| /third_party/openssl/crypto/x509/ |
| H A D | x509_vfy.c | 59 static int check_key_level(X509_STORE_CTX *ctx, X509 *cert); 60 static int check_sig_level(X509_STORE_CTX *ctx, X509 *cert); 61 static int check_curve(X509 *cert); 87 * Return 1 if given cert is considered self-signed, 0 if not, or -1 on error. 90 * to match issuer and subject names (i.e., the cert being self-issued) and any 93 int X509_self_signed(X509 *cert, int verify_signature) in X509_self_signed() argument 97 if ((pkey = X509_get0_pubkey(cert)) == NULL) { /* handles cert == NULL */ in X509_self_signed() 101 if (!ossl_x509v3_cache_extensions(cert)) in X509_self_signed() 103 if ((cert in X509_self_signed() 192 X509 *cert = sk_X509_value(ctx->chain, i); check_auth_level() local 2654 dane_i2d(X509 *cert, uint8_t selector, unsigned int *i2dlen) dane_i2d() argument 2687 dane_match(X509_STORE_CTX *ctx, X509 *cert, int depth) dane_match() argument 2834 X509 *cert; check_dane_issuer() local 2860 X509 *cert = sk_X509_value(ctx->chain, num - 1); check_dane_pkeys() local 2902 check_leaf_suiteb(X509_STORE_CTX *ctx, X509 *cert) check_leaf_suiteb() argument 2913 X509 *cert = ctx->cert; dane_verify() local 2977 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument 3382 check_key_level(X509_STORE_CTX *ctx, X509 *cert) check_key_level() argument 3412 check_curve(X509 *cert) check_curve() argument 3439 check_sig_level(X509_STORE_CTX *ctx, X509 *cert) check_sig_level() argument [all...] |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /base/security/huks/frameworks/huks_standard/main/core/src/ |
| H A D | hks_verifier.c | 152 static X509 *GetX509FormatCert(const struct HksCertInfo *cert)
in GetX509FormatCert() argument 156 BIO *bio = BIO_new_mem_buf(cert->data, cert->length);
in GetX509FormatCert() 159 if (cert->format == HKS_CERT_DER) {
in GetX509FormatCert() 161 } else if (cert->format == HKS_CERT_PEM) {
in GetX509FormatCert() 174 HKS_IF_NULL_LOGE_RETURN(x509, HKS_ERROR_VERIFICATION_FAILED, "load cert chain to x509 failed")
in TranslateToX509Format() 181 static int32_t VerifySignature(const struct HksCertInfo *cert, const struct HksCertInfo *issuerCert)
in VerifySignature() argument 184 HKS_IF_NULL_LOGE_RETURN(pubKey, HKS_ERROR_VERIFICATION_FAILED, "get public key from device cert failed")
in VerifySignature() 186 int32_t resOpenssl = X509_verify(cert->x509, pubKey);
in VerifySignature() 201 HKS_LOG_E("verify cert chai in VerifyCertChain() 394 GetKeyDescriptionSeqValue(const struct HksCertInfo *cert, uint8_t **data, uint32_t *len) GetKeyDescriptionSeqValue() argument 588 struct HksCertInfo *cert = &(certsInfo[i]); InitCertChainInfo() local [all...] |
| /third_party/node/test/parallel/ |
| H A D | test-tls-enable-trace.js | 45 checkServerIdentity: (servername, cert) => { }, 46 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 49 cert: keys.agent6.cert,
|
| H A D | test-tls-secure-context-usage-order.js | 20 cert: loadPEM('agent2-cert'), 27 cert: loadPEM('agent1-cert'), 28 ca: [ loadPEM('ca2-cert') ] 33 cert: loadPEM('agent1-cert'), 34 ca: [ loadPEM('ca1-cert') ] 60 cert: loadPEM('agent1-cert'), [all...] |
| H A D | test-tls-ocsp-callback.js | 40 const cert = fixtures.readKey('agent1-cert.pem'); 41 const ca = fixtures.readKey('ca1-cert.pem'); 46 cert, 56 delete options.cert; 75 server.on('OCSPRequest', common.mustCall((cert, issuer, callback) => { 76 assert.ok(Buffer.isBuffer(cert));
|
| H A D | test-tls-client-getephemeralkeyinfo.js | 12 const cert = fixtures.readKey('agent2-cert.pem'); 26 cert: cert, 42 } = new X509Certificate(cert));
|
