| /qemu/scripts/ |
| A D | u2f-setup-gen.py | 92 cert = crypto.X509() 93 cert.set_version(0x2) 96 cert.set_serial_number(randint(1, 2 ** 64)) 99 cert.gmtime_adj_notBefore(0) 103 cert.set_pubkey(pubkey) 106 cert.get_subject().CN = "U2F emulated" 107 cert.set_issuer(cert.get_subject()) 110 cert.add_extensions([ 114 cert.add_extensions([ 118 cert.add_extensions([ [all …]
|
| /qemu/crypto/ |
| A D | tlscredsx509.c | 379 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_creds_load_cert() local 419 gnutls_x509_crt_deinit(cert); in qcrypto_tls_creds_load_cert() 420 cert = NULL; in qcrypto_tls_creds_load_cert() 422 return cert; in qcrypto_tls_creds_load_cert() 473 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_creds_x509_sanity_check() local 485 if (!cert) { in qcrypto_tls_creds_x509_sanity_check() 498 if (cert && in qcrypto_tls_creds_x509_sanity_check() 513 if (cert && ncacerts && in qcrypto_tls_creds_x509_sanity_check() 523 if (cert) { in qcrypto_tls_creds_x509_sanity_check() 524 gnutls_x509_crt_deinit(cert); in qcrypto_tls_creds_x509_sanity_check() [all …]
|
| A D | tlssession.c | 301 gnutls_x509_crt_t cert = NULL; in qcrypto_tls_session_check_certificate() local 346 ret = gnutls_x509_crt_init(&cert); in qcrypto_tls_session_check_certificate() 353 ret = gnutls_x509_crt_import(cert, &certs[i], GNUTLS_X509_FMT_DER); in qcrypto_tls_session_check_certificate() 360 if (gnutls_x509_crt_get_expiration_time(cert) < now) { in qcrypto_tls_session_check_certificate() 365 if (gnutls_x509_crt_get_activation_time(cert) > now) { in qcrypto_tls_session_check_certificate() 370 if (gnutls_x509_crt_get_activation_time(cert) > now) { in qcrypto_tls_session_check_certificate() 379 ret = gnutls_x509_crt_get_dn(cert, session->peername, &dnameSize); in qcrypto_tls_session_check_certificate() 406 if (!gnutls_x509_crt_check_hostname(cert, session->hostname)) { in qcrypto_tls_session_check_certificate() 421 gnutls_x509_crt_deinit(cert); in qcrypto_tls_session_check_certificate() 427 gnutls_x509_crt_deinit(cert); in qcrypto_tls_session_check_certificate()
|
| A D | x509-utils.c | 28 int qcrypto_get_x509_cert_fingerprint(uint8_t *cert, size_t size, in qcrypto_get_x509_cert_fingerprint() argument 37 gnutls_datum_t datum = {.data = cert, .size = size}; in qcrypto_get_x509_cert_fingerprint()
|
| A D | trace-events | 18 …ad_cert(void *creds, int isServer, const char *file) "TLS creds x509 load cert creds=%p isServer=%… 19 qcrypto_tls_creds_x509_load_cert_list(void *creds, const char *file) "TLS creds x509 load cert list…
|
| /qemu/docs/specs/ |
| A D | spdm.rst | 64 -subj "/CN=DMTF libspdm ECP384 responder cert" 66 $ openssl x509 -req -in end_responder.req -out end_responder.cert \ 67 -CA inter.cert -CAkey inter.key -sha384 -days 3650 -set_serial 3 \ 70 $ openssl asn1parse -in end_responder.cert -out end_responder.cert.der 72 $ cat ca.cert.der inter.cert.der end_responder.cert.der > bundle_responder.certchain.der
|
| /qemu/docs/system/devices/ |
| A D | ccid.rst | 60 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca 61 …certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fak… 62 … -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca 68 …rd-emulated,backend=certificates,db=sql:$PWD,cert1=id-cert,cert2=signing-cert,cert3=encryption-cert 85 together with the manually imported CA cert:: 122 …vscclient -e "db=\"sql:$PWD\" use_hw=no soft=(,Test,CAC,,id-cert,signing-cert,encryption-cert)" <q…
|
| A D | usb-u2f.rst | 87 * ``cert`` 93 …|qemu_system| -usb -device u2f-emulated,cert=$DIR1/$FILE1,priv=$DIR2/$FILE2,counter=$DIR3/$FILE3,e…
|
| /qemu/docs/system/ |
| A D | tls.rst | 69 --outfile ca-cert.pem 74 be used for signing other keys. The generated ``ca-cert.pem`` file 126 --load-ca-certificate ca-cert.pem \ 130 --outfile server-hostNNN-cert.pem 179 --load-ca-certificate ca-cert.pem \ 183 --outfile client-hostNNN-cert.pem 230 --load-ca-certificate ca-cert.pem \ 234 --outfile both-hostNNN-cert.pem 237 ``server-cert.pem`` and ``server-key.pem``, and again as 238 ``client-cert.pem`` and ``client-key.pem``. [all …]
|
| A D | vnc-security.rst | 72 files, ``ca-cert.pem``, ``server-cert.pem`` and ``server-key.pem``.
