/ssl/ |
A D | ssl_cert.cc | 66 ret->cert_cb = cert->cert_cb; in ssl_cert_dup() 71 ret->sid_ctx = cert->sid_ctx; in ssl_cert_dup() 77 cert->cert_cb = cb; in ssl_cert_set_cert_cb() 78 cert->cert_cb_arg = arg; in ssl_cert_set_cert_cb() 101 cert->x509_method->cert_flush_cached_leaf(cert); in cert_set_chain_and_key() 102 cert->x509_method->cert_flush_cached_chain(cert); in cert_set_chain_and_key() 120 cert->x509_method->cert_flush_cached_leaf(cert); in ssl_set_cert() 236 CBS cert; in ssl_cert_extract_issuer() local 242 &cert, NULL, NULL, in ssl_cert_extract_issuer() 532 CERT *cert = ssl->config->cert.get(); in SSL_certs_clear() local [all …]
|
A D | ssl_x509.cc | 63 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() 64 cert->x509_leaf = nullptr; in ssl_crypto_x509_cert_flush_cached_leaf() 69 cert->x509_chain = nullptr; in ssl_crypto_x509_cert_flush_cached_chain() 109 X509_free(cert->x509_stash); in ssl_crypto_x509_cert_clear() 110 cert->x509_stash = nullptr; in ssl_crypto_x509_cert_clear() 596 assert(cert->x509_method); in ssl_cert_cache_leaf_cert() 618 return cert->x509_leaf; in ssl_cert_get0_leaf() 637 assert(cert->x509_method); in ssl_cert_add1_chain_cert() 654 X509_free(cert->x509_stash); in ssl_cert_add0_chain_cert() 655 cert->x509_stash = x509; in ssl_cert_add0_chain_cert() [all …]
|
A D | ssl_credential.cc | 40 CERT *cert = hs->config->cert.get(); in ssl_get_full_credential_list() local 42 if (!cert->x509_method->ssl_auto_chain_if_needed(hs)) { in ssl_get_full_credential_list() 46 size_t num_creds = cert->credentials.size(); in ssl_get_full_credential_list() 47 bool include_legacy = cert->legacy_credential->IsComplete(); in ssl_get_full_credential_list() 56 for (size_t i = 0; i < cert->credentials.size(); i++) { in ssl_get_full_credential_list() 57 (*out)[i] = cert->credentials[i].get(); in ssl_get_full_credential_list() 60 (*out)[num_creds - 1] = cert->legacy_credential.get(); in ssl_get_full_credential_list() 281 CRYPTO_BUFFER_init_CBS(cert, &cert_cbs); in ChainContainsIssuer() 327 return PushToStack(chain.get(), std::move(cert)); in AppendIntermediateCert() 577 return ctx->cert->credentials.Push(UpRef(cred)); in SSL_CTX_add1_credential() [all …]
|
A D | tls_method.cc | 142 static void ssl_noop_x509_clear(CERT *cert) {} in ssl_noop_x509_clear() argument 143 static void ssl_noop_x509_free(CERT *cert) {} in ssl_noop_x509_free() argument 144 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} in ssl_noop_x509_dup() argument 145 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} in ssl_noop_x509_flush_cached_leaf() argument 146 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {} in ssl_noop_x509_flush_cached_chain() argument
|
A D | ssl_privkey.cc | 357 ssl->config->cert->legacy_credential.get(), pkey); in SSL_use_PrivateKey() 409 return SSL_CREDENTIAL_set1_private_key(ctx->cert->legacy_credential.get(), in SSL_CTX_use_PrivateKey() 436 ssl->config->cert->legacy_credential.get(), key_method)); in SSL_set_private_key_method() 442 ctx->cert->legacy_credential.get(), key_method)); in SSL_CTX_set_private_key_method() 603 ctx->cert->legacy_credential.get(), prefs, num_prefs); in SSL_CTX_set_signing_algorithm_prefs() 612 ssl->config->cert->legacy_credential.get(), prefs, num_prefs); in SSL_set_signing_algorithm_prefs()
|
