HomeSort by: relevance | last modified time | path
    Searched refs:cert (Results 1 - 25 of 661) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/crypto/external/apache2/openssl/dist/test/recipes/
25-test_req.t 373 "Generating self signed ML-DSA-44 cert and private key");
382 "Generating self signed ML-DSA-65 cert and private key");
391 "Generating self signed ML-DSA-87 cert and private key");
472 "Generating self signed SLH-DSA-SHA2-128f cert and private key");
481 "Generating self signed SLH-DSA-SHA2-256s cert and private key");
490 "Generating self signed SLH-DSA-SHAKE-256f cert and private key");
541 my $cert = shift @_;
542 my $ss = $cert =~ m/self-signed/;
543 my $is_ca = $cert =~ m/CA/;
548 "-subj", "/CN=$cn", @_, "-out", $cert);
    [all...]
25-test_verify.t 23 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_;
29 push(@args, srctop_file(@certspath, "$cert.pem"));
36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
40 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
42 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
44 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)])
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
25-test_verify.t 20 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_;
26 push(@args, srctop_file(@path, "$cert.pem"));
33 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
37 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
39 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)])
    [all...]
  /src/external/bsd/unbound/dist/testdata/dnscrypt_cert_chacha.tdir/
dnscrypt_cert_chacha.conf 21 dnscrypt-provider: 2.dnscrypt-cert.example.com.
24 dnscrypt-provider-cert: 1_salsa.cert
25 dnscrypt-provider-cert: 2_chacha.cert
26 dnscrypt-provider-cert: 2_salsa.cert
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/data/
mkcert.sh 27 cert() { function
28 local cert=$1; shift
31 openssl x509 -req -sha256 -out "${cert}.pem" \
38 local cert=$1; shift
46 cert "$cert" "$exts" -signkey "${key}.pem" \
53 local cert=$1; shift
64 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
70 secp256r1TestCA.key secp256r1TestCA.cert
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
25-test_verify.t 21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_;
28 push(@args, srctop_file(@path, "$cert.pem"));
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)])
    [all...]
25-test_req.t 390 my $cert = shift @_;
391 my $ss = $cert =~ m/self-signed/;
392 my $is_ca = $cert =~ m/CA/;
397 "-subj", "/CN=$cn", @_, "-out", $cert);
400 ok(run(app([@cmd])), "generate $cert");
403 my $cert = shift @_;
405 cert_contains($cert, "Subject Key Identifier", $expect);
408 my $cert = shift @_;
410 cert_contains($cert, "Authority Key Identifier", $expect);
413 my $cert = shift @_
    [all...]
  /src/external/ibm-public/postfix/dist/src/tls/
mkcert.sh 92 cert() { function
93 local cert=$1; shift
97 openssl x509 "${dopts[@]}" -req -out "${cert}.pem" \
104 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
121 local cert=$1; shift
137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
144 local cert=$1; shif
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/certs/
setup.sh 3 # Primary root: root-cert
4 # root cert variants: CA:false, key2, DN2
7 ./mkcert.sh genroot "Root CA" root-key root-cert
11 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
13 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
15 openssl x509 -in root-cert.pem -trustout \
17 openssl x509 -in root-cert.pem -trustout \
19 openssl x509 -in root-cert.pem -trustout \
21 openssl x509 -in root-cert.pem -trustout \
23 openssl x509 -in root-cert.pem -trustout
    [all...]
mkcert.sh 90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
113 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
132 local cert=$1; shift
147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
154 local cert=$1; shif
    [all...]
  /src/external/bsd/unbound/dist/testdata/dnscrypt_cert.tdir/
dnscrypt_cert.conf 21 dnscrypt-provider: 2.dnscrypt-cert.example.com.
