/dports/devel/aws-c-io/aws-c-io-0.10.12/tests/ |
H A D | pki_utils_test.c | 75 struct aws_byte_buf *cert_data = NULL; in s_test_pem_single_cert_parse() local 77 ASSERT_BIN_ARRAYS_EQUALS(s_expected, sizeof(s_expected), cert_data->buffer, cert_data->len); in s_test_pem_single_cert_parse() 291 … s_expected_intermediate_1, sizeof(s_expected_intermediate_1), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 294 … s_expected_intermediate_2, sizeof(s_expected_intermediate_2), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 296 …ASSERT_BIN_ARRAYS_EQUALS(s_expected_leaf, sizeof(s_expected_leaf), cert_data->buffer, cert_data->l… in AWS_TEST_CASE() 415 ASSERT_BIN_ARRAYS_EQUALS(s_expected, sizeof(s_expected), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 495 ASSERT_BIN_ARRAYS_EQUALS(s_expected, sizeof(s_expected), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 586 ASSERT_BIN_ARRAYS_EQUALS(s_expected, sizeof(s_expected), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 816 … s_expected_intermediate_1, sizeof(s_expected_intermediate_1), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() 819 … s_expected_intermediate_2, sizeof(s_expected_intermediate_2), cert_data->buffer, cert_data->len); in AWS_TEST_CASE() [all …]
|
/dports/mail/neomutt/neomutt-20211029/contrib/ |
H A D | smime_keys | 298 my $cert_data = {}; 301 $cert_data->{type} = ""; 304 $cert_data->{issuer} = ""; 306 return $cert_data; 537 my $cert_data; 799 my $cert_data = {}; 803 $cert_data->{trust} = openssl_trust_flag($cert_data->{hashvalue}, $issuer_hash); 804 $cert_data->{purpose} = openssl_purpose_flag($filename, $cert_data->{hashvalue}); 808 $cert_data->{trust}, $cert_data->{purpose}, $issuer_hash); 812 return $cert_data; [all …]
|
/dports/security/gcr/gcr-3.40.0/gcr/ |
H A D | test-simple-certificate.c | 36 gpointer cert_data; member 43 if (!g_file_get_contents (SRCDIR "/gcr/fixtures/der-certificate.crt", (gchar**)&test->cert_data, in setup() 46 g_assert (test->cert_data); in setup() 52 g_free (test->cert_data); in teardown() 62 cert = gcr_simple_certificate_new (test->cert_data, test->n_cert_data); in test_new() 67 egg_assert_cmpmem (der, n_der, ==, test->cert_data, test->n_cert_data); in test_new() 79 cert = gcr_simple_certificate_new_static (test->cert_data, test->n_cert_data); in test_new_static() 85 g_assert (der == test->cert_data); /* Must be same pointer */ in test_new_static()
|
H A D | test-pkcs11-certificate.c | 41 gpointer cert_data; member 63 g_assert (test->cert_data); in setup() 84 bytes = g_bytes_new_static (test->cert_data, test->n_cert_data); in setup() 91 gck_builder_add_data (&builder, CKA_VALUE, test->cert_data, test->n_cert_data); in setup() 109 g_free (test->cert_data); in teardown() 128 cert = gcr_simple_certificate_new_static (test->cert_data, test->n_cert_data); in test_lookup_certificate_issuer() 139 g_assert (memcmp (der, test->cert_data, test->n_cert_data) == 0); in test_lookup_certificate_issuer() 147 g_assert (memcmp (attr->value, test->cert_data, test->n_cert_data) == 0); in test_lookup_certificate_issuer() 156 g_assert (memcmp (attr->value, test->cert_data, test->n_cert_data) == 0); in test_lookup_certificate_issuer() 197 cert = gcr_simple_certificate_new_static (test->cert_data, test->n_cert_data); in test_lookup_certificate_issuer_async() [all …]
|
/dports/sysutils/froxlor/froxlor-0.9.38.7_4/froxlor/ |
H A D | ssl_certificates.php | 130 $cert_data = openssl_x509_parse($cert['ssl_cert_file']); 146 if ($cert_data) { 147 $validFrom = date('d.m.Y H:i:s', $cert_data['validFrom_time_t']); 148 $validTo = date('d.m.Y H:i:s', $cert_data['validTo_time_t']); 151 if ($cert_data['validTo_time_t'] < time()) { 156 …if (isset($cert_data['extensions']['subjectAltName']) && ! empty($cert_data['extensions']['subject… 157 $SANs = explode(",", $cert_data['extensions']['subjectAltName']); 161 if ($san != $cert_data['subject']['CN'] && strpos($san, "othername:") === false) {
