Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 25 of 768) sorted by relevance

12345678910>>...31

/third_party/node/test/parallel/
Dtest-tls-passphrase.js33 const cert = fixtures.readKey('rsa_cert.crt'); constant
36 assert(Buffer.isBuffer(cert));
38 assert.strictEqual(typeof cert.toString(), 'string');
47 cert: cert, property
48 ca: [cert],
59 cert: cert, property
66 cert: cert, property
74 cert: cert, property
83 cert: [cert], property
90 cert: [cert], property
[all …]
Dtest-tls-check-server-identity.js37 cert: { subject: { CN: 'a.com' } }, property
42 cert: { subject: { CN: 'a.com' } }, property
47 cert: { subject: { CN: 'a.com' } }, property
52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property
53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property
56 cert: { subject: { CN: 'b.com' } }, property
59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property
62 cert: { subject: { CN: '.a.com' } }, property
72 cert: { subject: { CN: '8.8.8.8' } }, property
80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property
[all …]
Dtest-tls-client-auth.js15 function checkServerIdentity(hostname, cert) { argument
17 assert.strictEqual(cert.subject.CN, 'agent10.example.com');
21 split(client.cert, client);
22 split(server.cert, server);
35 cert: client.cert, property
41 cert: server.cert, property
58 cert: server.cert, property
75 cert: server.cert, property
94 cert: server.cert, property
117 cert: client.single, property
[all …]
Dtest-tls-client-verify.js34 cert: 'agent2-cert', property
36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property
37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property
38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property
43 cert: 'agent2-cert', property
45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property
46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property
47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property
52 cert: 'agent2-cert', property
54 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property
[all …]
Dtest-tls-options-boolean-check.js65 ].forEach(([key, cert]) => {
66 tls.createServer({ key, cert }); field
83 ].forEach(([key, cert, index]) => {
86 tls.createServer({ key, cert }); field
109 ].forEach(([key, cert, index]) => {
110 const val = index === undefined ? cert : cert[index];
112 tls.createServer({ key, cert }); field
132 ].forEach(([key, cert, ca]) => {
133 tls.createServer({ key, cert, ca }); property
144 ].forEach(([key, cert, ca, index]) => {
[all …]
/third_party/openssl/test/certs/
Dsetup.sh4 ./mkcert.sh genroot "Root CA" root-key root-cert
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
14 openssl x509 -in root-cert.pem -trustout \
16 openssl x509 -in root-cert.pem -trustout \
18 openssl x509 -in root-cert.pem -trustout \
20 openssl x509 -in root-cert.pem -trustout \
23 openssl x509 -in root-cert.pem -trustout \
25 openssl x509 -in root-cert.pem -trustout \
43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5
46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768
[all …]
Dmkcert.sh90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
134 local cert=$1; shift
151 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
158 local cert=$1; shift
172 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
183 local cert=$1; shift
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/x509/
Dtests.rs41 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable
42 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable
43 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading()
53 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable
54 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable
55 let debugged = format!("{:#?}", cert); in test_debug()
69 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable
70 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable
71 let not_before = cert.not_before().to_string(); in test_cert_issue_validity()
72 let not_after = cert.not_after().to_string(); in test_cert_issue_validity()
[all …]
/third_party/openssl/test/recipes/
D25-test_req.t384 my $cert = shift @_;
385 my $ss = $cert =~ m/self-signed/;
386 my $is_ca = $cert =~ m/CA/;
391 "-subj", "/CN=$cn", @_, "-out", $cert);
394 ok(run(app([@cmd])), "generate $cert");
397 my $cert = shift @_;
399 cert_contains($cert, "Subject Key Identifier", $expect);
402 my $cert = shift @_;
404 cert_contains($cert, "Authority Key Identifier", $expect);
407 my $cert = shift @_;
[all …]
/third_party/node/test/fixtures/keys/
DMakefile2 ca1-cert.pem \
3 ca2-cert.pem \
5 ca3-cert.pem \
6 ca4-cert.pem \
7 ca5-cert.pem \
8 ca6-cert.pem \
9 agent1-cert.pem \
11 agent2-cert.pem \
12 agent3-cert.pem \
13 agent4-cert.pem \
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dx509v3.c45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
59 os_free(cert); in x509_certificate_free()
[all …]
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/
Dopenssh-cert.js28 function verify(cert, key) { argument
66 var cert = {};
67 cert.signatures = {};
68 cert.signatures.openssh = {};
70 cert.signatures.openssh.nonce = sshbuf.readBuffer();
97 cert.subjectKey = new Key(key);
99 cert.serial = sshbuf.readInt64();
104 cert.signatures.openssh.keyId = sshbuf.readString();
114 cert.subjects = principals.map(function (pr) {
122 cert.validFrom = int64ToDate(sshbuf.readInt64());
[all …]
Dx509.js35 function verify(cert, key) { argument
36 var sig = cert.signatures.x509;
46 writeTBSCert(cert, der);
117 var cert = {};
118 cert.signatures = {};
119 var sig = (cert.signatures.x509 = {});
122 cert.serial = readMPInt(der, 'serial');
132 cert.issuer = Identity.parseAsn1(der);
135 cert.validFrom = readDate(der);
136 cert.validUntil = readDate(der);
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dx509v3.c45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
59 os_free(cert); in x509_certificate_free()
[all …]
/third_party/openssl/test/recipes/80-test_cmp_http_data/
Dtest_credentials.csv1 expected,description, -section,val, -ref,val, -secret,val, -cert,val, -key,val, -keypass,val, -extr…
3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.…
6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.…
9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp…
10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key…
