/third_party/node/test/parallel/ |
H A D | test-crypto-x509.js | 17 } = require('internal/crypto/x509'); 88 const x509 = new X509Certificate(cert); 90 assert(isX509Certificate(x509)); 92 assert(!x509.ca); 93 assert.strictEqual(x509.subject, subjectCheck); 94 assert.strictEqual(x509.subjectAltName, undefined); 95 assert.strictEqual(x509.issuer, issuerCheck); 96 assert.strictEqual(x509.infoAccess, infoAccessCheck); 97 assert.strictEqual(x509.validFrom, 'Sep 3 21:40:37 2022 GMT'); 98 assert.strictEqual(x509 [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-x509.c | 98 lws_tls_mbedtls_cert_info(mbedtls_x509_crt *x509, enum lws_tls_cert_info type, in lws_tls_mbedtls_cert_info() argument 104 if (!x509) in lws_tls_mbedtls_cert_info() 112 buf->time = lws_tls_mbedtls_time_to_unix(&x509->MBEDTLS_PRIVATE_V30_ONLY(valid_from)); in lws_tls_mbedtls_cert_info() 118 buf->time = lws_tls_mbedtls_time_to_unix(&x509->MBEDTLS_PRIVATE_V30_ONLY(valid_to)); in lws_tls_mbedtls_cert_info() 124 return lws_tls_mbedtls_get_x509_name(&x509->MBEDTLS_PRIVATE_V30_ONLY(subject), buf, len); in lws_tls_mbedtls_cert_info() 127 return lws_tls_mbedtls_get_x509_name(&x509->MBEDTLS_PRIVATE_V30_ONLY(issuer), buf, len); in lws_tls_mbedtls_cert_info() 130 buf->usage = x509->MBEDTLS_PRIVATE(key_usage); in lws_tls_mbedtls_cert_info() 138 switch (mbedtls_pk_get_type(&x509->MBEDTLS_PRIVATE_V30_ONLY(pk))) { in lws_tls_mbedtls_cert_info() 141 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(x509->MBEDTLS_PRIVATE_V30_ONLY(pk)); in lws_tls_mbedtls_cert_info() 156 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec(x509 in lws_tls_mbedtls_cert_info() 281 mbedtls_x509_crt *x509; lws_tls_vhost_cert_info() local 292 mbedtls_x509_crt *x509; lws_tls_peer_cert_info() local 314 lws_x509_info(struct lws_x509_cert *x509, enum lws_tls_cert_info type, union lws_tls_cert_info_results *buf, size_t len) lws_x509_info() argument 321 lws_x509_create(struct lws_x509_cert **x509) lws_x509_create() argument 334 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len) lws_x509_parse_from_pem() argument 354 lws_x509_verify(struct lws_x509_cert *x509, struct lws_x509_cert *trusted, const char *common_name) lws_x509_verify() argument 379 lws_x509_public_to_jwk(struct lws_jwk *jwk, struct lws_x509_cert *x509, const char *curves, int rsa_min_bits) lws_x509_public_to_jwk() argument 531 lws_x509_destroy(struct lws_x509_cert **x509) lws_x509_destroy() argument [all...] |
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-x509.c | 79 lws_tls_openssl_cert_info(X509 *x509, enum lws_tls_cert_info type, in lws_tls_openssl_cert_info() argument 97 if (!x509) in lws_tls_openssl_cert_info() 110 X509_get_notBefore(x509)); in lws_tls_openssl_cert_info() 117 X509_get_notAfter(x509)); in lws_tls_openssl_cert_info() 126 xn = X509_get_subject_name(x509); in lws_tls_openssl_cert_info() 137 xn = X509_get_issuer_name(x509); in lws_tls_openssl_cert_info() 146 buf->usage = X509_get_key_usage(x509); in lws_tls_openssl_cert_info() 155 size_t klen = (unsigned int)i2d_X509_PUBKEY(X509_get_X509_PUBKEY(x509), NULL); in lws_tls_openssl_cert_info() 167 X509_get_X509_PUBKEY(x509), &ptmp) != (int)klen || in lws_tls_openssl_cert_info() 185 int der_len = i2d_X509(x509, NUL in lws_tls_openssl_cert_info() 352 lws_x509_info(struct lws_x509_cert *x509, enum lws_tls_cert_info type, union lws_tls_cert_info_results *buf, size_t len) lws_x509_info() argument 364 X509 *x509 = SSL_CTX_get0_certificate(vhost->tls.ssl_ctx); lws_tls_vhost_cert_info() local 