| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_lib.c | 524 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 546 cch->d.certificate = cert; in CMS_add0_cert() 550 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 553 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 555 X509_up_ref(cert); in CMS_add1_cert() 679 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 682 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 685 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 697 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 716 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |
| /third_party/openssl/crypto/cms/ |
| H A D | cms_lib.c | 511 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 533 cch->d.certificate = cert; in CMS_add0_cert() 537 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 540 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 542 X509_up_ref(cert); in CMS_add1_cert() 666 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 669 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 672 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 684 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 703 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /third_party/node/test/parallel/ |
| H A D | test-tls-ocsp-callback.js | 40 const cert = fixtures.readKey('agent1-cert.pem'); 41 const ca = fixtures.readKey('ca1-cert.pem'); 46 cert, 56 delete options.cert; 75 server.on('OCSPRequest', common.mustCall((cert, issuer, callback) => { 76 assert.ok(Buffer.isBuffer(cert));
|
| H A D | test-tls-client-getephemeralkeyinfo.js | 12 const cert = fixtures.readKey('agent2-cert.pem'); 26 cert: cert, 42 } = new X509Certificate(cert));
|
| H A D | test-tls-enable-trace-cli.js | 49 checkServerIdentity: (servername, cert) => { }, 50 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 53 cert: keys.agent6.cert,
|
| H A D | test-tls-enable-keylog-cli.js | 41 checkServerIdentity: (servername, cert) => { }, 42 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 45 cert: keys.agent6.cert,
|
| H A D | test-tls-sni-server-client.js | 38 cert: loadPEM('agent2-cert') 44 cert: loadPEM('agent1-cert') 48 cert: loadPEM('agent3-cert') 52 // NOTE: Contains ca3 chain cert 53 cert: loadPEM('agent6-cert') 59 ca: [loadPEM('ca1-cert')], [all...] |
| H A D | test-tls-no-rsa-key.js | 33 cert: fixtures.readKey('ec-cert.pem') 51 const cert = c.getPeerCertificate(); 52 assert.strictEqual(cert.subject.C, 'US');
|
| H A D | test-tls-peer-certificate-multi-keys.js | 33 cert: fixtures.readKey('rsa_cert.crt') 41 const cert = socket.getCertificate(); 42 // The server's local cert is the client's peer cert. 44 cert.subject.OU,
|
| /third_party/node/test/fixtures/ |
| H A D | tls-connect.js | 35 function load(cert, root) { 36 root = root || cert; // Assume self-signed if no issuer. 38 key: fixtures.readKey(cert + '-key.pem', 'binary'), 39 cert: fixtures.readKey(cert + '-cert.pem', 'binary'), 40 ca: fixtures.readKey(root + '-cert.pem', 'binary'),
|
| /third_party/openssl/test/testutil/ |
| H A D | load.c | 20 X509 *cert = NULL; in load_cert_pem() local 26 && TEST_ptr(cert = X509_new_ex(libctx, NULL))) in load_cert_pem() 27 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL)); in load_cert_pem() 30 return cert; in load_cert_pem()
|
| /third_party/openssl/demos/pkcs12/ |
| H A D | pkread.c | 52 X509 *cert = NULL; in main() local 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 91 if (cert != NULL) { in main() 93 PEM_write_X509_AUX(fp, cert); in main() 106 X509_free(cert); in main()
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_rsa.c | 42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate() 50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local 74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file() 77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file() 84 if (cert == NULL) { in SSL_use_certificate_file() 146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey() 224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate() 258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert() 259 * key (when switching to a different cert & key, first this in ssl_set_cert() 282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_rsa.c | 42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate() 50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local 74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file() 77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file() 84 if (cert == NULL) { in SSL_use_certificate_file() 146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey() 224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate() 258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert() 259 * key (when switching to a different cert & key, first this in ssl_set_cert() 282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local [all...] |
| /third_party/node/test/sequential/ |
| H A D | test-tls-session-timeout.js | 55 const cert = fixtures.readKey('rsa_cert.crt'); 58 cert: cert, 59 ca: [cert],
|
| /third_party/node/test/addons/openssl-client-cert-engine/ |
| H A D | testengine.cc | 20 #define AGENT_CERT "test/fixtures/keys/agent1-cert.pem" 58 std::string cert = LoadFile(AGENT_CERT); in EngineLoadSSLClientCert() local 59 if (cert.empty()) { in EngineLoadSSLClientCert() 63 BIO* bio = BIO_new_mem_buf(cert.data(), cert.size()); in EngineLoadSSLClientCert()
|
| /test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/ |
| H A D | publicCertificateCallback.js | 18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert.createX509Cert(encodingBlob, (err, data) => {
81 certformat = cert.EncodingFormat.FORMAT_PEM;
84 certformat = cert.EncodingFormat.FORMAT_PEM;
96 cert.createX509Cert(encodingBlob, (err, data) => {
175 if (String(err).indexOf("check cert validity failed") != -1) {
344 certformat = cert [all...] |
| H A D | publicCertificatePromise.js | 18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert
82 certformat = cert.EncodingFormat.FORMAT_PEM;
85 certformat = cert.EncodingFormat.FORMAT_PEM;
97 cert
163 if (String(err).indexOf("check cert validity failed") != -1) {
326 certformat = cert [all...] |
| /third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
| H A D | ssl_lib.c | 191 CERT *cert; in SSL_CTX_new() local 208 cert = ssl_cert_new(rngctx); in SSL_CTX_new() 209 if (!cert) { in SSL_CTX_new() 222 ctx->cert = cert; in SSL_CTX_new() 235 lwsl_err("%s: unable to load cert bundle 0x%x\n", __func__, -n); in SSL_CTX_new() 237 lwsl_info("%s: loaded cert bundle %d\n", __func__, n); in SSL_CTX_new() 244 ssl_cert_free(cert); in SSL_CTX_new() 258 ssl_cert_free(ctx->cert); in SSL_CTX_free() 320 ssl->cert in SSL_new() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
| /third_party/openssl/test/ |
| H A D | cmp_msg_test.c | 67 static X509 *cert = NULL; variable 173 /* newkey used by default for signing does not match cert: */ in test_cmp_create_ir_protection_fails() 174 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_cmp_create_ir_protection_fails() 262 || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_kur() 290 X509_dup(cert)))) { in test_cmp_create_certconf() 304 X509_dup(cert)))) { in test_cmp_create_certconf_badAlg() 318 X509_dup(cert)))) { in test_cmp_create_certconf_fail_info_max() 355 if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_rr() 398 X509_dup(cert)) == NULL in execute_certrep_create() 408 if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromres in execute_certrep_create() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | notify.c | 1106 struct tls_cert_data *cert, in wpas_notify_certification() 1113 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 1115 cert->tod == 2 ? " tod=2" : "", in wpas_notify_certification() 1116 cert->tod == 1 ? " tod=1" : ""); in wpas_notify_certification() 1118 if (cert->cert) { in wpas_notify_certification() 1120 size_t len = wpabuf_len(cert->cert) * 2 + 1; in wpas_notify_certification() 1123 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert in wpas_notify_certification() 1105 wpas_notify_certification(struct wpa_supplicant *wpa_s, struct tls_cert_data *cert, const char *cert_hash) wpas_notify_certification() argument [all...] |