Home
last modified time | relevance | path

Searched refs:GetCertificate (Results 1 – 25 of 2084) sorted by relevance

12345678910>>...84

/dports/lang/mono/mono-5.10.1.57/mcs/class/System/Test/System.Security.Cryptography.X509Certificates/
H A DPkits_4_04_BasicCertificateRevocationTests.cs56 get { return GetCertificate ("NoCRLCACert.crt"); }
60 get { return GetCertificate ("RevokedsubCACert.crt"); }
64 get { return GetCertificate ("BadCRLSignatureCACert.crt"); }
68 get { return GetCertificate ("BadCRLIssuerNameCACert.crt"); }
72 get { return GetCertificate ("WrongCRLCACert.crt"); }
76 get { return GetCertificate ("TwoCRLsCACert.crt"); }
84 get { return GetCertificate ("UnknownCRLExtensionCACert.crt"); }
88 get { return GetCertificate ("OldCRLnextUpdateCACert.crt"); }
92 get { return GetCertificate ("pre2000CRLnextUpdateCACert.crt"); }
100 get { return GetCertificate ("NegativeSerialNumberCACert.crt"); }
[all …]
H A DPkits_4_06_VerifyingBasicConstraints.cs47 get { return GetCertificate ("MissingbasicConstraintsCACert.crt"); }
63 get { return GetCertificate ("pathLenConstraint0CACert.crt"); }
67 get { return GetCertificate ("pathLenConstraint0subCACert.crt"); }
71 get { return GetCertificate ("pathLenConstraint0subCA2Cert.crt"); }
75 get { return GetCertificate ("pathLenConstraint6CACert.crt"); }
79 get { return GetCertificate ("pathLenConstraint6subCA0Cert.crt"); }
87 get { return GetCertificate ("pathLenConstraint6subCA1Cert.crt"); }
99 get { return GetCertificate ("pathLenConstraint6subCA4Cert.crt"); }
115 get { return GetCertificate ("pathLenConstraint1CACert.crt"); }
123 get { return GetCertificate ("pathLenConstraint1subCACert.crt"); }
[all …]
H A DPkits_4_05_VerifyingPathWithSelfIssuedCertificates.cs49 get { return GetCertificate ("BasicSelfIssuedNewKeyCACert.crt"); }
53 get { return GetCertificate ("BasicSelfIssuedNewKeyOldWithNewCACert.crt"); }
57 get { return GetCertificate ("BasicSelfIssuedOldKeyCACert.crt"); }
61 get { return GetCertificate ("BasicSelfIssuedOldKeyNewWithOldCACert.crt"); }
65 get { return GetCertificate ("BasicSelfIssuedCRLSigningKeyCACert.crt"); }
69 get { return GetCertificate ("BasicSelfIssuedCRLSigningKeyCRLCert.crt"); }
76 X509Certificate2 ee = GetCertificate ("ValidBasicSelfIssuedOldWithNewTest1EE.crt"); in T1_ValidBasicSelfIssuedOldWithNew()
94 X509Certificate2 ee = GetCertificate ("ValidBasicSelfIssuedOldWithNewTest1EE.crt"); in T1_ValidBasicSelfIssuedOldWithNew_MS()
142 X509Certificate2 ee = GetCertificate ("ValidBasicSelfIssuedNewWithOldTest3EE.crt"); in T3_ValidBasicSelfIssuedNewWithOld()
160 X509Certificate2 ee = GetCertificate ("ValidBasicSelfIssuedNewWithOldTest3EE.crt"); in T3_ValidBasicSelfIssuedNewWithOld_MS()
[all …]
H A DPkits_4_03_VerifyingNameChaining.cs52 get { return GetCertificate ("NameOrderingCACert.crt"); }
56 get { return GetCertificate ("UIDCACert.crt"); }
60 get { return GetCertificate ("RFC3280MandatoryAttributeTypesCACert.crt"); }
64 get { return GetCertificate ("RFC3280OptionalAttributeTypesCACert.crt"); }
68 get { return GetCertificate ("UTF8StringEncodedNamesCACert.crt"); }
76 get { return GetCertificate ("UTF8StringCaseInsensitiveMatchCACert.crt"); }
83 X509Certificate2 ee = GetCertificate ("InvalidNameChainingTest1EE.crt"); in T01_InvalidNameChainingEE()
102 X509Certificate2 ee = GetCertificate ("InvalidNameChainingTest1EE.crt"); in T01_InvalidNameChainingEE_MS()
129 X509Certificate2 ee = GetCertificate ("InvalidNameChainingOrderTest2EE.crt"); in T02_InvalidNameChainingOrder()
148 X509Certificate2 ee = GetCertificate ("InvalidNameChainingOrderTest2EE.crt"); in T02_InvalidNameChainingOrder_MS()
[all …]
H A DPkits_4_07_KeyUsage.cs51 get { return GetCertificate ("keyUsageCriticalkeyCertSignFalseCACert.crt"); }
55 get { return GetCertificate ("keyUsageNotCriticalkeyCertSignFalseCACert.crt"); }
59 get { return GetCertificate ("keyUsageNotCriticalCACert.crt"); }
63 get { return GetCertificate ("keyUsageCriticalcRLSignFalseCACert.crt"); }
67 get { return GetCertificate ("keyUsageNotCriticalcRLSignFalseCACert.crt"); }
73 X509Certificate2 ee = GetCertificate ("InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt"); in T1_InvalidKeyUsageCriticalKeyCertSignFalse()
106 X509Certificate2 ee = GetCertificate ("ValidkeyUsageNotCriticalTest3EE.crt"); in T3_ValidKeyUsageNotCritical()
122 X509Certificate2 ee = GetCertificate ("InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt"); in T4_InvalidKeyUsageCriticalCRLSignFalse()