|
| A D | authz.rst | 210 If x509 cert was being used as the username, a suitable
|
| /qemu/hw/usb/ |
| A D | u2f-emulated.c | 79 char *cert; member 248 ret = u2f_emulated_read(key->cert, cert_pem, sizeof(cert_pem)); in u2f_emulated_setup_vdev_manualy() 303 if (key->cert != NULL || key->privkey != NULL || key->entropy != NULL in u2f_emulated_realize() 305 if (key->cert != NULL && key->privkey != NULL in u2f_emulated_realize() 374 DEFINE_PROP_STRING("cert", U2FEmulatedState, cert),
|
| /qemu/hw/core/ |
| A D | eif.c | 276 g_autofree uint8_t *cert = NULL; in get_signature_fingerprint_sha384() local 332 cert = g_try_malloc(len); in get_signature_fingerprint_sha384() 333 if (!cert) { in get_signature_fingerprint_sha384() 349 cert[i] = cbor_get_uint8(tmp); in get_signature_fingerprint_sha384() 353 if (qcrypto_get_x509_cert_fingerprint(cert, len, QCRYPTO_HASH_ALGO_SHA384, in get_signature_fingerprint_sha384()
|
| /qemu/include/crypto/ |
| A D | x509-utils.h | 16 int qcrypto_get_x509_cert_fingerprint(uint8_t *cert, size_t size,
|
| /qemu/tests/qemu-iotests/ |
| A D | common.tls | 111 name=${1:-ca-cert}
|
| /qemu/qapi/ |
| A D | misc-target.json | 183 # @cert-chain: PDH certificate chain (base64 encoded) 196 'cert-chain': 'str',
|
| A D | ui.json | 1703 # @cert-subject: server certificate subject 1717 '*tls-port': 'int', '*cert-subject': 'str' } }
|
| A D | qom.json | 964 # @dh-cert-file: guest owners DH certificate (encoded with base64) 988 'data': { '*dh-cert-file': 'str',
|
| /qemu/docs/system/i386/ |
| A D | amd-memory-encryption.rst | 67 The DH certificate and session blob can be provided via the ``dh-cert-file`` and 71 sev-guest,id=sev0,dh-cert-file=<file1>,session-file=<file2>
|
| /qemu/ |
| A D | hmp-commands.hx | 1059 .args_type = "protocol:s,hostname:s,port:i?,tls-port:i?,cert-subject:s?", 1060 .params = "protocol hostname port tls-port cert-subject", 1066 ``client_migrate_info`` *protocol* *hostname* *port* *tls-port* *cert-subject*
|
| A D | qemu-options.hx | 2224 " [,x509-cert-file=<file>][,x509-cacert-file=<file>]\n" 2292 …``x509-key-file=<file>``; \ ``x509-key-password=<file>``; \ ``x509-cert-file=<file>``; \ ``x509-ca… 5511 must be stored in PEM format, in filenames ca-cert.pem, 5512 ca-crl.pem (optional), server-cert.pem (only servers), 5513 server-key.pem (only servers), client-cert.pem (only clients), 5835 …s,reduced-phys-bits=val,[sev-device=string,policy=policy,handle=handle,dh-cert-file=file,session-f… 5869 The ``dh-cert-file`` and ``session-file`` provides the guest
|