Home
last modified time | relevance | path

Searched refs:cert (Results 126 - 150 of 1243) sorted by relevance

12345678910>>...50

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
H A Dtlsv1_client_read.c280 struct x509_certificate *cert) in tls_peer_cert_event()
294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event()
295 cert->cert_len); in tls_peer_cert_event()
296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event()
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
321 struct x509_certificate *cert, in tls_cert_chain_failure_event()
329 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event()
334 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event()
338 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_cert_chain_failure_event()
339 cert in tls_cert_chain_failure_event()
279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument
320 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument
352 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local
822 struct x509_certificate *cert; tls_process_certificate_status() local
[all...]
H A Dtlsv1_cred.c35 x509_certificate_chain_free(cred->cert); in tlsv1_cred_free()
48 struct x509_certificate *cert, *p; in tlsv1_add_cert_der() local
51 cert = x509_certificate_parse(buf, len); in tlsv1_add_cert_der()
52 if (cert == NULL) { in tlsv1_add_cert_der()
61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der()
66 p->next = cert; in tlsv1_add_cert_der()
69 cert->next = *chain; in tlsv1_add_cert_der()
70 *chain = cert; in tlsv1_add_cert_der()
73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
158 const char *cert, cons in tlsv1_set_cert_chain()
157 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert_chain() argument
194 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) tlsv1_set_ca_cert() argument
258 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert() argument
506 struct x509_certificate *cert; pkcs12_certbag() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_write.c27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
33 while (cert) { in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
257 struct x509_certificate *cert; in tls_write_client_certificate() local
283 cert in tls_write_client_certificate()
[all...]
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
/test/xts/acts/telephony/networkmanager/ndk/networkndk/entry/src/main/cpp/
H A Dnet_stack_ndk_test.cpp68 void GetCertData(NetStack_CertBlob &cert, char *certPath, NetStack_CertType certType) in GetCertData() argument
70 cert.type = certType; in GetCertData()
84 cert.size = length; in GetCertData()
87 cert.data = new uint8_t[length]; in GetCertData()
90 cert.data[i] = static_cast<uint8_t>(buffer[i]); in GetCertData()
92 OH_LOG_Print(LOG_APP, LOG_DEBUG, WEBSOCKET_LOG_DOMAIN, WEBSOCKET_LOG_TAG, "cert size is: %{public}d", cert.size); in GetCertData()
99 NetStack_CertBlob cert; in TestCaseCertVerification() local
103 GetCertData(cert, pemCertPath, NetStack_CertType::NETSTACK_CERT_TYPE_PEM); in TestCaseCertVerification()
105 ret = OH_NetStack_CertVerification(&cert, in TestCaseCertVerification()
[all...]
/base/security/code_signature/utils/src/
H A Dhuks_attest_verifier.cpp104 LOG_ERROR("add cert to X509 store failed"); in AddCAToStore()
113 static bool VerifyIssurCert(X509 *cert, STACK_OF(X509) *chain) in VerifyIssurCert() argument
132 if (!X509_STORE_CTX_init(storeCtx, store, cert, chain)) { in VerifyIssurCert()
142 LOG_ERROR("Verify cert failed, msg = %{public}s", X509_verify_cert_error_string(index)); in VerifyIssurCert()
163 LOG_ERROR("verify signing cert failed."); in VerifySigningCert()
215 static bool VerifyExtension(X509 *cert, const ByteBuffer &challenge) in VerifyExtension() argument
221 const STACK_OF(X509_EXTENSION) *exts = X509_get0_extensions(cert); in VerifyExtension()
254 LOG_INFO("Dump cert chain"); in ShowCertInfo()
255 for (auto cert: certChainBuffer) { in ShowCertInfo()
256 if (ConvertCertToPEMString(cert, pe in ShowCertInfo()
[all...]
