| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 25-test_req.t | 373 "Generating self signed ML-DSA-44 cert and private key"); 382 "Generating self signed ML-DSA-65 cert and private key"); 391 "Generating self signed ML-DSA-87 cert and private key"); 472 "Generating self signed SLH-DSA-SHA2-128f cert and private key"); 481 "Generating self signed SLH-DSA-SHA2-256s cert and private key"); 490 "Generating self signed SLH-DSA-SHAKE-256f cert and private key"); 541 my $cert = shift @_; 542 my $ss = $cert =~ m/self-signed/; 543 my $is_ca = $cert =~ m/CA/; 548 "-subj", "/CN=$cn", @_, "-out", $cert); [all...] |
| 25-test_verify.t | 23 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 29 push(@args, srctop_file(@certspath, "$cert.pem")); 36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 40 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 42 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 44 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 25-test_verify.t | 20 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 26 push(@args, srctop_file(@path, "$cert.pem")); 33 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 37 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 39 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]) [all...] |
| /src/external/bsd/unbound/dist/testdata/dnscrypt_cert_chacha.tdir/ |
| dnscrypt_cert_chacha.conf | 21 dnscrypt-provider: 2.dnscrypt-cert.example.com. 24 dnscrypt-provider-cert: 1_salsa.cert 25 dnscrypt-provider-cert: 2_chacha.cert 26 dnscrypt-provider-cert: 2_salsa.cert
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/data/ |
| mkcert.sh | 27 cert() { function 28 local cert=$1; shift 31 openssl x509 -req -sha256 -out "${cert}.pem" \ 38 local cert=$1; shift 46 cert "$cert" "$exts" -signkey "${key}.pem" \ 53 local cert=$1; shift 64 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 70 secp256r1TestCA.key secp256r1TestCA.cert [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 25-test_verify.t | 21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 28 push(@args, srctop_file(@path, "$cert.pem")); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]) [all...] |
| 25-test_req.t | 390 my $cert = shift @_; 391 my $ss = $cert =~ m/self-signed/; 392 my $is_ca = $cert =~ m/CA/; 397 "-subj", "/CN=$cn", @_, "-out", $cert); 400 ok(run(app([@cmd])), "generate $cert"); 403 my $cert = shift @_; 405 cert_contains($cert, "Subject Key Identifier", $expect); 408 my $cert = shift @_; 410 cert_contains($cert, "Authority Key Identifier", $expect); 413 my $cert = shift @_ [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| mkcert.sh | 92 cert() { function 93 local cert=$1; shift 97 openssl x509 "${dopts[@]}" -req -out "${cert}.pem" \ 104 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 121 local cert=$1; shift 137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 144 local cert=$1; shif [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| setup.sh | 3 # Primary root: root-cert 4 # root cert variants: CA:false, key2, DN2 7 ./mkcert.sh genroot "Root CA" root-key root-cert 11 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 13 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 15 openssl x509 -in root-cert.pem -trustout \ 17 openssl x509 -in root-cert.pem -trustout \ 19 openssl x509 -in root-cert.pem -trustout \ 21 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout [all...] |
| mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 113 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 132 local cert=$1; shift 147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 154 local cert=$1; shif [all...] |
| /src/external/bsd/unbound/dist/testdata/dnscrypt_cert.tdir/ |
| dnscrypt_cert.conf | 21 dnscrypt-provider: 2.dnscrypt-cert.example.com. 24 dnscrypt-provider-cert: 1_salsa.cert 25 dnscrypt-provider-cert: 2_salsa.cert
|
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 5 # root cert variants: CA:false, key2, DN2, expired 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 10 # cross root and root cross cert 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout [all...] |
| mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert=$1; shif [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert-ee.pem [all...] |
| test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1 68 echo "verify n0ll cert (fail)" 71 cert:FILE:$srcdir/data/n0ll.pem \ 74 echo "verify n0ll cert (fail) [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/certs/ |
| ocspquery.sh | 18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 27 -cert client.pem -cert server.pem -cert rev.pem \
|
| /src/crypto/external/cpl/trousers/etc/ |
| tcsd.conf | 8 platform_cred = /etc/tpm/platform.cert 9 conformance_cred = /etc/tpm/conformance.cert 10 endorsement_cred = /etc/tpm/endorsement.cert
|
| /src/crypto/external/bsd/openssl/dist/demos/certs/ |
| ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 20 -cert client.pem -cert server.pem -cert rev.pem \
|
| /src/crypto/external/bsd/openssl.old/dist/demos/certs/ |
| ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 20 -cert client.pem -cert server.pem -cert rev.pem \
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/95-test_external_tlsfuzzer_data/ |
| tls-fuzzer-cert.sh | 5 sed -e "s|@SERVER@|$SERV|g" -e "s/@PORT@/$PORT/g" -e "s/@PRIORITY@/$PRIORITY/g" ${TESTDATADIR}/cert.json.in >${TMPFILE}
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert=$1; shif [all...] |
| setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 5 # root cert variants: CA:false, key2, DN2, expired 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 10 # cross root and root cross cert 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| cert_37.c | 27 dns_cert_t cert; local 38 * Cert type. 42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 43 RETERR(uint16_tobuffer(cert, target)); 102 * Cert. 171 dns_rdata_cert_t *cert = source; local 174 REQUIRE(cert != NULL); 175 REQUIRE(cert->common.rdtype == type); 176 REQUIRE(cert->common.rdclass == rdclass); 181 RETERR(uint16_tobuffer(cert->type, target)) 190 dns_rdata_cert_t *cert = target; local 222 dns_rdata_cert_t *cert = source; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| cert_37.c | 27 dns_cert_t cert; local 38 * Cert type. 42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 43 RETERR(uint16_tobuffer(cert, target)); 102 * Cert. 170 dns_rdata_cert_t *cert = source; local 173 REQUIRE(cert != NULL); 174 REQUIRE(cert->common.rdtype == type); 175 REQUIRE(cert->common.rdclass == rdclass); 180 RETERR(uint16_tobuffer(cert->type, target)) 189 dns_rdata_cert_t *cert = target; local 215 dns_rdata_cert_t *cert = source; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| cmsapitest.c | 10 static X509 *cert = NULL; variable 26 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0)) 33 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, 64 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) { 72 X509_free(cert); 73 cert = NULL; 78 X509_free(cert); 79 cert = NULL; 91 X509_free(cert);
|