/third_party/node/test/parallel/ |
D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); constant 36 assert(Buffer.isBuffer(cert)); 38 assert.strictEqual(typeof cert.toString(), 'string'); 47 cert: cert, property 48 ca: [cert], 59 cert: cert, property 66 cert: cert, property 74 cert: cert, property 83 cert: [cert], property 90 cert: [cert], property [all …]
|
D | test-tls-check-server-identity.js | 37 cert: { subject: { CN: 'a.com' } }, property 42 cert: { subject: { CN: 'a.com' } }, property 47 cert: { subject: { CN: 'a.com' } }, property 52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property 53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property 56 cert: { subject: { CN: 'b.com' } }, property 59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property 62 cert: { subject: { CN: '.a.com' } }, property 72 cert: { subject: { CN: '8.8.8.8' } }, property 80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property [all …]
|
D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { argument 17 assert.strictEqual(cert.subject.CN, 'agent10.example.com'); 21 split(client.cert, client); 22 split(server.cert, server); 35 cert: client.cert, property 41 cert: server.cert, property 58 cert: server.cert, property 75 cert: server.cert, property 95 cert: server.cert, property 118 cert: client.single, property [all …]
|
D | test-tls-client-verify.js | 34 cert: 'agent2-cert', property 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 43 cert: 'agent2-cert', property 45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property 46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 52 cert: 'agent2-cert', property 54 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property [all …]
|
/third_party/openssl/test/certs/ |
D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert.pem -trustout \ 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 [all …]
|
D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert=$1; shift 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 188 local cert=$1; shift [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
D | tests.rs | 46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable 47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable 48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading() 58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable 59 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable 60 let debugged = format!("{:#?}", cert); in test_debug() 74 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable 75 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable 76 let not_before = cert.not_before().to_string(); in test_cert_issue_validity() 77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity() [all …]
|
/third_party/openssl/test/recipes/ |
D | 25-test_req.t | 384 my $cert = shift @_; 385 my $ss = $cert =~ m/self-signed/; 386 my $is_ca = $cert =~ m/CA/; 391 "-subj", "/CN=$cn", @_, "-out", $cert); 394 ok(run(app([@cmd])), "generate $cert"); 397 my $cert = shift @_; 399 cert_contains($cert, "Subject Key Identifier", $expect); 402 my $cert = shift @_; 404 cert_contains($cert, "Authority Key Identifier", $expect); 407 my $cert = shift @_; [all …]
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 2 ca1-cert.pem \ 3 ca2-cert.pem \ 5 ca3-cert.pem \ 6 ca4-cert.pem \ 7 ca5-cert.pem \ 8 ca6-cert.pem \ 9 agent1-cert.pem \ 11 agent2-cert.pem \ 12 agent3-cert.pem \ 13 agent4-cert.pem \ [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/third_party/openssl/test/recipes/80-test_cmp_http_data/ |
D | test_credentials.csv | 1 expected,description, -section,val, -ref,val, -secret,val, -cert,val, -key,val, -keypass,val, -extr… 3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.… 6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.… 9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp… 10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key… 12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,… 13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL… 14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA… 15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,… 16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,… [all …]
|
/third_party/node/src/crypto/ |
D | crypto_x509.cc | 33 ManagedX509::ManagedX509(X509Pointer&& cert) : cert_(std::move(cert)) {} in ManagedX509() argument 58 X509Certificate* cert; in Fingerprint() local 59 ASSIGN_OR_RETURN_UNWRAP(&cert, args.Holder()); in Fingerprint() 61 if (GetFingerprintDigest(env, algo(), cert->get()).ToLocal(&ret)) in Fingerprint() 111 X509Pointer cert, in New() argument 113 std::shared_ptr<ManagedX509> mcert(new ManagedX509(std::move(cert))); in New() 119 std::shared_ptr<ManagedX509> cert, in New() argument 130 new X509Certificate(env, obj, std::move(cert), issuer_chain); in New() 138 X509* cert = SSL_get_certificate(ssl.get()); in GetCert() local 139 if (cert == nullptr) in GetCert() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() 62 EVP_PKEY_free(cert->pkey); in __ssl_cert_new() 64 ssl_mem_free(cert); in __ssl_cert_new() [all …]
