| /base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
| H A D | x509_cert_chain_openssl.c | 112 static CfResult X509ToHcfX509Certificate(X509 *cert, HcfX509Certificate **returnObj) in X509ToHcfX509Certificate() argument 114 if (cert == NULL) { in X509ToHcfX509Certificate() 120 uint8_t *certData = GetX509EncodedDataStream(cert, &dataLength); in X509ToHcfX509Certificate() 161 /* the list count has checked when create cert chain */ in GetCertlist() 170 X509 *cert = sk_X509_value(x509CertChain, i); in GetCertlist() local 171 if (cert == NULL) { in GetCertlist() 178 res = X509ToHcfX509Certificate(cert, &x509Cert); in GetCertlist() 210 X509 *cert = sk_X509_value(certChain, j); in STACK_OF() local 211 if (cert == NULL) { in STACK_OF() 218 int32_t res = X509_CRL_get0_by_cert(crl, &rev, cert); in STACK_OF() 257 X509 *cert = sk_X509_value(x509CertChain, 0); // leaf cert VerifyCertChain() local 376 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)trustAnchors->CACert); GetTrustAnchor() local 482 FillValidateResult(HcfX509TrustAnchor *inputAnchor, X509 *cert, HcfX509CertChainValidateResult *result) FillValidateResult() argument 653 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local 824 VerifyOcspSigner(OCSP_BASICRESP *bs, STACK_OF(X509) *certChain, X509 *cert) VerifyOcspSigner() argument 1359 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local 1407 X509 *cert = sk_X509_value(x509CertChain, 0); STACK_OF() local 1546 X509 *cert = NULL; CreateX509CertChainPEM() local 1597 X509 *cert = NULL; CreateX509CertChainDER() local 1764 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)inCerts->data[i]); GetCertsStack() local 2017 X509 *cert = NULL; STACK_OF() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_client_read.c | 280 struct x509_certificate *cert) in tls_peer_cert_event() 294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event() 295 cert->cert_len); in tls_peer_cert_event() 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 315 if (cert->extensions_present & X509_EXT_CERTIFICATE_POLICY) { in tls_peer_cert_event() 316 if (cert->certificate_policy & X509_EXT_CERT_POLICY_TOD_STRICT) in tls_peer_cert_event() 318 else if (cert->certificate_policy & in tls_peer_cert_event() 329 struct x509_certificate *cert, in tls_cert_chain_failure_event() 337 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event() 279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument 328 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument 360 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local 830 struct x509_certificate *cert; tls_process_certificate_status() local [all...] |
| H A D | tlsv1_client_write.c | 27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 33 while (cert) { in tls_client_cert_chain_der_len() 34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len() 35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 38 &cert->issuer); in tls_client_cert_chain_der_len() 257 struct x509_certificate *cert; in tls_write_client_certificate() local 283 cert in tls_write_client_certificate() [all...] |
| H A D | tlsv1_server_write.c | 27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local 29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len() 30 while (cert) { in tls_server_cert_chain_der_len() 31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len() 32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len() 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len() 35 &cert->issuer); in tls_server_cert_chain_der_len() 194 struct x509_certificate *cert; in tls_write_server_certificate() local 228 cert in tls_write_server_certificate() [all...] |
| /device/soc/rockchip/common/sdk_linux/scripts/ |
| H A D | Makefile | 16 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 17 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 18 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 24 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 25 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| /third_party/curl/docs/examples/ |
| H A D | sessioninfo.c | 61 gnutls_x509_crt_t cert; in wrfu() local 64 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { in wrfu() 66 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { in wrfu() 68 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { in wrfu() 75 gnutls_x509_crt_deinit(cert); in wrfu()
|
| H A D | usercertinmem.c | 48 X509 *cert = NULL; in sslctx_function() local 131 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); in sslctx_function() 132 if(!cert) { in sslctx_function() 137 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); in sslctx_function() 170 if(cert) in sslctx_function() 171 X509_free(cert); in sslctx_function()
|
| /third_party/node/test/parallel/ |
| H A D | test-tls-cert-regression.js | 30 const cert = 69 function test(cert, key, cb) { 71 cert, 78 test(cert, key, common.mustCall(function() { 79 test(Buffer.from(cert), Buffer.from(key), common.mustCall());
|
| H A D | test-https-selfsigned-no-keycertsign-no-crash.js | 33 const cert = 34 fixtures.readKey(path.join('selfsigned-no-keycertsign', 'cert.pem')); 38 cert: cert 54 ca: cert
