| /base/security/dlp_permission_service/frameworks/test/mock/ |
| H A D | dlp_permission_kit.cpp | 32 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument 40 cert = std::vector<uint8_t>(certStr.begin(), certStr.end()); in GenerateDlpCertificate() 47 std::string encJsonStr(certParcel->cert.begin(), certParcel->cert.end()); in ParseDlpCertificate() 53 certParcel->offlineCert = certParcel->cert; in ParseDlpCertificate()
|
| /base/update/updater/services/include/package/ |
| H A D | cert_verify.h | 33 virtual int32_t CertChainCheck(STACK_OF(X509) *certStack, X509 *cert) = 0; member in Hpackage::CertHelper 44 int32_t CheckCertChain(STACK_OF(X509) *certStack, X509 *cert); member in Hpackage::CertVerify 58 int32_t CertChainCheck(STACK_OF(X509) *certStack, X509 *cert) override; 62 int32_t VerifySingleCert(X509 *cert); 63 int32_t CompareCertSubjectAndIssuer(X509 *cert);
|
| /third_party/openssl/test/helpers/ |
| H A D | cmp_testlib.c | 59 * Up refs and push a cert onto sk. 63 int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert) in STACK_OF() 67 if (sk == NULL || cert == NULL) in STACK_OF() 69 if (!X509_up_ref(cert)) in STACK_OF() 71 res = sk_X509_push(sk, cert); in STACK_OF() 73 X509_free(cert); /* down-ref */ in STACK_OF()
|
| /third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
| H A D | tls_test_common.c | 53 fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", in setup_ca_cert() 390 gnutls_datum_t * cert, in setup_session() 405 cert->size = strlen (srv_self_signed_cert_pem) + 1; in setup_session() 406 cert->data = malloc (cert->size); in setup_session() 407 if (NULL == cert->data) in setup_session() 413 memcpy (cert->data, srv_self_signed_cert_pem, cert->size); in setup_session() 414 gnutls_certificate_set_x509_key_mem (*xcred, cert, key, in setup_session() 435 gnutls_datum_t * cert, in teardown_session() 388 setup_session(gnutls_session_t * session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t * xcred) setup_session() argument 433 teardown_session(gnutls_session_t session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t xcred) teardown_session() argument [all...] |
| /third_party/mbedtls/tests/src/test_helpers/ |
| H A D | ssl_helpers.c | 566 mbedtls_test_ssl_endpoint_certificate *cert = &(ep->cert); in test_ssl_endpoint_certificate_free() local 567 if (cert != NULL) { in test_ssl_endpoint_certificate_free() 568 if (cert->ca_cert != NULL) { in test_ssl_endpoint_certificate_free() 569 mbedtls_x509_crt_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 570 mbedtls_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 571 cert->ca_cert = NULL; in test_ssl_endpoint_certificate_free() 573 if (cert->cert != NULL) { in test_ssl_endpoint_certificate_free() 574 mbedtls_x509_crt_free(cert in test_ssl_endpoint_certificate_free() 598 mbedtls_test_ssl_endpoint_certificate *cert = NULL; mbedtls_test_ssl_endpoint_certificate_init() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | tls_gnutls.c | 480 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", in tls_connection_set_params() 488 "Failed to read CA cert '%s' in PEM format: %s", in tls_connection_set_params() 494 "GnuTLS: Successfully read CA cert '%s' in PEM format", in tls_connection_set_params() 498 "GnuTLS: Successfully read CA cert '%s' in DER format", in tls_connection_set_params() 511 "Failed to parse CA cert in DER format: %s", in tls_connection_set_params() 517 "Failed to parse CA cert in PEM format: %s", in tls_connection_set_params() 548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format", in tls_connection_set_params() 562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format", in tls_connection_set_params() 576 "cert/key in PEM format: %s", in tls_connection_set_params() 581 "GnuTLS: Successfully read client cert/ke in tls_connection_set_params() 610 gnutls_datum_t cert, key; tls_connection_set_params() local 928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument 955 server_eku_purpose(gnutls_x509_crt_t cert) server_eku_purpose() argument 1089 tls_match_suffix_helper(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix_helper() argument 1109 tls_match_suffix(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix() argument 1141 gnutls_x509_crt_t cert; tls_connection_verify_peer() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | tls_gnutls.c | 480 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", in tls_connection_set_params() 488 "Failed to read CA cert '%s' in PEM format: %s", in tls_connection_set_params() 494 "GnuTLS: Successfully read CA cert '%s' in PEM format", in tls_connection_set_params() 498 "GnuTLS: Successfully read CA cert '%s' in DER format", in tls_connection_set_params() 