H A Dsigner_info.cpp41 bool SignerInfo::InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md, in InitSignerInfo() argument
44 if ((cert == nullptr) || (md == nullptr)) { in InitSignerInfo()
61 // add sign cert info in InitSignerInfo()
63 X509_get_issuer_name(cert))) { in InitSignerInfo()
68 ASN1_INTEGER_dup(X509_get_serialNumber(cert)))) { in InitSignerInfo()
77 int signatureNid = GetSignAlgorithmID(cert); in InitSignerInfo()
208 int SignerInfo::GetSignAlgorithmID(const X509 *cert) in GetSignAlgorithmID() argument
210 X509_PUBKEY *xpkey = X509_get_X509_PUBKEY(cert); in GetSignAlgorithmID()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dt_x509.c398 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags) in ossl_x509_print_ex_brief() argument
403 if (cert == NULL) in ossl_x509_print_ex_brief()
406 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_SUBJECT)) in ossl_x509_print_ex_brief()
408 if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { in ossl_x509_print_ex_brief()
413 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_ISSUER)) in ossl_x509_print_ex_brief()
416 if (!X509_print_ex(bio, cert, flags, in ossl_x509_print_ex_brief()
419 if (X509_cmp_current_time(X509_get0_notBefore(cert)) > 0) in ossl_x509_print_ex_brief()
422 if (X509_cmp_current_time(X509_get0_notAfter(cert)) < 0) in ossl_x509_print_ex_brief()
425 return X509_print_ex(bio, cert, flag in ossl_x509_print_ex_brief()
437 X509 *cert = sk_X509_value(certs, i); print_certs() local
[all...]
H A Dx509_vfy.c59 static int check_key_level(X509_STORE_CTX *ctx, X509 *cert);
60 static int check_sig_level(X509_STORE_CTX *ctx, X509 *cert);
61 static int check_curve(X509 *cert);
87 * Return 1 if given cert is considered self-signed, 0 if not, or -1 on error.
90 * to match issuer and subject names (i.e., the cert being self-issued) and any
93 int X509_self_signed(X509 *cert, int verify_signature) in X509_self_signed() argument
97 if ((pkey = X509_get0_pubkey(cert)) == NULL) { /* handles cert == NULL */ in X509_self_signed()
101 if (!ossl_x509v3_cache_extensions(cert)) in X509_self_signed()
103 if ((cert in X509_self_signed()
192 X509 *cert = sk_X509_value(ctx->chain, i); check_auth_level() local
2652 dane_i2d(X509 *cert, uint8_t selector, unsigned int *i2dlen) dane_i2d() argument
2685 dane_match(X509_STORE_CTX *ctx, X509 *cert, int depth) dane_match() argument
2832 X509 *cert; check_dane_issuer() local
2858 X509 *cert = sk_X509_value(ctx->chain, num - 1); check_dane_pkeys() local
2900 check_leaf_suiteb(X509_STORE_CTX *ctx, X509 *cert) check_leaf_suiteb() argument
2911 X509 *cert = ctx->cert; dane_verify() local
2975 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument
3380 check_key_level(X509_STORE_CTX *ctx, X509 *cert) check_key_level() argument
3410 check_curve(X509 *cert) check_curve() argument
3437 check_sig_level(X509_STORE_CTX *ctx, X509 *cert) check_sig_level() argument
[all...]
/third_party/openssl/crypto/x509/
H A Dt_x509.c400 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags) in ossl_x509_print_ex_brief() argument
405 if (cert == NULL) in ossl_x509_print_ex_brief()
408 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_SUBJECT)) in ossl_x509_print_ex_brief()
410 if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { in ossl_x509_print_ex_brief()
415 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_ISSUER)) in ossl_x509_print_ex_brief()
418 if (!X509_print_ex(bio, cert, flags, in ossl_x509_print_ex_brief()
421 if (X509_cmp_current_time(X509_get0_notBefore(cert)) > 0) in ossl_x509_print_ex_brief()
424 if (X509_cmp_current_time(X509_get0_notAfter(cert)) < 0) in ossl_x509_print_ex_brief()
427 return X509_print_ex(bio, cert, flag in ossl_x509_print_ex_brief()
439 X509 *cert = sk_X509_value(certs, i); print_certs() local
[all...]
H A Dx509_vfy.c59 static int check_key_level(X509_STORE_CTX *ctx, X509 *cert);
60 static int check_sig_level(X509_STORE_CTX *ctx, X509 *cert);
61 static int check_curve(X509 *cert);
87 * Return 1 if given cert is considered self-signed, 0 if not, or -1 on error.
