/dports/security/py-cryptography/stage/usr/local/lib/python3.8/site-packages/cryptography/x509/ |
H A D | oid.py | 15 SUBJECT_ALTERNATIVE_NAME = ObjectIdentifier("2.5.29.17") variable in ExtensionOID 229 ExtensionOID.SUBJECT_ALTERNATIVE_NAME: "subjectAltName",
|
H A D | __init__.py | 115 OID_SUBJECT_ALTERNATIVE_NAME = ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
/dports/security/py-cryptography/cryptography-3.3.2/build/lib.dragonfly-6.3-DEVELOPMENT-x86_64-3.8/cryptography/x509/ |
H A D | oid.py | 15 SUBJECT_ALTERNATIVE_NAME = ObjectIdentifier("2.5.29.17") 229 ExtensionOID.SUBJECT_ALTERNATIVE_NAME: "subjectAltName",
|
H A D | __init__.py | 115 OID_SUBJECT_ALTERNATIVE_NAME = ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
/dports/security/py-cryptography/cryptography-3.3.2/src/cryptography/x509/ |
H A D | oid.py | 15 SUBJECT_ALTERNATIVE_NAME = ObjectIdentifier("2.5.29.17") variable in ExtensionOID 229 ExtensionOID.SUBJECT_ALTERNATIVE_NAME: "subjectAltName",
|
H A D | __init__.py | 115 OID_SUBJECT_ALTERNATIVE_NAME = ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
/dports/security/py-service_identity/service_identity-18.1.0/src/service_identity/ |
H A D | cryptography.py | 111 ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
/dports/dns/py-dns-crawler/dns-crawler-1.4.9/dns_crawler/ |
H A D | certificate.py | 75 x509.oid.ExtensionOID.SUBJECT_ALTERNATIVE_NAME).value]
|
/dports/net-mgmt/check_ssl_cert/check_ssl_cert-2.17.0/ |
H A D | check_ssl_cert | 766 tmp=" ${SUBJECT_ALTERNATIVE_NAME}" 957 tmp=" ${SUBJECT_ALTERNATIVE_NAME}" 4525 SUBJECT_ALTERNATIVE_NAME="$(extract_cert_attribute 'subjectAlternativeName' "${CERT}")" 4526 debuglog "subjectAlternativeName = ${SUBJECT_ALTERNATIVE_NAME}" 4527 …if [ -n "${REQUIRE_SAN}" ] && [ -z "${SUBJECT_ALTERNATIVE_NAME}" ] && [ "${OPENSSL_COMMAND}" != "c… 4533 for san in ${SUBJECT_ALTERNATIVE_NAME}; do 4546 debuglog "SUBJECT_ALTERNATIVE_NAME = ${SUBJECT_ALTERNATIVE_NAME}" 4585 if [ -n "${REQUIRE_SAN}" ] && [ -z "${SUBJECT_ALTERNATIVE_NAME}" ]; then 4594 if [ -n "${SUBJECT_ALTERNATIVE_NAME}" ]; then 4612 debuglog " SUBJECT_ALTERNATIVE_NAME = ${SUBJECT_ALTERNATIVE_NAME}" [all …]
|
/dports/devel/pytype/pytype-2021.9.9/pytype/typeshed/stubs/cryptography/cryptography/x509/ |
H A D | oid.pyi | 10 SUBJECT_ALTERNATIVE_NAME: ObjectIdentifier = ...
|
/dports/java/bouncycastle15/crypto-169/prov/src/main/jdk1.3/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPathValidatorSpi.java | 395 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate() 459 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate()
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/cargo-crates/picky-asn1-x509-0.5.0/src/ |
H A D | oids.rs | 106 SUBJECT_ALTERNATIVE_NAME => subject_alternative_name => "2.5.29.17",
|
H A D | extension.rs | 216 oids::SUBJECT_ALTERNATIVE_NAME => { in deserialize()
|
/dports/java/bouncycastle15/crypto-169/prov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPathValidatorSpi.java | 410 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate() 474 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate()
|
H A D | PKIXCertPathValidatorSpi_8.java | 428 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate() 492 criticalExtensions.remove(RFC3280CertPathUtilities.SUBJECT_ALTERNATIVE_NAME); in engineValidate()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/tools/testserver/ |
H A D | minica.py | 198 SUBJECT_ALTERNATIVE_NAME = asn1.OID([2, 5, 29, 17]) variable 232 SUBJECT_ALTERNATIVE_NAME,
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/tools/testserver/ |
H A D | minica.py | 198 SUBJECT_ALTERNATIVE_NAME = asn1.OID([2, 5, 29, 17]) variable 232 SUBJECT_ALTERNATIVE_NAME,
|
/dports/java/bouncycastle15/crypto-169/prov/src/main/jdk1.1/org/bouncycastle/jce/provider/ |
H A D | PKIXCertPathValidatorSpi.java | 80 …private static final String SUBJECT_ALTERNATIVE_NAME = X509Extensions.SubjectAlternativeName.getId… field in PKIXCertPathValidatorSpi 927 … ASN1Sequence altName = (ASN1Sequence)getExtensionValue(cert, SUBJECT_ALTERNATIVE_NAME); in engineValidate() 1526 criticalExtensions.remove(SUBJECT_ALTERNATIVE_NAME); in engineValidate() 1633 criticalExtensions.remove(SUBJECT_ALTERNATIVE_NAME); in engineValidate()
|
/dports/security/py-cryptography/cryptography-3.3.2/tests/x509/ |
H A D | test_x509_ext.py | 2296 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2313 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2331 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2344 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2368 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2384 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2400 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2420 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2447 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2478 ExtensionOID.SUBJECT_ALTERNATIVE_NAME [all …]
|
H A D | test_x509.py | 1429 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 1707 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2559 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2610 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2668 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 2766 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 3909 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 4039 ExtensionOID.SUBJECT_ALTERNATIVE_NAME 4042 assert ext.oid == ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
/dports/java/bouncycastle15/crypto-169/mail/src/main/java/org/bouncycastle/mail/smime/validator/ |
H A D | SignedMailValidator.java | 79 private static final String SUBJECT_ALTERNATIVE_NAME = Extension.subjectAlternativeName field in SignedMailValidator 435 byte[] ext = cert.getExtensionValue(SUBJECT_ALTERNATIVE_NAME); in getEmailAddresses()
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/plugins/module_utils/acme/ |
H A D | backend_cryptography.py | 332 if extension.oid == cryptography.x509.oid.ExtensionOID.SUBJECT_ALTERNATIVE_NAME:
|
/dports/devel/pycharm-pro/pycharm-2020.2.3/plugins/python/helpers/typeshed/third_party/2and3/cryptography/ |
H A D | x509.pyi | 45 SUBJECT_ALTERNATIVE_NAME: ClassVar[ObjectIdentifier]
|
/dports/devel/py-jedi/jedi-0.18.0/jedi/third_party/typeshed/third_party/2and3/cryptography/ |
H A D | x509.pyi | 45 SUBJECT_ALTERNATIVE_NAME: ClassVar[ObjectIdentifier]
|
/dports/java/bouncycastle15/crypto-169/prov/src/test/java/org/bouncycastle/jce/provider/test/ |
H A D | CertPathValidatorTest.java | 692 static final String SUBJECT_ALTERNATIVE_NAME = Extension.subjectAlternativeName.getId(); field in CertPathValidatorTest.X509CertificateObject 1150 || oidId.equals(SUBJECT_ALTERNATIVE_NAME) in hasUnsupportedCriticalExtension()
|