139 X509Certificate2 ee = GetCertificate ("InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt"); in T4_InvalidKeyUsageCriticalCRLSignFalse_MS()
159 X509Certificate2 ee = GetCertificate ("InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt"); in T5_InvalidKeyUsageNotCriticalCRLSignFalse()
[all …]
H A DPkits_4_02_ValidityPeriod.cs51 get { return GetCertificate ("BadnotBeforeDateCACert.crt"); }
55 get { return GetCertificate ("BadnotAfterDateCACert.crt"); }
61 X509Certificate2 ee = GetCertificate ("InvalidCAnotBeforeDateTest1EE.crt"); in T1_InvalidCAnotBeforeDate()
76 X509Certificate2 ee = GetCertificate ("InvalidEEnotBeforeDateTest2EE.crt"); in T2_InvalidEEnotBeforeDate()
91 X509Certificate2 ee = GetCertificate ("Validpre2000UTCnotBeforeDateTest3EE.crt"); in T3_ValidPre2000UTCnotBeforeDate()
106 X509Certificate2 ee = GetCertificate ("ValidGeneralizedTimenotBeforeDateTest4EE.crt"); in T4_ValidGeneralizedTimeNotBeforeDate()
121 X509Certificate2 ee = GetCertificate ("InvalidCAnotAfterDateTest5EE.crt"); in T5_InvalidCAnotAfterDate()
136 X509Certificate2 ee = GetCertificate ("InvalidEEnotAfterDateTest6EE.crt"); in T6_InvalidEEnotAfterDate()
151 X509Certificate2 ee = GetCertificate ("Invalidpre2000UTCEEnotAfterDateTest7EE.crt"); in T7_InvalidPre2000UTCnotAfterDate()
166 X509Certificate2 ee = GetCertificate ("ValidGeneralizedTimenotAfterDateTest8EE.crt"); in T8_ValidGeneralizedTimeNotAfterDate()
H A DPkits_4_01_SignatureVerification.cs51 get { return GetCertificate ("BadSignedCACert.crt"); }
55 get { return GetCertificate ("DSACACert.crt"); }
59 get { return GetCertificate ("DSAParametersInheritedCACert.crt"); }
65 X509Certificate2 ee = GetCertificate ("ValidCertificatePathTest1EE.crt"); in T1_ValidSignature()
80 X509Certificate2 ee = GetCertificate ("InvalidCASignatureTest2EE.crt"); in T2_InvalidCASignature()
95 X509Certificate2 ee = GetCertificate ("InvalidEESignatureTest3EE.crt"); in T3_InvalidEESignature()
110 X509Certificate2 ee = GetCertificate ("ValidDSASignaturesTest4EE.crt"); in T4_ValidDSASignatures()
125 X509Certificate2 ee = GetCertificate ("ValidDSAParameterInheritanceTest5EE.crt"); in T5_ValidDSAParameterInheritance()
142 X509Certificate2 ee = GetCertificate ("InvalidDSASignatureTest6EE.crt"); in T6_InvalidDSASignatures()
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/caddyserver/certmagic/
H A Dhandshake_test.go45 if cert, err := cfg.GetCertificate(hello); err == nil {
48 if cert, err := cfg.GetCertificate(helloNoSNI); err == nil {
55 if cert, err := cfg.GetCertificate(hello); err != nil {
60 if _, err := cfg.GetCertificate(helloNoSNI); err == nil {
71 if cert, err := cfg.GetCertificate(helloSub); err != nil {
78 if _, err := cfg.GetCertificate(helloNoSNI); err == nil {
83 if _, err := cfg.GetCertificate(helloNoMatch); err == nil {
89 if cert, err := cfg.GetCertificate(helloNoSNI); err != nil {
102 if cert, err := cfg.GetCertificate(helloNoSNI); err != nil {
/dports/irc/inspircd/inspircd-3.11.0/include/modules/
H A Dssl.h215 virtual ssl_cert* GetCertificate() const in GetCertificate() function
227 ssl_cert* cert = GetCertificate(); in GetFingerprint()
258 static ssl_cert* GetCertificate(StreamSocket* sock) in GetCertificate() function
264 return ssliohook->GetCertificate(); in GetCertificate()
276 ssl_cert* cert = SSLClientCert::GetCertificate(sock); in GetFingerprint()
295 virtual ssl_cert* GetCertificate(User* user) = 0;
310 ssl_cert* cert = GetCertificate(user); in GetFingerprint()
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/ssl/
H A Dsct_reporting_service_browsertest.cc73 verify_result.verified_cert = https_server_.GetCertificate().get(); in SetUpOnMainThread()
76 https_server()->GetCertificate().get(), "a.test", verify_result, in SetUpOnMainThread()
79 https_server()->GetCertificate().get(), "b.test", verify_result, in SetUpOnMainThread()
84 https_server()->GetCertificate().get(), in SetUpOnMainThread()
283 verify_result.verified_cert = https_server()->GetCertificate().get(); in IN_PROC_BROWSER_TEST_F()
286 https_server()->GetCertificate().get(), "a.test", verify_result, net::OK); in IN_PROC_BROWSER_TEST_F()
304 verify_result.verified_cert = https_server()->GetCertificate().get(); in IN_PROC_BROWSER_TEST_F()
307 https_server()->GetCertificate().get(), "private.test", verify_result, in IN_PROC_BROWSER_TEST_F()