90 * to match issuer and subject names (i.e., the cert being self-issued) and any
93 int X509_self_signed(X509 *cert, int verify_signature) in X509_self_signed() argument
97 if ((pkey = X509_get0_pubkey(cert)) == NULL) { /* handles cert == NULL */ in X509_self_signed()
101 if (!ossl_x509v3_cache_extensions(cert)) in X509_self_signed()
103 if ((cert in X509_self_signed()
192 X509 *cert = sk_X509_value(ctx->chain, i); check_auth_level() local
2654 dane_i2d(X509 *cert, uint8_t selector, unsigned int *i2dlen) dane_i2d() argument
2687 dane_match(X509_STORE_CTX *ctx, X509 *cert, int depth) dane_match() argument
2834 X509 *cert; check_dane_issuer() local
2860 X509 *cert = sk_X509_value(ctx->chain, num - 1); check_dane_pkeys() local
2902 check_leaf_suiteb(X509_STORE_CTX *ctx, X509 *cert) check_leaf_suiteb() argument
2913 X509 *cert = ctx->cert; dane_verify() local
2977 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument
3382 check_key_level(X509_STORE_CTX *ctx, X509 *cert) check_key_level() argument
3412 check_curve(X509 *cert) check_curve() argument
3439 check_sig_level(X509_STORE_CTX *ctx, X509 *cert) check_sig_level() argument
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-enable-trace.js45 checkServerIdentity: (servername, cert) => { },
46 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
49 cert: keys.agent6.cert,
H A Dtest-tls-secure-context-usage-order.js20 cert: loadPEM('agent2-cert'),
27 cert: loadPEM('agent1-cert'),
28 ca: [ loadPEM('ca2-cert') ]
33 cert: loadPEM('agent1-cert'),
34 ca: [ loadPEM('ca1-cert') ]
60 cert: loadPEM('agent1-cert'),
[all...]
H A Dtest-tls-ocsp-callback.js40 const cert = fixtures.readKey('agent1-cert.pem');
41 const ca = fixtures.readKey('ca1-cert.pem');
46 cert,
56 delete options.cert;
75 server.on('OCSPRequest', common.mustCall((cert, issuer, callback) => {
76 assert.ok(Buffer.isBuffer(cert));
/third_party/lwip/src/include/lwip/
H A Daltcp_tls.h74 const u8_t *cert, size_t cert_len);
83 const u8_t *cert, size_t cert_len);
88 struct altcp_tls_config *altcp_tls_create_config_client(const u8_t *cert, size_t cert_len);
95 const u8_t *cert, size_t cert_len);
/third_party/node/deps/openssl/openssl/engines/
H A De_capi.c1298 PCCERT_CONTEXT cert) in capi_get_prov_info()
1303 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info()
1311 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info()
1346 static char *capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) in capi_cert_get_fname() argument
1352 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname()
1358 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname()
1371 static void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) in capi_dump_cert() argument
1378 fname = capi_cert_get_fname(ctx, cert); in capi_dump_cert()
1387 p = cert->pbCertEncoded; in capi_dump_cert()
1388 x = d2i_X509(NULL, &p, cert in capi_dump_cert()
1297 capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_prov_info() argument
1438 PCCERT_CONTEXT cert = NULL; capi_list_certs() local
1473 PCCERT_CONTEXT cert = NULL; capi_find_cert() local
1552 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_cert_key() argument
1569 PCCERT_CONTEXT cert; capi_find_key() local
1726 PCCERT_CONTEXT cert = NULL, excert = NULL; capi_load_ssl_client_cert() local
1849 PCCERT_CONTEXT cert; cert_select_dialog() local
[all...]
/third_party/openssl/engines/
H A De_capi.c1298 PCCERT_CONTEXT cert) in capi_get_prov_info()
1303 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info()
1311 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info()
1346 static char *capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) in capi_cert_get_fname() argument
1352 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname()
1358 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname()
1371 static void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) in capi_dump_cert() argument
1378 fname = capi_cert_get_fname(ctx, cert); in capi_dump_cert()
1387 p = cert->pbCertEncoded; in capi_dump_cert()
1388 x = d2i_X509(NULL, &p, cert in capi_dump_cert()
1297 capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_prov_info() argument
1438 PCCERT_CONTEXT cert = NULL; capi_list_certs() local
1473 PCCERT_CONTEXT cert = NULL; capi_find_cert() local
1552 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_cert_key() argument
1569 PCCERT_CONTEXT cert; capi_find_key() local
1726 PCCERT_CONTEXT cert = NULL, excert = NULL; capi_load_ssl_client_cert() local
1849 PCCERT_CONTEXT cert; cert_select_dialog() local
[all...]
