/third_party/node/test/parallel/ |
H A D | test-tls-client-auth.js | 36 ca: server.ca, 42 ca: client.ca, 53 ca: server.ca, 59 ca: client.ca, 70 ca: server.ca, [all...] |
H A D | test-https-agent-session-reuse.js | 17 const ca = fixtures.readKey('ca1-cert.pem'); 40 ca: ca, 49 ca: ca, 61 ca: ca, 71 ca: ca, 82 ca [all...] |
H A D | test-https-strict.js | 63 const agent1 = new https.Agent({ ca: [ca1] }); 64 const agent2 = new https.Agent({ ca: [ca2] }); 65 const agent3 = new https.Agent({ ca: [ca1, ca2] }); 120 function makeReq(path, port, error, host, ca) { 122 const options = { port, path, ca }; 124 if (!ca) { 127 if (!Array.isArray(ca)) ca = [ca]; 128 if (ca [all...] |
H A D | test-tls-multi-key.js | 45 client: { ca: [ 62 client: { ca: [ 78 client: { ca: [ 96 client: { ca: [ 115 client: { ca: [ 134 client: { ca: [ 143 const clientTrustRoots = options.client.ca; 155 ca: clientTrustRoots, 175 ca: clientTrustRoots,
|
H A D | test-tls-socket-default-options.js | 21 { secureContext: tls.createSecureContext({ ca: keys.agent1.ca }) }, 25 { ca: keys.agent1.ca }, 28 // Secure context options, like ca, are ignored if a sec ctx is explicitly 31 { secureContext: tls.createSecureContext(), ca: keys.agent1.ca },
|
H A D | test-tls-options-boolean-check.js | 123 // Format ['key', 'cert', 'ca'] 132 ].forEach(([key, cert, ca]) => { 133 tls.createServer({ key, cert, ca }); 137 // Format ['key', 'cert', 'ca'] 144 ].forEach(([key, cert, ca, index]) => { 145 const val = index === undefined ? ca : ca[index]; 147 tls.createServer({ key, cert, ca }); 151 message: 'The "options.ca" property must be of type string or an instance' + 158 // Format ['key', 'cert', 'ca'] [all...] |
H A D | test-tls-sni-option.js | 61 ca: [ loadPEM('ca2-cert') ] 76 ca: [loadPEM('ca1-cert')], 89 ca: [loadPEM('ca1-cert')], 102 ca: [loadPEM('ca2-cert')], 115 ca: [loadPEM('ca1-cert')], 128 ca: [loadPEM('ca1-cert')],
|
H A D | test-tls-sni-server-client.js | 59 ca: [loadPEM('ca1-cert')], 68 ca: [loadPEM('ca2-cert')], 77 ca: [loadPEM('ca2-cert')], 86 ca: [loadPEM('ca1-cert')], 95 ca: [loadPEM('ca1-cert')],
|
H A D | test-tls-multiple-cas-as-string.js | 18 function test(ca) { 19 const server = tls.createServer({ ca, cert, key }); 21 server.addContext('agent3', { ca, cert, key }); 29 ca
|
/third_party/curl/lib/ |
H A D | curl_addrinfo.c | 81 struct Curl_addrinfo *ca; in Curl_freeaddrinfo() local 83 for(ca = cahead; ca; ca = canext) { in Curl_freeaddrinfo() 84 canext = ca->ai_next; in Curl_freeaddrinfo() 85 free(ca); in Curl_freeaddrinfo() 115 struct Curl_addrinfo *ca; in Curl_getaddrinfo_ex() local 148 ca = malloc(sizeof(struct Curl_addrinfo) + ss_size + namelen); in Curl_getaddrinfo_ex() 149 if(!ca) { in Curl_getaddrinfo_ex() 157 ca in Curl_getaddrinfo_ex() 571 struct Curl_addrinfo *ca; Curl_addrinfo_set_port() local [all...] |
H A D | hostip.c | 530 struct Curl_addrinfo *ca; in get_localhost6() local 536 ca = calloc(1, sizeof(struct Curl_addrinfo) + ss_size + hostlen + 1); in get_localhost6() 537 if(!ca) in get_localhost6() 548 ca->ai_flags = 0; in get_localhost6() 549 ca->ai_family = AF_INET6; in get_localhost6() 550 ca->ai_socktype = SOCK_STREAM; in get_localhost6() 551 ca->ai_protocol = IPPROTO_TCP; in get_localhost6() 552 ca->ai_addrlen = (curl_socklen_t)ss_size; in get_localhost6() 553 ca->ai_next = NULL; in get_localhost6() 554 ca in get_localhost6() 567 struct Curl_addrinfo *ca; get_localhost() local [all...] |
