/third_party/node/test/parallel/ |
H A D | test-crypto-certificate.js | 42 function checkMethods(certificate) { 44 assert.strictEqual(certificate.verifySpkac(spkacValid), true); 45 assert.strictEqual(certificate.verifySpkac(spkacFail), false); 48 stripLineEndings(certificate.exportPublicKey(spkacValid).toString('utf8')), 51 assert.strictEqual(certificate.exportPublicKey(spkacFail), ''); 54 certificate.exportChallenge(spkacValid).toString('utf8'), 57 assert.strictEqual(certificate.exportChallenge(spkacFail), ''); 60 assert.strictEqual(certificate.verifySpkac(ab), true); 61 assert.strictEqual(certificate.verifySpkac(new Uint8Array(ab)), true); 62 assert.strictEqual(certificate [all...] |
H A D | test-tls-key-mismatch.js | 33 /^Error: error:05800074:x509 certificate routines::key values mismatch$/ : 34 /^Error: error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch$/;
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
H A D | certificate.js | 8 // leaf certificate. 27 // If we failed to verify the certificate chain for all of the trusted 31 message: 'Failed to verify certificate chain', 46 // Construct certificate path from leaf to root 48 // Perform validation checks on each certificate in the path 50 // Return verified certificate path 57 // Filter for paths which contain a trusted certificate 62 message: 'no trusted certificate path found', 69 // Removes the last certificate in the path, which will be a second copy 70 // of the root certificate give [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/ |
H A D | wpa_evp_key.c | 189 struct Credential certificate = { 0 };
in get_pubkey() local 190 certificate.credData.data = (uint8_t *)malloc(MAX_LEN_CERTIFICATE_CHAIN);
in get_pubkey() 191 if (certificate.credData.data == NULL) {
in get_pubkey() 192 wpa_printf(MSG_ERROR, "%s malloc certificate.credData.data fail", __func__);
in get_pubkey() 196 BIO* bio = BIO_from_cm(key_id, certificate);
in get_pubkey() 199 if (certificate.credData.data != NULL) {
in get_pubkey() 200 free(certificate.credData.data);
in get_pubkey() 207 if (certificate.credData.data != NULL) {
in get_pubkey() 208 free(certificate.credData.data);
in get_pubkey() 262 BIO *BIO_from_cm(const char *key_id, struct Credential certificate)
in BIO_from_cm() argument [all...] |
H A D | wpa_evp_key.h | 21 BIO *BIO_from_cm(const char *key_id, struct Credential certificate);
|
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/ |
H A D | pem.js | 21 function toDER(certificate) { 23 certificate.split('\n').forEach((line) => { 33 // encoding dictates that each certificate should have a trailing newline after 35 function fromDER(certificate, type = 'CERTIFICATE') { 36 // Base64-encode the certificate. 37 const der = certificate.toString('base64'); 38 // Split the certificate into lines of 64 characters.
|
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
H A D | sigstore_bundle.js | 43 : isSet(object.certificate) 44 ? { $case: "certificate", certificate: sigstore_common_1.X509Certificate.fromJSON(object.certificate) } 62 message.content?.$case === "certificate" && 63 (obj.certificate = message.content?.certificate 64 ? sigstore_common_1.X509Certificate.toJSON(message.content?.certificate)
|
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/bundler/ |
H A D | bundle.js | 51 certificate: signature.key.$case === 'x509Certificate' 52 ? util_1.pem.toDER(signature.key.certificate) 64 certificate: signature.key.$case === 'x509Certificate' 65 ? util_1.pem.toDER(signature.key.certificate)
|
H A D | base.js | 42 // or the certificate, depending on the type of key material. 48 return key.certificate;
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/bundle/ |
H A D | index.js | 48 $case: 'certificate', 49 certificate: core_1.X509Certificate.parse(bundle.verificationMaterial.content.x509CertificateChain 52 case 'certificate': 54 $case: 'certificate', 55 certificate: core_1.X509Certificate.parse(bundle.verificationMaterial.content.certificate.rawBytes),
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/src/ |
H A D | cert_manager_api.c | 24 struct Credential *certificate) in CmGetAppCert() 26 CM_LOG_D("enter get app certificate"); in CmGetAppCert() 27 if (keyUri == NULL || certificate == NULL || (store != CM_CREDENTIAL_STORE && in CmGetAppCert() 32 int32_t ret = CmClientGetAppCert(keyUri, store, certificate); in CmGetAppCert() 33 CM_LOG_D("leave get app certificate, result = %d", ret); in CmGetAppCert() 23 CmGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate) CmGetAppCert() argument
|
H A D | cm_ipc_client.c | 126 struct Credential *certificate) in GetAppCert() 162 ret = CmAppCertInfoUnpackFromService(&outBlob, certificate); in GetAppCert() 173 int32_t CmClientGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate) in CmClientGetAppCert() argument 175 return GetAppCert(CM_MSG_GET_APP_CERTIFICATE, keyUri, store, certificate); in CmClientGetAppCert() 125 GetAppCert(enum CertManagerInterfaceCode type, const struct CmBlob *certUri, const uint32_t store, struct Credential *certificate) GetAppCert() argument
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/ |
H A D | policy.js | 9 message: `certificate identity error - expected ${policyIdentity}, got ${signerIdentity}`, 20 message: `invalid certificate extension - expected ${key}=${policyExtensions[key]}, got ${key}=${signerExtensions[key]}`,
|
H A D | verifier.js | 86 case 'certificate': { 87 const result = (0, key_1.verifyCertificate)(key.certificate, timestamps, this.trustMaterial);
|
/third_party/node/deps/npm/node_modules/@sigstore/bundle/dist/ |
H A D | build.js | 73 if (options.certificate) { 77 certificates: [{ rawBytes: options.certificate }],
|
/third_party/python/PCbuild/ |
H A D | prepare_ssl.bat | 16 echo. --certificate (-c) The signing certificate to use for binaries.
