Searched refs:x509 (Results 1 – 15 of 15) sorted by relevance
/ssl/ |
A D | ssl_x509.cc | 51 int cert_len = i2d_X509(x509, &buf); in x509_to_buffer() 78 for (X509 *x509 : chain) { in ssl_cert_set1_chain() 145 if (!x509) { in ssl_crypto_x509_session_cache_objects() 150 leaf = UpRef(x509); in ssl_crypto_x509_session_cache_objects() 655 cert->x509_stash = x509; in ssl_cert_add0_chain_cert() 705 return SSL_CTX_add0_chain_cert(ctx, x509); in SSL_CTX_add_extra_chain_cert() 758 if (!x509 || // in ssl_cert_cache_chain_certs() 966 if (x509 == NULL) { in add_client_CA() 1002 int SSL_add_client_CA(SSL *ssl, X509 *x509) { in SSL_add_client_CA() argument 1034 X509 *x509 = NULL; in do_client_cert_cb() local [all …]
|
A D | ssl_file.cc | 56 bssl::UniquePtr<X509> x509( in add_bio_cert_subjects_to_stack() local 58 if (x509 == nullptr) { in add_bio_cert_subjects_to_stack() 69 X509_NAME *subject = X509_get_subject_name(x509.get()); in add_bio_cert_subjects_to_stack()
|
/ssl/test/runner/ |
A D | tls.go | 226 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 275 if key, err := x509.ParsePKCS1PrivateKey(der); err == nil { 278 if key, err := x509.ParsePKCS8PrivateKey(der); err == nil { 286 if key, err := x509.ParseECPrivateKey(der); err == nil {
|
A D | key_usage_tests.go | 27 KeyUsage: x509.KeyUsageKeyAgreement, 66 KeyUsage: x509.KeyUsageDigitalSignature, 71 KeyUsage: x509.KeyUsageKeyEncipherment,
|
A D | certificate_tests.go | 19 func makeCertPoolFromRoots(creds ...*Credential) *x509.CertPool { 20 certPool := x509.NewCertPool() 22 cert, err := x509.ParseCertificate(cred.RootCertificate)
|
A D | certs.go | 183 spki.AddASN1BitString(x509.MarshalPKCS1PublicKey(key)) 193 KeyUsage x509.KeyUsage 269 spki, err := x509.MarshalPKIXPublicKey(subject.PrivateKey.Public()) 407 keyDER, err := x509.MarshalPKCS8PrivateKey(privKey)
|
A D | common.go | 331 PeerCertificates []*x509.Certificate // certificate chain presented by remote peer 333 VerifiedChains [][]*x509.Certificate // verified chains built from PeerCertificates 372 serverCertificates []*x509.Certificate // Certificate chain presented by the server 515 RootCAs *x509.CertPool 569 ClientCAs *x509.CertPool
|
A D | key_agreement.go | 171 …erateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byt… 809 …erateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byt… 861 …erateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byt… 968 …erateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byt…
|
A D | handshake_server.go | 2314 certs := make([]*x509.Certificate, len(certificates)) 2317 if certs[i], err = x509.ParseCertificate(asn1Data); err != nil { 2324 opts := x509.VerifyOptions{ 2327 Intermediates: x509.NewCertPool(), 2328 KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, 2343 if ku == x509.ExtKeyUsageClientAuth {
|
A D | delegated_credential_tests.go | 96 pubBytes, err := x509.MarshalPKIXPublicKey(dcPriv.Public())
|
A D | handshake_client.go | 1683 var leaf *x509.Certificate 1866 certs := make([]*x509.Certificate, len(certMsg.certificates)) 1868 cert, err := x509.ParseCertificate(certEntry.data) 1889 opts := x509.VerifyOptions{ 1893 Intermediates: x509.NewCertPool(), 1925 if hs.peerPublicKey, err = x509.ParsePKIXPublicKey(dc.pkixPublicKey); err != nil {
|
A D | cipher_suites.go | 40 …generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchange…
|
A D | conn.go | 59 peerCertificates []*x509.Certificate 63 verifiedChains [][]*x509.Certificate
|
A D | runner.go | 318 k, err := x509.ParsePKCS8PrivateKey(block.Bytes)
|
/ssl/test/ |
A D | test_config.cc | 1195 static bssl::UniquePtr<CRYPTO_BUFFER> X509ToBuffer(X509 *x509) { in X509ToBuffer() argument 1197 int der_len = i2d_X509(x509, &der); in X509ToBuffer() 1476 bssl::UniquePtr<X509> x509; in CredentialFromConfig() local 1482 buffers.push_back(X509ToBuffer(x509.get())); in CredentialFromConfig() 1782 bssl::UniquePtr<X509> x509; in ClientCertCallback() local 1785 if (!GetCertificate(ssl, &x509, &chain, &pkey)) { in ClientCertCallback() 1790 if (!x509) { in ClientCertCallback() 1795 *out_x509 = x509.release(); in ClientCertCallback() 1801 bssl::UniquePtr<X509> x509; in InstallCertificate() local 1804 if (!GetCertificate(ssl, &x509, &chain, &pkey)) { in InstallCertificate() [all …]
|
Completed in 49 milliseconds