Searched refs:not_after (Results 1 - 11 of 11) sorted by relevance
/third_party/rust/crates/rust-openssl/openssl/examples/ |
H A D | mk_certs.rs | 43 let not_after = Asn1Time::days_from_now(365)?; in mk_ca_cert() 44 cert_builder.set_not_after(¬_after)?; in mk_ca_cert() 106 let not_after = Asn1Time::days_from_now(365)?; in mk_ca_signed_cert() 107 cert_builder.set_not_after(¬_after)?; in mk_ca_signed_cert()
|
/third_party/mbedtls/library/ |
H A D | x509write_crt.c | 131 const char *not_after) in mbedtls_x509write_crt_set_validity() 134 strlen(not_after) != MBEDTLS_X509_RFC5280_UTC_TIME_LEN - 1) { in mbedtls_x509write_crt_set_validity() 138 strncpy(ctx->not_after, not_after, MBEDTLS_X509_RFC5280_UTC_TIME_LEN); in mbedtls_x509write_crt_set_validity() 140 ctx->not_after[MBEDTLS_X509_RFC5280_UTC_TIME_LEN - 1] = 'Z'; in mbedtls_x509write_crt_set_validity() 504 x509_write_time(&c, buf, ctx->not_after, in mbedtls_x509write_crt_der() 129 mbedtls_x509write_crt_set_validity(mbedtls_x509write_cert *ctx, const char *not_before, const char *not_after) mbedtls_x509write_crt_set_validity() argument
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 56 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 71 not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 75 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 83 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@ 201 not_before=20190210144400 not_after=20290210144400 \ 215 not_before=20290210144400 not_after=20390210144400 md=SHA256 version=3 output_file=$@ 320 $(MBEDTLS_CERT_WRITE) subject_key=rsa_pkcs1_1024_clear.pem subject_name="CN=dw.yonan.net" issuer_crt=enco-ca-prstr.pem issuer_key=rsa_pkcs1_1024_clear.pem not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ 335 $(MBEDTLS_CERT_WRITE) request_file=$< serial=4 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ 338 $(MBEDTLS_CERT_WRITE) request_file=$< serial=4 issuer_crt=$(test_ca_crt) issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA256 version=3 output_file=$@ 410 not_before=20190210144406 not_after [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | x509_crt.h | 227 char MBEDTLS_PRIVATE(not_after)[MBEDTLS_X509_RFC5280_UTC_TIME_LEN + 1]; 998 * \param not_after not_after timestamp 1004 const char *not_after);
|
/third_party/mbedtls/programs/x509/ |
H A D | cert_write.c | 114 " not_after=%%s default: 20301231235959\n" \ 190 const char *not_after; /* validity period not after */ member 357 opt.not_after = DFL_NOT_AFTER; in main() 402 } else if (strcmp(p, "not_after") == 0) { in main() 403 opt.not_after = q; in main() 856 ret = mbedtls_x509write_crt_set_validity(&crt, opt.not_before, opt.not_after); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | x509v3.h | 61 os_time_t not_after; member
|
H A D | x509v3.c | 742 &cert->not_after) < 0) { in x509_parse_validity() 750 (unsigned long) cert->not_after); in x509_parse_validity() 2105 (unsigned long) cert->not_after)) { in x509_certificate_chain_validate() 2107 "(now=%lu not_before=%lu not_after=%lu)", in x509_certificate_chain_validate() 2108 now.sec, cert->not_before, cert->not_after); in x509_certificate_chain_validate()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | x509v3.h | 61 os_time_t not_after; member
|
H A D | x509v3.c | 732 &cert->not_after) < 0) { in x509_parse_validity() 740 (unsigned long) cert->not_after); in x509_parse_validity() 2167 (unsigned long) cert->not_after)) { in x509_certificate_chain_validate() 2169 "(now=%lu not_before=%lu not_after=%lu)", in x509_certificate_chain_validate() 2170 now.sec, cert->not_before, cert->not_after); in x509_certificate_chain_validate()
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | mod.rs | 228 pub fn set_not_after(&mut self, not_after: &Asn1TimeRef) -> Result<(), ErrorStack> { in set_not_after() 229 unsafe { cvt(X509_set1_notAfter(self.0.as_ptr(), not_after.as_ptr())).map(|_| ()) } in set_not_after() 570 pub fn not_after(&self) -> &Asn1TimeRef { in not_after() functions 573 Asn1TimeRef::from_const_ptr_opt(date).expect("not_after must not be null") in not_after() 806 debug_struct.field("not_after", &self.not_after());
|
H A D | tests.rs | 69 assert!(debugged.contains(r#"not_after: Aug 12 17:00:03 2026 GMT"#)); in test_debug() 77 let not_after = cert.not_after().to_string(); in test_cert_issue_validity() 80 assert_eq!(not_after, "Aug 12 17:00:03 2026 GMT"); in test_cert_issue_validity()
|
Completed in 17 milliseconds