| /third_party/rust/crates/rust-openssl/openssl/src/x509/ |
| D | tests.rs | 41 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() localVariable 42 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() localVariable 53 let cert = include_bytes!("../../test/cert.pem"); in test_debug() localVariable 54 let cert = X509::from_pem(cert).unwrap(); in test_debug() localVariable 69 let cert = include_bytes!("../../test/cert.pem"); in test_cert_issue_validity() localVariable 70 let cert = X509::from_pem(cert).unwrap(); in test_cert_issue_validity() localVariable 80 let cert = include_bytes!("../../test/cert.pem"); in test_save_der() localVariable 81 let cert = X509::from_pem(cert).unwrap(); in test_save_der() localVariable 89 let cert = include_bytes!("../../test/cert.pem"); in test_subject_read_cn() localVariable 90 let cert = X509::from_pem(cert).unwrap(); in test_subject_read_cn() localVariable [all …]
|
| /third_party/node/test/parallel/ |
| D | test-tls-check-server-identity.js | 37 cert: { subject: { CN: 'a.com' } }, property 42 cert: { subject: { CN: 'a.com' } }, property 47 cert: { subject: { CN: 'a.com' } }, property 52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property 53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property 56 cert: { subject: { CN: 'b.com' } }, property 59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property 62 cert: { subject: { CN: '.a.com' } }, property 72 cert: { subject: { CN: '8.8.8.8' } }, property 80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property [all …]
|
| D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); constant 47 cert: cert, property 59 cert: cert, property 66 cert: cert, property 74 cert: cert, property 83 cert: [cert], property 90 cert: [cert], property 98 cert: [cert], property 107 cert: cert.toString(), property 114 cert: cert.toString(), property [all …]
|
| D | test-tls-client-verify.js | 34 cert: 'agent2-cert', property 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 43 cert: 'agent2-cert', property 45 { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, property 46 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, property 47 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, property 52 cert: 'agent2-cert', property 54 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, property [all …]
|
| D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { argument 35 cert: client.cert, property 41 cert: server.cert, property 58 cert: server.cert, property 75 cert: server.cert, property 94 cert: server.cert, property 117 cert: client.single, property 123 cert: server.single, property 136 cert: client.single, property 142 cert: server.single, property [all …]
|
| D | test-revert-CVE-2021-44531.js | 25 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'URI:http://8.8.8.8/' }, property 30 host: 'a.b.a.com', cert: { property 36 host: 'a.b.a.com', cert: { property 42 host: 'a.b.a.com', cert: { property 51 host: 'a.b.a.com', cert: { property
|
| D | test-tls-sni-option.js | 37 cert: loadPEM('agent2-cert'), property 60 cert: loadPEM('agent1-cert'), property 65 cert: loadPEM('agent3-cert') property 75 cert: loadPEM('agent1-cert'), property 88 cert: loadPEM('agent4-cert'), property 101 cert: loadPEM('agent2-cert'), property 114 cert: loadPEM('agent3-cert'), property 127 cert: loadPEM('agent3-cert'), property
|
| D | test-tls-cert-regression.js | 30 const cert = constant 69 function test(cert, key, cb) { argument 71 cert, property
|
| D | test-tls-options-boolean-check.js | 66 tls.createServer({ key, cert }); field 86 tls.createServer({ key, cert }); field 112 tls.createServer({ key, cert }); field 133 tls.createServer({ key, cert, ca }); property 147 tls.createServer({ key, cert, ca }); property 166 tls.createSecureContext({ key, cert, ca }); property
|
| D | test-tls-zero-clear-in.js | 31 const cert = fixtures.readKey('rsa_cert.crt'); constant 35 cert, property 45 cert: cert, property
|
| D | test-tls-multiple-cas-as-string.js | 15 const cert = fixtures.readKey('agent3-cert.pem', 'utf8'); constant 19 const server = tls.createServer({ ca, cert, key }); property 21 server.addContext('agent3', { ca, cert, key }); property
|
| D | test-tls-multi-key.js | 40 cert: [ property 57 cert: [ property 73 cert: [ property 90 cert: [ property 108 cert: [ property 127 cert: [ property
|
| D | test-https-options-boolean-check.js | 66 https.createServer({ key, cert }); field 87 https.createServer({ key, cert }); field 113 https.createServer({ key, cert }); field 134 https.createServer({ key, cert, ca }); property 148 https.createServer({ key, cert, ca }); property
|
| D | test-tls-sni-server-client.js | 38 cert: loadPEM('agent2-cert') property 44 cert: loadPEM('agent1-cert') property 48 cert: loadPEM('agent3-cert') property 53 cert: loadPEM('agent6-cert') property
|
