Searched refs:cert (Results 1 - 22 of 22) sorted by relevance

/pkg/src/util/mkcert/
H A Dmkcert.c44 int add_ext(X509 *cert, int nid, char *value);
179 add_ext(X509 *cert, int nid, char *value) argument
190 X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0);
195 X509_add_ext(cert, ex, -1);
/pkg/src/svc/
H A Dsvc-pkg-mirror356 cert=${ssl_certs[$i]}
362 "$cert" $SMF_FMRI "$cachedir" "$http_proxy" \
399 # pkgrecv_from_origin <repo> <origin> <key path> <cert path> <FMRI>
407 typeset cert=$(echo $4 | reduce_null_str)
426 if [ -n "$key" ] && [ -n "$cert" ]; then
428 cert="--cert $cert"
434 $key $cert --clone"
437 -d "$repo" -m all-timestamps $key $cert *"
[all...]
/pkg/src/tests/cli/
H A Dt_https.py90 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format(
92 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")),
99 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format(
101 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")),
108 # are still possible. (The paths to key and cert should be
118 # Listing the test publisher causes its cert and key to be
133 "-k {key} -c {cert} -p {url}".format(
135 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")),
148 "-k {key} -c {cert} -p {url}".format(
150 cert
[all...]
H A Dt_pkgsign.py297 sign_args = "-k {key} -c {cert} -i {ch1} {name}".format(
301 cert=os.path.join(self.cs_dir,
320 # Find the hash of the publisher CA cert used.
340 # self-signed cert.
435 self.pkg("set-publisher --revoke-ca-cert={0} test".format(hsh))
439 self.pkg("set-publisher --approve-ca-cert={0} test".format(
443 self.pkg("set-publisher --revoke-ca-cert={0} test".format(hsh))
462 self.pkg("set-publisher --approve-ca-cert={0} test".format(
470 self.pkg("set-publisher --unset-ca-cert={0} test".format(hsh))
471 self.pkg("set-publisher --approve-ca-cert
[all...]
H A Dt_depot_config.py936 cert = os.path.join(self.test_root, "tmp",
945 "--cert {0} --key {1}".format(cert, key),
948 "providing cert or key should fail but succeeded "
952 "--ca-cert {0} --ca-key {1}".format(cert, key),
955 "providing cert or key should fail but succeeded "
959 "--cert-chain {0}".format(cert), out=True, stderr=True, exit=2)
961 "providing cert o
[all...]
H A Dt_pkg_composite.py134 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \
137 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
H A Dt_pkg_temp_sources.py146 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \
149 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
H A Dt_pkg_sysrepo.py367 "server-ca-cert":os.path.join(self.raw_trust_anchor_dir,
371 "server-ssl-cert":os.path.join(self.cs_dir,
426 "-k {key} -c {cert} " \
432 cert=os.path.join(
2606 SSLCertificateFile {server-ssl-cert}
2610 SSLCACertificateFile {server-ca-cert}
H A Dt_pkgrepo.py2287 # now sign with a key, cert and chain cert and check we fail
2316 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \
2319 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
3911 "cert": os.path.join(self.cs_dir,
3930 self.pkgrepo("-s {url} info --key {key} --cert {cert}"
3934 self.pkgrepo("-s {url} list --key {key} --cert {cert}"
3938 self.pkgrepo("-s {url} get --key {key} --cert {cer
[all...]
/pkg/src/
H A Ddepot-config.py144 ( ( --cert server_cert_file --key server_key_file
145 [--cert-chain ssl_cert_chain_file] ) |
146 --cert-key-dir cert_key_directory ) [ (--ca-cert ca_cert_file
426 cert = X509()
427 cert.set_serial_number(serial)
428 cert.gmtime_adj_notBefore(starttime)
429 cert.gmtime_adj_notAfter(endtime)
431 cert.get_subject().C = "US"
432 cert
[all...]
H A Dpkgrepo.py157 [--key ssl_key ... --cert ssl_cert ...] [section/property ...]
160 [--key ssl_key ... --cert ssl_cert ...]
163 [--key ssl_key ... --cert ssl_cert ...] [pkg_fmri_pattern ...]
166 [--key ssl_key ... --cert ssl_cert ...] [pkg_fmri_pattern ...]
169 --cert ssl_cert ...] [--no-catalog] [--no-index]
172 --cert ssl_cert ...] [--no-catalog] [--no-index]
187 -s first_repo_uri_or_path [--key ssl_key ... --cert ssl_cert ...]
188 -s second_repo_uri_or_path [--key ssl_key ... --cert ssl_cert ...]
522 cert = None
524 opts, pargs = getopt.getopt(args, "F:Hp:s:", ["key=", "cert
[all...]