24 dnscrypt-provider-cert: 1_salsa.cert
25 dnscrypt-provider-cert: 2_salsa.cert
  /src/crypto/external/apache2/openssl/dist/test/certs/
setup.sh 3 # Primary root: root-cert
4 ./mkcert.sh genroot "Root CA" root-key root-cert
5 # root cert variants: CA:false, key2, DN2, expired
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
10 # cross root and root cross cert
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
14 openssl x509 -in root-cert.pem -trustout \
16 openssl x509 -in root-cert.pem -trustout \
18 openssl x509 -in root-cert.pem -trustout \
20 openssl x509 -in root-cert.pem -trustout
    [all...]
mkcert.sh 90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
135 local cert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
163 local cert=$1; shif
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
test_ca.in 62 --certificate="FILE:cert-ee.pem" || exit 1
66 cert:FILE:cert-ee.pem \
69 echo "issue crl (no cert)"
76 cert:FILE:cert-ee.pem \
80 echo "issue crl (with cert)"
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert-ee.pem
    [all...]
test_cert.in 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
68 echo "verify n0ll cert (fail)"
71 cert:FILE:$srcdir/data/n0ll.pem \
74 echo "verify n0ll cert (fail)
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/certs/
ocspquery.sh 18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
27 -cert client.pem -cert server.pem -cert rev.pem \
  /src/crypto/external/cpl/trousers/etc/
tcsd.conf 8 platform_cred = /etc/tpm/platform.cert
9 conformance_cred = /etc/tpm/conformance.cert
10 endorsement_cred = /etc/tpm/endorsement.cert
  /src/crypto/external/bsd/openssl/dist/demos/certs/
ocspquery.sh 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
20 -cert client.pem -cert server.pem -cert rev.pem \
  /src/crypto/external/bsd/openssl.old/dist/demos/certs/
ocspquery.sh 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
20 -cert client.pem -cert server.pem -cert rev.pem \
  /src/crypto/external/apache2/openssl/dist/test/recipes/95-test_external_tlsfuzzer_data/
tls-fuzzer-cert.sh 5 sed -e "s|@SERVER@|$SERV|g" -e "s/@PORT@/$PORT/g" -e "s/@PRIORITY@/$PRIORITY/g" ${TESTDATADIR}/cert.json.in >${TMPFILE}
  /src/crypto/external/bsd/openssl/dist/test/certs/
mkcert.sh 90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
135 local cert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
163 local cert=$1; shif
    [all...]
setup.sh 3 # Primary root: root-cert
4 ./mkcert.sh genroot "Root CA" root-key root-cert
5 # root cert variants: CA:false, key2, DN2, expired
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
10 # cross root and root cross cert
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
14 openssl x509 -in root-cert.pem -trustout \
16 openssl x509 -in root-cert.pem -trustout \
18 openssl x509 -in root-cert.pem -trustout \
20 openssl x509 -in root-cert.pem -trustout
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
cert_37.c 27 dns_cert_t cert; local
38 * Cert type.
42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
43 RETERR(uint16_tobuffer(cert, target));
102 * Cert.
171 dns_rdata_cert_t *cert = source; local
174 REQUIRE(cert != NULL);
175 REQUIRE(cert->common.rdtype == type);
176 REQUIRE(cert->common.rdclass == rdclass);
181 RETERR(uint16_tobuffer(cert->type, target))
190 dns_rdata_cert_t *cert = target; local
222 dns_rdata_cert_t *cert = source; local
    [all...]
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
cert_37.c 27 dns_cert_t cert; local
38 * Cert type.
42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
43 RETERR(uint16_tobuffer(cert, target));
102 * Cert.
170 dns_rdata_cert_t *cert = source; local
173 REQUIRE(cert != NULL);
174 REQUIRE(cert->common.rdtype == type);
175 REQUIRE(cert->common.rdclass == rdclass);
180 RETERR(uint16_tobuffer(cert->type, target))
189 dns_rdata_cert_t *cert = target; local
215 dns_rdata_cert_t *cert = source; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
cmsapitest.c 10 static X509 *cert = NULL; variable
26 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0))
33 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio,
64 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) {
72 X509_free(cert);
73 cert = NULL;
78 X509_free(cert);
79 cert = NULL;
91 X509_free(cert);

Completed in 37 milliseconds

1 2 3 4 5 6 7 8 91011>>