A D | ssl_lib.cc | 434 ret->cert = MakeUnique<CERT>(method->x509_method); in SSL_CTX_new() 438 if (ret->cert == nullptr || // in SSL_CTX_new() 439 !ret->cert->is_valid() || // in SSL_CTX_new() 514 ssl->config->cert = ssl_cert_dup(ctx->cert.get()); in SSL_new() 515 if (ssl->config->cert == nullptr) { in SSL_new() 1435 *out_len = ssl->config->cert->sid_ctx.size(); in SSL_get0_session_id_context() 1436 return ssl->config->cert->sid_ctx.data(); in SSL_get0_session_id_context() 2402 return ssl->config->cert->legacy_credential->privkey.get(); in SSL_get_privatekey() 2406 return ctx->cert->legacy_credential->privkey.get(); in SSL_CTX_get0_privatekey() 2484 UniquePtr<CERT> new_cert = ssl_cert_dup(ctx->cert.get()); in SSL_set_SSL_CTX() [all …]
|
A D | ssl_test.cc | 4829 ASSERT_TRUE(cert); in TEST() 4833 X509_cmp(cert, cert); in TEST() 4840 ASSERT_TRUE(cert); in TEST() 6720 ASSERT_TRUE(cert); in TEST() 8601 ASSERT_TRUE(cert); in TEST() 8816 ASSERT_TRUE(cert); in TEST() 9280 ASSERT_TRUE(cert); in TEST() 9320 X509 *cert; in TEST() member 9373 ASSERT_TRUE(cert); in TEST() 9534 ASSERT_TRUE(cert); in TEST() [all …]
|
A D | ssl_asn1.cc | 622 CBS cert; in SSL_SESSION_parse() local 623 if (!CBS_get_any_asn1_element(&cert_chain, &cert, NULL, NULL) || in SSL_SESSION_parse() 624 CBS_len(&cert) == 0) { in SSL_SESSION_parse() 629 UniquePtr<CRYPTO_BUFFER> buffer(CRYPTO_BUFFER_new_from_CBS(&cert, pool)); in SSL_SESSION_parse()
|
A D | internal.h | 1440 bool AppendIntermediateCert(bssl::UniquePtr<CRYPTO_BUFFER> cert); 2548 void (*cert_clear)(CERT *cert); 2550 void (*cert_free)(CERT *cert); 2554 void (*cert_dup)(CERT *new_cert, const CERT *cert); 2555 void (*cert_flush_cached_chain)(CERT *cert); 2558 void (*cert_flush_cached_leaf)(CERT *cert); 3229 UniquePtr<CERT> cert; member 3371 UniquePtr<CERT> ssl_cert_dup(CERT *cert); 3372 bool ssl_set_cert(CERT *cert, UniquePtr<CRYPTO_BUFFER> buffer); 3809 bssl::UniquePtr<bssl::CERT> cert; member
|
A D | handshake.cc | 465 CBB body, certs, cert; in ssl_send_tls12_certificate() local 477 if (!CBB_add_u24_length_prefixed(&certs, &cert) || in ssl_send_tls12_certificate() 478 !CBB_add_bytes(&cert, CRYPTO_BUFFER_data(buffer), in ssl_send_tls12_certificate()
|
A D | tls13_client.cc | 923 } else if (hs->config->cert->cert_cb != nullptr) { in do_send_client_certificate() 925 int rv = hs->config->cert->cert_cb(ssl, hs->config->cert->cert_cb_arg); in do_send_client_certificate()
|
/ssl/test/runner/ |
A D | tls.go | 176 func LoadX509KeyPair(certFile, keyFile string) (cert Credential, err error) { 190 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Credential, err error) { 198 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 202 if len(cert.Certificate) == 0 { 219 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 226 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 233 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 243 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 254 priv, ok := cert.PrivateKey.(ed25519.PrivateKey)
|
A D | key_agreement.go | 68 …sigAlg, err = selectSignatureAlgorithm(false /* server */, ka.version, cert, config, clientHello.s… 74 …sig, err := signMessage(false /* server */, ka.version, cert.PrivateKey, config, sigAlg, serverRSA… 116 key := cert.PrivateKey.(*rsa.PrivateKey) 196 padded := make([]byte, rsaSize(cert.PublicKey.(*rsa.PublicKey))) 213 encrypted, err := rsaRawEncrypt(cert.PublicKey.(*rsa.PublicKey), padded) 634 …sigAlg, err = selectSignatureAlgorithm(false /* server */, ka.version, cert, config, clientHello.s… 640 sig, err := signMessage(false /* server */, ka.version, cert.PrivateKey, config, sigAlg, msg) 771 return ka.auth.signParameters(config, cert, clientHello, hello, serverECDHParams) 899 baseSkx, err := ka.base.generateServerKeyExchange(config, cert, clientHello, hello, version) 940 otherSecret, err := ka.base.processClientKeyExchange(config, cert, newCkx, version) [all …]
