| /foundation/communication/netstack/test/unittest/tlssocket/client/ |
| H A D | TlsSocketTest.cpp | 258 [](int32_t errCode, const X509CertRawData &cert) { EXPECT_TRUE(errCode == TLSSOCKET_SUCCESS); }); in HWTEST_F() 279 [](int32_t errCode, const X509CertRawData &cert) { EXPECT_TRUE(errCode == TLSSOCKET_SUCCESS); }); in HWTEST_F()
|
| /base/security/certificate_framework/test/unittest/v1.0/src/ |
| H A D | crypto_x509_crl_test.cpp | 140 // Get cert in HWTEST_F() 163 // Get cert in HWTEST_F() 191 // Get cert in HWTEST_F() 213 // Get cert in HWTEST_F() 825 // Get cert in HWTEST_F() 857 // Get cert in HWTEST_F() 889 // Get cert in HWTEST_F() 937 // Get cert in HWTEST_F() 961 // Get cert in HWTEST_F() 983 // Get cert in HWTEST_F() 1583 HcfCertificate cert; HWTEST_F() local 1654 HcfCertificate cert; HWTEST_F() local 1829 HcfCertificate cert; HWTEST_F() local [all...] |
| /third_party/curl/src/ |
| H A D | tool_operate.c | 1603 /* Check if config->cert is a PKCS#11 URI and set the in single_transfer() 1605 if(config->cert) { in single_transfer() 1607 if(is_pkcs11_uri(config->cert)) { in single_transfer() 1644 * --cert loadmem=<filename>:<password> --cert-type p12 in single_transfer() 1646 * --cert <filename>:<password> --cert-type p12 in single_transfer() 1649 if(config->cert && (strlen(config->cert) > 8) && in single_transfer() 1650 (memcmp(config->cert, "loadme in single_transfer() [all...] |
| /third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
| H A D | mod.rs | 1011 pub fn set_certificate(&mut self, cert: &X509Ref) -> Result<(), ErrorStack> { in set_certificate() 1012 unsafe { cvt(ffi::SSL_CTX_use_certificate(self.as_ptr(), cert.as_ptr())).map(|_| ()) } in set_certificate() 1020 pub fn add_extra_chain_cert(&mut self, cert: X509) -> Result<(), ErrorStack> { in add_extra_chain_cert() 1022 cvt(ffi::SSL_CTX_add_extra_chain_cert(self.as_ptr(), cert.as_ptr()) as c_int)?; in add_extra_chain_cert() 1023 mem::forget(cert); in add_extra_chain_cert() 3242 pub fn set_certificate(&mut self, cert: &X509Ref) -> Result<(), ErrorStack> { in set_certificate() 3244 cvt(ffi::SSL_use_certificate(self.as_ptr(), cert.as_ptr()))?; in set_certificate()
|
| /third_party/node/test/parallel/ |
| H A D | test-tls-server-verify.js | 51 CAs: ['ca1-cert'], 63 CAs: ['ca1-cert'], 75 CAs: ['ca1-cert'], 87 CAs: ['ca1-cert'], 99 CAs: ['ca1-cert', 'ca2-cert'], 112 CAs: ['ca2-cert'], 118 // Agent4 has a cert in the CRL. 134 const serverCert = loadPEM('agent2-cert'); 140 // - Self-signed cert [all...] |
| H A D | test-crypto-sign-verify.js | 287 function testVerify(cert, vector) { 291 key: cert,
|
| /third_party/node/deps/openssl/openssl/crypto/ct/ |
| H A D | ct_sct.c | 360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1) in SCT_validate()
|
| /third_party/openssl/crypto/ct/ |
| H A D | ct_sct.c | 360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1) in SCT_validate()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/ |
| H A D | eapol_supp_sm.h | 251 * @cert: Certificate information 254 void (*cert_cb)(void *ctx, struct tls_cert_data *cert,
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/ |
| H A D | eapol_supp_sm.h | 257 * @cert: Certificate information 260 void (*cert_cb)(void *ctx, struct tls_cert_data *cert,
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | notify.h | 189 struct tls_cert_data *cert,
|
| /third_party/mbedtls/library/ |