511 "Failed to parse CA cert in DER format: %s", in tls_connection_set_params() 517 "Failed to parse CA cert in PEM format: %s", in tls_connection_set_params() 548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format", in tls_connection_set_params() 562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format", in tls_connection_set_params() 576 "cert/key in PEM format: %s", in tls_connection_set_params() 581 "GnuTLS: Successfully read client cert/ke in tls_connection_set_params() 610 gnutls_datum_t cert, key; tls_connection_set_params() local 928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument 955 server_eku_purpose(gnutls_x509_crt_t cert) server_eku_purpose() argument 1089 tls_match_suffix_helper(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix_helper() argument 1109 tls_match_suffix(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix() argument 1141 gnutls_x509_crt_t cert; tls_connection_verify_peer() local [all...] |
| H A D | tls_openssl.c | 375 const CERT_CONTEXT *cert; member 498 if (priv->cert) in cryptoapi_free_data() 499 CertFreeCertificateContext(priv->cert); in cryptoapi_free_data() 526 if (strncmp(name, "cert://", 7) == 0) { in cryptoapi_find_cert() 561 X509 *cert = NULL; in tls_cryptoapi_cert() local 567 (strncmp(name, "cert://", 7) != 0 && in tls_cryptoapi_cert() 581 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); in tls_cryptoapi_cert() 582 if (priv->cert == NULL) { in tls_cryptoapi_cert() 583 priv->cert = cryptoapi_find_cert( in tls_cryptoapi_cert() 586 if (priv->cert in tls_cryptoapi_cert() 664 X509 *cert; tls_cryptoapi_ca_cert() local 1721 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) tls_match_altsubject_component() argument 1746 tls_match_altsubject(X509 *cert, const char *match) tls_match_altsubject() argument 1870 match_dn_field(const X509 *cert, int nid, const char *field, const char *value, const struct tls_dn_field_order_cnt *dn_cnt) match_dn_field() argument 1943 get_value_from_field(const X509 *cert, char *field_str, struct tls_dn_field_order_cnt *dn_cnt) get_value_from_field() argument 2003 tls_match_dn_field(X509 *cert, const char *match) tls_match_dn_field() argument 2036 tls_match_suffix_helper(X509 *cert, const char *match, size_t match_len, int full) tls_match_suffix_helper() argument 2107 tls_match_suffix(X509 *cert, const char *match, int full) tls_match_suffix() argument 2164 get_x509_cert(X509 *cert) get_x509_cert() argument 2189 struct wpabuf *cert = NULL; openssl_tls_fail_event() local 2208 openssl_cert_tod(X509 *cert) openssl_cert_tod() argument 2243 struct wpabuf *cert = NULL; openssl_tls_cert_event() local 2340 debug_print_cert(X509 *cert, const char *title) debug_print_cert() argument 2440 struct wpabuf *cert; tls_verify_cb() local 2483 X509 *cert; tls_verify_cb() local 2726 X509 *cert = d2i_X509(NULL, tls_connection_ca_cert() local 3494 X509 *cert; tls_parse_pkcs12() local 3675 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) tls_engine_get_cert() argument 3682 X509 *cert; tls_engine_get_cert() member 3713 X509 *cert; tls_connection_engine_client_cert() local 3740 X509 *cert; tls_connection_engine_ca_cert() local 4976 X509 *cert; ocsp_resp_cb() local 5473 openssl_debug_dump_certificate(int i, X509 *cert) openssl_debug_dump_certificate() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
| H A D | http_curl.c | 56 int (*cert_cb)(void *ctx, struct http_cert *cert); 179 static void debug_dump_cert(const char *title, X509 *cert) in debug_dump_cert() argument 189 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); in debug_dump_cert() 204 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_othername() argument 212 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername() 216 cert->othername = on; in add_alt_name_othername() 217 on = &on[cert->num_othername]; in add_alt_name_othername() 232 cert->num_othername++; in add_alt_name_othername() 236 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_dns() argument 257 add_alt_name(struct http_ctx *ctx, struct http_cert *cert, const GENERAL_NAME *name) add_alt_name() argument 271 add_alt_names(struct http_ctx *ctx, struct http_cert *cert, GENERAL_NAMES *names) add_alt_names() argument 799 add_logotype_ext(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert) add_logotype_ext() argument 870 parse_cert(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert, GENERAL_NAMES **names) parse_cert() argument 906 validate_server_cert(struct http_ctx *ctx, X509 *cert) validate_server_cert() argument 935 X509 *cert; http_parse_x509_certificate() local 996 X509 *cert; curl_cb_ssl_verify() local 1168 X509 *cert; ocsp_resp_cb() local 1746 http_set_cert_cb(struct http_ctx *ctx, int (*cb)(void *ctx, struct http_cert *cert), void *cb_ctx) http_set_cert_cb() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
