Home
last modified time | relevance | path

Searched refs:cert (Results 101 - 125 of 1215) sorted by relevance

12345678910>>...49

/base/security/certificate_framework/frameworks/adapter/v1.0/src/
H A Dx509_cert_chain_openssl.c112 static CfResult X509ToHcfX509Certificate(X509 *cert, HcfX509Certificate **returnObj) in X509ToHcfX509Certificate() argument
114 if (cert == NULL) { in X509ToHcfX509Certificate()
120 uint8_t *certData = GetX509EncodedDataStream(cert, &dataLength); in X509ToHcfX509Certificate()
161 /* the list count has checked when create cert chain */ in GetCertlist()
170 X509 *cert = sk_X509_value(x509CertChain, i); in GetCertlist() local
171 if (cert == NULL) { in GetCertlist()
178 res = X509ToHcfX509Certificate(cert, &x509Cert); in GetCertlist()
210 X509 *cert = sk_X509_value(certChain, j); in STACK_OF() local
211 if (cert == NULL) { in STACK_OF()
218 int32_t res = X509_CRL_get0_by_cert(crl, &rev, cert); in STACK_OF()
257 X509 *cert = sk_X509_value(x509CertChain, 0); // leaf cert VerifyCertChain() local
376 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)trustAnchors->CACert); GetTrustAnchor() local
482 FillValidateResult(HcfX509TrustAnchor *inputAnchor, X509 *cert, HcfX509CertChainValidateResult *result) FillValidateResult() argument
653 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local
824 VerifyOcspSigner(OCSP_BASICRESP *bs, STACK_OF(X509) *certChain, X509 *cert) VerifyOcspSigner() argument
1359 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local
1407 X509 *cert = sk_X509_value(x509CertChain, 0); STACK_OF() local
1546 X509 *cert = NULL; CreateX509CertChainPEM() local
1597 X509 *cert = NULL; CreateX509CertChainDER() local
1764 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)inCerts->data[i]); GetCertsStack() local
2017 X509 *cert = NULL; STACK_OF() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_read.c280 struct x509_certificate *cert) in tls_peer_cert_event()
294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event()
295 cert->cert_len); in tls_peer_cert_event()
296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event()
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
315 if (cert->extensions_present & X509_EXT_CERTIFICATE_POLICY) { in tls_peer_cert_event()
316 if (cert->certificate_policy & X509_EXT_CERT_POLICY_TOD_STRICT) in tls_peer_cert_event()
318 else if (cert->certificate_policy & in tls_peer_cert_event()
329 struct x509_certificate *cert, in tls_cert_chain_failure_event()
337 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event()
279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument
328 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument
360 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local
830 struct x509_certificate *cert; tls_process_certificate_status() local
[all...]
H A Dtlsv1_client_write.c27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
33 while (cert) { in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
257 struct x509_certificate *cert; in tls_write_client_certificate() local
283 cert in tls_write_client_certificate()
[all...]
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
/device/soc/rockchip/common/sdk_linux/scripts/
H A DMakefile16 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert
17 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert
18 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert
24 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS)
25 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
/third_party/curl/docs/examples/
H A Dsessioninfo.c61 gnutls_x509_crt_t cert; in wrfu() local
64 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { in wrfu()
66 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { in wrfu()
68 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { in wrfu()
75 gnutls_x509_crt_deinit(cert); in wrfu()
H A Dusercertinmem.c48 X509 *cert = NULL; in sslctx_function() local
131 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); in sslctx_function()
132 if(!cert) { in sslctx_function()
137 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); in sslctx_function()
170 if(cert) in sslctx_function()
171 X509_free(cert); in sslctx_function()
/third_party/node/test/parallel/
H A Dtest-tls-cert-regression.js30 const cert =
69 function test(cert, key, cb) {
71 cert,
78 test(cert, key, common.mustCall(function() {
79 test(Buffer.from(cert), Buffer.from(key), common.mustCall());
H A Dtest-https-selfsigned-no-keycertsign-no-crash.js33 const cert =
34 fixtures.readKey(path.join('selfsigned-no-keycertsign', 'cert.pem'));
38 cert: cert
54 ca: cert
H A Dtest-tls-getcertificate-x509.js13 cert: fixtures.readKey('agent6-cert.pem')
21 const cert = socket.getX509Certificate();
