x509_buf *san_buf, mbedtls_x509_subject_alternative_name *san) mbedtls_x509_parse_subject_alt_name() argument 1502 mbedtls_x509_free_subject_alt_name(mbedtls_x509_subject_alternative_name *san) mbedtls_x509_free_subject_alt_name() argument 1520 mbedtls_x509_subject_alternative_name san; mbedtls_x509_info_subject_alt_name() local [all...] |
H A D | x509write.c | 63 CHECK_OVERFLOW_ADD(buflen, cur->node.san.unstructured_name.len); in mbedtls_x509_write_set_san_common() 68 const mbedtls_asn1_named_data *chunk = &cur->node.san.directory_name; in mbedtls_x509_write_set_san_common() 109 (const unsigned char *) cur->node.san.unstructured_name.p; in mbedtls_x509_write_set_san_common() 110 size_t unstructured_name_len = cur->node.san.unstructured_name.len; in mbedtls_x509_write_set_san_common() 129 .san.directory_name)); in mbedtls_x509_write_set_san_common()
|
H A D | x509_crt.c | 2902 static int x509_crt_check_san_ip(const mbedtls_x509_sequence *san, in x509_crt_check_san_ip() argument 2911 for (const mbedtls_x509_sequence *cur = san; cur != NULL; cur = cur->next) { in x509_crt_check_san_ip() 2923 static int x509_crt_check_san_uri(const mbedtls_x509_sequence *san, in x509_crt_check_san_uri() argument 2926 for (const mbedtls_x509_sequence *cur = san; cur != NULL; cur = cur->next) { in x509_crt_check_san_uri() 2941 static int x509_crt_check_san(const mbedtls_x509_sequence *san, in x509_crt_check_san() argument 2947 for (const mbedtls_x509_sequence *cur = san; cur != NULL; cur = cur->next) { in x509_crt_check_san() 2966 if (x509_crt_check_san_ip(san, cn, cn_len) == 0) { in x509_crt_check_san() 2971 if (x509_crt_check_san_uri(san, cn, cn_len) == 0) { in x509_crt_check_san()
|
/third_party/libfuse/test/ |
H A D | ci-build.sh | 58 san=$1 61 echo "=== Building with clang and ${san} sanitizer ===" 64 mkdir build-${san}; pushd build-${san} 68 meson setup -D b_sanitize=${san} -D b_lundef=false -D werror=true\ 83 rm -fr build-${san} 90 for san in undefined address; do 91 sanitized_build ${san} 97 for san in undefined address; do 98 sanitized_build ${san} " [all...] |
/third_party/libwebsockets/test-apps/ |
H A D | test.js | 28 function san(s) function 215 san(socket_di.extensions); 246 san(socket_status.extensions); 262 san(jso.version) + "</td></tr>" + 264 san(jso.hostname) + "</td></tr>" + 272 "</td><td><b>" + san(jso.conns[n].peer) + 273 "</b><br>" + san(d.toString()) + 274 "<br>" + san(jso.conns[n].ua) + 322 san(socket_di.extensions); 425 san(socket_l [all...] |
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-eventlib-demos/mount-origin/ |
H A D | test.js | 28 function san(s) function 215 san(socket_di.extensions); 246 san(socket_status.extensions); 262 san(jso.version) + "</td></tr>" + 264 san(jso.hostname) + "</td></tr>" + 272 "</td><td><b>" + san(jso.conns[n].peer) + 273 "</b><br>" + san(d.toString()) + 274 "<br>" + san(jso.conns[n].ua) + 322 san(socket_di.extensions); 425 san(socket_l [all...] |
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-deaddrop/mount-origin/ |
H A D | deaddrop.js | 5 function san(s) function 126 "Failed " + san(e.status.toString()); 263 lws_urlencode(san(j.files[n].name)) + "\">"; 268 lws_urlencode(san(j.files[n].name)) + 270 san(j.files[n].name) + "</a></td></tr>";
|
/third_party/libwebsockets/plugins/deaddrop/assets/ |
H A D | deaddrop.js | 5 function san(s) function 126 "Failed " + san(e.status.toString()); 263 lws_urlencode(san(j.files[n].name)) + "\">"; 268 lws_urlencode(san(j.files[n].name)) + 270 san(j.files[n].name) + "</a></td></tr>";
|
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
H A D | sigstore_verification.js | 9 return { issuer: "", san: undefined, oids: [] }; 15 san: isSet(object.san) ? sigstore_common_1.SubjectAlternativeName.fromJSON(object.san) : undefined, 22 message.san !== undefined && (obj.san = message.san ? sigstore_common_1.SubjectAlternativeName.toJSON(message.san) : undefined);
|
/third_party/node/deps/npm/node_modules/sigstore/dist/ |
