/third_party/node/test/parallel/ |
D | test-tls-check-server-identity.js | 37 cert: { subject: { CN: 'a.com' } }, property 42 cert: { subject: { CN: 'a.com' } }, property 47 cert: { subject: { CN: 'a.com' } }, property 52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property 53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property 56 cert: { subject: { CN: 'b.com' } }, property 59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property 62 cert: { subject: { CN: '.a.com' } }, property 72 cert: { subject: { CN: '8.8.8.8' } }, property 80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property [all …]
|
D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); constant 36 assert(Buffer.isBuffer(cert)); 38 assert.strictEqual(typeof cert.toString(), 'string'); 47 cert: cert, property 48 ca: [cert], 59 cert: cert, property 66 cert: cert, property 74 cert: cert, property 83 cert: [cert], property 90 cert: [cert], property [all …]
|
D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { argument 17 assert.strictEqual(cert.subject.CN, 'agent10.example.com'); 21 split(client.cert, client); 22 split(server.cert, server); 35 cert: client.cert, property 41 cert: server.cert, property 58 cert: server.cert, property 75 cert: server.cert, property 94 cert: server.cert, property 117 cert: client.single, property [all …]
|
D | test-tls-client-verify.js | 34 cert: 'agent2-cert', property 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 43 cert: 'agent2-cert', property 45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property 46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 52 cert: 'agent2-cert', property 54 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property [all …]
|
D | test-tls-options-boolean-check.js | 65 ].forEach(([key, cert]) => { 66 tls.createServer({ key, cert }); field 83 ].forEach(([key, cert, index]) => { 86 tls.createServer({ key, cert }); field 109 ].forEach(([key, cert, index]) => { 110 const val = index === undefined ? cert : cert[index]; 112 tls.createServer({ key, cert }); field 132 ].forEach(([key, cert, ca]) => { 133 tls.createServer({ key, cert, ca }); property 144 ].forEach(([key, cert, ca, index]) => { [all …]
|
/third_party/openssl/test/certs/ |
D | setup.sh | 7 ./mkcert.sh genroot "Root CA" root-key root-cert 13 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 15 openssl x509 -in root-cert.pem -trustout \ 17 openssl x509 -in root-cert.pem -trustout \ 19 openssl x509 -in root-cert.pem -trustout \ 21 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert.pem -trustout \ 41 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 44 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 [all …]
|
D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 113 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 132 local cert=$1; shift 147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 154 local cert=$1; shift 168 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 179 local cert=$1; shift [all …]
|
/third_party/glib/gio/tests/ |
D | tls-certificate.c | 39 GTlsCertificate *cert; in pem_parser() local 52 cert = g_tls_certificate_new_from_pem (pem, -1, &error); in pem_parser() 54 g_assert_nonnull (cert); in pem_parser() 56 g_object_get (cert, in pem_parser() 59 parsed_key_pem = g_test_tls_connection_get_private_key_pem (cert); in pem_parser() 66 g_object_unref (cert); in pem_parser() 70 cert = g_tls_certificate_new_from_pem (pem, 10, &error); in pem_parser() 76 cert = g_tls_certificate_new_from_pem (pem, pem_len - 10, &error); in pem_parser() 86 cert = g_tls_certificate_new_from_pem (pem, -1, &error); in pem_parser() 88 g_assert_nonnull (cert); in pem_parser() [all …]
|