H A D | asyn-thread.c | 302 struct Curl_addrinfo *ca; in query_complete() local 343 ca = malloc(sizeof(struct Curl_addrinfo) + ss_size + namelen); in query_complete() 344 if(!ca) { in query_complete() 351 ca->ai_flags = ai->ai_flags; in query_complete() 352 ca->ai_family = ai->ai_family; in query_complete() 353 ca->ai_socktype = ai->ai_socktype; in query_complete() 354 ca->ai_protocol = ai->ai_protocol; in query_complete() 355 ca->ai_addrlen = (curl_socklen_t)ss_size; in query_complete() 356 ca->ai_addr = NULL; in query_complete() 357 ca in query_complete() [all...] |
H A D | asyn-ares.c | 682 struct Curl_addrinfo *ca; in ares2addr() local 702 ca = malloc(sizeof(struct Curl_addrinfo) + ss_size); in ares2addr() 703 if(!ca) { in ares2addr() 711 ca->ai_flags = ai->ai_flags; in ares2addr() 712 ca->ai_family = ai->ai_family; in ares2addr() 713 ca->ai_socktype = ai->ai_socktype; in ares2addr() 714 ca->ai_protocol = ai->ai_protocol; in ares2addr() 715 ca->ai_addrlen = (curl_socklen_t)ss_size; in ares2addr() 716 ca->ai_addr = NULL; in ares2addr() 717 ca in ares2addr() [all...] |
/third_party/curl/lib/vtls/ |
H A D | bearssl.c | 90 struct cafile_parser *ca = ctx; in append_dn() local 92 if(ca->err != CURLE_OK || !ca->in_cert) in append_dn() 94 if(sizeof(ca->dn) - ca->dn_len < len) { in append_dn() 95 ca->err = CURLE_FAILED_INIT; in append_dn() 98 memcpy(ca->dn + ca->dn_len, buf, len); in append_dn() 99 ca->dn_len += len; in append_dn() 104 struct cafile_parser *ca in x509_push() local 114 struct cafile_parser ca; load_cafile() local [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkcs12.rs | 44 chain: parsed.ca, in parse() 56 let mut ca = ptr::null_mut(); in parse2() variables 63 &mut ca, in parse2() 68 let ca = Stack::from_ptr_opt(ca); in parse2() 70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2() 100 ca: None, in builder() 121 pub ca: Option<Stack<X509>>, 129 ca: Option<Stack<X509>>, 164 pub fn ca( functions [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/timestamp/ |
H A D | tsa.js | 22 const verified = timestampAuthorities.some((ca) => { 24 verifyTimestampForCA(timestamp, data, ca); 39 function verifyTimestampForCA(timestamp, data, ca) { 40 const [leaf, ...cas] = ca.certChain; 57 const validAtSigningTime = ca.certChain.every((cert) => cert.validForDate(signingTime)); 71 return timestampAuthorities.filter((ca) => ca.certChain.length > 0 && 72 core_1.crypto.bufferEqual(ca.certChain[0].serialNumber, criteria.serialNumber) && 73 core_1.crypto.bufferEqual(ca.certChain[0].issuer, criteria.issuer));
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | tests.rs | 177 let cert = include_bytes!("../../test/root-ca.pem"); in test_retrieve_pathlen() 181 let cert = include_bytes!("../../test/intermediate-ca.pem"); in test_retrieve_pathlen() 313 let basic_constraints = BasicConstraints::new().critical().ca().build().unwrap(); in x509_builder() 389 BasicConstraints::new().critical().ca().build().unwrap(), in x509_extension_to_der() 485 let ca = include_bytes!("../../test/root-ca.pem"); in issued() 486 let ca = X509::from_pem(ca).unwrap(); in issued() 488 assert_eq!(ca.issued(&cert), X509VerifyResult::OK); in issued() 524 let ca in test_verify_cert() [all...] |