381 X509 *x509; lws_tls_peer_cert_info() local 409 lws_x509_create(struct lws_x509_cert **x509) lws_x509_create() argument 419 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len) lws_x509_parse_from_pem() argument 437 lws_x509_verify(struct lws_x509_cert *x509, struct lws_x509_cert *trusted, const char *common_name) lws_x509_verify() argument 473 lws_x509_public_to_jwk(struct lws_jwk *jwk, struct lws_x509_cert *x509, const char *curves, int rsa_min_bits) lws_x509_public_to_jwk() argument [all...] |
H A D | openssl-server.c | 808 X509 *x509; member 831 vhost->tls.ss->x509 = X509_new(); 832 if (!vhost->tls.ss->x509) 835 ASN1_INTEGER_set(X509_get_serialNumber(vhost->tls.ss->x509), 1); 836 X509_gmtime_adj(X509_get_notBefore(vhost->tls.ss->x509), 0); 837 X509_gmtime_adj(X509_get_notAfter(vhost->tls.ss->x509), 3600); 849 X509_set_pubkey(vhost->tls.ss->x509, vhost->tls.ss->pkey); 851 name = X509_get_subject_name(vhost->tls.ss->x509); 862 X509_set_issuer_name(vhost->tls.ss->x509, name); 876 if (X509_add1_ext_i2d(vhost->tls.ss->x509, NID_subject_alt_nam [all...] |
/third_party/openssl/fuzz/ |
H A D | x509.c | 11 #include <openssl/x509.h> 31 X509 *x509 = d2i_X509(NULL, &p, len); in FuzzerTestOneInput() local 32 if (x509 != NULL) { in FuzzerTestOneInput() 35 X509_print(bio, x509); in FuzzerTestOneInput() 38 X509_issuer_and_serial_hash(x509); in FuzzerTestOneInput() 40 i2d_X509(x509, &der); in FuzzerTestOneInput() 43 X509_free(x509); in FuzzerTestOneInput()
|
/third_party/mbedtls/programs/ |
H A D | Makefile | 85 x509/cert_app \ 86 x509/cert_req \ 87 x509/cert_write \ 88 x509/crl_app \ 89 x509/load_roots \ 90 x509/req_app \ 393 x509/cert_app$(EXEXT): x509/cert_app.c $(DEP) 394 echo " CC x509/cert_app.c" 395 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) x509/cert_ap [all...] |
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-x509/ |
H A D | main.c | 2 * lws-crypto-x509 31 read_pem_c509_cert(struct lws_x509_cert **x509, const char *filename, in read_pem_c509_cert() argument 40 if (lws_x509_create(x509)) { in read_pem_c509_cert() 41 lwsl_err("%s: failed to create x509\n", __func__); in read_pem_c509_cert() 46 if (lws_x509_parse_from_pem(*x509, pembuf, (unsigned int)n) < 0) { in read_pem_c509_cert() 48 lws_x509_destroy(x509); in read_pem_c509_cert() 59 struct lws_x509_cert *x509 = NULL, *x509_trusted = NULL; in main() local 92 if (read_pem_c509_cert(&x509, p, pembuf, sizeof(pembuf))) { in main() 110 if (lws_x509_verify(x509, x509_trusted, NULL)) { in main() 140 if (lws_x509_public_to_jwk(&jwk, x509, " in main() [all...] |
/third_party/curl/lib/vtls/ |
H A D | bearssl.c | 57 struct x509_context x509; member 273 struct x509_context *x509 = (struct x509_context *)ctx; in x509_start_chain() local 275 if(!x509->verifypeer) { in x509_start_chain() 276 x509->cert_num = 0; in x509_start_chain() 280 if(!x509->verifyhost) in x509_start_chain() 282 x509->minimal.vtable->start_chain(&x509->minimal.vtable, server_name); in x509_start_chain() 287 struct x509_context *x509 = (struct x509_context *)ctx; in x509_start_cert() local 289 if(!x509->verifypeer) { in x509_start_cert() 291 if(x509 in x509_start_cert() 302 struct x509_context *x509 = (struct x509_context *)ctx; x509_append() local 315 struct x509_context *x509 = (struct x509_context *)ctx; x509_end_cert() local 327 struct x509_context *x509 = (struct x509_context *)ctx; x509_end_chain() local 339 struct x509_context *x509 = (struct x509_context *)ctx; x509_get_pkey() local [all...] |
