/third_party/node/test/parallel/ |
H A D | test-tls-inception.js | 36 cert: fixtures.readKey('rsa_cert.crt')
|
H A D | test-tls-getprotocol.js | 32 cert: fixtures.readKey('agent2-cert.pem')
|
H A D | test-tls-interleave.js | 34 cert: fixtures.readKey('rsa_cert.crt'),
|
H A D | test-tls-max-send-fragment.js | 43 cert: fixtures.readKey('agent1-cert.pem')
|
H A D | test-tls-server-parent-constructor-options.js | 16 cert: fixtures.readKey('agent1-cert.pem'),
|
H A D | test-tls-set-encoding.js | 33 cert: fixtures.readKey('agent2-cert.pem')
|
H A D | test-tls-write-error.js | 15 const server_cert = fixtures.readKey('agent1-cert.pem'); 19 cert: server_cert,
|
H A D | test-tls-wrap-timeout.js | 17 cert: fixtures.readKey('agent1-cert.pem')
|
H A D | test-async-wrap-tlssocket-asyncreset.js | 14 cert: fixtures.readKey('agent1-cert.pem'), 15 ca: fixtures.readKey('ca1-cert.pem')
|
H A D | test-https-agent-additional-options.js | 13 cert: fixtures.readKey('agent1-cert.pem'), 14 ca: fixtures.readKey('ca1-cert.pem'),
|
H A D | test-https-client-renegotiation-limit.js | 53 cert: fixtures.readKey('rsa_cert.crt'),
|
/third_party/node/test/pummel/ |
H A D | test-https-large-response.js | 33 cert: fixtures.readKey('agent1-cert.pem'),
|
H A D | test-tls-throttle.js | 40 cert: fixtures.readKey('agent2-cert.pem'),
|
/third_party/node/test/addons/openssl-client-cert-engine/ |
H A D | test.js | 15 common.skip('no client cert engine'); 21 const agentCert = fs.readFileSync(fixture.path('/keys/agent1-cert.pem')); 22 const agentCa = fs.readFileSync(fixture.path('/keys/ca1-cert.pem')); 26 cert: agentCert, 41 clientCertEngine: engine, // `engine` will provide key+cert
|
/third_party/node/test/async-hooks/ |
H A D | test-graph.tls-write.js | 23 cert: fixtures.readKey('rsa_cert.crt'),
|
/third_party/node/benchmark/tls/ |
H A D | tls-connect.js | 22 cert: fixtures.readKey('rsa_cert.crt'),
|
H A D | throughput-c2s.js | 34 cert: fixtures.readKey('rsa_cert.crt'),
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | cms.rs | 60 cert: *mut X509, in CMS_decrypt()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | http-utils.h | 58 int (*cb)(void *ctx, struct http_cert *cert),
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | http-utils.h | 58 int (*cb)(void *ctx, struct http_cert *cert),
|
/third_party/node/deps/openssl/openssl/fuzz/ |
H A D | server.c | 527 X509 *cert; in FuzzerTestOneInput() local 562 cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER)); in FuzzerTestOneInput() 563 OPENSSL_assert(cert != NULL); in FuzzerTestOneInput() 564 ret = SSL_CTX_use_certificate(ctx, cert); in FuzzerTestOneInput() 566 X509_free(cert); in FuzzerTestOneInput() 585 cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL); in FuzzerTestOneInput() 586 OPENSSL_assert(cert != NULL); in FuzzerTestOneInput() 588 ret = SSL_CTX_use_certificate(ctx, cert); in FuzzerTestOneInput() 590 X509_free(cert); in FuzzerTestOneInput() 609 cert in FuzzerTestOneInput() [all...] |
/third_party/openssl/fuzz/ |
H A D | server.c | 527 X509 *cert; in FuzzerTestOneInput() local 562 cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER)); in FuzzerTestOneInput() 563 OPENSSL_assert(cert != NULL); in FuzzerTestOneInput() 564 ret = SSL_CTX_use_certificate(ctx, cert); in FuzzerTestOneInput() 566 X509_free(cert); in FuzzerTestOneInput() 585 cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL); in FuzzerTestOneInput() 586 OPENSSL_assert(cert != NULL); in FuzzerTestOneInput() 588 ret = SSL_CTX_use_certificate(ctx, cert); in FuzzerTestOneInput() 590 X509_free(cert); in FuzzerTestOneInput() 609 cert in FuzzerTestOneInput() [all...] |
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | ts.h | 424 # define TS_VERIFY_CTS_set_certs(ctx, cert) TS_VERIFY_CTX_set_certs(ctx,cert) 477 const char *cert, TS_RESP_CTX *ctx);
|
/third_party/openssl/include/openssl/ |
H A D | ts.h | 424 # define TS_VERIFY_CTS_set_certs(ctx, cert) TS_VERIFY_CTX_set_certs(ctx,cert) 477 const char *cert, TS_RESP_CTX *ctx);
|
/third_party/python/Modules/ |
H A D | _ssl.c | 477 /* verify code for cert validation error */ in fill_and_set_sslerror() 1755 #include "_ssl/cert.c" 1770 BIO *cert; in _ssl__test_decode_cert_impl() local 1773 if ((cert=BIO_new(BIO_s_file())) == NULL) { in _ssl__test_decode_cert_impl() 1779 if (BIO_read_filename(cert, PyBytes_AsString(path)) <= 0) { in _ssl__test_decode_cert_impl() 1785 x = PEM_read_bio_X509(cert, NULL, NULL, NULL); in _ssl__test_decode_cert_impl() 1797 if (cert != NULL) BIO_free(cert); in _ssl__test_decode_cert_impl() 1836 /* return cert in DER-encoded format */ in _ssl__SSLSocket_getpeercert_impl() 1886 /* OpenSSL does not include peer cert fo in _ssl__SSLSocket_get_unverified_chain_impl() 3978 X509 *cert = NULL; _add_ca_certs() local 4663 X509 *cert; _ssl__SSLContext_get_ca_certs_impl() local 5554 PyObject *keyusage = NULL, *cert = NULL, *enc = NULL, *tup = NULL; _ssl_enum_certificates_impl() local [all...] |