Home
last modified time | relevance | path

Searched refs:pem (Results 1 - 25 of 401) sorted by relevance

12345678910>>...17

/third_party/mbedtls/tests/data_files/
H A DMakefile104 cert_example_multi.csr: rsa_pkcs1_1024_clear.pem
105 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=www.example.com" -set_serial 17 -config $(test_ca_config_file) -extensions dns_alt_names -days 3650 -key rsa_pkcs1_1024_clear.pem -out $@
113 cert_example_multi_nocn.csr: rsa_pkcs1_1024_clear.pem
123 parse_input/test_csr_v3_keyUsage.csr.der: rsa_pkcs1_1024_clear.pem
124 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_keyUsage
125 parse_input/test_csr_v3_subjectAltName.csr.der: rsa_pkcs1_1024_clear.pem
126 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_subjectAltName
127 parse_input/test_csr_v3_nsCertType.csr.der: rsa_pkcs1_1024_clear.pem
128 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_nsCertType
129 parse_input/test_csr_v3_all.csr.der: rsa_pkcs1_1024_clear.pem
[all...]
H A Dprint_c.pl23 Usage: $0 mbedtls_test_foo <file.pem
24 $0 TEST_FOO mbedtls_test_foo <file.pem
/third_party/node/deps/openssl/openssl/providers/implementations/encode_decode/
H A Dencode_key2any.c22 #include <openssl/pem.h>
1239 * output The output type to implement. may be der or pem.
1335 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, pem);
1337 MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, pem);
1338 MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, pem);
1341 MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, pem);
1344 MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, pem);
1346 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem);
1359 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, pem);
1361 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, pem);
[all...]
/third_party/openssl/providers/implementations/encode_decode/
H A Dencode_key2any.c22 #include <openssl/pem.h>
1228 * output The output type to implement. may be der or pem.
1324 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, type_specific_keypair, pem);
1326 MAKE_ENCODER(dh, dh, EVP_PKEY_DH, type_specific_params, pem);
1327 MAKE_ENCODER(dhx, dh, EVP_PKEY_DHX, type_specific_params, pem);
1330 MAKE_ENCODER(dsa, dsa, EVP_PKEY_DSA, type_specific, pem);
1333 MAKE_ENCODER(ec, ec, EVP_PKEY_EC, type_specific_no_pub, pem);
1335 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem);
1348 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, EncryptedPrivateKeyInfo, pem);
1350 MAKE_ENCODER(rsa, rsa, EVP_PKEY_RSA, PrivateKeyInfo, pem);
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-passphrase.js31 const passKey = fixtures.readKey('rsa_private_encrypted.pem');
32 const rawKey = fixtures.readKey('rsa_private.pem');
153 key: [{ pem: passKey, passphrase: 'password' }],
160 key: [{ pem: passKey, passphrase: 'password' }],
168 key: [{ pem: passKey }],
176 key: [{ pem: passKey.toString(), passphrase: 'password' }],
183 key: [{ pem: rawKey, passphrase: 'ignored' }],
190 key: [{ pem: rawKey.toString(), passphrase: 'ignored' }],
197 key: [{ pem: rawKey }],
205 key: [{ pem
[all...]
H A Dtest-https-options-boolean-check.js24 const keyBuff = fixtures.readKey('agent1-key.pem');
25 const certBuff = fixtures.readKey('agent1-cert.pem');
26 const keyBuff2 = fixtures.readKey('ec-key.pem');
