Home
last modified time | relevance | path

Searched refs:Certificate (Results 1 - 16 of 16) sorted by relevance

/third_party/node/lib/internal/crypto/
H A Dcertificate.js32 // The legacy implementation of this exposed the Certificate
40 function Certificate() { function
41 if (!(this instanceof Certificate))
42 return new Certificate();
45 Certificate.prototype.verifySpkac = verifySpkac;
46 Certificate.prototype.exportPublicKey = exportPublicKey;
47 Certificate.prototype.exportChallenge = exportChallenge;
49 Certificate.exportChallenge = exportChallenge;
50 Certificate.exportPublicKey = exportPublicKey;
51 Certificate
43 Certificate.prototype.verifySpkac = verifySpkac; global() class
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-certificate.js29 const { Certificate } = crypto;
79 () => Certificate.verifySpkac(buf), {
83 () => Certificate.exportChallenge(buf), {
87 () => Certificate.exportPublicKey(buf), {
95 checkMethods(new Certificate());
100 checkMethods(Certificate);
107 // Direct call Certificate() should return instance
108 assert(Certificate() instanceof Certificate);
112 () => Certificate
[all...]
/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py20 Certificate = namedtuple("Certificate", ['cafile', 'certfile', 'keyfile']) variable
23 'ecdsa_secp256r1_sha256': Certificate('data_files/test-ca2.crt',
26 'ecdsa_secp384r1_sha384': Certificate('data_files/test-ca2.crt',
29 'ecdsa_secp521r1_sha512': Certificate('data_files/test-ca2.crt',
32 'rsa_pss_rsae_sha256': Certificate('data_files/test-ca_cat12.crt',
423 check_strings.append("Certificate verification was skipped")
462 "Certificate Verify: Signature algorithm ( {:04x} )".format(
H A Dgenerate_server9_bad_saltlen.py73 target_certificate = x509.Certificate.load(der_bytes)
/third_party/node/lib/
H A Dcrypto.js122 const Certificate = require('internal/crypto/certificate');
227 Certificate,
/third_party/node/test/fixtures/x509-escaping/
H A Dcreate-certs.js344 const pem = rfc5280.Certificate.encode(cert, 'pem', {
498 const pem = rfc5280.Certificate.encode(cert, 'pem', {
639 const pem = rfc5280.Certificate.encode(cert, 'pem', {
/third_party/node/test/fixtures/0-dns/
H A Dcreate-cert.js73 const pem = rfc5280.Certificate.encode(cert, 'pem', {label: 'CERTIFICATE'});
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DCertificate.pm10 package TLSProxy::Certificate;
54 die "Invalid Certificate List length"
60 die "Certificate too long" if ($certlen + 3) > $certlistlen;
97 print " Certificate List Len:".$certlistlen."\n";
98 print " Certificate Len:".$certlen."\n";
106 die "Invalid Certificate List length"
112 die "Certificate too long" if ($certlen + 3) > $certlistlen;
123 print " Certificate List Len:".$certlistlen."\n";
124 print " Certificate Len:".$certlen."\n";
H A DMessage.pm54 MT_CERTIFICATE, "Certificate",
338 $message = TLSProxy::Certificate->new(
H A DProxy.pm21 use TLSProxy::Certificate;
/third_party/openssl/util/perl/TLSProxy/
H A DCertificate.pm10 package TLSProxy::Certificate;
54 die "Invalid Certificate List length"
60 die "Certificate too long" if ($certlen + 3) > $certlistlen;
97 print " Certificate List Len:".$certlistlen."\n";
98 print " Certificate Len:".$certlen."\n";
106 die "Invalid Certificate List length"
112 die "Certificate too long" if ($certlen + 3) > $certlistlen;
123 print " Certificate List Len:".$certlistlen."\n";
124 print " Certificate Len:".$certlen."\n";
H A DMessage.pm54 MT_CERTIFICATE, "Certificate",
338 $message = TLSProxy::Certificate->new(
H A DProxy.pm21 use TLSProxy::Certificate;
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_conf.c88 /* Certificate filenames for each type */
725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICATE,
/third_party/openssl/ssl/
H A Dssl_conf.c88 /* Certificate filenames for each type */
725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICATE,
/third_party/python/Lib/test/
H A Dtest_ssl.py357 _ssl.Certificate,
365 support.check_disallow_instantiation(self, _ssl.Certificate)
4263 # Certificate didn't change
4553 # send empty Certificate + Finish

Completed in 15 milliseconds