|
A D | compliance_policy_tests.go | 39 var cert Credential 41 cert = ecdsaP384Certificate 43 cert = rsaCertificate 72 shimCertificate: &cert, 87 Credential: &cert, 217 cert := sigalg.baseCert.WithSignatureAlgorithms(sigalg.id) 242 Credential: cert,
|
A D | cipher_suite_tests.go | 79 var cert *Credential 81 cert = &rsaCertificate 83 cert = &ecdsaP256Certificate 85 cert = &rsaCertificate 116 if ver.version >= VersionTLS13 && cert == nil { 140 Credential: cert, 147 shimCertificate: cert, 163 Credential: cert, 191 Credential: cert, 218 Credential: cert,
|
A D | handshake_server.go | 41 cert *Credential member 1054 …, registrationRecord, err := spake2plus.Register(hs.cert.PAKEPassword, hs.cert.PAKEClientID, hs.ce… 1058 …pake, err := spake2plus.NewVerifier(hs.cert.PAKEContext, hs.cert.PAKEClientID, hs.cert.PAKEServerI… 1165 useCert := hs.cert 1187 cert := certificateEntry{ 1414 certs = append(certs, cert.data) 1417 if cert.ocspResponse != nil || cert.sctList != nil { 1641 hs.cert = config.Credential 1646 if cert := config.Bugs.RenegotiationCertificate; c.cipherSuite != nil && cert != nil { 1647 hs.cert = cert [all …]
|
A D | certs.go | 358 bb.AddASN1(cbasn1.SEQUENCE, func(cert *cryptobyte.Builder) { 359 cert.AddBytes(tbs) 360 cert.AddValue(sigAlg) 361 cert.AddASN1BitString(sig) 363 cert := bb.BytesOrPanic() 370 ret.chain[len(ret.chain)-1] = cert 390 for _, cert := range certs { 391 if err := pem.Encode(f, &pem.Block{Type: "CERTIFICATE", Bytes: cert}); err != nil {
|
A D | key_usage_tests.go | 22 cert := rootCA.Issue(X509Info{ 41 Credential: &cert, 53 Credential: &cert,
|
A D | signature_algorithm_tests.go | 75 cert := alg.baseCert 77 cert = cert.WithSignatureAlgorithms(alg.id) 183 shimCertificate: cert, 228 shimCertificate: cert, 257 Credential: cert, 285 Credential: cert, 311 Credential: cert,
|
A D | basic_tests.go | 1771 cert := rsaCertificate 1773 cert.Certificate = append(cert.Certificate, cert.Certificate[0]) 1778 Credential: &cert, 1785 Credential: &cert, 1793 Credential: &cert, 1803 Credential: &cert,
|
A D | handshake_messages.go | 2151 for i, cert := range m.certificates { 2164 if cert.duplicateExtensions { 2169 if cert.ocspResponse != nil { 2177 if cert.sctList != nil { 2182 if cert.extraExtension != nil { 2183 extensions.AddBytes(cert.extraExtension) 2209 var cert certificateEntry 2235 cert.sctList = []byte(body) 2238 if cert.delegatedCredential != nil { 2259 cert.delegatedCredential = dc [all …]
|
A D | ticket.go | 49 for _, cert := range s.certificates { 50 addUint24LengthPrefixedBytes(msg, cert)
|
A D | certificate_tests.go | 22 cert, err := x509.ParseCertificate(cred.RootCertificate) 26 certPool.AddCert(cert)
|
A D | handshake_client.go | 1324 for i, cert := range certMsg.certificates { 1325 if c.config.Bugs.NoOCSPStapling && cert.ocspResponse != nil { 1329 if c.config.Bugs.NoSignedCertificateTimestamps && cert.sctList != nil { 1333 …if i > 0 && c.config.Bugs.ExpectNoExtensionsOnIntermediate && (cert.ocspResponse != nil || cert.sc… 1868 cert, err := x509.ParseCertificate(certEntry.data) 1873 certs[i] = cert 1896 for i, cert := range certs { 1900 opts.Intermediates.AddCert(cert)
|
/ssl/test/ |
A D | fuzzer.h | 418 bssl::UniquePtr<X509> cert(d2i_X509(NULL, &bufp, sizeof(kCertificateDER))); in Init() 419 if (!cert || in Init() 420 !SSL_CTX_use_certificate(ctx_.get(), cert.get()) || in Init()
|