30 if "%~1"=="--certificate" (set SigningCertificate=%~2) && shift && shift & goto CheckOpts
|
H A D | prepare_tcltk.bat | 16 echo. --certificate (-c) The signing certificate to use for binaries.
32 if "%~1"=="--certificate" (set SigningCertificate=%~2) && shift && shift & goto CheckOpts
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/include/ |
H A D | cm_ipc_client.h | 27 int32_t CmClientGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate);
|
H A D | cert_manager_api.h | 25 CM_API_EXPORT int32_t CmGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate);
|
/third_party/curl/lib/vtls/ |
H A D | x509asn1.c | 171 * It is intended to support certificate information gathering for SSL backends 173 * entry points to get particular certificate sub-fields. 733 * ASN.1 parse an X509 certificate into structure subfields. 745 cert->certificate.header = NULL; in Curl_parseX509() 746 cert->certificate.beg = beg; in Curl_parseX509() 747 cert->certificate.end = end; in Curl_parseX509() 923 /* Generate a certificate information record for the public key. */ in do_pubkey_field() 1065 /* Prepare the certificate information for curl_easy_getinfo(). */ in Curl_extract_certinfo() 1067 /* Extract the certificate ASN.1 elements. */ in Curl_extract_certinfo() 1184 /* Generate PEM certificate in Curl_extract_certinfo() [all...] |
H A D | x509asn1.h | 50 /* X509 certificate: RFC 5280. */ 52 struct Curl_asn1Element certificate; member
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_lib.c | 117 ossl_x509_set0_libctx(cch->d.certificate, libctx, propq); in ossl_cms_resolve_libctx() 536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 546 cch->d.certificate = cert; in CMS_add0_cert() 640 if (!ossl_x509_add_cert_new(&certs, cch->d.certificate, in STACK_OF()
|
/third_party/openssl/crypto/cms/ |
H A D | cms_lib.c | 104 ossl_x509_set0_libctx(cch->d.certificate, libctx, propq); in ossl_cms_resolve_libctx() 523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 533 cch->d.certificate = cert; in CMS_add0_cert() 627 if (!ossl_x509_add_cert_new(&certs, cch->d.certificate, in STACK_OF()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 5 certificate decoding. Chris Stawarz contributed some non-blocking 398 "A certificate could not be verified."); 491 "Hostname mismatch, certificate is not valid for '%S'.", in fill_and_set_sslerror() 497 "IP address mismatch, certificate is not valid for '%S'.", in fill_and_set_sslerror() 729 * matched by a certificate valid for any sub-domain of name. in _ssl_configure_hostname() 1186 _get_peer_alt_names (_sslmodulestate *state, X509 *certificate) { in _get_peer_alt_names() argument 1204 if (certificate == NULL) in _get_peer_alt_names() 1215 certificate, NID_subject_alt_name, NULL, NULL); in _get_peer_alt_names() 1450 _get_aia_uri(X509 *certificate, int nid) { in _get_aia_uri() argument 1455 info = X509_get_ext_d2i(certificate, NID_info_acces in _get_aia_uri() 1507 _get_crl_dp(X509 *certificate) _get_crl_dp() argument 1565 _decode_certificate(_sslmodulestate *state, X509 *certificate) _decode_certificate() argument 1736 _certificate_to_der(_sslmodulestate *state, X509 *certificate) _certificate_to_der() argument [all...] |
/third_party/node/lib/internal/main/ |
H A D | print_help.js | 65 'certificate validation' }], 81 ['SSL_CERT_FILE', { helpText: 'sets OpenSSL\'s trusted certificate file ' +
|