D | gtesttlsbackend.c | 123 g_test_tls_certificate_verify (GTlsCertificate *cert, in G_DEFINE_TYPE_WITH_CODE() 137 GTestTlsCertificate *cert = (GTestTlsCertificate *) object; in g_test_tls_certificate_get_property() local 142 g_value_set_string (value, cert->cert_pem); in g_test_tls_certificate_get_property() 145 g_value_set_string (value, cert->key_pem); in g_test_tls_certificate_get_property() 148 g_value_set_object (value, cert->issuer); in g_test_tls_certificate_get_property() 153 if (g_strcmp0 (cert->pkcs11_uri, "unsupported") != 0) in g_test_tls_certificate_get_property() 154 g_value_set_string (value, cert->pkcs11_uri); in g_test_tls_certificate_get_property() 157 g_value_set_string (value, cert->private_key_pkcs11_uri); in g_test_tls_certificate_get_property() 171 GTestTlsCertificate *cert = (GTestTlsCertificate *) object; in g_test_tls_certificate_set_property() local 176 cert->cert_pem = g_value_dup_string (value); in g_test_tls_certificate_set_property() [all …]
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 2 ca1-cert.pem \ 3 ca2-cert.pem \ 5 ca3-cert.pem \ 6 ca4-cert.pem \ 7 ca5-cert.pem \ 8 ca6-cert.pem \ 9 agent1-cert.pem \ 11 agent2-cert.pem \ 12 agent3-cert.pem \ 13 agent4-cert.pem \ [all …]
|
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/ |
D | openssh-cert.js | 28 function verify(cert, key) { argument 66 var cert = {}; 67 cert.signatures = {}; 68 cert.signatures.openssh = {}; 70 cert.signatures.openssh.nonce = sshbuf.readBuffer(); 97 cert.subjectKey = new Key(key); 99 cert.serial = sshbuf.readInt64(); 104 cert.signatures.openssh.keyId = sshbuf.readString(); 114 cert.subjects = principals.map(function (pr) { 122 cert.validFrom = int64ToDate(sshbuf.readInt64()); [all …]
|
D | x509.js | 35 function verify(cert, key) { argument 36 var sig = cert.signatures.x509; 46 writeTBSCert(cert, der); 117 var cert = {}; 118 cert.signatures = {}; 119 var sig = (cert.signatures.x509 = {}); 122 cert.serial = readMPInt(der, 'serial'); 132 cert.issuer = Identity.parseAsn1(der); 135 cert.validFrom = readDate(der); 136 cert.validUntil = readDate(der); [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() 62 EVP_PKEY_free(cert->pkey); in __ssl_cert_new() 64 ssl_mem_free(cert); in __ssl_cert_new() [all …]
|
/third_party/glib/gio/ |
D | gtlscertificate.c | 69 g_tls_certificate_init (GTlsCertificate *cert) in g_tls_certificate_init() argument 259 GObject *cert; in g_tls_certificate_new_internal() local 264 cert = g_initable_new (g_tls_backend_get_certificate_type (backend), in g_tls_certificate_new_internal() 271 return G_TLS_CERTIFICATE (cert); in g_tls_certificate_new_internal() 420 GTlsCertificate *cert = NULL, *issuer = NULL, *root = NULL; in create_certificate_chain_from_list() local 437 issuer = cert; in create_certificate_chain_from_list() 438 cert = g_tls_certificate_new_internal (pem->data, key, issuer, NULL); in create_certificate_chain_from_list() 442 if (!cert) in create_certificate_chain_from_list() 447 root = cert; in create_certificate_chain_from_list() 455 flags = g_tls_certificate_verify (cert, NULL, root); in create_certificate_chain_from_list() [all …]
|
/third_party/python/Lib/test/ |
D | make_ssl_certs.py | 164 cert = f.read() 167 return cert, key 228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable 230 f.write(cert) 239 f.write(cert) 242 f.write(cert) 246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable 249 f.write(cert) 251 cert, key = make_cert_key('localhost', sign=True) variable 254 f.write(cert) [all …]
|
/third_party/python/Modules/_ssl/ |
D | cert.c | 18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument 23 assert(cert != NULL); in newCertificate() 30 X509_up_ref(cert); in newCertificate() 32 self->cert = cert; in newCertificate() 39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument 41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509() 56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local 57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upref); in _PySSL_CertificateFromX509Stack() 90 retcode = PEM_write_bio_X509(bio, self->cert); in _ssl_Certificate_public_bytes_impl() 93 retcode = PEM_write_bio_X509_AUX(bio, self->cert); in _ssl_Certificate_public_bytes_impl() [all …]
|
/third_party/curl/lib/ |