| H A D | http_curl.c | 56 int (*cert_cb)(void *ctx, struct http_cert *cert); 179 static void debug_dump_cert(const char *title, X509 *cert) in debug_dump_cert() argument 189 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); in debug_dump_cert() 204 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_othername() argument 212 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername() 216 cert->othername = on; in add_alt_name_othername() 217 on = &on[cert->num_othername]; in add_alt_name_othername() 232 cert->num_othername++; in add_alt_name_othername() 236 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_dns() argument 257 add_alt_name(struct http_ctx *ctx, struct http_cert *cert, const GENERAL_NAME *name) add_alt_name() argument 271 add_alt_names(struct http_ctx *ctx, struct http_cert *cert, GENERAL_NAMES *names) add_alt_names() argument 799 add_logotype_ext(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert) add_logotype_ext() argument 870 parse_cert(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert, GENERAL_NAMES **names) parse_cert() argument 906 validate_server_cert(struct http_ctx *ctx, X509 *cert) validate_server_cert() argument 935 X509 *cert; http_parse_x509_certificate() local 996 X509 *cert; curl_cb_ssl_verify() local 1168 X509 *cert; ocsp_resp_cb() local 1746 http_set_cert_cb(struct http_ctx *ctx, int (*cb)(void *ctx, struct http_cert *cert), void *cb_ctx) http_set_cert_cb() argument [all...] |
| /base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
| H A D | x509_cert_chain_openssl.c | 112 static CfResult X509ToHcfX509Certificate(X509 *cert, HcfX509Certificate **returnObj) in X509ToHcfX509Certificate() argument 114 if (cert == NULL) { in X509ToHcfX509Certificate() 120 uint8_t *certData = GetX509EncodedDataStream(cert, &dataLength); in X509ToHcfX509Certificate() 161 /* the list count has checked when create cert chain */ in GetCertlist() 170 X509 *cert = sk_X509_value(x509CertChain, i); in GetCertlist() local 171 if (cert == NULL) { in GetCertlist() 178 res = X509ToHcfX509Certificate(cert, &x509Cert); in GetCertlist() 210 X509 *cert = sk_X509_value(certChain, j); in STACK_OF() local 211 if (cert == NULL) { in STACK_OF() 218 int32_t res = X509_CRL_get0_by_cert(crl, &rev, cert); in STACK_OF() 257 X509 *cert = sk_X509_value(x509CertChain, 0); // leaf cert VerifyCertChain() local 376 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)trustAnchors->CACert); GetTrustAnchor() local 482 FillValidateResult(HcfX509TrustAnchor *inputAnchor, X509 *cert, HcfX509CertChainValidateResult *result) FillValidateResult() argument 653 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local 824 VerifyOcspSigner(OCSP_BASICRESP *bs, STACK_OF(X509) *certChain, X509 *cert) VerifyOcspSigner() argument 1359 X509 *cert = sk_X509_value(x509CertChain, i); STACK_OF() local 1407 X509 *cert = sk_X509_value(x509CertChain, 0); STACK_OF() local 1546 X509 *cert = NULL; CreateX509CertChainPEM() local 1597 X509 *cert = NULL; CreateX509CertChainDER() local 1764 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)inCerts->data[i]); GetCertsStack() local 2017 X509 *cert = NULL; STACK_OF() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_client_read.c | 280 struct x509_certificate *cert) in tls_peer_cert_event() 294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event() 295 cert->cert_len); in tls_peer_cert_event() 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 315 if (cert->extensions_present & X509_EXT_CERTIFICATE_POLICY) { in tls_peer_cert_event() 316 if (cert->certificate_policy & X509_EXT_CERT_POLICY_TOD_STRICT) in tls_peer_cert_event() 318 else if (cert->certificate_policy & in tls_peer_cert_event() 329 struct x509_certificate *cert, in tls_cert_chain_failure_event() 337 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event() 279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument 328 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument 360 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local 830 struct x509_certificate *cert; tls_process_certificate_status() local [all...] |
| /device/soc/rockchip/common/sdk_linux/scripts/ |
| H A D | Makefile | 16 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 17 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 18 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 24 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 25 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| /kernel/linux/linux-5.10/scripts/ |
