/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 104 cert_example_multi.csr: rsa_pkcs1_1024_clear.pem 105 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=www.example.com" -set_serial 17 -config $(test_ca_config_file) -extensions dns_alt_names -days 3650 -key rsa_pkcs1_1024_clear.pem -out $@ 113 cert_example_multi_nocn.csr: rsa_pkcs1_1024_clear.pem 123 parse_input/test_csr_v3_keyUsage.csr.der: rsa_pkcs1_1024_clear.pem 124 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_keyUsage 125 parse_input/test_csr_v3_subjectAltName.csr.der: rsa_pkcs1_1024_clear.pem 126 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_subjectAltName 127 parse_input/test_csr_v3_nsCertType.csr.der: rsa_pkcs1_1024_clear.pem 128 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_nsCertType 129 parse_input/test_csr_v3_all.csr.der: rsa_pkcs1_1024_clear.pem [all...] |
H A D | print_c.pl | 23 Usage: $0 mbedtls_test_foo <file.pem 24 $0 TEST_FOO mbedtls_test_foo <file.pem
|
/third_party/node/deps/openssl/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 22 #include <openssl/pem.h> 1239 * output The output type to implement. may be der or pem. 1335 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, pem); 1337 MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, pem); 1338 MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, pem); 1341 MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, pem); 1344 MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, pem); 1346 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem); 1359 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, pem); 1361 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, pem); [all...] |
/third_party/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 22 #include <openssl/pem.h> 1228 * output The output type to implement. may be der or pem. 1324 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, pem); 1326 MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, pem); 1327 MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, pem); 1330 MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, pem); 1333 MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, pem); 1335 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem); 1348 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, pem); 1350 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, pem); [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-passphrase.js | 31 const passKey = fixtures.readKey('rsa_private_encrypted.pem'); 32 const rawKey = fixtures.readKey('rsa_private.pem'); 153 key: [{ pem: passKey, passphrase: 'password' }], 160 key: [{ pem: passKey, passphrase: 'password' }], 168 key: [{ pem: passKey }], 176 key: [{ pem: passKey.toString(), passphrase: 'password' }], 183 key: [{ pem: rawKey, passphrase: 'ignored' }], 190 key: [{ pem: rawKey.toString(), passphrase: 'ignored' }], 197 key: [{ pem: rawKey }], 205 key: [{ pem [all...] |
H A D | test-https-options-boolean-check.js | 24 const keyBuff = fixtures.readKey('agent1-key.pem'); 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 26 const keyBuff2 = fixtures.readKey('ec-key.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 63 [[{ pem: keyBuff }], false], 64 [[{ pem: keyBuff }, { pem: keyBuff }], false], 78 [{ pem [all...] |
H A D | test-tls-options-boolean-check.js | 24 const keyBuff = fixtures.readKey('agent1-key.pem'); 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 26 const keyBuff2 = fixtures.readKey('ec-key.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 63 [[{ pem: keyBuff }], false], 64 [[{ pem: keyBuff }, { pem: keyBuff }], false], 78 [{ pem [all...] |
H A D | test-tls-cert-ext-encoding.js | 21 const pem = ` 71 key: pem, 72 cert: pem,
|
/third_party/mbedtls/library/ |
H A D | pkparse.c | 36 #include "mbedtls/pem.h" 982 mbedtls_pem_context pem; in mbedtls_pk_parse_key() local 990 mbedtls_pem_init(&pem); in mbedtls_pk_parse_key() 997 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_pk_parse_key() 1006 pem.buf, pem.buflen)) != 0) { in mbedtls_pk_parse_key() 1010 mbedtls_pem_free(&pem); in mbedtls_pk_parse_key() 1026 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_pk_parse_key() 1036 pem.buf, pem in mbedtls_pk_parse_key() 1190 mbedtls_pem_context pem; mbedtls_pk_parse_public_key() local [all...] |
H A D | x509_crl.c | 31 #include "mbedtls/pem.h" 510 mbedtls_pem_context pem; in mbedtls_x509_crl_parse() local 518 mbedtls_pem_init(&pem); in mbedtls_x509_crl_parse() 525 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_crl_parse() 541 pem.buf, pem.buflen)) != 0) { in mbedtls_x509_crl_parse() 542 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse() 546 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse() 550 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse()
|
