/third_party/openssl/test/recipes/ |
D | 25-test_verify.t | 21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 28 push(@args, srctop_file(@path, "$cert.pem")); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]), [all …]
|
D | 06-test_algorithmid.t | 20 'ee-cert' => 'ca-cert', 23 # 'ee-pss-sha1-cert' => 'ca-cert', 24 # 'ee-pss-sha256-cert' => 'ca-cert', 25 # 'ee-pss-cert' => 'ca-pss-cert', 26 # 'server-pss-restrict-cert' => 'rootcert', 32 'ee-cert-ec-explicit' => 'ca-cert-ec-named', 33 'ee-cert-ec-named-explicit' => 'ca-cert-ec-explicit', 34 'ee-cert-ec-named-named' => 'ca-cert-ec-named', 35 # 'server-ed448-cert' => 'root-ed448-cert' 36 'server-ecdsa-brainpoolP256r1-cert' => 'rootcert',
|
D | 04-test_pem_reading.t | 28 "cert-1023line.pem" => 1, 29 "cert-1024line.pem" => 1, 30 "cert-1025line.pem" => 1, 31 "cert-254-chars-at-the-end.pem" => 1, 32 "cert-254-chars-in-the-middle.pem" => 1, 33 "cert-255line.pem" => 1, 34 "cert-256line.pem" => 1, 35 "cert-257line.pem" => 1, 36 "cert-blankline.pem" => 0, 37 "cert-bom.pem" => 1, [all …]
|
D | 25-test_req.t | 384 my $cert = shift @_; 385 my $ss = $cert =~ m/self-signed/; 386 my $is_ca = $cert =~ m/CA/; 391 "-subj", "/CN=$cn", @_, "-out", $cert); 394 ok(run(app([@cmd])), "generate $cert"); 397 my $cert = shift @_; 399 cert_contains($cert, "Subject Key Identifier", $expect); 402 my $cert = shift @_; 404 cert_contains($cert, "Authority Key Identifier", $expect); 407 my $cert = shift @_; [all …]
|
/third_party/openssl/test/certs/ |
D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 5 # root cert variants: CA:false, key2, DN2, expired 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 10 # cross root and root cross cert 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout \ [all …]
|
D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert=$1; shift 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 188 local cert=$1; shift [all …]
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 2 ca1-cert.pem \ 3 ca2-cert.pem \ 5 ca3-cert.pem \ 6 ca4-cert.pem \ 7 ca5-cert.pem \ 8 ca6-cert.pem \ 9 agent1-cert.pem \ 11 agent2-cert.pem \ 12 agent3-cert.pem \ 13 agent4-cert.pem \ [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); constant 36 assert(Buffer.isBuffer(cert)); 38 assert.strictEqual(typeof cert.toString(), 'string'); 47 cert: cert, property 48 ca: [cert], 59 cert: cert, property 66 cert: cert, property 74 cert: cert, property 83 cert: [cert], property 90 cert: [cert], property [all …]
|
D | test-tls-check-server-identity.js | 37 cert: { subject: { CN: 'a.com' } }, property 38 error: 'Host: false. is not cert\'s CN: a.com' 42 cert: { subject: { CN: 'a.com' } }, property 43 error: 'Host: null. is not cert\'s CN: a.com' 47 cert: { subject: { CN: 'a.com' } }, property 48 error: 'Host: undefined. is not cert\'s CN: a.com' 52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property 53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property 56 cert: { subject: { CN: 'b.com' } }, property 57 error: 'Host: a.com. is not cert\'s CN: b.com' [all …]
|
D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { argument 17 assert.strictEqual(cert.subject.CN, 'agent10.example.com'); 20 // Split out the single end-entity cert and the subordinate CA for later use. 21 split(client.cert, client); 22 split(server.cert, server); 31 // Typical setup, nothing special, complete cert chains sent to peer. 35 cert: client.cert, property 41 cert: server.cert, property 50 // As above, but without requesting client's cert. 58 cert: server.cert, property [all …]
|
D | test-tls-multi-key.js | 34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec. 40 cert: [ property 41 fixtures.readKey('agent1-cert.pem'), 42 fixtures.readKey('ec10-cert.pem'), 46 fixtures.readKey('ca5-cert.pem'), 47 fixtures.readKey('ca1-cert.pem'), 51 // Key and cert are ordered as ec, rsa. 57 cert: [ property 58 fixtures.readKey('agent1-cert.pem'), 59 fixtures.readKey('ec10-cert.pem'), [all …]
|
D | test-tls-client-verify.js | 32 { ca: ['ca1-cert'], 34 cert: 'agent2-cert', property 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 43 cert: 'agent2-cert', property 45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property 46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 50 { ca: ['ca1-cert', 'ca2-cert'], [all …]