| H A D | Makefile | 15 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 16 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 17 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 23 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 24 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| /third_party/curl/docs/examples/ |
| H A D | sessioninfo.c | 61 gnutls_x509_crt_t cert; in wrfu() local 64 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { in wrfu() 66 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { in wrfu() 68 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { in wrfu() 75 gnutls_x509_crt_deinit(cert); in wrfu()
|
| H A D | usercertinmem.c | 48 X509 *cert = NULL; in sslctx_function() local 131 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); in sslctx_function() 132 if(!cert) { in sslctx_function() 137 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); in sslctx_function() 170 if(cert) in sslctx_function() 171 X509_free(cert); in sslctx_function()
|
| /third_party/node/test/parallel/ |
| H A D | test-tls-cert-regression.js | 30 const cert = 69 function test(cert, key, cb) { 71 cert, 78 test(cert, key, common.mustCall(function() { 79 test(Buffer.from(cert), Buffer.from(key), common.mustCall());
|
| H A D | test-https-selfsigned-no-keycertsign-no-crash.js | 33 const cert = 34 fixtures.readKey(path.join('selfsigned-no-keycertsign', 'cert.pem')); 38 cert: cert 54 ca: cert
|
| H A D | test-tls-getcertificate-x509.js | 13 cert: fixtures.readKey('agent6-cert.pem') 21 const cert = socket.getX509Certificate(); 22 assert(cert instanceof X509Certificate); 24 cert.serialNumber,
|
| H A D | test-tls-multi-key.js | 34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec. 40 cert: [ 41 fixtures.readKey('agent1-cert.pem'), 42 fixtures.readKey('ec10-cert.pem'), 46 fixtures.readKey('ca5-cert.pem'), 47 fixtures.readKey('ca1-cert.pem'), 51 // Key and cert are ordered as ec, rsa. 57 cert: [ 58 fixtures.readKey('agent1-cert.pem'), 59 fixtures.readKey('ec10-cert [all...] |
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
| H A D | certificate.js | 58 paths = paths.filter((path) => path.some((cert) => this.trustedCerts.includes(cert))); 154 const validCAs = path.slice(1).every((cert) => cert.isCA); 174 const cert = path[i]; 176 if (cert.extBasicConstraints?.isCA) { 177 const pathLength = cert.extBasicConstraints.pathLenConstraint;
|
| /base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/src/ |
| H A D | hks_client_service_dcm.cpp | 35 ENABLE_CFI(int32_t DcmGenerateCertChain(struct HksBlob *cert, const uint8_t *remoteObject)) in DcmGenerateCertChain() argument 37 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cert), HKS_ERROR_INVALID_ARGUMENT, "invalid in cert"); in DcmGenerateCertChain() 43 .blob = { .size = cert->size, .data = cert->data }, in DcmGenerateCertChain()
|
| /third_party/node/deps/openssl/openssl/crypto/store/ |
| H A D | store_result.c | 463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert() 464 * to reading it as a normal cert (just X509), but if in try_cert() 466 * trusted cert, then no fallback should be engaged. in try_cert() 471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local 473 if (cert == NULL) in try_cert() 481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert() 484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert() 486 X509_free(cert); in try_cert() 487 cert = NULL; in try_cert() 490 if (cert ! in try_cert() 549 X509 *cert = NULL; try_pkcs12() local [all...] |
| /third_party/openssl/crypto/store/ |
| H A D | store_result.c | 463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert() 464 * to reading it as a normal cert (just X509), but if in try_cert() 466 * trusted cert, then no fallback should be engaged. in try_cert() 471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local 473 if (cert == NULL) in try_cert() 481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert() 484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert() 486 X509_free(cert); in try_cert() 487 cert = NULL; in try_cert() 490 if (cert ! in try_cert() 549 X509 *cert = NULL; try_pkcs12() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_client_write.c | 27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local 32 cert = conn->cred->cert; in tls_client_cert_chain_der_len() 33 while (cert) { in tls_client_cert_chain_der_len() 34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len() 35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len() 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len() 38 &cert->issuer); in tls_client_cert_chain_der_len() 269 struct x509_certificate *cert; in tls_write_client_certificate() local 295 cert in tls_write_client_certificate() [all...] |