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-x509.h | 88 * \param x509: pointer to lws_x509_cert pointer to be set to allocated object 90 * Allocates an lws_x509_cert object and set *x509 to point to it. 93 lws_x509_create(struct lws_x509_cert **x509); 96 * lws_x509_parse_from_pem() - Read one or more x509 certs in PEM format from memory 98 * \param x509: pointer to lws_x509_cert object 102 * Parses PEM certificates in memory into a native x509 representation for the 112 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len); 118 * \param x509: pointer to lws_x509_cert object, may contain multiple 120 * \param common_name: NULL, or required CN (Common Name) of \p x509 122 * Returns 0 if the cert or certs in \p x509 represen [all...] |
/third_party/openssl/test/ |
H A D | x509_check_cert_pkey_test.c | 14 #include <openssl/x509.h> 31 X509 *x509 = NULL; in test_x509_check_cert_pkey() local 73 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); in test_x509_check_cert_pkey() 74 if (x509 == NULL) { in test_x509_check_cert_pkey() 75 TEST_error("read PEM x509 failed"); in test_x509_check_cert_pkey() 79 result = X509_check_private_key(x509, pkey); in test_x509_check_cert_pkey() 84 TEST_error("read PEM x509 req failed"); in test_x509_check_cert_pkey() 103 X509_free(x509); in test_x509_check_cert_pkey() 127 if (it->x509 != NULL) in test_PEM_X509_INFO_read_bio()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
H A D | ssl_x509.c | 215 if (ctx->cert->x509 == x) in SSL_CTX_use_certificate() 218 X509_free(ctx->cert->x509); in SSL_CTX_use_certificate() 220 ctx->cert->x509 = x; in SSL_CTX_use_certificate() 233 if (ssl->cert->x509 == x) in SSL_use_certificate() 236 X509_free(ssl->cert->x509); in SSL_use_certificate() 238 ssl->cert->x509 = x; in SSL_use_certificate() 250 return ssl->cert->x509; in SSL_get_certificate()
|
H A D | ssl_cert.c | 41 ix = ic->x509; in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 84 X509_free(cert->x509); in ssl_cert_free()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | nseq.c | 41 X509 *x509 = NULL; in nseq_main() local 94 while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in nseq_main() 95 if (!sk_X509_push(seq->certs, x509)) in nseq_main() 119 x509 = sk_X509_value(seq->certs, i); in nseq_main() 120 dump_cert_text(out, x509); in nseq_main() 121 PEM_write_bio_X509(out, x509); in nseq_main()
|
/third_party/openssl/apps/ |
H A D | nseq.c | 41 X509 *x509 = NULL; in nseq_main() local 94 while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in nseq_main() 95 if (!sk_X509_push(seq->certs, x509)) in nseq_main() 119 x509 = sk_X509_value(seq->certs, i); in nseq_main() 120 dump_cert_text(out, x509); in nseq_main() 121 PEM_write_bio_X509(out, x509); in nseq_main()
|
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 13 #include "crypto/x509.h" /* for ossl_x509_add_cert_new() */ 188 X509 *x509; in parse_bag() local 223 if ((x509 = PKCS12_SAFEBAG_get1_cert(bag)) == NULL) in parse_bag() 225 if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { in parse_bag() 226 X509_free(x509); in parse_bag() 235 r = X509_alias_set1(x509, data, len); in parse_bag() 238 X509_free(x509); in parse_bag() 244 if (!sk_X509_push(ocerts, x509)) { in parse_bag() 245 X509_free(x509); in parse_bag()
|
