/pkg/src/util/mkcert/ |
H A D | mkcert.c | 44 int add_ext(X509 *cert, int nid, char *value); 179 add_ext(X509 *cert, int nid, char *value) argument 190 X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0); 195 X509_add_ext(cert, ex, -1);
|
/pkg/src/svc/ |
H A D | svc-pkg-mirror | 356 cert=${ssl_certs[$i]} 362 "$cert" $SMF_FMRI "$cachedir" "$http_proxy" \ 399 # pkgrecv_from_origin <repo> <origin> <key path> <cert path> <FMRI> 407 typeset cert=$(echo $4 | reduce_null_str) 426 if [ -n "$key" ] && [ -n "$cert" ]; then 428 cert="--cert $cert" 434 $key $cert --clone" 437 -d "$repo" -m all-timestamps $key $cert *" [all...] |
/pkg/src/tests/cli/ |
H A D | t_https.py | 90 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format( 92 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")), 99 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format( 101 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")), 108 # are still possible. (The paths to key and cert should be 118 # Listing the test publisher causes its cert and key to be 133 "-k {key} -c {cert} -p {url}".format( 135 cert=os.path.join(self.cs_dir, self.get_cli_cert("test")), 148 "-k {key} -c {cert} -p {url}".format( 150 cert [all...] |
H A D | t_pkgsign.py | 297 sign_args = "-k {key} -c {cert} -i {ch1} {name}".format( 301 cert=os.path.join(self.cs_dir, 320 # Find the hash of the publisher CA cert used. 340 # self-signed cert. 435 self.pkg("set-publisher --revoke-ca-cert={0} test".format(hsh)) 439 self.pkg("set-publisher --approve-ca-cert={0} test".format( 443 self.pkg("set-publisher --revoke-ca-cert={0} test".format(hsh)) 462 self.pkg("set-publisher --approve-ca-cert={0} test".format( 470 self.pkg("set-publisher --unset-ca-cert={0} test".format(hsh)) 471 self.pkg("set-publisher --approve-ca-cert [all...] |
H A D | t_depot_config.py | 936 cert = os.path.join(self.test_root, "tmp", 945 "--cert {0} --key {1}".format(cert, key), 948 "providing cert or key should fail but succeeded " 952 "--ca-cert {0} --ca-key {1}".format(cert, key), 955 "providing cert or key should fail but succeeded " 959 "--cert-chain {0}".format(cert), out=True, stderr=True, exit=2) 961 "providing cert o [all...] |
H A D | t_pkg_composite.py | 134 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 137 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
|
H A D | t_pkg_temp_sources.py | 146 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 149 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
|
H A D | t_pkg_sysrepo.py | 367 "server-ca-cert":os.path.join(self.raw_trust_anchor_dir, 371 "server-ssl-cert":os.path.join(self.cs_dir, 426 "-k {key} -c {cert} " \ 432 cert=os.path.join( 2606 SSLCertificateFile {server-ssl-cert} 2610 SSLCACertificateFile {server-ca-cert}
|
H A D | t_pkgrepo.py | 2287 # now sign with a key, cert and chain cert and check we fail 2316 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 2319 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"), 3911 "cert": os.path.join(self.cs_dir, 3930 self.pkgrepo("-s {url} info --key {key} --cert {cert}" 3934 self.pkgrepo("-s {url} list --key {key} --cert {cert}" 3938 self.pkgrepo("-s {url} get --key {key} --cert {cer [all...] |
/pkg/src/ |
H A D | depot-config.py | 144 ( ( --cert server_cert_file --key server_key_file 145 [--cert-chain ssl_cert_chain_file] ) | 146 --cert-key-dir cert_key_directory ) [ (--ca-cert ca_cert_file 426 cert = X509() 427 cert.set_serial_number(serial) 428 cert.gmtime_adj_notBefore(starttime) 429 cert.gmtime_adj_notAfter(endtime) 431 cert.get_subject().C = "US" 432 cert [all...] |
H A D | pkgrepo.py | 157 [--key ssl_key ... --cert ssl_cert ...] [section/property ...] 160 [--key ssl_key ... --cert ssl_cert ...] 163 [--key ssl_key ... --cert ssl_cert ...] [pkg_fmri_pattern ...] 166 [--key ssl_key ... --cert ssl_cert ...] [pkg_fmri_pattern ...] 169 --cert ssl_cert ...] [--no-catalog] [--no-index] 172 --cert ssl_cert ...] [--no-catalog] [--no-index] 187 -s first_repo_uri_or_path [--key ssl_key ... --cert ssl_cert ...] 188 -s second_repo_uri_or_path [--key ssl_key ... --cert ssl_cert ...] 522 cert = None 524 opts, pargs = getopt.getopt(args, "F:Hp:s:", ["key=", "cert [all...] |