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/test/ |
H A D | cert_test_util.cc | 22 std::string cert_data; in CreateCertificateListFromFile() local 23 if (!base::ReadFileToString(cert_path, &cert_data)) in CreateCertificateListFromFile() 25 return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), in CreateCertificateListFromFile() 26 cert_data.size(), in CreateCertificateListFromFile() 70 std::string cert_data; in ImportCertFromFile() local 71 if (!base::ReadFileToString(cert_path, &cert_data)) in ImportCertFromFile() 76 cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); in ImportCertFromFile()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/test/ |
H A D | cert_test_util.cc | 22 std::string cert_data; in CreateCertificateListFromFile() local 23 if (!base::ReadFileToString(cert_path, &cert_data)) in CreateCertificateListFromFile() 25 return X509Certificate::CreateCertificateListFromBytes(cert_data.data(), in CreateCertificateListFromFile() 26 cert_data.size(), in CreateCertificateListFromFile() 70 std::string cert_data; in ImportCertFromFile() local 71 if (!base::ReadFileToString(cert_path, &cert_data)) in ImportCertFromFile() 76 cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO); in ImportCertFromFile()
|
/dports/security/clamav/clamav-0.104.2/common/ |
H A D | cert_util.c | 139 free(*cert_data); in _x509_to_pem_append() 140 *cert_data = NULL; in _x509_to_pem_append() 145 *cert_data = tmp; in _x509_to_pem_append() 154 (*cert_data)[*total_buf_len] = '\0'; in _x509_to_pem_append() 331 if (*cert_data == NULL) { in cert_store_export_pem() 351 cert_data, in cert_store_export_pem() 385 cert_data, in cert_store_export_pem() 420 cert_data, in cert_store_export_pem() 438 if (ret != CL_SUCCESS && cert_data && *cert_data) { in cert_store_export_pem() 439 free(*cert_data); in cert_store_export_pem() [all …]
|
/dports/security/clamav-lts/clamav-0.103.5/shared/ |
H A D | cert_util.c | 139 free(*cert_data); in _x509_to_pem_append() 140 *cert_data = NULL; in _x509_to_pem_append() 145 *cert_data = tmp; in _x509_to_pem_append() 154 (*cert_data)[*total_buf_len] = '\0'; in _x509_to_pem_append() 331 if (*cert_data == NULL) { in cert_store_export_pem() 351 cert_data, in cert_store_export_pem() 385 cert_data, in cert_store_export_pem() 420 cert_data, in cert_store_export_pem() 438 if (ret != CL_SUCCESS && cert_data && *cert_data) { in cert_store_export_pem() 439 free(*cert_data); in cert_store_export_pem() [all …]
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/ |
H A D | NICE.pm | 110 my $cert_data = $x509 ->db_hash(); 111 my $identifier = $cert_data->{identifier}; 136 $cert_data->{authority_key_identifier} 137 ? (subject_key_identifier => $cert_data->{authority_key_identifier}) 138 : (subject => $cert_data->{issuer_dn}), 148 …)->warn("NICE certificate issued with unknown issuer! ($identifier / ".$cert_data->{issuer_dn}.")"… 155 cakey => $cert_data->{authority_key_identifier}, 157 key => $cert_data->{subject_key_identifier}, 163 key => $cert_data->{subject_key_identifier}, 171 %$cert_data,
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/ |
H A D | NICE.pm | 110 my $cert_data = $x509 ->db_hash(); 111 my $identifier = $cert_data->{identifier}; 136 $cert_data->{authority_key_identifier} 137 ? (subject_key_identifier => $cert_data->{authority_key_identifier}) 138 : (subject => $cert_data->{issuer_dn}), 148 …)->warn("NICE certificate issued with unknown issuer! ($identifier / ".$cert_data->{issuer_dn}.")"… 155 cakey => $cert_data->{authority_key_identifier}, 157 key => $cert_data->{subject_key_identifier}, 163 key => $cert_data->{subject_key_identifier}, 171 %$cert_data,
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/ |