12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,…
13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL…
14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA…
15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,…
16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,…
[all …]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
Dssl_cert.c28 CERT *cert; in __ssl_cert_new() local
33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new()
34 if (!cert) { in __ssl_cert_new()
47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new()
48 if (!cert->pkey) { in __ssl_cert_new()
53 cert->x509 = __X509_new(ix); in __ssl_cert_new()
54 if (!cert->x509) { in __ssl_cert_new()
59 return cert; in __ssl_cert_new()
62 EVP_PKEY_free(cert->pkey); in __ssl_cert_new()
64 ssl_mem_free(cert); in __ssl_cert_new()
[all …]
/third_party/python/Lib/test/
Dmake_ssl_certs.py164 cert = f.read()
167 return cert, key
228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable
230 f.write(cert)
239 f.write(cert)
242 f.write(cert)
246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable
249 f.write(cert)
251 cert, key = make_cert_key('localhost', sign=True) variable
254 f.write(cert)
[all …]
/third_party/python/Modules/_ssl/
Dcert.c18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument
23 assert(cert != NULL); in newCertificate()
30 X509_up_ref(cert); in newCertificate()
32 self->cert = cert; in newCertificate()
39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument
41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509()
56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local
57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upref); in _PySSL_CertificateFromX509Stack()
90 retcode = PEM_write_bio_X509(bio, self->cert); in _ssl_Certificate_public_bytes_impl()
93 retcode = PEM_write_bio_X509_AUX(bio, self->cert); in _ssl_Certificate_public_bytes_impl()
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/
Dpkcs12.rs43 cert: parsed.cert.unwrap(), in parse()
55 let mut cert = ptr::null_mut(); in parse2() localVariable
62 &mut cert, in parse2()
67 let cert = X509::from_ptr_opt(cert); in parse2() localVariable
70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2()
99 cert: None, in builder()
114 pub cert: X509, field
120 pub cert: Option<X509>, field
128 cert: Option<X509>, field
157 pub fn cert(&mut self, cert: &X509Ref) -> &mut Self { in cert() method
[all …]
/third_party/openssl/ssl/
Dssl_cert.c75 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument
86 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
94 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
95 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
99 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
100 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
103 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup()
122 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup()
125 OPENSSL_malloc(cert->pkeys[i].serverinfo_length); in ssl_cert_dup()
130 ret->pkeys[i].serverinfo_length = cert->pkeys[i].serverinfo_length; in ssl_cert_dup()
[all …]
/third_party/openssl/crypto/ess/
Dess_lib.c18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert,
21 const X509 *cert,
42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local
44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init()
57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument
66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init()
81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init()
88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init()
119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local
121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, 1)) == NULL) in OSSL_ESS_signing_cert_v2_new_init()
[all …]
/third_party/openssl/crypto/cmp/
Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
45 pubkey = X509_get_pubkey(cert); in verify_signature()
63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument
112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
206 static int already_checked(const X509 *cert, in already_checked() argument
212 if (X509_cmp(sk_X509_value(already_checked, i - 1), cert) == 0) in already_checked()
[all …]
/third_party/openssl/crypto/ocsp/
Docsp_srv.c157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument
159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert()
236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument
238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name()
246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument
258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex()
279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument
281 if (cert == NULL) in OCSP_RESPID_set_by_key()
283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert->libctx, cert->propq); in OCSP_RESPID_set_by_key()
286 int OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, in OCSP_RESPID_match_ex() argument
[all …]
/third_party/openssl/test/ssl-tests/
D20-cert-select.cnf.in16 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
18 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
26 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
28 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
30 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
38 "Certificate" => test_pem("server-pss-cert.pem"),
43 "Certificate" => test_pem("server-pss-restrict-cert.pem"),
56 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
[all …]
/third_party/node/src/
Dnode_crypto_common.cc51 int SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert, X509** issuer) { in SSL_CTX_get_issuer() argument
57 X509_STORE_CTX_get1_issuer(issuer, store_ctx.get(), cert) == 1; in SSL_CTX_get_issuer()
281 X509* cert = SSL_get_certificate(ssl.get()); in GetCert() local
282 if (cert == nullptr) in GetCert()
285 MaybeLocal<Object> maybe_cert = X509ToObject(env, cert); in GetCert()
343 StackOfX509 CloneSSLCerts(X509Pointer&& cert, in CloneSSLCerts() argument
346 if (cert) in CloneSSLCerts()
347 sk_X509_push(peer_certs.get(), cert.release()); in CloneSSLCerts()
349 X509Pointer cert(X509_dup(sk_X509_value(ssl_certs, i))); in CloneSSLCerts() local
350 if (!cert || !sk_X509_push(peer_certs.get(), cert.get())) in CloneSSLCerts()
[all …]

12345678910>>...31