|
D | test-tls-sni-option.js | 37 cert: loadPEM('agent2-cert'), property 60 cert: loadPEM('agent1-cert'), property 61 ca: [ loadPEM('ca2-cert') ] 65 cert: loadPEM('agent3-cert') property 75 cert: loadPEM('agent1-cert'), property 76 ca: [loadPEM('ca1-cert')], 88 cert: loadPEM('agent4-cert'), property 89 ca: [loadPEM('ca1-cert')], 101 cert: loadPEM('agent2-cert'), property 102 ca: [loadPEM('ca2-cert')], [all …]
|
D | test-tls-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 tls.createServer({ key, cert }); field 70 // Format ['key', 'cert', 'expected message'] 83 ].forEach(([key, cert, index]) => { 86 tls.createServer({ key, cert }); field [all …]
|
D | test-https-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 https.createServer({ key, cert }); field 70 // Format ['key', 'cert', 'expected message'] 84 ].forEach(([key, cert, index]) => { 87 https.createServer({ key, cert }); field [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
D | tests.rs | 46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable 47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable 48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading() 58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable 59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable 60 let debugged = format!("{:#?}", cert); in test_debug() 74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable 75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable 76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity() 77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity() [all …]
|
/third_party/openssl/test/recipes/80-test_cmp_http_data/ |
D | test_credentials.csv | 1 expected,description, -section,val, -ref,val, -secret,val, -cert,val, -key,val, -keypass,val, -extr… 3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.… 6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.… 9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp… 10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key… 12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,… 13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL… 14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA… 15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,… 16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,… [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 26 CERT *__ssl_cert_new(CERT *ic, void *rngctx) in __ssl_cert_new() 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 35 SSL_DEBUG(SSL_CERT_ERROR_LEVEL, "no enough memory > (cert)"); in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() [all …]
|
/third_party/node/src/crypto/ |
D | crypto_x509.cc | 33 ManagedX509::ManagedX509(X509Pointer&& cert) : cert_(std::move(cert)) {} in ManagedX509() argument 51 tracker->TrackFieldWithSize("cert", size); in MemoryInfo() 58 X509Certificate* cert; in Fingerprint() local 59 ASSIGN_OR_RETURN_UNWRAP(&cert, args.Holder()); in Fingerprint() 61 if (GetFingerprintDigest(env, algo(), cert->get()).ToLocal(&ret)) in Fingerprint() 111 X509Pointer cert, in New() argument 113 std::shared_ptr<ManagedX509> mcert(new ManagedX509(std::move(cert))); in New() 119 std::shared_ptr<ManagedX509> cert, in New() argument 130 new X509Certificate(env, obj, std::move(cert), issuer_chain); in New() 138 X509* cert = SSL_get_certificate(ssl.get()); in GetCert() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() [all …]
|
/third_party/openssl/crypto/cmp/ |
D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ [all …]
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ [all …]
|
/third_party/openssl/ssl/ |
D | ssl_cert.c | 61 CERT *ssl_cert_new(void) in ssl_cert_new() 63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_new() 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup() 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() [all …]
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | ssl_cert.c | 61 CERT *ssl_cert_new(void) in ssl_cert_new() 63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_new() 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup() 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() [all …]
|