| H A D | ssl_tls12_server.c | 729 cur->cert); in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 751 * This avoids sending the client a cert it'll reject based on in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 767 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 782 ssl->handshake->key_cert->cert); in ssl_pick_cert() 2446 * 4 . 4 cert type count in ssl_write_certificate_request() 2447 * 5 .. m-1 cert types in ssl_write_certificate_request() 4207 MBEDTLS_SSL_DEBUG_MSG(1, ("sig_alg doesn't match cert ke in ssl_parse_certificate_verify() [all...] |
| H A D | ssl_misc.h | 827 mbedtls_ssl_key_cert *key_cert; /*!< chosen key/cert pair (server) */ 829 mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */ 1031 const mbedtls_x509_crt *dn_hints; /*!< acceptable client cert issuers */ 1248 mbedtls_x509_crt *cert; /*!< cert */ member 1250 mbedtls_ssl_key_cert *next; /*!< next key/cert pair */ 1676 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1683 * Warning: cert_endpoint is the endpoint of the cert (ie, of our peer when we 1684 * check a cert we received from them)! 1689 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, [all...] |
| /third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
| H A D | daemon.c | 510 gnutls_datum_t cert; in MHD_init_daemon_certificate() local 522 cert.data = (unsigned char *) daemon->https_mem_trust; in MHD_init_daemon_certificate() 523 cert.size = strlen (daemon->https_mem_trust); in MHD_init_daemon_certificate() 524 if (gnutls_certificate_set_x509_trust_mem (daemon->x509_cred, &cert, in MHD_init_daemon_certificate() 546 cert.data = (unsigned char *) daemon->https_mem_cert; in MHD_init_daemon_certificate() 547 cert.size = strlen (daemon->https_mem_cert); in MHD_init_daemon_certificate() 552 &cert, &key, in MHD_init_daemon_certificate() 567 &cert, &key, in MHD_init_daemon_certificate()
|
| /third_party/curl/lib/vtls/ |
| H A D | gtls.c | 474 /* set the trusted CA cert bundle file */ in gtls_client_init() 482 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 495 /* set the trusted CA cert directory */ in gtls_client_init() 500 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 754 gnutls_x509_crt_t cert, in pkp_pin_peer_pubkey() 770 if(!cert) in pkp_pin_peer_pubkey() 779 ret = gnutls_pubkey_import_x509(key, cert, 0); in pkp_pin_peer_pubkey() 862 /* no peer cert, but auth is ok if we have SRP user and cipher and no in Curl_gtls_verifyserver() 867 failf(data, "failed to get server cert"); in Curl_gtls_verifyserver() 904 failf(data, "server cert verif in Curl_gtls_verifyserver() 753 pkp_pin_peer_pubkey(struct Curl_easy *data, gnutls_x509_crt_t cert, const char *pinnedpubkey) pkp_pin_peer_pubkey() argument [all...] |
| /third_party/rust/crates/rust-openssl/openssl/src/x509/ |
| H A D | mod.rs | 118 /// * `cert` - The certificate that should be verified. 130 cert: &X509Ref, in init() 151 cert.as_ptr(), in init() 1797 "X509_CRL_get0_by_{{serial,cert}} should only return 0, 1, or 2." in from_ffi_status() 1886 pub fn get_by_cert<'a>(&'a self, cert: &X509) -> CrlStatus<'a> { in get_by_cert() 1890 ffi::X509_CRL_get0_by_cert(self.as_ptr(), &mut ret as *mut _, cert.as_ptr()); in get_by_cert()
|
| /base/security/certificate_framework/test/fuzztest/v1.0/x509certchain_fuzzer/ |
| H A D | x509certchain_fuzzer.cpp | 202 const CfEncodingBlob cert = { reinterpret_cast<uint8_t *>(const_cast<char *>(g_testSelfSignedCaCert)), in CreateChainByArr() local 204 (void)HcfX509CertificateCreate(&cert, &x509CertObj); in CreateChainByArr() 436 certsData->count = 2; /* level-2 cert chain. */ in ConstructCertData() 509 certsData.count = *reinterpret_cast<const uint32_t *>(data); /* level-2 cert chain. */ in X509CertChainValidatorCreateFuzzTest()