|
/third_party/nghttp2/src/ |
D | shrpx_tls_test.cc | 199 auto cert = PEM_read_X509(f, nullptr, nullptr, nullptr); in load_cert() local 203 return cert; in load_cert() 232 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 235 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() 239 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname() 245 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 248 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() 252 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname() 258 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 261 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() [all …]
|
/third_party/python/Lib/test/ |
D | make_ssl_certs.py | 164 cert = f.read() 167 return cert, key 228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable 230 f.write(cert) 239 f.write(cert) 242 f.write(cert) 246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable 249 f.write(cert) 251 cert, key = make_cert_key('localhost', sign=True) variable 254 f.write(cert) [all …]
|
/third_party/python/Modules/_ssl/ |
D | cert.c | 18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument 23 assert(cert != NULL); in newCertificate() 30 X509_up_ref(cert); in newCertificate() 32 self->cert = cert; in newCertificate() 39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument 41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509() 56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local 57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upref); in _PySSL_CertificateFromX509Stack() 90 retcode = PEM_write_bio_X509(bio, self->cert); in _ssl_Certificate_public_bytes_impl() 93 retcode = PEM_write_bio_X509_AUX(bio, self->cert); in _ssl_Certificate_public_bytes_impl() [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | pkcs12.rs | 43 cert: parsed.cert.unwrap(), in parse() 55 let mut cert = ptr::null_mut(); in parse2() localVariable 62 &mut cert, in parse2() 67 let cert = X509::from_ptr_opt(cert); in parse2() localVariable 70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2() 99 cert: None, in builder() 114 pub cert: X509, field 120 pub cert: Option<X509>, field 128 cert: Option<X509>, field 157 pub fn cert(&mut self, cert: &X509Ref) -> &mut Self { in cert() method [all …]
|
/third_party/curl/lib/vtls/ |
D | x509asn1.c | 761 int Curl_parseX509(struct Curl_X509certificate *cert, in Curl_parseX509() argument 769 cert->certificate.header = NULL; in Curl_parseX509() 770 cert->certificate.beg = beg; in Curl_parseX509() 771 cert->certificate.end = end; in Curl_parseX509() 784 beg = getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509() 788 if(!getASN1Element(&cert->signature, beg, end)) in Curl_parseX509() 795 cert->version.header = NULL; in Curl_parseX509() 796 cert->version.beg = &defaultVersion; in Curl_parseX509() 797 cert->version.end = &defaultVersion + sizeof(defaultVersion); in Curl_parseX509() 802 if(!getASN1Element(&cert->version, elem.beg, elem.end)) in Curl_parseX509() [all …]
|
/third_party/openssl/ssl/ |
D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert->pkeys[i].serverinfo_length); in ssl_cert_dup() 140 ret->pkeys[i].serverinfo_length = cert->pkeys[i].serverinfo_length; in ssl_cert_dup() [all …]
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert->pkeys[i].serverinfo_length); in ssl_cert_dup() 140 ret->pkeys[i].serverinfo_length = cert->pkeys[i].serverinfo_length; in ssl_cert_dup() [all …]
|
/third_party/openssl/crypto/ess/ |
D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, 1)) == NULL) in OSSL_ESS_signing_cert_v2_new_init() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/ess/ |
D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, 1)) == NULL) in OSSL_ESS_signing_cert_v2_new_init() [all …]
|
/third_party/openssl/crypto/cmp/ |
D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 206 static int already_checked(const X509 *cert, in already_checked() argument 212 if (X509_cmp(sk_X509_value(already_checked, i - 1), cert) == 0) in already_checked() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() argument 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 206 static int already_checked(const X509 *cert, in already_checked() argument 212 if (X509_cmp(sk_X509_value(already_checked, i - 1), cert) == 0) in already_checked() [all …]
|