Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 21 of 21) sorted by relevance

/qemu/scripts/
A Du2f-setup-gen.py92 cert = crypto.X509()
93 cert.set_version(0x2)
96 cert.set_serial_number(randint(1, 2 ** 64))
99 cert.gmtime_adj_notBefore(0)
103 cert.set_pubkey(pubkey)
106 cert.get_subject().CN = "U2F emulated"
107 cert.set_issuer(cert.get_subject())
110 cert.add_extensions([
114 cert.add_extensions([
118 cert.add_extensions([
[all …]
/qemu/crypto/
A Dtlscredsx509.c379 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_creds_load_cert() local
419 gnutls_x509_crt_deinit(cert); in qcrypto_tls_creds_load_cert()
420 cert = NULL; in qcrypto_tls_creds_load_cert()
422 return cert; in qcrypto_tls_creds_load_cert()
473 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_creds_x509_sanity_check() local
485 if (!cert) { in qcrypto_tls_creds_x509_sanity_check()
498 if (cert && in qcrypto_tls_creds_x509_sanity_check()
513 if (cert && ncacerts && in qcrypto_tls_creds_x509_sanity_check()
523 if (cert) { in qcrypto_tls_creds_x509_sanity_check()
524 gnutls_x509_crt_deinit(cert); in qcrypto_tls_creds_x509_sanity_check()
[all …]
A Dtlssession.c301 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_session_check_certificate() local
346 ret = gnutls_x509_crt_init(&cert); in qcrypto_tls_session_check_certificate()
353 ret = gnutls_x509_crt_import(cert, &certs[i], GNUTLS_X509_FMT_DER); in qcrypto_tls_session_check_certificate()
360 if (gnutls_x509_crt_get_expiration_time(cert) < now) { in qcrypto_tls_session_check_certificate()
365 if (gnutls_x509_crt_get_activation_time(cert) > now) { in qcrypto_tls_session_check_certificate()
370 if (gnutls_x509_crt_get_activation_time(cert) > now) { in qcrypto_tls_session_check_certificate()
379 ret = gnutls_x509_crt_get_dn(cert, session->peername, &dnameSize); in qcrypto_tls_session_check_certificate()
406 if (!gnutls_x509_crt_check_hostname(cert, session->hostname)) { in qcrypto_tls_session_check_certificate()
421 gnutls_x509_crt_deinit(cert); in qcrypto_tls_session_check_certificate()
427 gnutls_x509_crt_deinit(cert); in qcrypto_tls_session_check_certificate()
A Dx509-utils.c28 int qcrypto_get_x509_cert_fingerprint(uint8_t *cert, size_t size, in qcrypto_get_x509_cert_fingerprint() argument
37 gnutls_datum_t datum = {.data = cert, .size = size}; in qcrypto_get_x509_cert_fingerprint()
A Dtrace-events18 …ad_cert(void *creds, int isServer, const char *file) "TLS creds x509 load cert creds=%p isServer=%…
19 qcrypto_tls_creds_x509_load_cert_list(void *creds, const char *file) "TLS creds x509 load cert list…
/qemu/docs/specs/
A Dspdm.rst64 -subj "/CN=DMTF libspdm ECP384 responder cert"
66 $ openssl x509 -req -in end_responder.req -out end_responder.cert \
67 -CA inter.cert -CAkey inter.key -sha384 -days 3650 -set_serial 3 \
70 $ openssl asn1parse -in end_responder.cert -out end_responder.cert.der
72 $ cat ca.cert.der inter.cert.der end_responder.cert.der > bundle_responder.certchain.der
/qemu/docs/system/devices/
A Dccid.rst60 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca
61 …certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fak…
62 … -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca
68 …rd-emulated,backend=certificates,db=sql:$PWD,cert1=id-cert,cert2=signing-cert,cert3=encryption-cert
85 together with the manually imported CA cert::
122 …vscclient -e "db=\"sql:$PWD\" use_hw=no soft=(,Test,CAC,,id-cert,signing-cert,encryption-cert)" <q…
A Dusb-u2f.rst87 * ``cert``
93 …|qemu_system| -usb -device u2f-emulated,cert=$DIR1/$FILE1,priv=$DIR2/$FILE2,counter=$DIR3/$FILE3,e…
/qemu/docs/system/
A Dtls.rst69 --outfile ca-cert.pem
74 be used for signing other keys. The generated ``ca-cert.pem`` file
126 --load-ca-certificate ca-cert.pem \
130 --outfile server-hostNNN-cert.pem
179 --load-ca-certificate ca-cert.pem \
183 --outfile client-hostNNN-cert.pem
230 --load-ca-certificate ca-cert.pem \
234 --outfile both-hostNNN-cert.pem
237 ``server-cert.pem`` and ``server-key.pem``, and again as
238 ``client-cert.pem`` and ``client-key.pem``.