/third_party/openssl/test/certs/ |
H A D | mkcert.sh | 190 local ca=$1; shift 199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 207 local ca=$1; shift 216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 229 local ca=$1; shift 235 geneeconfig $key $cert $cakey $ca "$conf" 256 local ca=$1; shift 266 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 288 local ca=$1; shift 300 cert "$cert" "$exts" -CA "${ca} [all...] |
/third_party/python/Lib/ctypes/test/ |
H A D | test_prototypes.py | 104 ca = c_char(b"a") 105 self.assertEqual(ord(b"a"), func(pointer(ca))[0]) 106 self.assertEqual(ord(b"a"), func(byref(ca))[0]) 119 ca = c_char(b"a") 120 self.assertEqual(ord(b"a"), func(pointer(ca))[0]) 121 self.assertEqual(ord(b"a"), func(byref(ca))[0]) 134 ca = c_char(b"a") 135 self.assertEqual(ord(b"a"), func(pointer(ca))[0]) 136 self.assertEqual(ord(b"a"), func(byref(ca))[0]) 184 ca [all...] |
H A D | test_arrays.py | 53 ca = CharArray(b"a", b"b", b"c") 59 self.assertEqual(ca[0], b"a") 60 self.assertEqual(ca[1], b"b") 61 self.assertEqual(ca[2], b"c") 62 self.assertEqual(ca[-3], b"a") 63 self.assertEqual(ca[-2], b"b") 64 self.assertEqual(ca[-1], b"c") 66 self.assertEqual(len(ca), 3) 70 self.assertRaises(TypeError, delitem, ca, 0)
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 39 test_ca_crt = test-ca.crt 40 test_ca_key_file_rsa = test-ca.key 43 test_ca_config_file = test-ca.opensslconf 51 test-ca.req.sha256: $(test_ca_key_file_rsa) 53 all_intermediate += test-ca.req.sha256 55 parse_input/test-ca.crt test-ca.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 56 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 57 all_final += test-ca [all...] |
/third_party/openssl/demos/pkcs12/ |
H A D | pkread.c | 53 STACK_OF(X509) *ca = NULL; in main() 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 95 if (ca != NULL && sk_X509_num(ca) > 0) { in main() 97 for (i = 0; i < sk_X509_num(ca); i++) in main() 98 PEM_write_X509_AUX(fp, sk_X509_value(ca, i)); in main() 108 sk_X509_pop_free(ca, X509_free); in main()
|
/third_party/skia/third_party/externals/libjpeg-turbo/ |
H A D | cdjpeg.c | 99 register int ca, ck; in GLOBAL() local 102 while ((ca = *arg++) != '\0') { in GLOBAL() 105 if (isupper(ca)) /* force arg to lcase (assume ck is already) */ in GLOBAL() 106 ca = tolower(ca); in GLOBAL() 107 if (ca != ck) in GLOBAL()
|
/third_party/curl/ |
H A D | Makefile | 65 ca-bundle: scripts/mk-ca-bundle.pl 66 @echo "generate a fresh ca-bundle.crt" 67 @perl $< -b -l -u lib/ca-bundle.crt 69 ca-firefox: lib/firefox-db2pem.sh 70 @echo "generate a fresh ca-bundle.crt" 71 ./lib/firefox-db2pem.sh lib/ca-bundle.crt
|
/third_party/libphonenumber/metadata/src/test/java/com/google/i18n/phonenumbers/metadata/table/ |
H A D | ColumnGroupTest.java | 38 Column<Boolean> ca = group.getColumn(PhoneRegion.of("CA")); in testGroupColumns() 39 assertThat(ca.getName()).isEqualTo("Region:CA"); in testGroupColumns() 52 Column<Boolean> ca = group.getColumn(PhoneRegion.of("CA")); in testExtractGroupColumns() 55 assertThat(group.extractGroupColumns(ImmutableSet.of(first, us, prototype, ca, last))) in testExtractGroupColumns() 56 .containsExactly(PhoneRegion.of("US"), us, PhoneRegion.of("CA"), ca).inOrder(); in testExtractGroupColumns()
|