H A D | config.js | 57 const san = options.certificateIdentityEmail || options.certificateIdentityURI; 58 if (san) { 59 policy.subjectAlternativeName = san;
|
/third_party/mbedtls/programs/x509/ |
H A D | cert_req.c | 57 " san=%%s default: (none)\n" \ 212 } else if (strcmp(p, "san") == 0) { in main() 273 cur->node.san.unstructured_name.p = (unsigned char *) ip; in main() 274 cur->node.san.unstructured_name.len = sizeof(ip); in main() 286 cur->node.san.directory_name = *ext_san_dirname; in main() 296 cur->node.san.unstructured_name.p = (unsigned char *) q; in main() 297 cur->node.san.unstructured_name.len = strlen(q); in main()
|
H A D | cert_write.c | 126 " san=%%s default: (none)\n" \ 533 } else if (strcmp(p, "san") == 0) { in main() 594 cur->node.san.unstructured_name.p = (unsigned char *) ip; in main() 595 cur->node.san.unstructured_name.len = sizeof(ip); in main() 607 cur->node.san.directory_name = *ext_san_dirname; in main() 617 cur->node.san.unstructured_name.p = (unsigned char *) q; in main() 618 cur->node.san.unstructured_name.len = strlen(q); in main()
|
/third_party/skia/infra/bots/recipe_modules/build/ |
H A D | default.py | 48 san = None 50 san = ('msan','memory') 52 san = ('tsan','thread') 54 if san: 55 short,full = san
|
/third_party/mbedtls/include/mbedtls/ |
H A D | x509.h | 299 san; /**< A union of the supported SAN types */ member 437 * \param san The target structure to populate with the parsed presentation 461 mbedtls_x509_subject_alternative_name *san); 465 * \param san SAN structure - extra memory owned by this structure will be freed 467 void mbedtls_x509_free_subject_alt_name(mbedtls_x509_subject_alternative_name *san);
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-fulltext-search/mount-origin/ |
H A D | lws-fts.js | 29 function san(s) function 147 san(jj.ac[n].ac) + 148 "'><table><tr><td>" + san(jj.ac[n].ac) +
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-extensions.c | 166 san; /**< A union of the supported SAN types */ member 261 memcpy(&name->san.other_name, in lws_mbedtls_x509_parse_general_name() 269 memcpy(&name->san.unstructured_name, in lws_mbedtls_x509_parse_general_name()
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-server.c | 1023 char san[256]; local 1029 lws_snprintf(san, sizeof(san), "DNS:%s,DNS:%s", 1034 san);
|
/third_party/node/test/fixtures/x509-escaping/ |
H A D | create-certs.js | 278 const san = sans[i]; 321 extnValue: [san]
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | tests.rs | 1081 let san = SubjectAlternativeName::new() in ipaddress_as_subject_alternative_name_is_formatted_in_debug() 1085 builder.append_extension(san).unwrap(); in ipaddress_as_subject_alternative_name_is_formatted_in_debug() 1134 let san = SubjectAlternativeName::new() in other_name_as_subject_alternative_name() 1138 builder.append_extension(san).unwrap(); in other_name_as_subject_alternative_name()
|
/third_party/python/Lib/ |
H A D | ssl.py | 404 san = cert.get('subjectAltName', ()) 405 for key, value in san:
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 484 server5-tricky-ip-san.crt.der: server5.key 487 all_final += server5-tricky-ip-san.crt.der 490 server5-tricky-ip-san-malformed-len.crt.der: server5-tricky-ip-san.crt.der 1610 $(MBEDTLS_CERT_WRITE) request_file=server1.req.sha256 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) version=1 not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ san=URI:http://pki.example.com\;IP:1.2.3.4\;DN:C=UK,O="Mbed TLS",CN="SubjectAltName test"\;DNS:example.com\;RFC822:mail@example.com
|
/third_party/python/Lib/test/ |
H A D | test_zipfile.py | 1592 san = zipfile.ZipFile._sanitize_windows_name 1594 self.assertEqual(san(r',,?,C:,foo,bar/z', ','), r'_,C_,foo,bar/z') 1595 self.assertEqual(san(r'a\b,c<d>e|f"g?h*i', ','), r'a\b,c_d_e_f_g_h_i') 1596 self.assertEqual(san('../../foo../../ba..r', '/'), r'foo/ba..r')
|
H A D | test_ssl.py | 471 san = (('DNS', 'altnull.python.org\x00example.com'), 478 san = (('DNS', 'altnull.python.org\x00example.com'), 484 self.assertEqual(p['subjectAltName'], san)
|