Home | History | Annotate | Download | only in tls

Lines Matching refs:ca

46         .ca(3)
51 .ca(2)
101 .ca(3)
106 .ca(2)
153 // Start with a trusted root CA certificate.
156 .ca(3)
160 // Add a good intermediate CA, and have that issue a good certificate to localhost. Prepare an
161 // SSL context for an HTTP client under attack. It includes the trusted CA and a pinned
165 .ca(2)
185 // Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare
191 .ca(2)
209 // rogue CA is trusted) but it should fail certificate pinning.
225 // Start with two root CA certificates, one is good and the other is compromised.
228 .ca(3)
233 .ca(3)
237 // Add a good intermediate CA, and have that issue a good certificate to localhost. Prepare an
238 // SSL context for an HTTP client under attack. It includes the trusted CA and a pinned
242 .ca(2)
258 // The attacker compromises the root CA, issues an intermediate with the same common name
259 // "intermediate_ca" as the good CA. This signs a rogue certificate for localhost. The server
264 .ca(2)
283 // rogue CA is trusted) but it should fail certificate pinning.