| H A D | test-tls-enable-trace-cli.js | 49 checkServerIdentity: (servername, cert) => { }, 50 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 53 cert: keys.agent6.cert,
|
| H A D | test-tls-enable-keylog-cli.js | 41 checkServerIdentity: (servername, cert) => { }, 42 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 45 cert: keys.agent6.cert,
|
| H A D | test-tls-sni-server-client.js | 38 cert: loadPEM('agent2-cert') 44 cert: loadPEM('agent1-cert') 48 cert: loadPEM('agent3-cert') 52 // NOTE: Contains ca3 chain cert 53 cert: loadPEM('agent6-cert') 59 ca: [loadPEM('ca1-cert')], [all...] |
| /third_party/lwip/src/include/lwip/ |
| H A D | altcp_tls.h | 74 const u8_t *cert, size_t cert_len); 83 const u8_t *cert, size_t cert_len); 88 struct altcp_tls_config *altcp_tls_create_config_client(const u8_t *cert, size_t cert_len); 95 const u8_t *cert, size_t cert_len);
|
| /third_party/fsverity-utils/lib/ |
| H A D | sign_digest.c | 85 X509 *cert; in read_certificate() local 99 cert = PEM_read_bio_X509(bio, NULL, NULL, NULL); in read_certificate() 100 if (!cert) { in read_certificate() 107 *cert_ret = cert; in read_certificate() 117 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7() 131 serial = ASN1_INTEGER_to_BN(X509_get_serialNumber(cert), NULL); in sign_pkcs7() 139 name_der_len = i2d_X509_NAME(X509_get_subject_name(cert), &name_der); in sign_pkcs7() 254 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7() 296 if (!PKCS7_sign_add_signer(p7, cert, pkey, md, pkcs7_flags)) { in sign_pkcs7() 407 X509 *cert in libfsverity_sign_digest() local 116 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument 253 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument [all...] |
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
| H A D | dlp_file_manager.cpp | 96 std::vector<uint8_t> cert; in GenerateCertData() local 98 int32_t result = DlpPermissionKit::GenerateDlpCertificate(policy, cert); in GenerateCertData() 101 DLP_LOG_ERROR(LABEL, "Generate dlp cert fail, errno=%{public}d", result); in GenerateCertData() 104 return GenerateCertBlob(cert, certData); in GenerateCertData() 107 int32_t DlpFileManager::GenerateCertBlob(const std::vector<uint8_t>& cert, struct DlpBlob& certData) const in GenerateCertBlob() argument 109 size_t certSize = cert.size(); in GenerateCertBlob() 111 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert is too large, size=%{public}zu", certSize); in GenerateCertBlob() 115 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert i in GenerateCertBlob() 221 UpdateDlpFile(bool isNeedAdapter, uint32_t oldCertSize, const std::string& workDir, const std::vector<uint8_t>& cert, std::shared_ptr<DlpFile>& filePtr) UpdateDlpFile() argument 256 struct DlpBlob cert; ParseDlpFileFormat() local [all...] |
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_lib.c | 524 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 546 cch->d.certificate = cert; in CMS_add0_cert() 550 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 553 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 555 X509_up_ref(cert); in CMS_add1_cert() 679 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 682 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 685 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 697 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 716 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |
| /third_party/openssl/crypto/cms/ |
