Home
last modified time | relevance | path

Searched refs:cert (Results 101 - 125 of 1055) sorted by relevance

12345678910>>...43

/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_lib.c524 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument
536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
546 cch->d.certificate = cert; in CMS_add0_cert()
550 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument
553 r = CMS_add0_cert(cms, cert); in CMS_add1_cert()
555 X509_up_ref(cert); in CMS_add1_cert()
679 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument
682 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp()
685 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp()
688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument
697 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument
716 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_lib.c511 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument
523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
533 cch->d.certificate = cert; in CMS_add0_cert()
537 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument
540 r = CMS_add0_cert(cms, cert); in CMS_add1_cert()
542 X509_up_ref(cert); in CMS_add1_cert()
666 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument
669 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp()
672 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp()
675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument
684 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument
703 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_all.c455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument
458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest()
459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest()
462 *len = sizeof(cert->sha1_hash); in X509_digest()
463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest()
466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest()
467 data, len, cert->libctx, cert->propq); in X509_digest()
470 /* calculate cert diges
471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument
[all...]
/third_party/openssl/crypto/x509/
H A Dx_all.c455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument
458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest()
459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest()
462 *len = sizeof(cert->sha1_hash); in X509_digest()
463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest()
466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest()
467 data, len, cert->libctx, cert->propq); in X509_digest()
470 /* calculate cert diges
471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-ocsp-callback.js40 const cert = fixtures.readKey('agent1-cert.pem');
41 const ca = fixtures.readKey('ca1-cert.pem');
46 cert,
56 delete options.cert;
75 server.on('OCSPRequest', common.mustCall((cert, issuer, callback) => {
76 assert.ok(Buffer.isBuffer(cert));
H A Dtest-tls-client-getephemeralkeyinfo.js12 const cert = fixtures.readKey('agent2-cert.pem');
26 cert: cert,
42 } = new X509Certificate(cert));
H A Dtest-tls-enable-trace-cli.js49 checkServerIdentity: (servername, cert) => { },
50 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
53 cert: keys.agent6.cert,
H A Dtest-tls-enable-keylog-cli.js41 checkServerIdentity: (servername, cert) => { },
42 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
45 cert: keys.agent6.cert,
H A Dtest-tls-sni-server-client.js38 cert: loadPEM('agent2-cert')
44 cert: loadPEM('agent1-cert')
48 cert: loadPEM('agent3-cert')
52 // NOTE: Contains ca3 chain cert
53 cert: loadPEM('agent6-cert')
59 ca: [loadPEM('ca1-cert')],
[all...]
H A Dtest-tls-no-rsa-key.js33 cert: fixtures.readKey('ec-cert.pem')
51 const cert = c.getPeerCertificate();
52 assert.strictEqual(cert.subject.C, 'US');
H A Dtest-tls-peer-certificate-multi-keys.js33 cert: fixtures.readKey('rsa_cert.crt')
41 const cert = socket.getCertificate();
42 // The server's local cert is the client's peer cert.
44 cert.subject.OU,
/third_party/node/test/fixtures/
H A Dtls-connect.js35 function load(cert, root) {
36 root = root || cert; // Assume self-signed if no issuer.
38 key: fixtures.readKey(cert + '-key.pem', 'binary'),
39 cert: fixtures.readKey(cert + '-cert.pem', 'binary'),
40 ca: fixtures.readKey(root + '-cert.pem', 'binary'),
/third_party/openssl/test/testutil/
H A Dload.c20 X509 *cert = NULL; in load_cert_pem() local
26 && TEST_ptr(cert = X509_new_ex(libctx, NULL))) in load_cert_pem()
27 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL)); in load_cert_pem()
30 return cert; in load_cert_pem()
/third_party/openssl/demos/pkcs12/
H A Dpkread.c52 X509 *cert = NULL; in main() local
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main()
91 if (cert != NULL) { in main()
93 PEM_write_X509_AUX(fp, cert); in main()