|
| H A D | test-tls-getcertificate-x509.js | 13 cert: fixtures.readKey('agent6-cert.pem') 21 const cert = socket.getX509Certificate(); 22 assert(cert instanceof X509Certificate); 24 cert.serialNumber,
|
| H A D | test-tls-multi-key.js | 34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec. 40 cert: [ 41 fixtures.readKey('agent1-cert.pem'), 42 fixtures.readKey('ec10-cert.pem'), 46 fixtures.readKey('ca5-cert.pem'), 47 fixtures.readKey('ca1-cert.pem'), 51 // Key and cert are ordered as ec, rsa. 57 cert: [ 58 fixtures.readKey('agent1-cert.pem'), 59 fixtures.readKey('ec10-cert [all...] |
| H A D | test-tls-enable-trace.js | 45 checkServerIdentity: (servername, cert) => { }, 46 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 49 cert: keys.agent6.cert,
|
| H A D | test-tls-secure-context-usage-order.js | 20 cert: loadPEM('agent2-cert'), 27 cert: loadPEM('agent1-cert'), 28 ca: [ loadPEM('ca2-cert') ] 33 cert: loadPEM('agent1-cert'), 34 ca: [ loadPEM('ca1-cert') ] 60 cert: loadPEM('agent1-cert'), [all...] |
| /base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/src/ |
| H A D | hks_client_service_dcm.cpp | 35 ENABLE_CFI(int32_t DcmGenerateCertChain(struct HksBlob *cert, const uint8_t *remoteObject)) in DcmGenerateCertChain() argument 37 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cert), HKS_ERROR_INVALID_ARGUMENT, "invalid in cert"); in DcmGenerateCertChain() 43 .blob = { .size = cert->size, .data = cert->data }, in DcmGenerateCertChain()
|
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
| H A D | certificate.js | 58 paths = paths.filter((path) => path.some((cert) => this.trustedCerts.includes(cert))); 154 const validCAs = path.slice(1).every((cert) => cert.isCA); 174 const cert = path[i]; 176 if (cert.extBasicConstraints?.isCA) { 177 const pathLength = cert.extBasicConstraints.pathLenConstraint;
|
| /third_party/node/deps/openssl/openssl/crypto/store/ |
| H A D | store_result.c | 463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert() 464 * to reading it as a normal cert (just X509), but if in try_cert() 466 * trusted cert, then no fallback should be engaged. in try_cert() 471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local 473 if (cert == NULL) in try_cert() 481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert() 484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert() 486 X509_free(cert); in try_cert() 487 cert = NULL; in try_cert() 490 if (cert ! in try_cert() 549 X509 *cert = NULL; try_pkcs12() local [all...] |
| /third_party/openssl/crypto/store/ |
| H A D | store_result.c | 463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert() 464 * to reading it as a normal cert (just X509), but if in try_cert() 466 * trusted cert, then no fallback should be engaged. in try_cert() 471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local 473 if (cert == NULL) in try_cert() 481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert() 484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert() 486 X509_free(cert); in try_cert() 487 cert = NULL; in try_cert() 490 if (cert ! in try_cert() 549 X509 *cert = NULL; try_pkcs12() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | tls_openssl.c | 375 const CERT_CONTEXT *cert; member 498 if (priv->cert) in cryptoapi_free_data() 499 CertFreeCertificateContext(priv->cert); in cryptoapi_free_data() 526 if (strncmp(name, "cert://", 7) == 0) { in cryptoapi_find_cert() 561 X509 *cert = NULL; in tls_cryptoapi_cert() local 567 (strncmp(name, "cert://", 7) != 0 && in tls_cryptoapi_cert() 581 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); in tls_cryptoapi_cert() 582 if (priv->cert == NULL) { in tls_cryptoapi_cert() 583 priv->cert = cryptoapi_find_cert( in tls_cryptoapi_cert() 586 if (priv->cert in tls_cryptoapi_cert() 664 X509 *cert; tls_cryptoapi_ca_cert() local 1721 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) tls_match_altsubject_component() argument 1746 tls_match_altsubject(X509 *cert, const char *match) tls_match_altsubject() argument 1870 match_dn_field(const X509 *cert, int nid, const char *field, const char *value, const struct tls_dn_field_order_cnt *dn_cnt) match_dn_field() argument 1943 get_value_from_field(const X509 *cert, char *field_str, struct tls_dn_field_order_cnt *dn_cnt) get_value_from_field() argument 2003 tls_match_dn_field(X509 *cert, const char *match) tls_match_dn_field() argument 2036 tls_match_suffix_helper(X509 *cert, const char *match, size_t match_len, int full) tls_match_suffix_helper() argument 2107 tls_match_suffix(X509 *cert, const char *match, int full) tls_match_suffix() argument 2164 get_x509_cert(X509 *cert) get_x509_cert() argument 2189 struct wpabuf *cert = NULL; openssl_tls_fail_event() local 2208 openssl_cert_tod(X509 *cert) openssl_cert_tod() argument 2243 struct wpabuf *cert = NULL; openssl_tls_cert_event() local 2340 debug_print_cert(X509 *cert, const char *title) debug_print_cert() argument 2440 struct wpabuf *cert; tls_verify_cb() local 2483 X509 *cert; tls_verify_cb() local 2726 X509 *cert = d2i_X509(NULL, tls_connection_ca_cert() local 3494 X509 *cert; tls_parse_pkcs12() local 3675 