22 assert(cert instanceof X509Certificate);
24 cert.serialNumber,
H A Dtest-tls-multi-key.js34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec.
40 cert: [
41 fixtures.readKey('agent1-cert.pem'),
42 fixtures.readKey('ec10-cert.pem'),
46 fixtures.readKey('ca5-cert.pem'),
47 fixtures.readKey('ca1-cert.pem'),
51 // Key and cert are ordered as ec, rsa.
57 cert: [
58 fixtures.readKey('agent1-cert.pem'),
59 fixtures.readKey('ec10-cert
[all...]
H A Dtest-tls-enable-trace.js45 checkServerIdentity: (servername, cert) => { },
46 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
49 cert: keys.agent6.cert,
H A Dtest-tls-secure-context-usage-order.js20 cert: loadPEM('agent2-cert'),
27 cert: loadPEM('agent1-cert'),
28 ca: [ loadPEM('ca2-cert') ]
33 cert: loadPEM('agent1-cert'),
34 ca: [ loadPEM('ca1-cert') ]
60 cert: loadPEM('agent1-cert'),
[all...]
/base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/src/
H A Dhks_client_service_dcm.cpp35 ENABLE_CFI(int32_t DcmGenerateCertChain(struct HksBlob *cert, const uint8_t *remoteObject)) in DcmGenerateCertChain() argument
37 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cert), HKS_ERROR_INVALID_ARGUMENT, "invalid in cert"); in DcmGenerateCertChain()
43 .blob = { .size = cert->size, .data = cert->data }, in DcmGenerateCertChain()
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/
H A Dcertificate.js58 paths = paths.filter((path) => path.some((cert) => this.trustedCerts.includes(cert)));
154 const validCAs = path.slice(1).every((cert) => cert.isCA);
174 const cert = path[i];
176 if (cert.extBasicConstraints?.isCA) {
177 const pathLength = cert.extBasicConstraints.pathLenConstraint;
/third_party/node/deps/openssl/openssl/crypto/store/
H A Dstore_result.c463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert()
464 * to reading it as a normal cert (just X509), but if in try_cert()
466 * trusted cert, then no fallback should be engaged. in try_cert()
471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local
473 if (cert == NULL) in try_cert()
481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert()
484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert()
486 X509_free(cert); in try_cert()
487 cert = NULL; in try_cert()
490 if (cert ! in try_cert()
549 X509 *cert = NULL; try_pkcs12() local
[all...]
/third_party/openssl/crypto/store/
H A Dstore_result.c463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert()
464 * to reading it as a normal cert (just X509), but if in try_cert()
466 * trusted cert, then no fallback should be engaged. in try_cert()
471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local
473 if (cert == NULL) in try_cert()
481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert()
484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert()
486 X509_free(cert); in try_cert()
487 cert = NULL; in try_cert()
490 if (cert ! in try_cert()
549 X509 *cert = NULL; try_pkcs12() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl.c375 const CERT_CONTEXT *cert; member
498 if (priv->cert) in cryptoapi_free_data()
499 CertFreeCertificateContext(priv->cert); in cryptoapi_free_data()
526 if (strncmp(name, "cert://", 7) == 0) { in cryptoapi_find_cert()
561 X509 *cert = NULL; in tls_cryptoapi_cert() local
567 (strncmp(name, "cert://", 7) != 0 && in tls_cryptoapi_cert()
581 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); in tls_cryptoapi_cert()
582 if (priv->cert == NULL) { in tls_cryptoapi_cert()
583 priv->cert = cryptoapi_find_cert( in tls_cryptoapi_cert()
586 if (priv->cert in tls_cryptoapi_cert()
664 X509 *cert; tls_cryptoapi_ca_cert() local
1721 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) tls_match_altsubject_component() argument
1746 tls_match_altsubject(X509 *cert, const char *match) tls_match_altsubject() argument
1870 match_dn_field(const X509 *cert, int nid, const char *field, const char *value, const struct tls_dn_field_order_cnt *dn_cnt) match_dn_field() argument
1943 get_value_from_field(const X509 *cert, char *field_str, struct tls_dn_field_order_cnt *dn_cnt) get_value_from_field() argument
2003 tls_match_dn_field(X509 *cert, const char *match) tls_match_dn_field() argument
2036 tls_match_suffix_helper(X509 *cert, const char *match, size_t match_len, int full) tls_match_suffix_helper() argument
2107 tls_match_suffix(X509 *cert, const char *match, int full) tls_match_suffix() argument
2164 get_x509_cert(X509 *cert) get_x509_cert() argument
2189 struct wpabuf *cert = NULL; openssl_tls_fail_event() local
2208 openssl_cert_tod(X509 *cert) openssl_cert_tod() argument
2243 struct wpabuf *cert = NULL; openssl_tls_cert_event() local
2340 debug_print_cert(X509 *cert, const char *title) debug_print_cert() argument
