| /third_party/node/deps/openssl/config/archs/linux64-mips64/asm/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux-armv4/asm/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/include/openssl/ |
| H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
| /third_party/openssl/test/ |
| H A D | cmp_client_test.c | 310 static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in test_certConf_cb() argument
|
| /base/security/device_auth/services/session_manager/src/session/v2/ |
| H A D | dev_session_v2.c | 651 CertInfo cert; in GetCertCredInfo() local 652 res = GetPeerCertInfo(impl->context, credInfo, &cert); in GetCertCredInfo() 654 LOGE("get peer cert fail."); in GetCertCredInfo() 658 res = GetCredInfoByPeerCert(impl->context, &cert, &info); in GetCertCredInfo() 659 DestroyCertInfo(&cert); in GetCertCredInfo() 987 LOGE("cert credential not support."); in CreateIsoSubSession() 1460 LOGE("Failed to get peer cert!"); in SetPeerUserIdToContext()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/dbus/ |
| H A D | dbus_new.c | 941 const struct wpabuf *cert) in wpas_dbus_signal_certification() 969 (cert && in wpas_dbus_signal_certification() 970 !wpa_dbus_dict_append_byte_array(&dict_iter, "cert", in wpas_dbus_signal_certification() 971 wpabuf_head(cert), in wpas_dbus_signal_certification() 972 wpabuf_len(cert))) || in wpas_dbus_signal_certification() 936 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) wpas_dbus_signal_certification() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/dbus/ |
| H A D | dbus_new.c | 1034 const struct wpabuf *cert) in wpas_dbus_signal_certification() 1067 (cert && in wpas_dbus_signal_certification() 1068 !wpa_dbus_dict_append_byte_array(&dict_iter, "cert", in wpas_dbus_signal_certification() 1069 wpabuf_head(cert), in wpas_dbus_signal_certification() 1070 wpabuf_len(cert))) || in wpas_dbus_signal_certification() 1029 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) wpas_dbus_signal_certification() argument
|
| /third_party/mbedtls/include/mbedtls/ |
| H A D | ssl.h | 948 * external processor. The parameter \p cert contains 956 * The parameters \p ssl and \p cert are guaranteed to remain 988 * \param cert Certificate containing the public key. 1015 mbedtls_x509_crt *cert, 1025 * external processor. The parameter \p cert contains 1033 * The parameters \p ssl and \p cert are guaranteed to remain 1055 * \param cert Certificate containing the public key. 1081 mbedtls_x509_crt *cert, 1259 mbedtls_x509_crt *MBEDTLS_PRIVATE(peer_cert); /*!< peer X.509 cert chain */ 1502 /** Callback for setting cert accordin [all...] |
| /third_party/libwebsockets/lib/secure-streams/ |
| H A D | secure-streams.c | 1235 h->policy->trust.server.cert->ca_der; in lws_ss_create() 1237 h->policy->trust.server.cert->ca_der_len; in lws_ss_create()
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_env.c | 451 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_ktri_cert_cmp() argument 457 return ossl_cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert); in CMS_RecipientInfo_ktri_cert_cmp()
|
| /third_party/openssl/crypto/cms/ |
| H A D | cms_env.c | 432 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_ktri_cert_cmp() argument 438 return ossl_cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert); in CMS_RecipientInfo_ktri_cert_cmp()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
| H A D | wpas_glue.c | 1024 static void wpa_supplicant_cert_cb(void *ctx, struct tls_cert_data *cert, in wpa_supplicant_cert_cb() argument 1029 wpas_notify_certification(wpa_s, cert, cert_hash); in wpa_supplicant_cert_cb()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | wpas_glue.c | 1095 static void wpa_supplicant_cert_cb(void *ctx, struct tls_cert_data *cert, in wpa_supplicant_cert_cb() argument 1100 wpas_notify_certification(wpa_s, cert, cert_hash); in wpa_supplicant_cert_cb()
|
| /base/security/certificate_framework/test/unittest/v1.0/src/ |
| H A D | crypto_x509_cert_chain_test.cpp | 118 int __real_PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca); 119 bool __real_CheckIsSelfSigned(const X509 *cert); 121 int PKCS12_parse_mock(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) { in PKCS12_parse_mock() argument 123 *cert = X509_new(); in PKCS12_parse_mock() 124 if (*cert == nullptr) { in PKCS12_parse_mock() 125 CF_LOG_E("Failed to malloc cert."); in PKCS12_parse_mock()
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/ |
| H A D | dlp_permission_client.cpp | 113 if (callback == nullptr || certParcel->cert.size() == 0) { in ParseDlpCertificate()
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | ts.h | 533 const char *cert, TS_RESP_CTX *ctx);
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
| H A D | ikev2_common.c | 306 payloads->cert = pdata; in ikev2_parse_payloads()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
| H A D | ikev2_common.c | 306 payloads->cert = pdata; in ikev2_parse_payloads()
|
| /third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
| H A D | x509.h | 512 int X509_self_signed(X509 *cert, int verify_signature); 543 ASN1_OCTET_STRING *X509_digest_sig(const X509 *cert, 981 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags); variable 1193 /* lookup a cert from a X509 STACK */
|
| /third_party/node/deps/openssl/config/archs/linux-elf/asm/include/openssl/ |
| H A D | x509.h | 512 int X509_self_signed(X509 *cert, int verify_signature); 543 ASN1_OCTET_STRING *X509_digest_sig(const X509 *cert, 981 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags); variable 1193 /* lookup a cert from a X509 STACK */
|
| /third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/asm/include/openssl/ |
| H A D | x509.h | 512 int X509_self_signed(X509 *cert, int verify_signature); 543 ASN1_OCTET_STRING *X509_digest_sig(const X509 *cert, 981 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags); variable 1193 /* lookup a cert from a X509 STACK */
|