H A D | x509_util_mac.cc | 67 CSSM_DATA cert_data; in CreateSecCertificateFromBytes() local 68 cert_data.Data = const_cast<uint8_t*>(data); in CreateSecCertificateFromBytes() 69 cert_data.Length = length; in CreateSecCertificateFromBytes() 72 OSStatus status = SecCertificateCreateFromData(&cert_data, CSSM_CERT_X_509v3, in CreateSecCertificateFromBytes() 129 CSSM_DATA cert_data; in CalculateFingerprint256() local 130 OSStatus status = SecCertificateGetData(cert, &cert_data); in CalculateFingerprint256() 134 DCHECK(cert_data.Data); in CalculateFingerprint256() 135 DCHECK_NE(cert_data.Length, 0U); in CalculateFingerprint256() 137 CC_SHA256(cert_data.Data, cert_data.Length, sha256.data); in CalculateFingerprint256() 299 CSSM_DATA cert_data; in Init() local [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/ |
H A D | x509_util_mac.cc | 66 CSSM_DATA cert_data; in CreateSecCertificateFromBytes() local 67 cert_data.Data = const_cast<uint8_t*>(data); in CreateSecCertificateFromBytes() 68 cert_data.Length = length; in CreateSecCertificateFromBytes() 71 OSStatus status = SecCertificateCreateFromData(&cert_data, CSSM_CERT_X_509v3, in CreateSecCertificateFromBytes() 128 CSSM_DATA cert_data; in CalculateFingerprint256() local 129 OSStatus status = SecCertificateGetData(cert, &cert_data); in CalculateFingerprint256() 133 DCHECK(cert_data.Data); in CalculateFingerprint256() 134 DCHECK_NE(cert_data.Length, 0U); in CalculateFingerprint256() 136 CC_SHA256(cert_data.Data, cert_data.Length, sha256.data); in CalculateFingerprint256() 298 CSSM_DATA cert_data; in Init() local [all …]
|
/dports/www/lua-resty-core/lua-resty-core-0.1.22/t/ |
H A D | ocsp.t | 39 cert_data, err = ssl.cert_pem_to_der(cert_data) 129 cert_data, err = ssl.cert_pem_to_der(cert_data) 221 cert_data, err = ssl.cert_pem_to_der(cert_data) 312 cert_data, err = ssl.cert_pem_to_der(cert_data) 403 cert_data, err = ssl.cert_pem_to_der(cert_data) 500 cert_data, err = ssl.cert_pem_to_der(cert_data) 596 cert_data, err = ssl.cert_pem_to_der(cert_data) 770 cert_data, err = ssl.cert_pem_to_der(cert_data) 862 cert_data, err = ssl.cert_pem_to_der(cert_data) 954 cert_data, err = ssl.cert_pem_to_der(cert_data) [all …]
|
/dports/net/py-zeep/zeep-4.1.0/src/zeep/wsse/ |
H A D | signature.py | 34 def _make_sign_key(key_data, cert_data, password): argument 36 key.load_cert_from_memory(cert_data, xmlsec.KeyFormat.PEM) 40 def _make_verify_key(cert_data): argument 41 key = xmlsec.Key.from_memory(cert_data, xmlsec.KeyFormat.CERT_PEM, None) 51 cert_data, argument 59 self.cert_data = cert_data 65 key = _make_sign_key(self.key_data, self.cert_data, self.password) 72 key = _make_verify_key(self.cert_data) 103 key = _make_sign_key(self.key_data, self.cert_data, self.password)
|
/dports/sysutils/py-salt/salt-3004.1/salt/modules/ |
H A D | keystore.py | 41 cert_data = {} 54 cert_data["pem"] = cert_pem 55 cert_data["alias"] = alias 56 cert_data["sha1"] = sha1 57 cert_data["valid_until"] = string_until 58 cert_data["valid_start"] = string_start 59 cert_data["expired"] = date_until < datetime.now() 61 return cert_data
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/amazon/ |
H A D | _aws_acm_facts.py | 285 cert_data = describe_certificate_with_backoff(client, certificate['CertificateArn']) 290 if cert_data['Status'] not in ['PENDING_VALIDATION', 'VALIDATION_TIMED_OUT', 'FAILED']: 292 … cert_data.update(get_certificate_with_backoff(client, certificate['CertificateArn'])) 298 cert_data = camel_dict_to_snake_dict(cert_data) 305 cert_data['tags'] = boto3_tag_list_to_ansible_dict(tags) 306 results.append(cert_data)
|
H A D | aws_acm_info.py | 285 cert_data = describe_certificate_with_backoff(client, certificate['CertificateArn']) 290 if cert_data['Status'] not in ['PENDING_VALIDATION', 'VALIDATION_TIMED_OUT', 'FAILED']: 292 … cert_data.update(get_certificate_with_backoff(client, certificate['CertificateArn'])) 298 cert_data = camel_dict_to_snake_dict(cert_data) 305 cert_data['tags'] = boto3_tag_list_to_ansible_dict(tags) 306 results.append(cert_data)
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/amazon/aws/plugins/module_utils/ |