|
| /foundation/communication/netstack/frameworks/js/napi/http/async_context/src/ |
| H A D | request_context.cpp | 73 {HTTP_SSL_CACERT_BADFILE, "Problem with the SSL CA cert (path? access rights?)"}, 715 std::string cert = NapiUtils::GetStringPropertyUtf8(GetEnv(), clientCertValue, HttpConstant::HTTP_CLIENT_CERT); in ParseClientCert() local 721 options.SetClientCert(cert, certType, key, keyPasswd); in ParseClientCert()
|
| /third_party/node/deps/openssl/openssl/crypto/ts/ |
| H A D | ts_rsp_sign.c | 706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local 707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
|
| /third_party/openssl/test/ |
| H A D | cmp_ctx_test.c | 320 static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in test_certConf_cb() argument 749 DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, cert, X509) in DEFINE_SET_CB_TEST()
|
| H A D | ssl_old_test.c | 676 " -s_key arg - Server key file (default: same as -cert)\n"); in sv_usage() 771 X509 *cert; in print_details() local 779 cert = SSL_get0_peer_certificate(c_ssl); in print_details() 780 if (cert != NULL) { in print_details() 781 EVP_PKEY* pubkey = X509_get0_pubkey(cert); in print_details() 2918 printf("In app_verify_callback, allowing cert. "); in app_verify_callback() 2920 printf("Finished printing do we have a context? 0x%p a cert? 0x%p\n", in app_verify_callback() 2925 printf("cert depth=%d %s\n", in app_verify_callback()
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | x509v3.h | 367 # define EXFLAG_SS 0x2000 /* cert is apparently self-signed */ 570 X509 *cert); 582 const char *section, X509 *cert); variable
|
| /third_party/openssl/crypto/ts/ |
| H A D | ts_rsp_sign.c | 706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local 707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
|
| /foundation/communication/netstack/frameworks/js/napi/tls/src/ |
| H A D | tls_socket_server.cpp | 482 const auto &cert = TLSServerConfiguration_.GetCertificate();
in GetCertificate() local 483 NETSTACK_LOGI("cert der is %{public}d", cert.encodingFormat);
in GetCertificate() 484 if (!cert.data.Length()) {
in GetCertificate() 485 CallOnErrorCallback(-1, "cert not data Length");
in GetCertificate() 489 callback(TlsSocket::TLSSOCKET_SUCCESS, cert);
in GetCertificate() 1154 reason = IP + hostName + " is not in the cert's list";
in CheckIpAndDnsName() 1165 tmpStr = ". is not in the cert's altnames";
in CheckIpAndDnsName() 1174 tmpStr = ". is not cert's CN";
in CheckIpAndDnsName() 1254 return HOST_NAME + hostname + ". is cert' in CheckServerIdentityLegal() [all...] |
| /foundation/communication/netstack/frameworks/js/napi/http/http_exec/src/ |
| H A D | http_exec.cpp | 907 std::string cert; in AddCurlHandle() local 911 context->options.GetClientCert(cert, certType, key, keyPasswd); in AddCurlHandle() 912 if (cert.empty()) { in AddCurlHandle() 916 NETSTACK_CURL_EASY_SET_OPTION(curl, CURLOPT_SSLCERT, cert.c_str(), context); in AddCurlHandle() 957 NETSTACK_LOGE("loading certificates from context cert error."); in AddCurlHandle() 970 // add app cert path in AddCurlHandle() 976 // add user cert path in AddCurlHandle() 979 // add system cert path in AddCurlHandle() 1013 // in real life, you should buy a ssl certification and rename it to /etc/ssl/cert.pem in AddCurlHandle()
|