H A D | x509_csr.c | 31 #include "mbedtls/pem.h" 459 mbedtls_pem_context pem; in mbedtls_x509_csr_parse() local 472 mbedtls_pem_init(&pem); in mbedtls_x509_csr_parse() 473 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_csr_parse() 478 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_csr_parse() 488 ret = mbedtls_x509_csr_parse_der(csr, pem.buf, pem.buflen); in mbedtls_x509_csr_parse() 491 mbedtls_pem_free(&pem); in mbedtls_x509_csr_parse()
|
/third_party/libwebsockets/lib/tls/ |
H A D | tls.c | 327 uint8_t *pem = NULL, *p, *end, *opem; in lws_tls_alloc_pem_to_der_file() local 333 n = alloc_file(context, filename, (uint8_t **)&pem, &len); in lws_tls_alloc_pem_to_der_file() 337 pem = (uint8_t *)inbuf; in lws_tls_alloc_pem_to_der_file() 341 opem = p = pem; in lws_tls_alloc_pem_to_der_file() 348 pem = lws_malloc((size_t)inlen, "alloc_der"); in lws_tls_alloc_pem_to_der_file() 349 if (!pem) in lws_tls_alloc_pem_to_der_file() 352 memcpy(pem, inbuf, (size_t)inlen); in lws_tls_alloc_pem_to_der_file() 354 *buf = pem; in lws_tls_alloc_pem_to_der_file() 364 pem = lws_malloc(((size_t)inlen * 3) / 4, "alloc_der"); in lws_tls_alloc_pem_to_der_file() 365 if (!pem) { in lws_tls_alloc_pem_to_der_file() [all...] |
/third_party/openssl/test/ |
H A D | crltest.c | 15 #include <openssl/pem.h> 190 static BIO *glue2bio(const char **pem, char **out) in glue2bio() argument 194 *out = glue_strings(pem, &s); in glue2bio() 201 static X509_CRL *CRL_from_strings(const char **pem) in CRL_from_strings() argument 205 BIO *b = glue2bio(pem, &p); in CRL_from_strings() 222 static X509 *X509_from_strings(const char **pem) in X509_from_strings() argument 226 BIO *b = glue2bio(pem, &p); in X509_from_strings()
|
/third_party/node/test/fixtures/x509-escaping/ |
H A D | create-certs.js | 32 writeFileSync('server-key.pem', privateKey.export({ 34 format: 'pem' 344 const pem = rfc5280.Certificate.encode(cert, 'pem', { 347 writeFileSync(`./alt-${i}-cert.pem`, `${pem}\n`); 498 const pem = rfc5280.Certificate.encode(cert, 'pem', { 501 writeFileSync(`./info-${i}-cert.pem`, `${pem}\ [all...] |
/third_party/openssl/test/certs/ |
H A D | mkcert.sh | 50 if [ ! -f "${key}.pem" ]; then 62 openssl genpkey "${args[@]}" -out "${key}.pem" 74 openssl req -new -"${OPENSSL_SIGALG}" -key "${key}.pem" \ 85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \ 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | macros.rs | 6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> { 9 let bio = crate::bio::MemBioSlice::new(pem)?; 20 pub fn $n3<F>(pem: &[u8], callback: F) -> Result<$t, crate::error::ErrorStack> 26 let bio = crate::bio::MemBioSlice::new(pem)?; 123 pub fn $n(pem: &[u8]) -> Result<$t, crate::error::ErrorStack> { 126 let bio = crate::bio::MemBioSlice::new(pem)?;
|
/third_party/node/tools/ |
H A D | mk-ca-bundle.pl | 268 my $pem = "\"-----BEGIN CERTIFICATE-----\\n\"\n" 282 print CRT $pem; 292 print TMP $pem; 304 print TMP $pem;
|
/third_party/node/benchmark/crypto/ |
H A D | oneshot-sign.js | 10 ec: fs.readFileSync(`${fixtures_keydir}/ec_p256_private.pem`, 'utf-8'), 11 rsa: fs.readFileSync(`${fixtures_keydir}/rsa_private_2048.pem`, 'utf-8'), 12 ed25519: fs.readFileSync(`${fixtures_keydir}/ed25519_private.pem`, 'utf-8'), 23 keyFormat: ['pem', 'der', 'jwk', 'keyObject', 'keyObject.unique'], 102 case 'pem':
|
H A D | rsa-sign-verify-throughput.js | 14 fs.readFileSync(`${fixtures_keydir}/rsa_public_${key}.pem`); 16 fs.readFileSync(`${fixtures_keydir}/rsa_private_${key}.pem`);
|
H A D | rsa-encrypt-decrypt-throughput.js | 14 fs.readFileSync(`${fixtures_keydir}/rsa_public_${key}.pem`); 16 fs.readFileSync(`${fixtures_keydir}/rsa_private_${key}.pem`);
|
/third_party/node/lib/internal/tls/ |
H A D | secure-context.js | 193 const pem = ( 194 val?.pem !== undefined ? val.pem : val); 197 setKey(context, pem, pass, name);
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | mod.rs | 18 pub use self::pem::*; 54 mod pem; modules
|
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-x509.h | 99 * \param pem: pointer to PEM format content 106 * IMPORTANT for compatibility with mbedtls, the last used byte of \p pem 112 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len); 153 * \param pem: pointer to PEM private key in memory 157 * IMPORTANT for compatibility with mbedtls, the last used byte of \p pem 168 void *pem, size_t len, const char *passphrase);
|
/third_party/mbedtls/tests/scripts/ |
H A D | generate_server9_bad_saltlen.py | 12 from asn1crypto import pem, x509, core #type: ignore #pylint: disable=import-error namespace 83 f.write(pem.armor('CERTIFICATE', target_certificate.dump()))
|
/third_party/node/test/fixtures/0-dns/ |
H A D | create-cert.js | 13 const private_key = fs.readFileSync('./0-dns-key.pem'); 15 // openssl rsa -in 0-dns-key.pem -RSAPublicKey_out -outform der 73 const pem = rfc5280.Certificate.encode(cert, 'pem', {label: 'CERTIFICATE'}); 75 fs.writeFileSync('./0-dns-cert.pem', pem + '\n');
|