H A D | acm.py | 111 … cert_data = self.describe_certificate_with_backoff(client, certificate['CertificateArn']) 116 if cert_data['Status'] not in ['PENDING_VALIDATION', 'VALIDATION_TIMED_OUT', 'FAILED']: 118 … cert_data.update(self.get_certificate_with_backoff(client, certificate['CertificateArn'])) 121 cert_data = camel_dict_to_snake_dict(cert_data) 127 cert_data['tags'] = boto3_tag_list_to_ansible_dict(tags) 128 results.append(cert_data) 149 cert_data = self.describe_certificate_with_backoff(client=client, certificate_arn=arn) 152 return cert_data['DomainName']
|
/dports/misc/py-cinder/cinder-12.0.10/cinder/volume/drivers/datera/ |
H A D | datera_common.py | 212 cert_data = None 218 cert_data = (client_cert, client_cert_key) 221 resp = driver._request(url, "get", None, header, cert_data) 228 resp = driver._request(url, "get", None, header, cert_data) 306 verify=False, cert=cert_data) 332 cert_data, argument 358 cert_data) 412 cert_data = None 416 cert_data = (client_cert, client_cert_key) 443 cert_data) [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/internal/ |
H A D | ocsp_unittest.cc | 144 std::string cert_data; in TEST_P() local 149 {"CERTIFICATE", &cert_data}, in TEST_P() 162 CheckOCSP(ocsp_data, cert_data, ca_data, kVerifyTime, kOCSPAgeOneWeek, in TEST_P() 169 scoped_refptr<ParsedCertificate> cert = ParseCertificate(cert_data); in TEST_P() 198 std::string cert_data; in TEST_P() local 202 {"CERTIFICATE", &cert_data}, in TEST_P() 211 scoped_refptr<ParsedCertificate> cert = ParseCertificate(cert_data); in TEST_P()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/internal/ |
H A D | ocsp_unittest.cc | 143 std::string cert_data; in TEST_P() local 148 {"CERTIFICATE", &cert_data}, in TEST_P() 161 CheckOCSP(ocsp_data, cert_data, ca_data, kVerifyTime, kOCSPAgeOneWeek, in TEST_P() 168 scoped_refptr<ParsedCertificate> cert = ParseCertificate(cert_data); in TEST_P() 197 std::string cert_data; in TEST_P() local 201 {"CERTIFICATE", &cert_data}, in TEST_P() 210 scoped_refptr<ParsedCertificate> cert = ParseCertificate(cert_data); in TEST_P()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/trust-dns-proto-0.20.3/src/rr/rdata/ |
H A D | tlsa.rs | 40 cert_data: Vec<u8>, field 302 cert_data: Vec<u8>, in new() 308 cert_data, in new() 328 pub fn cert_data(&self) -> &[u8] { in cert_data() method 329 &self.cert_data in cert_data() 357 let cert_data = decoder.read_vec(cert_len)?.unverified(/*will fail in usage if invalid*/); in read() localVariable 363 cert_data, in read() 372 encoder.emit_vec(&tlsa.cert_data)?; in emit() 432 cert = sshfp::HEX.encode(&self.cert_data), in fmt()
|
/dports/net/oha/oha-0.4.7/cargo-crates/trust-dns-proto-0.20.3/src/rr/rdata/ |
H A D | tlsa.rs | 40 cert_data: Vec<u8>, field 302 cert_data: Vec<u8>, in new() 308 cert_data, in new() 328 pub fn cert_data(&self) -> &[u8] { in cert_data() method 329 &self.cert_data in cert_data() 357 let cert_data = decoder.read_vec(cert_len)?.unverified(/*will fail in usage if invalid*/); in read() localVariable 363 cert_data, in read() 372 encoder.emit_vec(&tlsa.cert_data)?; in emit() 432 cert = sshfp::HEX.encode(&self.cert_data), in fmt()
|
/dports/net-im/telepathy-glib/telepathy-glib-0.24.1/telepathy-glib/ |
H A D | tls-certificate.c | 87 GPtrArray *cert_data; member 208 GPtrArray *cert_data; in tls_certificate_got_all_cb() local 254 if (cert_data == NULL) in tls_certificate_got_all_cb() 269 for (i = 0; i < cert_data->len; i++) in tls_certificate_got_all_cb() 271 GArray *arr = g_ptr_array_index (cert_data, i); in tls_certificate_got_all_cb() 275 g_ptr_array_add (self->priv->cert_data, bytes); in tls_certificate_got_all_cb() 279 self->priv->cert_data->len, self->priv->cert_type); in tls_certificate_got_all_cb() 350 if (priv->cert_data != NULL) in tp_tls_certificate_finalize() 351 g_ptr_array_unref (priv->cert_data); in tp_tls_certificate_finalize() 374 g_value_set_boxed (value, priv->cert_data); in tp_tls_certificate_get_property() [all …]
|