27 const certBuff2 = fixtures.readKey('ec-cert.pem');
28 const caCert = fixtures.readKey('ca1-cert.pem');
29 const caCert2 = fixtures.readKey('ca2-cert.pem');
63 [[{ pem: keyBuff }], false],
64 [[{ pem: keyBuff }, { pem: keyBuff }], false],
78 [{ pem
[all...]
H A Dtest-tls-options-boolean-check.js24 const keyBuff = fixtures.readKey('agent1-key.pem');
25 const certBuff = fixtures.readKey('agent1-cert.pem');
26 const keyBuff2 = fixtures.readKey('ec-key.pem');
27 const certBuff2 = fixtures.readKey('ec-cert.pem');
28 const caCert = fixtures.readKey('ca1-cert.pem');
29 const caCert2 = fixtures.readKey('ca2-cert.pem');
63 [[{ pem: keyBuff }], false],
64 [[{ pem: keyBuff }, { pem: keyBuff }], false],
78 [{ pem
[all...]
H A Dtest-tls-cert-ext-encoding.js21 const pem = `
71 key: pem,
72 cert: pem,
/third_party/mbedtls/library/
H A Dpkparse.c36 #include "mbedtls/pem.h"
982 mbedtls_pem_context pem; in mbedtls_pk_parse_key() local
990 mbedtls_pem_init(&pem); in mbedtls_pk_parse_key()
997 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_pk_parse_key()
1006 pem.buf, pem.buflen)) != 0) { in mbedtls_pk_parse_key()
1010 mbedtls_pem_free(&pem); in mbedtls_pk_parse_key()
1026 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_pk_parse_key()
1036 pem.buf, pem in mbedtls_pk_parse_key()
1190 mbedtls_pem_context pem; mbedtls_pk_parse_public_key() local
[all...]
H A Dx509_crl.c31 #include "mbedtls/pem.h"
510 mbedtls_pem_context pem; in mbedtls_x509_crl_parse() local
518 mbedtls_pem_init(&pem); in mbedtls_x509_crl_parse()
525 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_crl_parse()
541 pem.buf, pem.buflen)) != 0) { in mbedtls_x509_crl_parse()
542 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse()
546 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse()
550 mbedtls_pem_free(&pem); in mbedtls_x509_crl_parse()
H A Dx509_csr.c31 #include "mbedtls/pem.h"
459 mbedtls_pem_context pem; in mbedtls_x509_csr_parse() local
472 mbedtls_pem_init(&pem); in mbedtls_x509_csr_parse()
473 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_csr_parse()
478 ret = mbedtls_pem_read_buffer(&pem, in mbedtls_x509_csr_parse()
488 ret = mbedtls_x509_csr_parse_der(csr, pem.buf, pem.buflen); in mbedtls_x509_csr_parse()
491 mbedtls_pem_free(&pem); in mbedtls_x509_csr_parse()
/third_party/libwebsockets/lib/tls/
H A Dtls.c327 uint8_t *pem = NULL, *p, *end, *opem; in lws_tls_alloc_pem_to_der_file() local
333 n = alloc_file(context, filename, (uint8_t **)&pem, &len); in lws_tls_alloc_pem_to_der_file()
337 pem = (uint8_t *)inbuf; in lws_tls_alloc_pem_to_der_file()
341 opem = p = pem; in lws_tls_alloc_pem_to_der_file()
348 pem = lws_malloc((size_t)inlen, "alloc_der"); in lws_tls_alloc_pem_to_der_file()
349 if (!pem) in lws_tls_alloc_pem_to_der_file()
352 memcpy(pem, inbuf, (size_t)inlen); in lws_tls_alloc_pem_to_der_file()
354 *buf = pem; in lws_tls_alloc_pem_to_der_file()
364 pem = lws_malloc(((size_t)inlen * 3) / 4, "alloc_der"); in lws_tls_alloc_pem_to_der_file()
365 if (!pem) { in lws_tls_alloc_pem_to_der_file()
[all...]
/third_party/openssl/test/
H A Dcrltest.c15 #include <openssl/pem.h>
190 static BIO *glue2bio(const char **pem, char **out) in glue2bio() argument
194 *out = glue_strings(pem, &s); in glue2bio()
201 static X509_CRL *CRL_from_strings(const char **pem) in CRL_from_strings() argument