| D | test-tls-set-sigalgs.js | 23 checkServerIdentity: (servername, cert) => { }, argument 25 cert: keys.agent2.cert, property 30 cert: keys.agent6.cert, property
|
| D | test-x509-escaping-revert-CVE-2021-44532.js | 104 cert: pem, property 217 cert: pem, property 299 const cert = fixtures.readKey('incorrect_san_correct_subject-cert.pem'); constant 313 const server = tls.createServer({ key, cert }, common.mustNotCall()); field 334 const cert = fixtures.readKey('irrelevant_san_correct_subject-cert.pem'); constant 348 const server = tls.createServer({ key, cert }, common.mustCall((socket) => { field
|
| D | test-http2-origin.js | 27 const cert = readKey('agent8-cert.pem', 'binary'); constant 31 const server = createSecureServer({ key, cert }); field 111 const server = createSecureServer({ key, cert, origins }); property 141 const server = createSecureServer({ key, cert }); field
|
| /third_party/python/Lib/test/ |
| D | make_ssl_certs.py | 228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable 246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable 251 cert, key = make_cert_key('localhost', sign=True) variable 256 cert, key = make_cert_key('fakehostname', sign=True) variable 261 cert, key = make_cert_key( variable 282 cert, key = make_cert_key('allsans', sign=True, extra_san='\n'.join(extra_san)) variable 299 cert, key = make_cert_key('idnsans', sign=True, extra_san='\n'.join(extra_san)) variable 304 cert, key = make_cert_key('nosan', sign=True, ext='req_x509_extensions_nosan') variable
|
| /third_party/node/test/sequential/ |
| D | test-tls-connect.js | 36 const cert = fixtures.readKey('rsa_cert.crt'); constant 39 const options = { cert: cert, key: key, port: common.PORT }; property 50 const cert = fixtures.readKey('rsa_cert.crt'); constant 55 cert: cert, property
|
| /third_party/openssl/crypto/ess/ |
| D | ess_lib.c | 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 137 const X509 *cert, in ESS_CERT_ID_V2_new_init() 197 static int ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) in ess_issuer_serial_cmp() 220 const X509 *cert; in find() local
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() 67 void x509_certificate_chain_free(struct x509_certificate *cert) in x509_certificate_chain_free() 220 struct x509_certificate *cert, in x509_parse_public_key() 693 struct x509_certificate *cert, const u8 **next) in x509_parse_validity() 775 static int x509_parse_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_key_usage() 812 static int x509_parse_ext_basic_constraints(struct x509_certificate *cert, in x509_parse_ext_basic_constraints() 1069 static int x509_parse_ext_subject_alt_name(struct x509_certificate *cert, in x509_parse_ext_subject_alt_name() 1096 static int x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, in x509_parse_ext_issuer_alt_name() 1172 static int x509_parse_ext_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_ext_key_usage() 1229 static int x509_parse_extension_data(struct x509_certificate *cert, in x509_parse_extension_data() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() 67 void x509_certificate_chain_free(struct x509_certificate *cert) in x509_certificate_chain_free() 217 struct x509_certificate *cert, in x509_parse_public_key() 687 struct x509_certificate *cert, const u8 **next) in x509_parse_validity() 765 static int x509_parse_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_key_usage() 798 static int x509_parse_ext_basic_constraints(struct x509_certificate *cert, in x509_parse_ext_basic_constraints() 1049 static int x509_parse_ext_subject_alt_name(struct x509_certificate *cert, in x509_parse_ext_subject_alt_name() 1073 static int x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, in x509_parse_ext_issuer_alt_name() 1146 static int x509_parse_ext_certificate_policies(struct x509_certificate *cert, in x509_parse_ext_certificate_policies() 1270 static int x509_parse_ext_ext_key_usage(struct x509_certificate *cert, in x509_parse_ext_ext_key_usage() [all …]
|
| /third_party/openssl/crypto/ocsp/ |
| D | ocsp_srv.c | 157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() 236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() 246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() 279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() 286 int OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, in OCSP_RESPID_match_ex() 322 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_match()
|
| /third_party/cef/libcef/browser/ |
| D | ssl_host_state_delegate.cc | 20 bool CertPolicy::Check(const net::X509Certificate& cert, int error) const { in Check() argument 30 void CertPolicy::Allow(const net::X509Certificate& cert, int error) { in Allow() 73 const net::X509Certificate& cert, in AllowCert() 99 const net::X509Certificate& cert, in QueryPolicy()
|
| /third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
| D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 80 void ssl_cert_free(CERT *cert) in ssl_cert_free()
|