/third_party/node/test/parallel/ |
D | test-tls-check-server-identity.js | 37 cert: { subject: { CN: 'a.com' } }, property 42 cert: { subject: { CN: 'a.com' } }, property 47 cert: { subject: { CN: 'a.com' } }, property 52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property 53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property 56 cert: { subject: { CN: 'b.com' } }, property 59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property 62 cert: { subject: { CN: '.a.com' } }, property 72 cert: { subject: { CN: '8.8.8.8' } }, property 80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property [all …]
|
D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); constant 47 cert: cert, property 59 cert: cert, property 66 cert: cert, property 74 cert: cert, property 83 cert: [cert], property 90 cert: [cert], property 98 cert: [cert], property 107 cert: cert.toString(), property 114 cert: cert.toString(), property [all …]
|
D | test-tls-client-verify.js | 34 cert: 'agent2-cert', property 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 43 cert: 'agent2-cert', property 45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property 46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 52 cert: 'agent2-cert', property 54 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property [all …]
|
D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { argument 35 cert: client.cert, property 41 cert: server.cert, property 58 cert: server.cert, property 75 cert: server.cert, property 94 cert: server.cert, property 117 cert: client.single, property 123 cert: server.single, property 136 cert: client.single, property 142 cert: server.single, property [all …]
|
D | test-revert-CVE-2021-44531.js | 25 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'URI:http://8.8.8.8/' }, property 30 host: 'a.b.a.com', cert: { property 36 host: 'a.b.a.com', cert: { property 42 host: 'a.b.a.com', cert: { property 51 host: 'a.b.a.com', cert: { property
|
D | test-tls-cert-regression.js | 30 const cert = constant 69 function test(cert, key, cb) { argument 71 cert, property
|
D | test-tls-sni-option.js | 37 cert: loadPEM('agent2-cert'), property 60 cert: loadPEM('agent1-cert'), property 65 cert: loadPEM('agent3-cert') property 75 cert: loadPEM('agent1-cert'), property 88 cert: loadPEM('agent4-cert'), property 101 cert: loadPEM('agent2-cert'), property 114 cert: loadPEM('agent3-cert'), property 127 cert: loadPEM('agent3-cert'), property
|
D | test-tls-options-boolean-check.js | 66 tls.createServer({ key, cert }); field 86 tls.createServer({ key, cert }); field 112 tls.createServer({ key, cert }); field 133 tls.createServer({ key, cert, ca }); property 147 tls.createServer({ key, cert, ca }); property 166 tls.createSecureContext({ key, cert, ca }); property
|
D | test-tls-zero-clear-in.js | 31 const cert = fixtures.readKey('rsa_cert.crt'); constant 35 cert, property 45 cert: cert, property
|
D | test-tls-multiple-cas-as-string.js | 15 const cert = fixtures.readKey('agent3-cert.pem', 'utf8'); constant 19 const server = tls.createServer({ ca, cert, key }); property 21 server.addContext('agent3', { ca, cert, key }); property
|
D | test-tls-multi-key.js | 40 cert: [ property 57 cert: [ property 73 cert: [ property 90 cert: [ property 108 cert: [ property 127 cert: [ property
|
D | test-https-options-boolean-check.js | 66 https.createServer({ key, cert }); field 87 https.createServer({ key, cert }); field 113 https.createServer({ key, cert }); field 134 https.createServer({ key, cert, ca }); property 148 https.createServer({ key, cert, ca }); property
|
D | test-tls-sni-server-client.js | 38 cert: loadPEM('agent2-cert') property 44 cert: loadPEM('agent1-cert') property 48 cert: loadPEM('agent3-cert') property 53 cert: loadPEM('agent6-cert') property
|
D | test-tls-set-sigalgs.js | 23 checkServerIdentity: (servername, cert) => { }, argument 25 cert: keys.agent2.cert, property 30 cert: keys.agent6.cert, property
|
D | test-tls-client-abort.js | 30 const cert = fixtures.readKey('rsa_cert.crt'); constant 33 const conn = tls.connect({ cert, key, port: 0 }, common.mustNotCall()); property
|
D | test-http2-tls-disconnect.js | 13 const cert = fixtures.readKey('agent8-cert.pem', 'binary'); constant 15 const server = http2.createSecureServer({ key, cert }, (request, response) => { field
|
D | test-tls-ca-concat.js | 14 checkServerIdentity: (servername, cert) => { }, argument 18 cert: keys.agent6.cert, property
|
/third_party/python/Lib/test/ |
