Home
last modified time | relevance | path

Searched refs:cert (Results 151 - 175 of 1048) sorted by relevance

12345678910>>...42

/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
304 ret = ['$G_NEXT_SRV_NO_CERT', '--http', '--disable-client-cert', '--debug=4']
306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
307 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
308 cert=cert, ke
[all...]
/third_party/node/test/fixtures/x509-escaping/
H A Dcreate-certs.js331 const cert = {
344 const pem = rfc5280.Certificate.encode(cert, 'pem', {
347 writeFileSync(`./alt-${i}-cert.pem`, `${pem}\n`);
372 value: 'good.example.com\nOCSP - URI:http://ca.nodejs.org/ca.cert',
485 const cert = {
498 const pem = rfc5280.Certificate.encode(cert, 'pem', {
501 writeFileSync(`./info-${i}-cert.pem`, `${pem}\n`);
626 const cert = {
639 const pem = rfc5280.Certificate.encode(cert, 'pem', {
642 writeFileSync(`./subj-${i}-cert
[all...]
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_conf.c50 BIO *cert = NULL; in TS_CONF_load_cert() local
53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert()
55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert()
59 BIO_free(cert); in TS_CONF_load_cert()
195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert()
200 if (cert == NULL) { in TS_CONF_set_signer_cert()
201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert()
202 if (cert == NULL) { in TS_CONF_set_signer_cert()
207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert()
194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
/third_party/openssl/crypto/ts/
H A Dts_conf.c50 BIO *cert = NULL; in TS_CONF_load_cert() local
53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert()
55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert()
59 BIO_free(cert); in TS_CONF_load_cert()
195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert()
200 if (cert == NULL) { in TS_CONF_set_signer_cert()
201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert()
202 if (cert == NULL) { in TS_CONF_set_signer_cert()
207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert()
194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dcms.rs71 /// Given the sender's private key, `pkey` and the recipient's certificate, `cert`,
74 pub fn decrypt<T>(&self, pkey: &PKeyRef<T>, cert: &X509) -> Result<Vec<u8>, ErrorStack> in decrypt()
80 let cert = cert.as_ptr(); in decrypt()
86 cert, in decrypt()
167 /// Given a signing cert `signcert`, private key `pkey`, a certificate stack `certs`,
295 // load cert with public key only in cms_encrypt_decrypt()
297 let pub_cert = X509::from_der(pub_cert_bytes).expect("failed to load pub cert"); in cms_encrypt_decrypt()
299 // load cert with private key in cms_encrypt_decrypt()
301 let priv_cert = Pkcs12::from_der(priv_cert_bytes).expect("failed to load priv cert"); in cms_encrypt_decrypt()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_wolfssl.c473 "SSL: use client cert DER blob failed"); in tls_connection_client_cert()
476 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert()
484 "SSL: use client cert PEM file failed"); in tls_connection_client_cert()
489 "SSL: use client cert DER file failed"); in tls_connection_client_cert()
493 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert()
576 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument
584 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component()
601 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument
636 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject()
676 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument
746 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument
813 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument
833 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local
856 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local
1008 struct wpabuf *cert; tls_verify_cb() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_wolfssl.c474 "SSL: use client cert DER blob failed"); in tls_connection_client_cert()
477 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert()
485 "SSL: use client cert PEM file failed"); in tls_connection_client_cert()
490 "SSL: use client cert DER file failed"); in tls_connection_client_cert()
494 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert()
577 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument
585 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component()
603 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument
638 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject()
678 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument
750 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument
817 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument
837 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local
860 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local
1015 struct wpabuf *cert; tls_verify_cb() local
[all...]
/third_party/node/lib/
H A Dtls.js280 exports.checkServerIdentity = function checkServerIdentity(hostname, cert) {
281 const subject = cert.subject;
