/third_party/gstreamer/gstplugins_bad/ext/dtls/ |
D | gstdtlscertificate.c | 73 X509 *x509; member 122 priv->x509 = NULL; in gst_dtls_certificate_init() 132 X509_free (priv->x509); in gst_dtls_certificate_finalize() 133 priv->x509 = NULL; in gst_dtls_certificate_finalize() 201 g_return_if_fail (!priv->x509); in init_generated() 211 priv->x509 = X509_new (); in init_generated() 213 if (!priv->x509) { in init_generated() 241 X509_free (priv->x509); in init_generated() 242 priv->x509 = NULL; in init_generated() 252 X509_free (priv->x509); in init_generated() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-x509.c | 98 lws_tls_mbedtls_cert_info(mbedtls_x509_crt *x509, enum lws_tls_cert_info type, in lws_tls_mbedtls_cert_info() argument 104 if (!x509) in lws_tls_mbedtls_cert_info() 112 buf->time = lws_tls_mbedtls_time_to_unix(&x509->MBEDTLS_PRIVATE(valid_from)); in lws_tls_mbedtls_cert_info() 118 buf->time = lws_tls_mbedtls_time_to_unix(&x509->MBEDTLS_PRIVATE(valid_to)); in lws_tls_mbedtls_cert_info() 124 return lws_tls_mbedtls_get_x509_name(&x509->MBEDTLS_PRIVATE(subject), buf, len); in lws_tls_mbedtls_cert_info() 127 return lws_tls_mbedtls_get_x509_name(&x509->MBEDTLS_PRIVATE(issuer), buf, len); in lws_tls_mbedtls_cert_info() 130 buf->usage = x509->MBEDTLS_PRIVATE(key_usage); in lws_tls_mbedtls_cert_info() 138 switch (mbedtls_pk_get_type(&x509->MBEDTLS_PRIVATE(pk))) { in lws_tls_mbedtls_cert_info() 141 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(x509->MBEDTLS_PRIVATE(pk)); in lws_tls_mbedtls_cert_info() 156 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(x509->MBEDTLS_PRIVATE(pk)); in lws_tls_mbedtls_cert_info() [all …]
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-x509.c | 79 lws_tls_openssl_cert_info(X509 *x509, enum lws_tls_cert_info type, in lws_tls_openssl_cert_info() argument 97 if (!x509) in lws_tls_openssl_cert_info() 110 X509_get_notBefore(x509)); in lws_tls_openssl_cert_info() 117 X509_get_notAfter(x509)); in lws_tls_openssl_cert_info() 126 xn = X509_get_subject_name(x509); in lws_tls_openssl_cert_info() 137 xn = X509_get_issuer_name(x509); in lws_tls_openssl_cert_info() 146 buf->usage = X509_get_key_usage(x509); in lws_tls_openssl_cert_info() 155 size_t klen = (unsigned int)i2d_X509_PUBKEY(X509_get_X509_PUBKEY(x509), NULL); in lws_tls_openssl_cert_info() 167 X509_get_X509_PUBKEY(x509), &ptmp) != (int)klen || in lws_tls_openssl_cert_info() 185 int der_len = i2d_X509(x509, NULL); in lws_tls_openssl_cert_info() [all …]
|
/third_party/openssl/test/certs/ |
D | setup.sh | 15 openssl x509 -in root-cert.pem -trustout \ 17 openssl x509 -in root-cert.pem -trustout \ 19 openssl x509 -in root-cert.pem -trustout \ 21 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert.pem -trustout \ 27 openssl x509 -in root-cert2.pem -trustout \ 29 openssl x509 -in root-cert2.pem -trustout \ 31 openssl x509 -in root-cert2.pem -trustout \ 33 openssl x509 -in root-nonca.pem -trustout \ [all …]
|
/third_party/openssl/fuzz/ |
D | x509.c | 33 X509 *x509 = d2i_X509(NULL, &p, len); in FuzzerTestOneInput() local 34 if (x509 != NULL) { in FuzzerTestOneInput() 37 X509_print(bio, x509); in FuzzerTestOneInput() 40 X509_issuer_and_serial_hash(x509); in FuzzerTestOneInput() 42 i2d_X509(x509, &der); in FuzzerTestOneInput() 45 X509_free(x509); in FuzzerTestOneInput()
|
D | build.info | 12 PROGRAMS_NO_INST=asn1 asn1parse bignum bndiv client conf crl server x509 62 SOURCE[x509]=x509.c driver.c 63 INCLUDE[x509]=../include {- $ex_inc -} 64 DEPEND[x509]=../libcrypto {- $ex_lib -} 68 …sn1-test asn1parse-test bignum-test bndiv-test client-test conf-test crl-test server-test x509-test 118 SOURCE[x509-test]=x509.c test-corpus.c 119 INCLUDE[x509-test]=../include 120 DEPEND[x509-test]=../libcrypto
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-x509/ |
