Home
last modified time | relevance | path

Searched full:cert (Results 1 – 25 of 1868) sorted by relevance

12345678910>>...75

/third_party/openssl/test/recipes/
D25-test_verify.t21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_;
28 push(@args, srctop_file(@path, "$cert.pem"));
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
[all …]
D06-test_algorithmid.t20 'ee-cert' => 'ca-cert',
23 # 'ee-pss-sha1-cert' => 'ca-cert',
24 # 'ee-pss-sha256-cert' => 'ca-cert',
25 # 'ee-pss-cert' => 'ca-pss-cert',
26 # 'server-pss-restrict-cert' => 'rootcert',
32 'ee-cert-ec-explicit' => 'ca-cert-ec-named',
33 'ee-cert-ec-named-explicit' => 'ca-cert-ec-explicit',
34 'ee-cert-ec-named-named' => 'ca-cert-ec-named',
35 # 'server-ed448-cert' => 'root-ed448-cert'
36 'server-ecdsa-brainpoolP256r1-cert' => 'rootcert',
D04-test_pem_reading.t28 "cert-1023line.pem" => 1,
29 "cert-1024line.pem" => 1,
30 "cert-1025line.pem" => 1,
31 "cert-254-chars-at-the-end.pem" => 1,
32 "cert-254-chars-in-the-middle.pem" => 1,
33 "cert-255line.pem" => 1,
34 "cert-256line.pem" => 1,
35 "cert-257line.pem" => 1,
36 "cert-blankline.pem" => 0,
37 "cert-bom.pem" => 1,
[all …]
D25-test_req.t384 my $cert = shift @_;
385 my $ss = $cert =~ m/self-signed/;
386 my $is_ca = $cert =~ m/CA/;
391 "-subj", "/CN=$cn", @_, "-out", $cert);
394 ok(run(app([@cmd])), "generate $cert");
397 my $cert = shift @_;
399 cert_contains($cert, "Subject Key Identifier", $expect);
402 my $cert = shift @_;
404 cert_contains($cert, "Authority Key Identifier", $expect);
407 my $cert = shift @_;
[all …]
/third_party/openssl/test/certs/
Dsetup.sh3 # Primary root: root-cert
4 ./mkcert.sh genroot "Root CA" root-key root-cert
5 # root cert variants: CA:false, key2, DN2, expired
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
10 # cross root and root cross cert
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
14 openssl x509 -in root-cert.pem -trustout \
16 openssl x509 -in root-cert.pem -trustout \
18 openssl x509 -in root-cert.pem -trustout \
20 openssl x509 -in root-cert.pem -trustout \
[all …]
Dmkcert.sh90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
135 local cert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
163 local cert=$1; shift
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
188 local cert=$1; shift
[all …]
/third_party/node/test/fixtures/keys/
DMakefile2 ca1-cert.pem \
3 ca2-cert.pem \
5 ca3-cert.pem \
6 ca4-cert.pem \
7 ca5-cert.pem \
8 ca6-cert.pem \
9 agent1-cert.pem \
11 agent2-cert.pem \
12 agent3-cert.pem \
13 agent4-cert.pem \
[all …]
/third_party/node/test/parallel/
Dtest-tls-passphrase.js33 const cert = fixtures.readKey('rsa_cert.crt'); constant
36 assert(Buffer.isBuffer(cert));
38 assert.strictEqual(typeof cert.toString(), 'string');
47 cert: cert, property
48 ca: [cert],
59 cert: cert, property
66 cert: cert, property
74 cert: cert, property
83 cert: [cert], property
90 cert: [cert], property
[all …]
Dtest-tls-check-server-identity.js37 cert: { subject: { CN: 'a.com' } }, property
38 error: 'Host: false. is not cert\'s CN: a.com'
42 cert: { subject: { CN: 'a.com' } }, property
43 error: 'Host: null. is not cert\'s CN: a.com'
47 cert: { subject: { CN: 'a.com' } }, property
48 error: 'Host: undefined. is not cert\'s CN: a.com'
52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property
53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property
56 cert: { subject: { CN: 'b.com' } }, property
57 error: 'Host: a.com. is not cert\'s CN: b.com'
[all …]
Dtest-tls-client-auth.js15 function checkServerIdentity(hostname, cert) { argument
17 assert.strictEqual(cert.subject.CN, 'agent10.example.com');
20 // Split out the single end-entity cert and the subordinate CA for later use.
21 split(client.cert, client);
22 split(server.cert, server);
31 // Typical setup, nothing special, complete cert chains sent to peer.
35 cert: client.cert, property
41 cert: server.cert, property
50 // As above, but without requesting client's cert.
58 cert: server.cert, property
[all …]
Dtest-tls-multi-key.js34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec.
40 cert: [ property
41 fixtures.readKey('agent1-cert.pem'),
42 fixtures.readKey('ec10-cert.pem'),
46 fixtures.readKey('ca5-cert.pem'),
47 fixtures.readKey('ca1-cert.pem'),
51 // Key and cert are ordered as ec, rsa.
57 cert: [ property
58 fixtures.readKey('agent1-cert.pem'),
59 fixtures.readKey('ec10-cert.pem'),
[all …]
Dtest-tls-client-verify.js32 { ca: ['ca1-cert'],
34 cert: 'agent2-cert', property
36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property
37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property
38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property
43 cert: 'agent2-cert', property
45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property
46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property
47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property
50 { ca: ['ca1-cert', 'ca2-cert'],
[all …]
Dtest-tls-sni-option.js37 cert: loadPEM('agent2-cert'), property
60 cert: loadPEM('agent1-cert'), property
61 ca: [ loadPEM('ca2-cert') ]
65 cert: loadPEM('agent3-cert') property
75 cert: loadPEM('agent1-cert'), property
76 ca: [loadPEM('ca1-cert')],
88 cert: loadPEM('agent4-cert'), property
89 ca: [loadPEM('ca1-cert')],
101 cert: loadPEM('agent2-cert'), property
102 ca: [loadPEM('ca2-cert')],
[all …]