205 BIO *b = glue2bio(pem, &p); in CRL_from_strings()
222 static X509 *X509_from_strings(const char **pem) in X509_from_strings() argument
226 BIO *b = glue2bio(pem, &p); in X509_from_strings()
/third_party/node/test/fixtures/x509-escaping/
H A Dcreate-certs.js32 writeFileSync('server-key.pem', privateKey.export({
34 format: 'pem'
344 const pem = rfc5280.Certificate.encode(cert, 'pem', {
347 writeFileSync(`./alt-${i}-cert.pem`, `${pem}\n`);
498 const pem = rfc5280.Certificate.encode(cert, 'pem', {
501 writeFileSync(`./info-${i}-cert.pem`, `${pem}\
[all...]
/third_party/openssl/test/certs/
H A Dmkcert.sh50 if [ ! -f "${key}.pem" ]; then
62 openssl genpkey "${args[@]}" -out "${key}.pem"
74 openssl req -new -"${OPENSSL_SIGALG}" -key "${key}.pem" \
85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
9 let bio = crate::bio::MemBioSlice::new(pem)?;
20 pub fn $n3<F>(pem: &[u8], callback: F) -> Result<$t, crate::error::ErrorStack>
26 let bio = crate::bio::MemBioSlice::new(pem)?;
123 pub fn $n(pem: &[u8]) -> Result<$t, crate::error::ErrorStack> {
126 let bio = crate::bio::MemBioSlice::new(pem)?;
/third_party/node/tools/
H A Dmk-ca-bundle.pl268 my $pem = "\"-----BEGIN CERTIFICATE-----\\n\"\n"
282 print CRT $pem;
292 print TMP $pem;
304 print TMP $pem;
/third_party/node/benchmark/crypto/
H A Doneshot-sign.js10 ec: fs.readFileSync(`${fixtures_keydir}/ec_p256_private.pem`, 'utf-8'),
11 rsa: fs.readFileSync(`${fixtures_keydir}/rsa_private_2048.pem`, 'utf-8'),
12 ed25519: fs.readFileSync(`${fixtures_keydir}/ed25519_private.pem`, 'utf-8'),
23 keyFormat: ['pem', 'der', 'jwk', 'keyObject', 'keyObject.unique'],
102 case 'pem':
H A Drsa-sign-verify-throughput.js14 fs.readFileSync(`${fixtures_keydir}/rsa_public_${key}.pem`);
16 fs.readFileSync(`${fixtures_keydir}/rsa_private_${key}.pem`);
H A Drsa-encrypt-decrypt-throughput.js14 fs.readFileSync(`${fixtures_keydir}/rsa_public_${key}.pem`);
16 fs.readFileSync(`${fixtures_keydir}/rsa_private_${key}.pem`);
/third_party/node/lib/internal/tls/
H A Dsecure-context.js193 const pem = (
194 val?.pem !== undefined ? val.pem : val);
197 setKey(context, pem, pass, name);
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Dmod.rs18 pub use self::pem::*;
54 mod pem; modules
/third_party/libwebsockets/include/libwebsockets/
H A Dlws-x509.h99 * \param pem: pointer to PEM format content
106 * IMPORTANT for compatibility with mbedtls, the last used byte of \p pem
112 lws_x509_parse_from_pem(struct lws_x509_cert *x509, const void *pem, size_t len);
153 * \param pem: pointer to PEM private key in memory
157 * IMPORTANT for compatibility with mbedtls, the last used byte of \p pem
168 void *pem, size_t len, const char *passphrase);
/third_party/mbedtls/tests/scripts/
H A Dgenerate_server9_bad_saltlen.py12 from asn1crypto import pem, x509, core #type: ignore #pylint: disable=import-error namespace
83 f.write(pem.armor('CERTIFICATE', target_certificate.dump()))
/third_party/node/test/fixtures/0-dns/
H A Dcreate-cert.js13 const private_key = fs.readFileSync('./0-dns-key.pem');
15 // openssl rsa -in 0-dns-key.pem -RSAPublicKey_out -outform der
73 const pem = rfc5280.Certificate.encode(cert, 'pem', {label: 'CERTIFICATE'});
75 fs.writeFileSync('./0-dns-cert.pem', pem + '\n');

Completed in 13 milliseconds

12345678910>>...17