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) tls_engine_get_cert() argument 3682 X509 *cert; tls_engine_get_cert() member 3713 X509 *cert; tls_connection_engine_client_cert() local 3740 X509 *cert; tls_connection_engine_ca_cert() local 4976 X509 *cert; ocsp_resp_cb() local 5473 openssl_debug_dump_certificate(int i, X509 *cert) openssl_debug_dump_certificate() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_client_write.c | 27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 33 while (cert) { in tls_client_cert_chain_der_len() 34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len() 35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 38 &cert->issuer); in tls_client_cert_chain_der_len() 269 struct x509_certificate *cert; in tls_write_client_certificate() local 295 cert in tls_write_client_certificate() [all...] |
| H A D | tlsv1_server_write.c | 27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local 29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len() 30 while (cert) { in tls_server_cert_chain_der_len() 31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len() 32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len() 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len() 35 &cert->issuer); in tls_server_cert_chain_der_len() 194 struct x509_certificate *cert; in tls_write_server_certificate() local 228 cert in tls_write_server_certificate() [all...] |
| H A D | tlsv1_client_read.c | 280 struct x509_certificate *cert) in tls_peer_cert_event() 294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event() 295 cert->cert_len); in tls_peer_cert_event() 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 321 struct x509_certificate *cert, in tls_cert_chain_failure_event() 329 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event() 334 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event() 338 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_cert_chain_failure_event() 339 cert in tls_cert_chain_failure_event() 279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument 320 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument 352 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local 822 struct x509_certificate *cert; tls_process_certificate_status() local [all...] |
| H A D | tlsv1_cred.c | 35 x509_certificate_chain_free(cred->cert); in tlsv1_cred_free() 48 struct x509_certificate *cert, *p; in tlsv1_add_cert_der() local 51 cert = x509_certificate_parse(buf, len); in tlsv1_add_cert_der() 52 if (cert == NULL) { in tlsv1_add_cert_der() 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der() 66 p->next = cert; in tlsv1_add_cert_der() 69 cert->next = *chain; in tlsv1_add_cert_der() 70 *chain = cert; in tlsv1_add_cert_der() 73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der() 158 const char *cert, cons in tlsv1_set_cert_chain() 157 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert_chain() argument 194 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) tlsv1_set_ca_cert() argument 258 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert() argument 506 struct x509_certificate *cert; pkcs12_certbag() local [all...] |
| /test/xts/acts/telephony/networkmanager/ndk/networkndk/entry/src/main/cpp/ |
| H A D | net_stack_ndk_test.cpp | 68 void GetCertData(NetStack_CertBlob &cert, char *certPath, NetStack_CertType certType)
in GetCertData() argument 70 cert.type = certType;
in GetCertData() 84 cert.size = length;
in GetCertData() 87 cert.data = new uint8_t[length];
in GetCertData() 90 cert.data[i] = static_cast<uint8_t>(buffer[i]);
in GetCertData() 92 OH_LOG_Print(LOG_APP, LOG_DEBUG, WEBSOCKET_LOG_DOMAIN, WEBSOCKET_LOG_TAG, "cert size is: %{public}d", cert.size);
in GetCertData() 99 NetStack_CertBlob cert;
in TestCaseCertVerification() local 103 GetCertData(cert, pemCertPath, NetStack_CertType::NETSTACK_CERT_TYPE_PEM);
in TestCaseCertVerification() 105 ret = OH_NetStack_CertVerification(&cert, in TestCaseCertVerification() [all...] |
| /base/security/code_signature/utils/src/ |
| H A D | huks_attest_verifier.cpp | 104 LOG_ERROR("add cert to X509 store failed"); in AddCAToStore() 113 static bool VerifyIssurCert(X509 *cert, STACK_OF(X509) *chain) in VerifyIssurCert() argument 132 if (!X509_STORE_CTX_init(storeCtx, store, cert, chain)) { in VerifyIssurCert() 142 LOG_ERROR("Verify cert failed, msg = %{public}s", X509_verify_cert_error_string(index)); in VerifyIssurCert() 163 LOG_ERROR("verify signing cert failed."); in VerifySigningCert() 215 static bool VerifyExtension(X509 *cert, const ByteBuffer &challenge) in VerifyExtension() argument 221 const STACK_OF(X509_EXTENSION) *exts = X509_get0_extensions(cert); in VerifyExtension() 254 LOG_INFO("Dump cert chain"); in ShowCertInfo() 255 for (auto cert: certChainBuffer) { in ShowCertInfo() 256 if (ConvertCertToPEMString(cert, pe in ShowCertInfo() [all...] |
| /third_party/lwip/src/include/lwip/ |
| H A D | altcp_tls.h | 74 const u8_t *cert, size_t cert_len); 83 const u8_t *cert, size_t cert_len); 88 struct altcp_tls_config *altcp_tls_create_config_client(const u8_t *cert, size_t cert_len); 95 const u8_t *cert, size_t cert_len);
|