Dtest-tls-options-boolean-check.js25 const certBuff = fixtures.readKey('agent1-cert.pem');
27 const certBuff2 = fixtures.readKey('ec-cert.pem');
28 const caCert = fixtures.readKey('ca1-cert.pem');
29 const caCert2 = fixtures.readKey('ca2-cert.pem');
44 // Format ['key', 'cert']
65 ].forEach(([key, cert]) => {
66 tls.createServer({ key, cert }); field
70 // Format ['key', 'cert', 'expected message']
83 ].forEach(([key, cert, index]) => {
86 tls.createServer({ key, cert }); field
[all …]
Dtest-https-options-boolean-check.js25 const certBuff = fixtures.readKey('agent1-cert.pem');
27 const certBuff2 = fixtures.readKey('ec-cert.pem');
28 const caCert = fixtures.readKey('ca1-cert.pem');
29 const caCert2 = fixtures.readKey('ca2-cert.pem');
44 // Format ['key', 'cert']
65 ].forEach(([key, cert]) => {
66 https.createServer({ key, cert }); field
70 // Format ['key', 'cert', 'expected message']
84 ].forEach(([key, cert, index]) => {
87 https.createServer({ key, cert }); field
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/x509/
Dtests.rs46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable
47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable
48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading()
58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable
59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable
60 let debugged = format!("{:#?}", cert); in test_debug()
74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable
75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable
76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity()
77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity()
[all …]
/third_party/openssl/test/recipes/80-test_cmp_http_data/
Dtest_credentials.csv1 expected,description, -section,val, -ref,val, -secret,val, -cert,val, -key,val, -keypass,val, -extr…
3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.…
6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.…
9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp…
10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key…
12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,…
13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL…
14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA…
15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,…
16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,…
[all …]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
Dssl_cert.c26 CERT *__ssl_cert_new(CERT *ic, void *rngctx) in __ssl_cert_new()
28 CERT *cert; in __ssl_cert_new() local
33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new()
34 if (!cert) { in __ssl_cert_new()
35 SSL_DEBUG(SSL_CERT_ERROR_LEVEL, "no enough memory > (cert)"); in __ssl_cert_new()
47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new()
48 if (!cert->pkey) { in __ssl_cert_new()
53 cert->x509 = __X509_new(ix); in __ssl_cert_new()
54 if (!cert->x509) { in __ssl_cert_new()
59 return cert; in __ssl_cert_new()
[all …]
/third_party/node/src/crypto/
Dcrypto_x509.cc33 ManagedX509::ManagedX509(X509Pointer&& cert) : cert_(std::move(cert)) {} in ManagedX509() argument
51 tracker->TrackFieldWithSize("cert", size); in MemoryInfo()
58 X509Certificate* cert; in Fingerprint() local
59 ASSIGN_OR_RETURN_UNWRAP(&cert, args.Holder()); in Fingerprint()
61 if (GetFingerprintDigest(env, algo(), cert->get()).ToLocal(&ret)) in Fingerprint()
111 X509Pointer cert, in New() argument
113 std::shared_ptr<ManagedX509> mcert(new ManagedX509(std::move(cert))); in New()
119 std::shared_ptr<ManagedX509> cert, in New() argument
130 new X509Certificate(env, obj, std::move(cert), issuer_chain); in New()
138 X509* cert = SSL_get_certificate(ssl.get()); in GetCert() local
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
[all …]
/third_party/openssl/crypto/cmp/
Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
45 pubkey = X509_get_pubkey(cert); in verify_signature()
63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
100 * certs (possibly including CRLs and a cert verification callback function)
106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument
112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */
[all …]
/third_party/node/deps/openssl/openssl/crypto/cmp/
Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
45 pubkey = X509_get_pubkey(cert); in verify_signature()
63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
100 * certs (possibly including CRLs and a cert verification callback function)
106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument
112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */
[all …]
/third_party/openssl/ssl/
Dssl_cert.c61 CERT *ssl_cert_new(void) in ssl_cert_new()
63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_new()
85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument
87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup()
96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
104 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup()
[all …]
/third_party/node/deps/openssl/openssl/ssl/
Dssl_cert.c61 CERT *ssl_cert_new(void) in ssl_cert_new()
63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_new()
85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument
87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup()
96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
104 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup()
[all …]

12345678910>>...75