2440 struct wpabuf *cert; tls_verify_cb() local
2483 X509 *cert; tls_verify_cb() local
2726 X509 *cert = d2i_X509(NULL, tls_connection_ca_cert() local
3494 X509 *cert; tls_parse_pkcs12() local
3675 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) tls_engine_get_cert() argument
3682 X509 *cert; tls_engine_get_cert() member
3713 X509 *cert; tls_connection_engine_client_cert() local
3740 X509 *cert; tls_connection_engine_ca_cert() local
4976 X509 *cert; ocsp_resp_cb() local
5473 openssl_debug_dump_certificate(int i, X509 *cert) openssl_debug_dump_certificate() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_write.c27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
33 while (cert) { in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
269 struct x509_certificate *cert; in tls_write_client_certificate() local
295 cert in tls_write_client_certificate()
[all...]
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
H A Dtlsv1_client_read.c280 struct x509_certificate *cert) in tls_peer_cert_event()
294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event()
295 cert->cert_len); in tls_peer_cert_event()
296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event()
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
321 struct x509_certificate *cert, in tls_cert_chain_failure_event()
329 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event()
334 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event()
338 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_cert_chain_failure_event()
339 cert in tls_cert_chain_failure_event()
279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument
320 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument
352 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local
822 struct x509_certificate *cert; tls_process_certificate_status() local
[all...]
H A Dtlsv1_cred.c35 x509_certificate_chain_free(cred->cert); in tlsv1_cred_free()
48 struct x509_certificate *cert, *p; in tlsv1_add_cert_der() local
51 cert = x509_certificate_parse(buf, len); in tlsv1_add_cert_der()
52 if (cert == NULL) { in tlsv1_add_cert_der()
61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der()
66 p->next = cert; in tlsv1_add_cert_der()
69 cert->next = *chain; in tlsv1_add_cert_der()
70 *chain = cert; in tlsv1_add_cert_der()
73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
158 const char *cert, cons in tlsv1_set_cert_chain()
157 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert_chain() argument
194 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) tlsv1_set_ca_cert() argument
258 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert() argument
506 struct x509_certificate *cert; pkcs12_certbag() local
[all...]
/test/xts/acts/telephony/networkmanager/ndk/networkndk/entry/src/main/cpp/
H A Dnet_stack_ndk_test.cpp68 void GetCertData(NetStack_CertBlob &cert, char *certPath, NetStack_CertType certType) in GetCertData() argument
70 cert.type = certType; in GetCertData()
84 cert.size = length; in GetCertData()
87 cert.data = new uint8_t[length]; in GetCertData()
90 cert.data[i] = static_cast<uint8_t>(buffer[i]); in GetCertData()
92 OH_LOG_Print(LOG_APP, LOG_DEBUG, WEBSOCKET_LOG_DOMAIN, WEBSOCKET_LOG_TAG, "cert size is: %{public}d", cert.size); in GetCertData()
99 NetStack_CertBlob cert; in TestCaseCertVerification() local
103 GetCertData(cert, pemCertPath, NetStack_CertType::NETSTACK_CERT_TYPE_PEM); in TestCaseCertVerification()
105 ret = OH_NetStack_CertVerification(&cert, in TestCaseCertVerification()
[all...]
/base/security/code_signature/utils/src/
H A Dhuks_attest_verifier.cpp104 LOG_ERROR("add cert to X509 store failed"); in AddCAToStore()
113 static bool VerifyIssurCert(X509 *cert, STACK_OF(X509) *chain) in VerifyIssurCert() argument
132 if (!X509_STORE_CTX_init(storeCtx, store, cert, chain)) { in VerifyIssurCert()
142 LOG_ERROR("Verify cert failed, msg = %{public}s", X509_verify_cert_error_string(index)); in VerifyIssurCert()
163 LOG_ERROR("verify signing cert failed."); in VerifySigningCert()
215 static bool VerifyExtension(X509 *cert, const ByteBuffer &challenge) in VerifyExtension() argument
221 const STACK_OF(X509_EXTENSION) *exts = X509_get0_extensions(cert); in VerifyExtension()
254 LOG_INFO("Dump cert chain"); in ShowCertInfo()
255 for (auto cert: certChainBuffer) { in ShowCertInfo()
256 if (ConvertCertToPEMString(cert, pe in ShowCertInfo()
[all...]
/third_party/lwip/src/include/lwip/
H A Daltcp_tls.h74 const u8_t *cert, size_t cert_len);
83 const u8_t *cert, size_t cert_len);
88 struct altcp_tls_config *altcp_tls_create_config_client(const u8_t *cert, size_t cert_len);
95 const u8_t *cert, size_t cert_len);

Completed in 15 milliseconds

12345678910>>...49