/base/security/huks/frameworks/huks_standard/main/core/src/
H A Dhks_verifier.c152 static X509 *GetX509FormatCert(const struct HksCertInfo *cert) in GetX509FormatCert() argument
156 BIO *bio = BIO_new_mem_buf(cert->data, cert->length); in GetX509FormatCert()
159 if (cert->format == HKS_CERT_DER) { in GetX509FormatCert()
161 } else if (cert->format == HKS_CERT_PEM) { in GetX509FormatCert()
174 HKS_IF_NULL_LOGE_RETURN(x509, HKS_ERROR_VERIFICATION_FAILED, "load cert chain to x509 failed") in TranslateToX509Format()
181 static int32_t VerifySignature(const struct HksCertInfo *cert, const struct HksCertInfo *issuerCert) in VerifySignature() argument
184 HKS_IF_NULL_LOGE_RETURN(pubKey, HKS_ERROR_VERIFICATION_FAILED, "get public key from device cert failed") in VerifySignature()
186 int32_t resOpenssl = X509_verify(cert->x509, pubKey); in VerifySignature()
201 HKS_LOG_E("verify cert chai in VerifyCertChain()
394 GetKeyDescriptionSeqValue(const struct HksCertInfo *cert, uint8_t **data, uint32_t *len) GetKeyDescriptionSeqValue() argument
588 struct HksCertInfo *cert = &(certsInfo[i]); InitCertChainInfo() local
[all...]
/third_party/fsverity-utils/lib/
H A Dsign_digest.c85 X509 *cert; in read_certificate() local
99 cert = PEM_read_bio_X509(bio, NULL, NULL, NULL); in read_certificate()
100 if (!cert) { in read_certificate()
107 *cert_ret = cert; in read_certificate()
117 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7()
131 serial = ASN1_INTEGER_to_BN(X509_get_serialNumber(cert), NULL); in sign_pkcs7()
139 name_der_len = i2d_X509_NAME(X509_get_subject_name(cert), &name_der); in sign_pkcs7()
254 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7()
296 if (!PKCS7_sign_add_signer(p7, cert, pkey, md, pkcs7_flags)) { in sign_pkcs7()
407 X509 *cert in libfsverity_sign_digest() local
116 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument
253 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument
[all...]
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/
H A Ddlp_file_manager.cpp96 std::vector<uint8_t> cert; in GenerateCertData() local
98 int32_t result = DlpPermissionKit::GenerateDlpCertificate(policy, cert); in GenerateCertData()
101 DLP_LOG_ERROR(LABEL, "Generate dlp cert fail, errno=%{public}d", result); in GenerateCertData()
104 return GenerateCertBlob(cert, certData); in GenerateCertData()
107 int32_t DlpFileManager::GenerateCertBlob(const std::vector<uint8_t>& cert, struct DlpBlob& certData) const in GenerateCertBlob() argument
109 size_t certSize = cert.size(); in GenerateCertBlob()
111 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert is too large, size=%{public}zu", certSize); in GenerateCertBlob()
115 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert i in GenerateCertBlob()
221 UpdateDlpFile(bool isNeedAdapter, uint32_t oldCertSize, const std::string& workDir, const std::vector<uint8_t>& cert, std::shared_ptr<DlpFile>& filePtr) UpdateDlpFile() argument
256 struct DlpBlob cert; ParseDlpFileFormat() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_lib.c524 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument
536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
546 cch->d.certificate = cert; in CMS_add0_cert()
550 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument
553 r = CMS_add0_cert(cms, cert); in CMS_add1_cert()
555 X509_up_ref(cert); in CMS_add1_cert()
679 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument
682 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp()
685 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp()
688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument
697 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument
716 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_lib.c511 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument
523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
533 cch->d.certificate = cert; in CMS_add0_cert()
537 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument
540 r = CMS_add0_cert(cms, cert); in CMS_add1_cert()
542 X509_up_ref(cert); in CMS_add1_cert()
666 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument
669 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp()
672 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp()
675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument
684 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument
703 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument
[all...]
/base/update/packaging_tools/
H A Dbuild_pkcs7.py184 cert = load_public_cert()
187 signed_data['certificates'] = [cert]
199 issuer = cert.issuer
200 serial_number = cert.serial_number
202 issuer_and_serial['issuer'] = cert.issuer
203 issuer_and_serial['serial_number'] = cert.serial_number
205 key_id = cert.key_identifier_value.native
/base/security/code_signature/services/local_code_sign/src/
H A Dlocal_code_sign_stub.cpp77 ByteBuffer cert; in InitLocalCertificateInner() local
78 int32_t result = InitLocalCertificate(challenge, cert); in InitLocalCertificateInner()
85 if (!reply.WriteUint32(cert.GetSize())) { in InitLocalCertificateInner()
88 if (!reply.WriteBuffer(cert.GetBuffer(), cert.GetSize())) { in InitLocalCertificateInner()

Completed in 20 milliseconds

12345678910>>...50