106 X509_free(cert); in main()
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_rsa.c42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate()
50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local
74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file()
77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file()
84 if (cert == NULL) { in SSL_use_certificate_file()
146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey()
224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate()
258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert()
259 * key (when switching to a different cert & key, first this in ssl_set_cert()
282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local
[all...]
/third_party/openssl/ssl/
H A Dssl_rsa.c42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate()
50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local
74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file()
77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file()
84 if (cert == NULL) { in SSL_use_certificate_file()
146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey()
224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate()
258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert()
259 * key (when switching to a different cert & key, first this in ssl_set_cert()
282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local
[all...]
/third_party/node/test/sequential/
H A Dtest-tls-session-timeout.js55 const cert = fixtures.readKey('rsa_cert.crt');
58 cert: cert,
59 ca: [cert],
/third_party/node/test/addons/openssl-client-cert-engine/
H A Dtestengine.cc20 #define AGENT_CERT "test/fixtures/keys/agent1-cert.pem"
58 std::string cert = LoadFile(AGENT_CERT); in EngineLoadSSLClientCert() local
59 if (cert.empty()) { in EngineLoadSSLClientCert()
63 BIO* bio = BIO_new_mem_buf(cert.data(), cert.size()); in EngineLoadSSLClientCert()
/test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/
H A DpublicCertificateCallback.js18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert.createX509Cert(encodingBlob, (err, data) => {
81 certformat = cert.EncodingFormat.FORMAT_PEM;
84 certformat = cert.EncodingFormat.FORMAT_PEM;
96 cert.createX509Cert(encodingBlob, (err, data) => {
175 if (String(err).indexOf("check cert validity failed") != -1) {
344 certformat = cert
[all...]
H A DpublicCertificatePromise.js18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert
82 certformat = cert.EncodingFormat.FORMAT_PEM;
85 certformat = cert.EncodingFormat.FORMAT_PEM;
97 cert
163 if (String(err).indexOf("check cert validity failed") != -1) {
326 certformat = cert
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
H A Dssl_lib.c191 CERT *cert; in SSL_CTX_new() local
208 cert = ssl_cert_new(rngctx); in SSL_CTX_new()
209 if (!cert) { in SSL_CTX_new()
222 ctx->cert = cert; in SSL_CTX_new()
235 lwsl_err("%s: unable to load cert bundle 0x%x\n", __func__, -n); in SSL_CTX_new()
237 lwsl_info("%s: loaded cert bundle %d\n", __func__, n); in SSL_CTX_new()
244 ssl_cert_free(cert); in SSL_CTX_new()
258 ssl_cert_free(ctx->cert); in SSL_CTX_free()
320 ssl->cert in SSL_new()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member
35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member
35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
/third_party/openssl/test/
H A Dcmp_msg_test.c67 static X509 *cert = NULL; variable
173 /* newkey used by default for signing does not match cert: */ in test_cmp_create_ir_protection_fails()
174 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_cmp_create_ir_protection_fails()
262 || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_kur()
290 X509_dup(cert)))) { in test_cmp_create_certconf()
304 X509_dup(cert)))) { in test_cmp_create_certconf_badAlg()
318 X509_dup(cert)))) { in test_cmp_create_certconf_fail_info_max()
355 if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_rr()
398 X509_dup(cert)) == NULL in execute_certrep_create()
408 if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromres in execute_certrep_create()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dnotify.c1106 struct tls_cert_data *cert, in wpas_notify_certification()
1113 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification()
1115 cert->tod == 2 ? " tod=2" : "", in wpas_notify_certification()
1116 cert->tod == 1 ? " tod=1" : ""); in wpas_notify_certification()
1118 if (cert->cert) { in wpas_notify_certification()
1120 size_t len = wpabuf_len(cert->cert) * 2 + 1; in wpas_notify_certification()
1123 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert in wpas_notify_certification()
1105 wpas_notify_certification(struct wpa_supplicant *wpa_s, struct tls_cert_data *cert, const char *cert_hash) wpas_notify_certification() argument
[all...]

Completed in 13 milliseconds

12345678910>>...43