[all …]
A Dvnc-security.rst72 files, ``ca-cert.pem``, ``server-cert.pem`` and ``server-key.pem``.
A Dauthz.rst210 If x509 cert was being used as the username, a suitable
/qemu/hw/usb/
A Du2f-emulated.c79 char *cert; member
248 ret = u2f_emulated_read(key->cert, cert_pem, sizeof(cert_pem)); in u2f_emulated_setup_vdev_manualy()
303 if (key->cert != NULL || key->privkey != NULL || key->entropy != NULL in u2f_emulated_realize()
305 if (key->cert != NULL && key->privkey != NULL in u2f_emulated_realize()
374 DEFINE_PROP_STRING("cert", U2FEmulatedState, cert),
/qemu/hw/core/
A Deif.c276 g_autofree uint8_t *cert = NULL; in get_signature_fingerprint_sha384() local
332 cert = g_try_malloc(len); in get_signature_fingerprint_sha384()
333 if (!cert) { in get_signature_fingerprint_sha384()
349 cert[i] = cbor_get_uint8(tmp); in get_signature_fingerprint_sha384()
353 if (qcrypto_get_x509_cert_fingerprint(cert, len, QCRYPTO_HASH_ALGO_SHA384, in get_signature_fingerprint_sha384()
/qemu/include/crypto/
A Dx509-utils.h16 int qcrypto_get_x509_cert_fingerprint(uint8_t *cert, size_t size,
/qemu/tests/qemu-iotests/
A Dcommon.tls111 name=${1:-ca-cert}
/qemu/qapi/
A Dmisc-target.json183 # @cert-chain: PDH certificate chain (base64 encoded)
196 'cert-chain': 'str',
A Dui.json1703 # @cert-subject: server certificate subject
1717 '*tls-port': 'int', '*cert-subject': 'str' } }
A Dqom.json964 # @dh-cert-file: guest owners DH certificate (encoded with base64)
988 'data': { '*dh-cert-file': 'str',
/qemu/docs/system/i386/
A Damd-memory-encryption.rst67 The DH certificate and session blob can be provided via the ``dh-cert-file`` and
71 sev-guest,id=sev0,dh-cert-file=<file1>,session-file=<file2>
/qemu/
A Dhmp-commands.hx1059 .args_type = "protocol:s,hostname:s,port:i?,tls-port:i?,cert-subject:s?",
1060 .params = "protocol hostname port tls-port cert-subject",
1066 ``client_migrate_info`` *protocol* *hostname* *port* *tls-port* *cert-subject*
A Dqemu-options.hx2224 " [,x509-cert-file=<file>][,x509-cacert-file=<file>]\n"
2292 …``x509-key-file=<file>``; \ ``x509-key-password=<file>``; \ ``x509-cert-file=<file>``; \ ``x509-ca…
5511 must be stored in PEM format, in filenames ca-cert.pem,
5512 ca-crl.pem (optional), server-cert.pem (only servers),
5513 server-key.pem (only servers), client-cert.pem (only clients),
5835 …s,reduced-phys-bits=val,[sev-device=string,policy=policy,handle=handle,dh-cert-file=file,session-f…
5869 The ``dh-cert-file`` and ``session-file`` provides the guest

Completed in 50 milliseconds