H A Dsign.py118 cert = x509.load_pem_x509_certificate(f.read(),
126 fh.write(cert.public_bytes(serialization.Encoding.PEM))
H A Dsysrepo.py316 pub_info[uri] = [[prefix, cert, key, hash of the uri, proxy], ... ]
422 [[prefix, cert, key, hash of the uri, proxy, uri type], ... ]
439 # map URIs to (pub.prefix, cert, key, hash, proxy, utype) tuples
516 # we don't have per-uri ssl key/cert information yet,
518 cert = repo.origins[-1].ssl_cert
521 (prefix, cert, key, hash, proxy_map.get(uri), utype)
701 for (pub, cert, key, hash, proxy, utype) in \
706 (uri, cert, key, hash, proxy, utype))
H A Dpublish.py107 [-T pattern] [--key ssl_key ... --cert ssl_cert ...]
320 "no-index", "no-catalog", "key=", "cert="])
327 cert = None
343 elif opt == "--cert":
344 cert = arg
412 ssl_cert=cert)
H A Dpull.py102 [--key src_key --cert src_cert]
107 [--key src_key --cert src_cert] --clone
182 --cert src_cert Specify a client SSL certificate file to use for pkg
412 cert = None
431 ["cert=", "key=", "dcert=", "dkey=", "mog-file=", "newest",
492 elif opt == "--cert":
493 cert = arg
557 remote_prefix=True, ssl_key=key, ssl_cert=cert)
/pkg/src/modules/client/
H A Dpublisher.py545 or trying one of several SSL key/cert pairs."""
2279 def approve_ca_cert(self, cert):
2280 """Add the cert as a CA for manifest signing for this publisher.
2282 The 'cert' parameter is a string of the certificate to add.
2285 cert = self.__string_to_cert(cert)
2286 hsh = self.__add_cert(cert)
2296 """Record that the cert with hash 's' is no longer trusted
2309 """If the cert with hash 's' has been added or removed by the
2330 """Convert a string to a X509 cert
[all...]
H A Dapi_errors.py2301 def __init__(self, cert, pfmri=None):
2303 self.cert = cert
2310 def __init__(self, cert, path, pfmri=None):
2311 CertificateException.__init__(self, cert, pfmri)
2332 def __init__(self, cert, cert_exceptions, *args, **kwargs):
2333 CertificateException.__init__(self, cert, *args, **kwargs)
2344 sub.oid._name, sub.value) for sub in self.cert.subject),
2346 for i in self.cert.issuer)) + s + "\n" + \
2354 def __init__(self, cert, reaso
[all...]
H A Dclient_api.py1939 cert = misc.validate_ssl_cert(ssl_cert)
1943 # If the cert information can't be retrieved,
1948 nb = cert.get_notBefore()
1956 na = cert.get_notAfter()
2197 pub_data["Approved CAs"] = [str(cert) for
2198 cert in p.approved_ca_certs]
2200 pub_data["Revoked CAs"] = [str(cert) for
2201 cert in p.revoked_ca_certs]
2522 # In the case of zones, the ssl cert given is assumed to
2648 # Only use existing cert informatio
[all...]
/pkg/src/modules/actions/
H A Dsignature.py144 # cert, so get the preferred chain hash value from the
453 cert = pub.get_cert_by_hash(hash_val, verify_hash=True,
464 pub.verify_chain(cert, trust_anchors, 0, use_crls,
471 pub_key = cert.public_key()
/pkg/src/modules/
H A Dmisc.py1217 cert = build_cert(ssl_cert, uri=uri, pub=prefix)
1219 if cert.has_expired():
1224 nb = cert.get_notBefore()
1237 na = cert.get_notAfter()
1248 return cert
3057 def check_ca(cert):
3058 """Check if 'cert' is a proper CA. For this the BasicConstraints need to
3059 identify it as a CA cert and it needs to have the CertSign
3068 for e in cert.extensions:
/pkg/src/tests/api/
H A Dt_p5p.py121 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \
124 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
/pkg/src/tests/
H A Dpkg5unittest.py949 cert = x509.load_pem_x509_certificate(
952 cert.public_bytes(serialization.Encoding.PEM)).hexdigest()
2702 sign_args = "-k {key} -c {cert} -i {ch1} {name}".format(
2705 cert=os.path.join(self.cs_dir, "cs1_ch1_ta3_cert.pem"),
3853 # TA7 needs password to unlock cert, don't use
3877 "server-ssl-cert":os.path.join(self.cs_dir,
3881 "server-ca-cert":os.path.join(self.path_to_certs, "combined_cas.pem"),
4120 SSLCertificateFile {server-ssl-cert}
4124 SSLCACertificateFile {server-ca-cert}

Completed in 429 milliseconds