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 13 #include "crypto/x509.h" /* for ossl_x509_add_cert_new() */ 188 X509 *x509; in parse_bag() local 223 if ((x509 = PKCS12_SAFEBAG_get1_cert(bag)) == NULL) in parse_bag() 225 if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { in parse_bag() 226 X509_free(x509); in parse_bag() 235 r = X509_alias_set1(x509, data, len); in parse_bag() 238 X509_free(x509); in parse_bag() 244 if (!sk_X509_push(ocerts, x509)) { in parse_bag() 245 X509_free(x509); in parse_bag()
|
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 13 #include <openssl/x509.h> 17 #include "crypto/x509.h" /* for sk_X509_add1_cert() */ 251 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) in PKCS7_add_certificate() argument 269 return ossl_x509_add_cert_new(sk, x509, X509_ADD_FLAG_UP_REF); in PKCS7_add_certificate() 338 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, in PKCS7_SIGNER_INFO_set() argument 347 X509_get_issuer_name(x509))) in PKCS7_SIGNER_INFO_set() 356 ASN1_INTEGER_dup(X509_get0_serialNumber(x509)))) in PKCS7_SIGNER_INFO_set() 387 PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, in PKCS7_add_signature() argument 405 if (PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst) <= 0) in PKCS7_add_signature() 565 PKCS7_RECIP_INFO *PKCS7_add_recipient(PKCS7 *p7, X509 *x509) in PKCS7_add_recipient() argument 617 PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) PKCS7_RECIP_INFO_set() argument [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 13 #include <openssl/x509.h> 17 #include "crypto/x509.h" /* for sk_X509_add1_cert() */ 251 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) in PKCS7_add_certificate() argument 269 return ossl_x509_add_cert_new(sk, x509, X509_ADD_FLAG_UP_REF); in PKCS7_add_certificate() 338 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, in PKCS7_SIGNER_INFO_set() argument 347 X509_get_issuer_name(x509))) in PKCS7_SIGNER_INFO_set() 356 ASN1_INTEGER_dup(X509_get0_serialNumber(x509)))) in PKCS7_SIGNER_INFO_set() 387 PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, in PKCS7_add_signature() argument 405 if (PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst) <= 0) in PKCS7_add_signature() 565 PKCS7_RECIP_INFO *PKCS7_add_recipient(PKCS7 *p7, X509 *x509) in PKCS7_add_recipient() argument 617 PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) PKCS7_RECIP_INFO_set() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_lu.c | 13 #include <openssl/x509.h> 14 #include "crypto/x509.h" 168 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509); in x509_object_cmp() 368 obj->data.x509 = (X509 *)x; in x509_store_add() 420 return X509_up_ref(a->data.x509); in X509_OBJECT_up_ref_count() 431 return a->data.x509; in X509_OBJECT_get0_X509() 466 X509_free(a->data.x509); in x509_object_free_internal() 481 a->data.x509 = obj; in X509_OBJECT_set1_X509() 513 stmp.data.x509 in STACK_OF() [all...] |
/third_party/openssl/crypto/x509/ |
H A D | x509_lu.c | 13 #include <openssl/x509.h> 14 #include "crypto/x509.h" 168 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509); in x509_object_cmp() 368 obj->data.x509 = (X509 *)x; in x509_store_add() 420 return X509_up_ref(a->data.x509); in X509_OBJECT_up_ref_count() 431 return a->data.x509; in X509_OBJECT_get0_X509() 466 X509_free(a->data.x509); in x509_object_free_internal() 481 a->data.x509 = obj; in X509_OBJECT_set1_X509() 513 stmp.data.x509 in STACK_OF() [all...] |