D | x509asn1.c | 706 int Curl_parseX509(struct Curl_X509certificate *cert, in Curl_parseX509() argument 714 cert->certificate.header = NULL; in Curl_parseX509() 715 cert->certificate.beg = beg; in Curl_parseX509() 716 cert->certificate.end = end; in Curl_parseX509() 729 beg = getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509() 733 if(!getASN1Element(&cert->signature, beg, end)) in Curl_parseX509() 740 cert->version.header = NULL; in Curl_parseX509() 741 cert->version.beg = &defaultVersion; in Curl_parseX509() 742 cert->version.end = &defaultVersion + sizeof(defaultVersion); in Curl_parseX509() 747 if(!getASN1Element(&cert->version, elem.beg, elem.end)) in Curl_parseX509() [all …]
|
/third_party/openssl/ssl/ |
D | ssl_cert.c | 74 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 85 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 93 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 94 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 97 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 98 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 102 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 121 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 124 OPENSSL_malloc(cert->pkeys[i].serverinfo_length); in ssl_cert_dup() 129 ret->pkeys[i].serverinfo_length = cert->pkeys[i].serverinfo_length; in ssl_cert_dup() [all …]
|
/third_party/mindspore/mindspore/lite/java/java/fl_client/src/main/java/com/mindspore/flclient/ |
D | SSLSocketFactoryTools.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateException; 30 import java.security.cert.CertificateFactory; 31 import java.security.cert.X509Certificate; 128 X509Certificate cert = null; in readCert() local 134 cert = (X509Certificate) certificate; in readCert() 152 return cert; in readCert() 168 X509Certificate cert; field in SSLSocketFactoryTools.MyTrustManager 170 MyTrustManager(X509Certificate cert) { in MyTrustManager() argument 171 this.cert = cert; in MyTrustManager() [all …]
|
/third_party/grpc/src/python/grpcio_tests/tests/unit/credentials/ |
D | README.md | 7 * The respective root CA cert in `certs/ca.cert.pem` 9 * The intermediate CA cert in 10 `intermediate/certs/intermediate.cert.pem`, signed by the root CA 12 * A client cert and a server cert--both signed by the intermediate 13 CA--in `intermediate/certs/client.cert.pem` and 14 `intermediate/certs/localhost-1.cert.pem`; the corresponding keys
|
/third_party/node/src/ |
D | node_crypto_common.cc | 51 int SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert, X509** issuer) { in SSL_CTX_get_issuer() argument 57 X509_STORE_CTX_get1_issuer(issuer, store_ctx.get(), cert) == 1; in SSL_CTX_get_issuer() 281 X509* cert = SSL_get_certificate(ssl.get()); in GetCert() local 282 if (cert == nullptr) in GetCert() 285 MaybeLocal<Object> maybe_cert = X509ToObject(env, cert); in GetCert() 343 StackOfX509 CloneSSLCerts(X509Pointer&& cert, in CloneSSLCerts() argument 346 if (cert) in CloneSSLCerts() 347 sk_X509_push(peer_certs.get(), cert.release()); in CloneSSLCerts() 349 X509Pointer cert(X509_dup(sk_X509_value(ssl_certs, i))); in CloneSSLCerts() local 350 if (!cert || !sk_X509_push(peer_certs.get(), cert.get())) in CloneSSLCerts() [all …]
|
/third_party/openssl/test/ |
D | cmsapitest.c | 10 static X509 *cert = NULL; variable 26 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0)) in test_encrypt_decrypt() 33 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt() 64 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) { in setup_tests() 72 X509_free(cert); in setup_tests() 73 cert = NULL; in setup_tests() 78 X509_free(cert); in setup_tests() 79 cert = NULL; in setup_tests() 91 X509_free(cert); in cleanup_tests()
|
/third_party/libcoap/ |
D | HOWTO.pkcs11 | 24 # ca-cert.pem - The certificate of the CA that signed Server and Client 25 # server-cert.pem - Contains the server certificate in PEM format 27 # client-cert.pem - Contains the server certificate in PEM format 55 p11tool --so-login --load-certificate ca-cert.pem --write --label ca-cert \ 65 # (Use different id to private key, but not the same as CA/Client cert) 66 openssl x509 -in server-cert.pem -out server-cert.der -outform DER 68 --write-object ./server-cert.der --type cert --id aa01 \ 69 --label "server-cert" --token-label "token-0" 78 # (Use different id to private key, but not the same as CA/Client cert) 79 openssl x509 -in client-cert.pem -out client-cert.der -outform DER [all …]
|