D | make_ssl_certs.py | 228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable 246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable 251 cert, key = make_cert_key('localhost', sign=True) variable 256 cert, key = make_cert_key('fakehostname', sign=True) variable 261 cert, key = make_cert_key( variable 282 cert, key = make_cert_key('allsans', sign=True, extra_san='\n'.join(extra_san)) variable 299 cert, key = make_cert_key('idnsans', sign=True, extra_san='\n'.join(extra_san)) variable 304 cert, key = make_cert_key('nosan', sign=True, ext='req_x509_extensions_nosan') variable
|
/third_party/glib/gio/tests/ |
D | tls-certificate.c | 39 GTlsCertificate *cert; in pem_parser() local 139 GTlsCertificate *cert; in pem_parser_handles_chain() local 206 GTlsCertificate *cert; in from_file() local 232 GTlsCertificate *cert; in from_files() local 301 GTlsCertificate *cert; in from_files_crlf() local 328 GTlsCertificate *cert; in from_files_pkcs8() local 355 GTlsCertificate *cert; in from_files_pkcs8enc() local 382 GTlsCertificate *cert = l->data; in list_from_file() local 405 GTlsCertificate *cert; in from_pkcs11_uri() local 423 GTlsCertificate *cert; in from_unsupported_pkcs11_uri() local
|
/third_party/node/test/sequential/ |
D | test-tls-connect.js | 36 const cert = fixtures.readKey('rsa_cert.crt'); constant 39 const options = { cert: cert, key: key, port: common.PORT }; property 50 const cert = fixtures.readKey('rsa_cert.crt'); constant 55 cert: cert, property
|
/third_party/glib/gio/ |
D | gtlscertificate.c | 69 g_tls_certificate_init (GTlsCertificate *cert) in g_tls_certificate_init() 259 GObject *cert; in g_tls_certificate_new_internal() local 420 GTlsCertificate *cert = NULL, *issuer = NULL, *root = NULL; in create_certificate_chain_from_list() local 473 GTlsCertificate *cert; in parse_and_create_certificate() local 532 GTlsCertificate *cert; in g_tls_certificate_new_from_pem() local 580 GTlsCertificate *cert; in g_tls_certificate_new_from_file() local 624 GTlsCertificate *cert; in g_tls_certificate_new_from_files() local 688 GObject *cert; in g_tls_certificate_new_from_pkcs11_uris() local 754 GTlsCertificate *cert = NULL; in g_tls_certificate_list_new_from_file() local 794 g_tls_certificate_get_issuer (GTlsCertificate *cert) in g_tls_certificate_get_issuer() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() 67 void x509_certificate_chain_free(struct x509_certificate *cert) in x509_certificate_chain_free() 220 struct x509_certificate *cert, in x509_parse_public_key() 693 struct x509_certificate *cert, const u8 **next) in x509_parse_validity() 775 static int x509_parse_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_key_usage() 812 static int x509_parse_ext_basic_constraints(struct x509_certificate *cert, in x509_parse_ext_basic_constraints() 1069 static int x509_parse_ext_subject_alt_name(struct x509_certificate *cert, in x509_parse_ext_subject_alt_name() 1096 static int x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, in x509_parse_ext_issuer_alt_name() 1172 static int x509_parse_ext_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_ext_key_usage() 1229 static int x509_parse_extension_data(struct x509_certificate *cert, in x509_parse_extension_data() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() 67 void x509_certificate_chain_free(struct x509_certificate *cert) in x509_certificate_chain_free() 217 struct x509_certificate *cert, in x509_parse_public_key() 687 struct x509_certificate *cert, const u8 **next) in x509_parse_validity() 765 static int x509_parse_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_key_usage() 798 static int x509_parse_ext_basic_constraints(struct x509_certificate *cert, in x509_parse_ext_basic_constraints() 1049 static int x509_parse_ext_subject_alt_name(struct x509_certificate *cert, in x509_parse_ext_subject_alt_name() 1073 static int x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, in x509_parse_ext_issuer_alt_name() 1146 static int x509_parse_ext_certificate_policies(struct x509_certificate *cert, in x509_parse_ext_certificate_policies() 1270 static int x509_parse_ext_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_ext_key_usage() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 80 void ssl_cert_free(CERT *cert) in ssl_cert_free()
|
/third_party/cef/libcef/browser/ |
D | ssl_host_state_delegate.cc | 20 bool CertPolicy::Check(const net::X509Certificate& cert, int error) const { in Check() argument 30 void CertPolicy::Allow(const net::X509Certificate& cert, int error) { in Allow() 73 const net::X509Certificate& cert, in AllowCert() 99 const net::X509Certificate& cert, in QueryPolicy()
|