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_rsa.c | 16 #include <openssl/x509.h> 20 static int ssl_set_cert(CERT *c, X509 *x509); 127 if (c->pkeys[i].x509 != NULL in ssl_set_pkey() 128 && !X509_check_private_key(c->pkeys[i].x509, pkey)) in ssl_set_pkey() 269 X509_free(c->pkeys[i].x509); in ssl_set_cert() 271 c->pkeys[i].x509 = x; in ssl_set_cert() 923 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 935 rv = ssl_security_cert(ssl, ctx, x509, 0, 1); in ssl_set_cert_and_key() 948 pubkey = X509_get_pubkey(x509); /* bumps reference */ in ssl_set_cert_and_key() 986 if (!override && (c->pkeys[i].x509 ! in ssl_set_cert_and_key() 1021 SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_use_cert_and_key() argument 1027 SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_CTX_use_cert_and_key() argument [all...] |
/third_party/openssl/ssl/ |
H A D | ssl_rsa.c | 16 #include <openssl/x509.h> 20 static int ssl_set_cert(CERT *c, X509 *x509); 127 if (c->pkeys[i].x509 != NULL in ssl_set_pkey() 128 && !X509_check_private_key(c->pkeys[i].x509, pkey)) in ssl_set_pkey() 269 X509_free(c->pkeys[i].x509); in ssl_set_cert() 271 c->pkeys[i].x509 = x; in ssl_set_cert() 923 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 935 rv = ssl_security_cert(ssl, ctx, x509, 0, 1); in ssl_set_cert_and_key() 948 pubkey = X509_get_pubkey(x509); /* bumps reference */ in ssl_set_cert_and_key() 986 if (!override && (c->pkeys[i].x509 ! in ssl_set_cert_and_key() 1021 SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_use_cert_and_key() argument 1027 SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_CTX_use_cert_and_key() argument [all...] |
/third_party/libcoap/src/ |
H A D | coap_openssl.c | 1084 add_ca_to_cert_store(X509_STORE *st, X509 *x509) { in add_ca_to_cert_store() argument 1091 if (!X509_STORE_add_cert(st, x509)) { in add_ca_to_cert_store() 1302 X509 *x509 = d2i_X509(NULL, &p, setup_data->pki_key.key.asn1.ca_cert_len); in setup_pki_server() local 1304 if (!x509 || !SSL_CTX_add_client_CA(ctx, x509)) { in setup_pki_server() 1308 if (x509) in setup_pki_server() 1309 X509_free(x509); in setup_pki_server() 1313 add_ca_to_cert_store(st, x509); in setup_pki_server() 1314 X509_free(x509); in setup_pki_server() 1385 X509 *x509; in setup_pki_server() local 1423 X509 *x509; setup_pki_server() local 1445 X509 *x509 = fp ? d2i_X509_fp(fp, NULL) : NULL; setup_pki_server() local 1671 X509 *x509 = d2i_X509(NULL, &p, (long)setup_data->pki_key.key.asn1.ca_cert_len); setup_pki_ssl() local 1763 X509 *x509; setup_pki_ssl() local 1804 X509 *x509; setup_pki_ssl() local 1829 X509 *x509 = fp ? d2i_X509_fp(fp, NULL) : NULL; setup_pki_ssl() local 1858 get_san_or_cn_from_cert(X509 *x509) get_san_or_cn_from_cert() argument 1923 X509 *x509 = X509_STORE_CTX_get_current_cert(ctx); tls_verify_call_back() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/pem/ |
H A D | pem_info.c | 21 #include <openssl/x509.h> 97 if (xi->x509 != NULL) { in STACK_OF() 108 xi->x509 = X509_new_ex(libctx, propq); in STACK_OF() 109 if (xi->x509 == NULL) in STACK_OF() 111 pp = &(xi->x509); in STACK_OF() 192 if ((xi->x509 != NULL) || (xi->crl != NULL) || in STACK_OF() 297 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp, xi->x509) <= 0)) in PEM_X509_INFO_write_bio()
|
/third_party/openssl/crypto/pem/ |
H A D | pem_info.c | 21 #include <openssl/x509.h> 97 if (xi->x509 != NULL) { in STACK_OF() 108 xi->x509 = X509_new_ex(libctx, propq); in STACK_OF() 109 if (xi->x509 == NULL) in STACK_OF() 111 pp = &(xi->x509); in STACK_OF() 192 if ((xi->x509 != NULL) || (xi->crl != NULL) || in STACK_OF() 297 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp, xi->x509) <= 0)) in PEM_X509_INFO_write_bio()
|