282 const altNames = cert.subjectaltname;
309 reason = `IP: ${hostname} is not in the cert's list: ` +
319 `Host: ${hostname}. is not in the cert's altnames: ${altNames}`;
330 reason = `Host: ${hostname}. is not cert's CN: ${cn}`;
337 return new ERR_TLS_CERT_ALTNAME_INVALID(reason, hostname, cert);
/third_party/node/src/crypto/
H A Dcrypto_x509.h23 explicit ManagedX509(X509Pointer&& cert);
53 X509Pointer cert,
58 std::shared_ptr<ManagedX509> cert,
73 X509Pointer cert);
129 std::shared_ptr<ManagedX509> cert,
H A Dcrypto_spkac.cc118 ByteSource cert = ExportChallenge(input); in ExportChallenge()
119 if (!cert) in ExportChallenge()
123 Encode(env->isolate(), cert.data<char>(), cert.size(), BUFFER); in ExportChallenge()
/third_party/libcoap/src/
H A Dcoap_gnutls.c637 int self_signed; /* 1 if cert self-signed, 0 otherwise */
647 gnutls_x509_crt_t cert; in get_san_or_cn() local
672 G_CHECK(gnutls_x509_crt_init(&cert), "gnutls_x509_crt_init"); in get_san_or_cn()
674 /* Interested only in first cert in chain */ in get_san_or_cn()
675 G_CHECK(gnutls_x509_crt_import(cert, &cert_info->cert_list[0], in get_san_or_cn()
678 cert_info->self_signed = gnutls_x509_crt_check_issuer(cert, cert); in get_san_or_cn()
682 ret = gnutls_x509_crt_get_subject_alt_name(cert, 0, dn, &size, NULL); in get_san_or_cn()
685 gnutls_x509_crt_deinit(cert); in get_san_or_cn()
691 G_CHECK(gnutls_x509_crt_get_dn(cert, d in get_san_or_cn()
884 gnutls_x509_crt_t cert; cert_verify_gnutls() local
1090 gnutls_datum_t cert; setup_pki_credentials() local
1236 gnutls_datum_t cert; setup_pki_credentials() local
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-client-mindhsize.js11 const cert = fixtures.readKey('agent2-cert.pem');
23 cert: cert,
H A Dtest-tls-dhe.js39 const cert = fixtures.readKey('agent2-cert.pem');
58 cert,
99 } = new X509Certificate(cert);
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
H A Dtest_https_multi_daemon.c98 FILE *cert; in main() local
110 if ((cert = setup_ca_cert ()) == NULL) in main()
128 fclose (cert); in main()
H A Dtest_https_time_out.c107 gnutls_datum_t cert; in main() local
132 if (0 != setup_session (&session, &key, &cert, &xcred)) in main()
138 teardown_session (session, &key, &cert, xcred); in main()
/third_party/openssl/test/
H A Dfatalerrtest.c16 static char *cert = NULL; variable
33 &sctx, &cctx, cert, privkey))) in test_fatalerr()
94 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
H A Dverify_extra_test.c183 X509 *cert = load_cert_from_file(filename); /* may result in NULL */ in test_self_signed() local
188 ret = TEST_int_eq(X509_self_signed(cert, 1), expected); in test_self_signed()
190 if (cert != NULL) { in test_self_signed()
192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed()
193 ret = ret && TEST_true(X509_STORE_CTX_init(ctx, NULL, cert, NULL)); in test_self_signed()
200 X509_free(cert); in test_self_signed()
221 /* Verifying a cert where we have no trusted certs should fail */ in test_store_ctx()
310 || !TEST_ptr(sroot_cert = test_mk_file_path(certs_dir, "sroot-cert.pem")) in setup_tests()
311 || !TEST_ptr(ca_cert = test_mk_file_path(certs_dir, "ca-cert.pem")) in setup_tests()
312 || !TEST_ptr(ee_cert = test_mk_file_path(certs_dir, "ee-cert in setup_tests()
[all...]
/third_party/libwebsockets/lib/tls/
H A Dtls-network.c93 lwsl_vhost_notice(v, " vhost %s: cert expiry: %dd", v->name, in lws_tls_check_cert_lifetime()
96 lwsl_vhost_info(v, " vhost %s: no cert", v->name); in lws_tls_check_cert_lifetime()
121 * LWS_TLS_EXTANT_NO : skip adding the cert
122 * LWS_TLS_EXTANT_YES : use the cert and private key paths normally
126 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, in lws_tls_generic_cert_checks() argument
132 * The user code can choose to either pass the cert and in lws_tls_generic_cert_checks()
136 * set up the cert himself using the user callback in lws_tls_generic_cert_checks()
142 if (!cert || !private_key) in lws_tls_generic_cert_checks()
145 n = (int)lws_tls_use_any_upgrade_check_extant(cert); in lws_tls_generic_cert_checks()
154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_ke in lws_tls_generic_cert_checks()
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dsess_id.c41 {"cert", OPT_CERT, '-', "Output certificate "},
55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local
89 cert = ++num; in sess_id_main()
133 if (cert) { in sess_id_main()
141 if (!noout && !cert) { in sess_id_main()
/third_party/openssl/apps/
H A Dsess_id.c41 {"cert", OPT_CERT, '-', "Output certificate "},
55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local
89 cert = ++num; in sess_id_main()
133 if (cert) { in sess_id_main()
141 if (!noout && !cert) { in sess_id_main()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_conf.c435 c = cctx->ctx->cert; in cmd_Certificate()
439 c = cctx->ssl->cert; in cmd_Certificate()
476 CERT *cert; in do_store() local
483 cert = cctx->ctx->cert; in do_store()
486 cert = cctx->ssl->cert; in do_store()
495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store()
725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT
[all...]

Completed in 17 milliseconds

12345678910>>...42