D | main.c | 31 read_pem_c509_cert(struct lws_x509_cert **x509, const char *filename, in read_pem_c509_cert() argument 40 if (lws_x509_create(x509)) { in read_pem_c509_cert() 46 if (lws_x509_parse_from_pem(*x509, pembuf, (unsigned int)n) < 0) { in read_pem_c509_cert() 48 lws_x509_destroy(x509); in read_pem_c509_cert() 59 struct lws_x509_cert *x509 = NULL, *x509_trusted = NULL; in main() local 92 if (read_pem_c509_cert(&x509, p, pembuf, sizeof(pembuf))) { in main() 110 if (lws_x509_verify(x509, x509_trusted, NULL)) { in main() 140 if (lws_x509_public_to_jwk(&jwk, x509, "P-256,P-384,P-521", 4096)) { in main() 195 lws_x509_destroy(&x509); in main()
|
/third_party/openssl/demos/certs/apps/ |
D | mkacerts.sh | 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 22 $OPENSSL x509 -nameopt oneline -subject -issuer >client.pem 27 $OPENSSL x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 29 $OPENSSL x509 -nameopt oneline -subject -issuer >server.pem 34 $OPENSSL x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 36 $OPENSSL x509 -nameopt oneline -subject -issuer >server2.pem
|
D | mkxcerts.sh | 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 22 -config apps.cnf -extensions ec_cert -x509 -nodes \ 27 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -nodes \ 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 69 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ [all …]
|
/third_party/mbedtls/programs/ |
D | Makefile | 127 x509/cert_app \ 128 x509/cert_req \ 129 x509/cert_write \ 130 x509/crl_app \ 131 x509/load_roots \ 132 x509/req_app \ 406 x509/cert_app$(EXEXT): x509/cert_app.c $(DEP) 408 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) x509/cert_app.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@ 410 x509/cert_write$(EXEXT): x509/cert_write.c $(DEP) 412 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) x509/cert_write.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@ [all …]
|
D | .gitignore | 69 x509/cert_app 70 x509/cert_req 71 x509/cert_write 72 x509/crl_app 73 x509/load_roots 74 x509/req_app
|
/third_party/libwebsockets/include/libwebsockets/ |
D | lws-x509.h | 93 lws_x509_create(struct lws_x509_cert **x509); 112 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len); 127 lws_x509_verify(struct lws_x509_cert *x509, struct lws_x509_cert *trusted, 144 lws_x509_public_to_jwk(struct lws_jwk *jwk, struct lws_x509_cert *x509, 178 lws_x509_destroy(struct lws_x509_cert **x509); 181 lws_x509_info(struct lws_x509_cert *x509, enum lws_tls_cert_info type,
|
/third_party/curl/lib/vtls/ |
D | bearssl.c | 48 struct x509_context x509; member 236 struct x509_context *x509 = (struct x509_context *)ctx; in x509_start_chain() local 238 if(!x509->verifyhost) in x509_start_chain() 240 x509->minimal.vtable->start_chain(&x509->minimal.vtable, server_name); in x509_start_chain() 245 struct x509_context *x509 = (struct x509_context *)ctx; in x509_start_cert() local 247 x509->minimal.vtable->start_cert(&x509->minimal.vtable, length); in x509_start_cert() 253 struct x509_context *x509 = (struct x509_context *)ctx; in x509_append() local 255 x509->minimal.vtable->append(&x509->minimal.vtable, buf, len); in x509_append() 260 struct x509_context *x509 = (struct x509_context *)ctx; in x509_end_cert() local 262 x509->minimal.vtable->end_cert(&x509->minimal.vtable); in x509_end_cert() [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_oid.data | 37 OID get x509 extension - id-ce-basicConstraints 40 OID get x509 extension - id-ce-keyUsage 43 OID get x509 extension - id-ce-extKeyUsage 46 OID get x509 extension - id-ce-subjectAltName 49 OID get x509 extension - id-netscape-certtype 52 OID get x509 extension - id-ce-certificatePolicies 55 OID get x509 extension - invalid oid 58 OID get x509 extension - wrong oid - id-ce
|
/third_party/openssl/apps/ |
D | nseq.c | 33 X509 *x509 = NULL; in nseq_main() local 80 while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) in nseq_main() 81 sk_X509_push(seq->certs, x509); in nseq_main() 103 x509 = sk_X509_value(seq->certs, i); in nseq_main() 104 dump_cert_text(out, x509); in nseq_main() 105 PEM_write_bio_X509(out, x509); in nseq_main()