H A D | sign.py | 118 cert = x509.load_pem_x509_certificate(f.read(), 126 fh.write(cert.public_bytes(serialization.Encoding.PEM))
|
H A D | sysrepo.py | 316 pub_info[uri] = [[prefix, cert, key, hash of the uri, proxy], ... ] 422 [[prefix, cert, key, hash of the uri, proxy, uri type], ... ] 439 # map URIs to (pub.prefix, cert, key, hash, proxy, utype) tuples 516 # we don't have per-uri ssl key/cert information yet, 518 cert = repo.origins[-1].ssl_cert 521 (prefix, cert, key, hash, proxy_map.get(uri), utype) 701 for (pub, cert, key, hash, proxy, utype) in \ 706 (uri, cert, key, hash, proxy, utype))
|
H A D | publish.py | 107 [-T pattern] [--key ssl_key ... --cert ssl_cert ...] 320 "no-index", "no-catalog", "key=", "cert="]) 327 cert = None 343 elif opt == "--cert": 344 cert = arg 412 ssl_cert=cert)
|
H A D | pull.py | 102 [--key src_key --cert src_cert] 107 [--key src_key --cert src_cert] --clone 182 --cert src_cert Specify a client SSL certificate file to use for pkg 412 cert = None 431 ["cert=", "key=", "dcert=", "dkey=", "mog-file=", "newest", 492 elif opt == "--cert": 493 cert = arg 557 remote_prefix=True, ssl_key=key, ssl_cert=cert)
|
/pkg/src/modules/client/ |
H A D | publisher.py | 545 or trying one of several SSL key/cert pairs.""" 2279 def approve_ca_cert(self, cert): 2280 """Add the cert as a CA for manifest signing for this publisher. 2282 The 'cert' parameter is a string of the certificate to add. 2285 cert = self.__string_to_cert(cert) 2286 hsh = self.__add_cert(cert) 2296 """Record that the cert with hash 's' is no longer trusted 2309 """If the cert with hash 's' has been added or removed by the 2330 """Convert a string to a X509 cert [all...] |
H A D | api_errors.py | 2301 def __init__(self, cert, pfmri=None): 2303 self.cert = cert 2310 def __init__(self, cert, path, pfmri=None): 2311 CertificateException.__init__(self, cert, pfmri) 2332 def __init__(self, cert, cert_exceptions, *args, **kwargs): 2333 CertificateException.__init__(self, cert, *args, **kwargs) 2344 sub.oid._name, sub.value) for sub in self.cert.subject), 2346 for i in self.cert.issuer)) + s + "\n" + \ 2354 def __init__(self, cert, reaso [all...] |
H A D | client_api.py | 1939 cert = misc.validate_ssl_cert(ssl_cert) 1943 # If the cert information can't be retrieved, 1948 nb = cert.get_notBefore() 1956 na = cert.get_notAfter() 2197 pub_data["Approved CAs"] = [str(cert) for 2198 cert in p.approved_ca_certs] 2200 pub_data["Revoked CAs"] = [str(cert) for 2201 cert in p.revoked_ca_certs] 2522 # In the case of zones, the ssl cert given is assumed to 2648 # Only use existing cert informatio [all...] |
/pkg/src/modules/actions/ |
H A D | signature.py | 144 # cert, so get the preferred chain hash value from the 453 cert = pub.get_cert_by_hash(hash_val, verify_hash=True, 464 pub.verify_chain(cert, trust_anchors, 0, use_crls, 471 pub_key = cert.public_key()
|
/pkg/src/modules/ |
H A D | misc.py | 1217 cert = build_cert(ssl_cert, uri=uri, pub=prefix) 1219 if cert.has_expired(): 1224 nb = cert.get_notBefore() 1237 na = cert.get_notAfter() 1248 return cert 3057 def check_ca(cert): 3058 """Check if 'cert' is a proper CA. For this the BasicConstraints need to 3059 identify it as a CA cert and it needs to have the CertSign 3068 for e in cert.extensions:
|
/pkg/src/tests/api/ |
H A D | t_p5p.py | 121 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 124 cert=os.path.join(self.cs_dir, "cs1_ch5_ta1_cert.pem"),
|
/pkg/src/tests/ |
H A D | pkg5unittest.py | 949 cert = x509.load_pem_x509_certificate( 952 cert.public_bytes(serialization.Encoding.PEM)).hexdigest() 2702 sign_args = "-k {key} -c {cert} -i {ch1} {name}".format( 2705 cert=os.path.join(self.cs_dir, "cs1_ch1_ta3_cert.pem"), 3853 # TA7 needs password to unlock cert, don't use 3877 "server-ssl-cert":os.path.join(self.cs_dir, 3881 "server-ca-cert":os.path.join(self.path_to_certs, "combined_cas.pem"), 4120 SSLCertificateFile {server-ssl-cert} 4124 SSLCACertificateFile {server-ca-cert}
|