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/attestation/
H A Dattestation_flow_integrated_unittest.cc108 flow.GetCertificate( in TEST_F()
112 flow.GetCertificate( in TEST_F()
116 flow.GetCertificate( in TEST_F()
147 flow.GetCertificate( in TEST_F()
175 flow.GetCertificate( in TEST_F()
207 flow.GetCertificate( in TEST_F()
239 flow.GetCertificate( in TEST_F()
270 flow.GetCertificate( in TEST_F()
304 flow.GetCertificate( in TEST_F()
335 flow.GetCertificate( in TEST_F()
[all …]
H A Dattestation_flow_unittest.cc74 TEST_F(AttestationFlowTest, GetCertificate) { in TEST_F() argument
133 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id, in TEST_F()
209 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id, in TEST_F()
285 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id, in TEST_F()
328 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), in TEST_F()
363 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), in TEST_F()
394 flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "", in TEST_F()
505 flow.GetCertificate(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE, EmptyAccountId(), in TEST_F()
559 flow.GetCertificate(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE, account_id, "", in TEST_F()
610 flow.GetCertificate(PROFILE_ENTERPRISE_ENROLLMENT_CERTIFICATE, in TEST_F()
[all …]
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/distribution/distribution-2.7.0/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/docker/distribution/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/sysutils/docker-registry/distribution-2.7.1/vendor/rsc.io/letsencrypt/
H A DREADME78 GetCertificate
80 The Manager's GetCertificate method returns certificates from the Manager's
82 this way, a server with a tls.Config.GetCertificate set to m.GetCertificate
84 of certificates ahead of time, install m.GetCertificate as before but then
91 must use m.GetCertificate to obtain a per-host certificate. The most common
94 Go TLS server with tls.Config.GetCertificate set to m.GetCertificate.
96 could use an implementation of tls.Config.GetCertificate that cached
100 In typical usage, then, the setting of tls.Config.GetCertificate to
101 m.GetCertificate serves two purposes: it provides certificates to the TLS
135 pretend to be asking for an incorrect host name. Then GetCertificate will
[all …]
/dports/lang/mono/mono-5.10.1.57/external/corefx/src/System.Security.Cryptography.Pkcs/tests/EnvelopedCms/
H A DCertificateTests.cs29 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeCertificates0_RoundTrip()
72 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeCertificates3_RoundTrip()
162 Certificates.RSAKeyTransfer1.GetCertificate(),
163 Certificates.RSAKeyTransfer2.GetCertificate(),
164 Certificates.DHKeyAgree1.GetCertificate(),
H A DContentEncryptionAlgorithmTests.cs30 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmRc2_128_RoundTrip()
68 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmDes_RoundTrip()
106 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithm3Des_RoundTrip()
143 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmRc4_RoundTrip()
181 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmAes128_RoundTrip()
219 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmAes192_RoundTrip()
257 using (X509Certificate2 cert = Certificates.RSAKeyTransfer1.GetCertificate()) in DecodeAlgorithmAes256_RoundTrip()
/dports/lang/mono/mono-5.10.1.57/mcs/class/System.Security/Test/System.Security.Cryptography.Pkcs/
H A DCmsRecipientTest.cs66 private X509Certificate2 GetCertificate (bool includePrivateKey) in GetCertificate() method in MonoTests.System.Security.Cryptography.Pkcs.CmsRecipientTest
74 X509Certificate2 x509 = GetCertificate (true); in IssuerAndSerialNumber()
83 X509Certificate2 x509 = GetCertificate (true); in SubjectKeyIdentifier()
92 X509Certificate2 x509 = GetCertificate (true); in Unknown()
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/lucas-clemente/quic-go/internal/qtls/
H A Dqtls_test.go135 GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
140 qtlsCert, err := qtlsConf.GetCertificate(nil)
148 Expect(qtlsConf.GetCertificate).To(BeNil())
153 GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
158 _, err := qtlsConf.GetCertificate(nil)
164 GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
169 Expect(qtlsConf.GetCertificate(nil)).To(BeNil())

12345678910>>...84