/third_party/mbedtls/programs/x509/ |
D | cert_write.c | 204 mbedtls_asn1_sequence *ext_key_usage; /* extended key usages */ member 312 mbedtls_asn1_sequence *ext_key_usage; in main() local 355 opt.ext_key_usage = DFL_EXT_KEY_USAGE; in main() 490 mbedtls_asn1_sequence **tail = &opt.ext_key_usage; in main() 497 ext_key_usage = mbedtls_calloc(1, sizeof(mbedtls_asn1_sequence)); in main() 498 ext_key_usage->buf.tag = MBEDTLS_ASN1_OID; in main() 500 SET_OID(ext_key_usage->buf, MBEDTLS_OID_SERVER_AUTH); in main() 502 SET_OID(ext_key_usage->buf, MBEDTLS_OID_CLIENT_AUTH); in main() 504 SET_OID(ext_key_usage->buf, MBEDTLS_OID_CODE_SIGNING); in main() 506 SET_OID(ext_key_usage->buf, MBEDTLS_OID_EMAIL_PROTECTION); in main() [all …]
|
/third_party/node/test/sequential/ |
D | test-tls-securepair-client.js | 54 assert.strictEqual(pair.cleartext.getPeerCertificate().ext_key_usage.length, 56 assert.strictEqual(pair.cleartext.getPeerCertificate().ext_key_usage[0],
|
/third_party/node/test/fixtures/keys/ |
D | agent4.cnf | 20 [ ext_key_usage ]
|
D | agent5.cnf | 20 [ ext_key_usage ]
|
D | Makefile | 336 -extensions ext_key_usage \ 378 -extensions ext_key_usage \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.h | 95 unsigned long ext_key_usage; member
|
D | x509v3.c | 1207 cert->ext_key_usage |= X509_EXT_KEY_USAGE_ANY; in x509_parse_ext_ext_key_usage() 1210 cert->ext_key_usage |= X509_EXT_KEY_USAGE_SERVER_AUTH; in x509_parse_ext_ext_key_usage() 1213 cert->ext_key_usage |= X509_EXT_KEY_USAGE_CLIENT_AUTH; in x509_parse_ext_ext_key_usage() 1216 cert->ext_key_usage |= X509_EXT_KEY_USAGE_OCSP; in x509_parse_ext_ext_key_usage()
|
D | tlsv1_client_ocsp.c | 632 !(signer->ext_key_usage & in tls_process_basic_ocsp_response()
|
D | tlsv1_server_read.c | 580 !(chain->ext_key_usage & in tls_process_certificate()
|
D | tlsv1_client_read.c | 606 !(chain->ext_key_usage & in tls_process_certificate()
|
/third_party/mbedtls/library/ |
D | x509_crt.c | 572 mbedtls_x509_sequence *ext_key_usage) in x509_get_ext_key_usage() argument 576 if ((ret = mbedtls_asn1_get_sequence_of(p, end, ext_key_usage, MBEDTLS_ASN1_OID)) != 0) { in x509_get_ext_key_usage() 581 if (ext_key_usage->buf.p == NULL) { in x509_get_ext_key_usage() 882 &crt->ext_key_usage)) != 0) { in x509_get_crt_ext() 1729 &crt->ext_key_usage)) != 0) { in mbedtls_x509_crt_info() 1830 for (cur = &crt->ext_key_usage; cur != NULL; cur = cur->next) { in mbedtls_x509_crt_check_extended_key_usage() 2837 mbedtls_asn1_sequence_free(cert_cur->ext_key_usage.next); in mbedtls_x509_crt_free()
|
D | oid.c | 351 FN_OID_TYPED_FROM_ASN1(mbedtls_oid_descriptor_t, ext_key_usage, oid_ext_key_usage) 354 ext_key_usage,
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.function | 329 char *ext_key_usage, 450 if (strcmp(ext_key_usage, "NULL") != 0) { 462 if (strcmp(ext_key_usage, "serverAuth") == 0) { 464 } else if (strcmp(ext_key_usage, "codeSigning,timeStamping") == 0) {
|
D | test_suite_x509write.data | 85 Certificate write check Server1 SHA1, one ext_key_usage
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.h | 96 unsigned long ext_key_usage; member
|
D | x509v3.c | 1302 cert->ext_key_usage |= X509_EXT_KEY_USAGE_ANY; in x509_parse_ext_ext_key_usage() 1305 cert->ext_key_usage |= X509_EXT_KEY_USAGE_SERVER_AUTH; in x509_parse_ext_ext_key_usage() 1308 cert->ext_key_usage |= X509_EXT_KEY_USAGE_CLIENT_AUTH; in x509_parse_ext_ext_key_usage() 1311 cert->ext_key_usage |= X509_EXT_KEY_USAGE_OCSP; in x509_parse_ext_ext_key_usage()
|
D | tlsv1_client_ocsp.c | 601 !(signer->ext_key_usage & in tls_process_basic_ocsp_response()
|
D | tlsv1_server_read.c | 580 !(chain->ext_key_usage & in tls_process_certificate()
|
D | tlsv1_client_read.c | 614 !(chain->ext_key_usage & in tls_process_certificate()
|
/third_party/mbedtls/include/mbedtls/ |
D | x509_crt.h | 89 mbedtls_x509_sequence ext_key_usage; /**< Optional list of extended key usage OIDs. */ member
|
/third_party/node/src/crypto/ |
D | crypto_common.cc | 529 MaybeStackBuffer<Local<Value>, 16> ext_key_usage(count); in GetKeyUsage() local 537 ext_key_usage[j++] = OneByteString(env->isolate(), buf); in GetKeyUsage() 541 return Array::New(env->isolate(), ext_key_usage.out(), count); in GetKeyUsage()
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
D | tests.rs | 321 let ext_key_usage = ExtendedKeyUsage::new() in x509_builder() localVariable 327 builder.append_extension(ext_key_usage).unwrap(); in x509_builder()
|
/third_party/openssl/crypto/objects/ |
D | obj_mac.num | 126 ext_key_usage 126
|
/third_party/node/deps/openssl/openssl/crypto/objects/ |
D | obj_mac.num | 126 ext_key_usage 126
|
/third_party/node/doc/api/ |
D | tls.md | 1232 * `ext_key_usage` {Array} (Optional) The extended key usage, a set of OIDs. 1291 ext_key_usage: [ '1.3.6.1.5.5.7.3.1', '1.3.6.1.5.5.7.3.2' ],
|