|
/third_party/openssl/crypto/pkcs7/ |
D | pk7_lib.c | 238 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) in PKCS7_add_certificate() argument 262 X509_up_ref(x509); in PKCS7_add_certificate() 263 if (!sk_X509_push(*sk, x509)) { in PKCS7_add_certificate() 264 X509_free(x509); in PKCS7_add_certificate() 303 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, in PKCS7_SIGNER_INFO_set() argument 312 X509_get_issuer_name(x509))) in PKCS7_SIGNER_INFO_set() 321 ASN1_INTEGER_dup(X509_get_serialNumber(x509)))) in PKCS7_SIGNER_INFO_set() 349 PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, in PKCS7_add_signature() argument 367 if (!PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst)) in PKCS7_add_signature() 422 PKCS7_RECIP_INFO *PKCS7_add_recipient(PKCS7 *p7, X509 *x509) in PKCS7_add_recipient() argument [all …]
|
/third_party/openssl/test/ |
D | x509_check_cert_pkey_test.c | 31 X509 *x509 = NULL; in test_x509_check_cert_pkey() local 73 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); in test_x509_check_cert_pkey() 74 if (x509 == NULL) { in test_x509_check_cert_pkey() 79 result = X509_check_private_key(x509, pkey); in test_x509_check_cert_pkey() 103 X509_free(x509); in test_x509_check_cert_pkey()
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_kiss.c | 181 X509 *x509; in parse_bag() local 215 if ((x509 = PKCS12_SAFEBAG_get1_cert(bag)) == NULL) in parse_bag() 217 if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { in parse_bag() 218 X509_free(x509); in parse_bag() 226 r = X509_alias_set1(x509, data, len); in parse_bag() 229 X509_free(x509); in parse_bag() 235 if (!sk_X509_push(ocerts, x509)) { in parse_bag() 236 X509_free(x509); in parse_bag()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_x509.c | 215 if (ctx->cert->x509 == x) in SSL_CTX_use_certificate() 218 X509_free(ctx->cert->x509); in SSL_CTX_use_certificate() 220 ctx->cert->x509 = x; in SSL_CTX_use_certificate() 233 if (ssl->cert->x509 == x) in SSL_use_certificate() 236 X509_free(ssl->cert->x509); in SSL_use_certificate() 238 ssl->cert->x509 = x; in SSL_use_certificate() 250 return ssl->cert->x509; in SSL_get_certificate()
|
D | ssl_cert.c | 41 ix = ic->x509; in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 84 X509_free(cert->x509); in ssl_cert_free()
|
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/ |
D | x509-pem.js | 3 var x509 = require('./x509'); variable 7 verify: x509.verify, 8 sign: x509.sign, 54 return (x509.read(buf, options)); 58 var dbuf = x509.write(cert, options);
|
/third_party/curl/tests/certs/scripts/ |
D | genroot.sh | 53 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca… 56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert 59 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der 63 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt 66 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ 21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 28 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 35 $OPENSSL x509 -req -in rreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 42 $OPENSSL x509 -req -in respreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 60 $OPENSSL x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ 70 $OPENSSL x509 -req -in dhcreq.pem -CA root.pem -days 3600 \
|
/third_party/openssl/ssl/ |
D | ssl_rsa.c | 19 static int ssl_set_cert(CERT *c, X509 *x509); 137 if (c->pkeys[i].x509 != NULL) { in ssl_set_pkey() 139 pktmp = X509_get0_pubkey(c->pkeys[i].x509); in ssl_set_pkey() 151 if (!X509_check_private_key(c->pkeys[i].x509, pkey)) { in ssl_set_pkey() 152 X509_free(c->pkeys[i].x509); in ssl_set_pkey() 153 c->pkeys[i].x509 = NULL; in ssl_set_pkey() 349 X509_free(c->pkeys[i].x509); in ssl_set_cert() 351 c->pkeys[i].x509 = x; in ssl_set_cert() 1020 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 1032 rv = ssl_security_cert(ssl, ctx, x509, 0, 1); in ssl_set_cert_and_key() [all …]
|