Home
last modified time | relevance | path

Searched refs:cert (Results 151 - 175 of 1243) sorted by relevance

12345678910>>...50

/third_party/node/test/fixtures/
H A Dtls-connect.js35 function load(cert, root) {
36 root = root || cert; // Assume self-signed if no issuer.
38 key: fixtures.readKey(cert + '-key.pem', 'binary'),
39 cert: fixtures.readKey(cert + '-cert.pem', 'binary'),
40 ca: fixtures.readKey(root + '-cert.pem', 'binary'),
/third_party/openssl/test/testutil/
H A Dload.c20 X509 *cert = NULL; in load_cert_pem() local
26 && TEST_ptr(cert = X509_new_ex(libctx, NULL))) in load_cert_pem()
27 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL)); in load_cert_pem()
30 return cert; in load_cert_pem()
/third_party/openssl/demos/pkcs12/
H A Dpkread.c52 X509 *cert = NULL; in main() local
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main()
91 if (cert != NULL) { in main()
93 PEM_write_X509_AUX(fp, cert); in main()
106 X509_free(cert); in main()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_all.c455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument
458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest()
459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest()
462 *len = sizeof(cert->sha1_hash); in X509_digest()
463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest()
466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest()
467 data, len, cert->libctx, cert->propq); in X509_digest()
470 /* calculate cert diges
471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument
[all...]
/third_party/openssl/crypto/x509/
H A Dx_all.c455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument
458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest()
459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest()
462 *len = sizeof(cert->sha1_hash); in X509_digest()
463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest()
466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest()
467 data, len, cert->libctx, cert->propq); in X509_digest()
470 /* calculate cert diges
471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument
[all...]
/base/security/code_signature/services/key_enable/src/
H A Dcert_chain_utils.rs63 for cert in x509_certs { in to_x509_store()
64 store_builder.add_cert(cert).unwrap(); in to_x509_store()
73 x509_certs.iter().map(|cert| cert.to_der()).collect() in to_der()
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/
H A Ddlp_permission_async_proxy.cpp30 void DlpPermissionAsyncProxy::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument
42 if (!data.WriteUInt8Vector(cert)) { in OnGenerateDlpCertificate()
64 const std::vector<uint8_t>& cert) in OnParseDlpCertificate()
85 if (!data.WriteUInt8Vector(cert)) { in OnParseDlpCertificate()
63 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
/foundation/communication/netstack/interfaces/innerkits/rust/ylong_http_client/src/reqwest_impl/async_impl/
H A Dmod.rs301 /// # fn set_cert(cert: Certificate) {
302 /// let builder = ClientBuilder::new().add_root_certificate(cert);
305 pub fn add_root_certificate(mut self, cert: Certificate) -> Self { in add_root_certificate()
306 for cert in cert.into_inner() { in add_root_certificate()
307 self = Self(self.0.add_root_certificate(cert)); in add_root_certificate()
/third_party/node/test/parallel/
H A Dtest-tls-client-getephemeralkeyinfo.js12 const cert = fixtures.readKey('agent2-cert.pem');
26 cert: cert,
42 } = new X509Certificate(cert));
H A Dtest-tls-enable-trace-cli.js49 checkServerIdentity: (servername, cert) => { },
50 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
53 cert: keys.agent6.cert,
H A Dtest-tls-enable-keylog-cli.js41 checkServerIdentity: (servername, cert) => { },
42 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
45 cert: keys.agent6.cert,
H A Dtest-tls-sni-server-client.js38 cert: loadPEM('agent2-cert')
44 cert: loadPEM('agent1-cert')
48 cert: loadPEM('agent3-cert')
52 // NOTE: Contains ca3 chain cert
53 cert: loadPEM('agent6-cert')
59 ca: [loadPEM('ca1-cert')],
[all...]
H A Dtest-tls-no-rsa-key.js33 cert: fixtures.readKey('ec-cert.pem')
51 const cert = c.getPeerCertificate();
52 assert.strictEqual(cert.subject.C, 'US');
H A Dtest-tls-peer-certificate-multi-keys.js33 cert: fixtures.readKey('rsa_cert.crt')
41 const cert = socket.getCertificate();
42 // The server's local cert is the client's peer cert.
44 cert.subject.OU,
H A Dtest-tls-multiple-cas-as-string.js13 const ca1 = fixtures.readKey('ca1-cert.pem', 'utf8');
14 const ca2 = fixtures.readKey('ca2-cert.pem', 'utf8');
15 const cert = fixtures.readKey('agent3-cert.pem', 'utf8');
19 const server = tls.createServer({ ca, cert, key });
21 server.addContext('agent3', { ca, cert, key });
/third_party/node/test/sequential/
H A Dtest-tls-session-timeout.js55 const cert = fixtures.readKey('rsa_cert.crt');
58 cert: cert,
59 ca: [cert],
/third_party/node/test/addons/openssl-client-cert-engine/
H A Dtestengine.cc20 #define AGENT_CERT "test/fixtures/keys/agent1-cert.pem"
58 std::string cert = LoadFile(AGENT_CERT); in EngineLoadSSLClientCert() local
59 if (cert.empty()) { in EngineLoadSSLClientCert()
63 BIO* bio = BIO_new_mem_buf(cert.data(), cert.size()); in EngineLoadSSLClientCert()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member
35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member
35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_rsa.c42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate()
50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local
74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file()
77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file()
84 if (cert == NULL) { in SSL_use_certificate_file()
146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey()
224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate()
258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert()
259 * key (when switching to a different cert & key, first this in ssl_set_cert()
282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local
[all...]
/third_party/openssl/ssl/
H A Dssl_rsa.c42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate()
50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local
74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file()
77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file()
84 if (cert == NULL) { in SSL_use_certificate_file()
146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey()
224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate()
258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert()
259 * key (when switching to a different cert & key, first this in ssl_set_cert()
282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local
[all...]
/base/update/updater/services/package/pkg_verify/
H A Dopenssl_util.h30 std::string GetX509CertSubjectName(X509 *cert);
31 std::string GetX509CertIssuerName(X509 *cert);
32 bool VerifyX509CertByIssuerCert(X509 *cert, X509 *issuerCert);
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dx509_parser.h47 extern void x509_free_certificate(struct x509_certificate *cert);
56 extern int x509_get_sig_params(struct x509_certificate *cert);
57 extern int x509_check_for_self_signed(struct x509_certificate *cert);
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dx509_parser.h46 extern void x509_free_certificate(struct x509_certificate *cert);
55 extern int x509_get_sig_params(struct x509_certificate *cert);
56 extern int x509_check_for_self_signed(struct x509_certificate *cert);
/test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/
H A DpublicCertificateCallback.js18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert.createX509Cert(encodingBlob, (err, data) => {
81 certformat = cert.EncodingFormat.FORMAT_PEM;
84 certformat = cert.EncodingFormat.FORMAT_PEM;
96 cert.createX509Cert(encodingBlob, (err, data) => {
175 if (String(err).indexOf("check cert validity failed") != -1) {
344 certformat = cert
[all...]

Completed in 11 milliseconds

12345678910>>...50