| H A D | cms_lib.c | 511 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 533 cch->d.certificate = cert; in CMS_add0_cert() 537 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 540 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 542 X509_up_ref(cert); in CMS_add1_cert() 666 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 669 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 672 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 684 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 703 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |
| /base/security/code_signature/utils/src/ |
| H A D | signer_info.cpp | 41 bool SignerInfo::InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md,
in InitSignerInfo() argument 44 if ((cert == nullptr) || (md == nullptr)) {
in InitSignerInfo() 61 // add sign cert info
in InitSignerInfo() 63 X509_get_issuer_name(cert))) {
in InitSignerInfo() 68 ASN1_INTEGER_dup(X509_get_serialNumber(cert)))) {
in InitSignerInfo() 77 int signatureNid = GetSignAlgorithmID(cert);
in InitSignerInfo() 208 int SignerInfo::GetSignAlgorithmID(const X509 *cert)
in GetSignAlgorithmID() argument 210 X509_PUBKEY *xpkey = X509_get_X509_PUBKEY(cert);
in GetSignAlgorithmID()
|
| /base/update/packaging_tools/ |
| H A D | build_pkcs7.py | 184 cert = load_public_cert() 187 signed_data['certificates'] = [cert] 199 issuer = cert.issuer 200 serial_number = cert.serial_number 202 issuer_and_serial['issuer'] = cert.issuer 203 issuer_and_serial['serial_number'] = cert.serial_number 205 key_id = cert.key_identifier_value.native
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /base/security/code_signature/services/local_code_sign/src/ |
| H A D | local_code_sign_stub.cpp | 77 ByteBuffer cert;
in InitLocalCertificateInner() local 78 int32_t result = InitLocalCertificate(challenge, cert);
in InitLocalCertificateInner() 85 if (!reply.WriteUint32(cert.GetSize())) {
in InitLocalCertificateInner() 88 if (!reply.WriteBuffer(cert.GetBuffer(), cert.GetSize())) {
in InitLocalCertificateInner()
|
| /third_party/node/test/fixtures/ |
| H A D | tls-connect.js | 35 function load(cert, root) { 36 root = root || cert; // Assume self-signed if no issuer. 38 key: fixtures.readKey(cert + '-key.pem', 'binary'), 39 cert: fixtures.readKey(cert + '-cert.pem', 'binary'), 40 ca: fixtures.readKey(root + '-cert.pem', 'binary'),
|
| /third_party/openssl/test/testutil/ |
| H A D | load.c | 20 X509 *cert = NULL; in load_cert_pem() local 26 && TEST_ptr(cert = X509_new_ex(libctx, NULL))) in load_cert_pem() 27 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL)); in load_cert_pem() 30 return cert; in load_cert_pem()
|
| /third_party/openssl/demos/pkcs12/ |
| H A D | pkread.c | 52 X509 *cert = NULL; in main() local 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 91 if (cert != NULL) { in main() 93 PEM_write_X509_AUX(fp, cert); in main() 106 X509_free(cert); in main()
|
| /base/security/code_signature/services/key_enable/src/ |
| H A D | cert_chain_utils.rs | 63 for cert in x509_certs {
in to_x509_store() 64 store_builder.add_cert(cert).unwrap();
in to_x509_store() 73 x509_certs.iter().map(|cert| cert.to_der()).collect()
in to_der()
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/ |
| H A D | dlp_permission_async_proxy.cpp | 30 void DlpPermissionAsyncProxy::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument 42 if (!data.WriteUInt8Vector(cert)) { in OnGenerateDlpCertificate() 64 const std::vector<uint8_t>& cert) in OnParseDlpCertificate() 85 if (!data.WriteUInt8Vector(cert)) { in OnParseDlpCertificate() 63 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
|
| /third_party/node/test/sequential/ |
| H A D | test-tls-session-timeout.js | 55 const cert = fixtures.readKey('rsa_cert.crt'); 58 cert: cert, 59 ca: [cert],
|