| /third_party/node/test/fixtures/ |
| H A D | tls-connect.js | 35 function load(cert, root) { 36 root = root || cert; // Assume self-signed if no issuer. 38 key: fixtures.readKey(cert + '-key.pem', 'binary'), 39 cert: fixtures.readKey(cert + '-cert.pem', 'binary'), 40 ca: fixtures.readKey(root + '-cert.pem', 'binary'),
|
| /third_party/openssl/test/testutil/ |
| H A D | load.c | 20 X509 *cert = NULL; in load_cert_pem() local 26 && TEST_ptr(cert = X509_new_ex(libctx, NULL))) in load_cert_pem() 27 (void)TEST_ptr(cert = PEM_read_bio_X509(bio, &cert, NULL, NULL)); in load_cert_pem() 30 return cert; in load_cert_pem()
|
| /third_party/openssl/demos/pkcs12/ |
| H A D | pkread.c | 52 X509 *cert = NULL; in main() local 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 91 if (cert != NULL) { in main() 93 PEM_write_X509_AUX(fp, cert); in main() 106 X509_free(cert); in main()
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /base/security/code_signature/services/key_enable/src/ |
| H A D | cert_chain_utils.rs | 63 for cert in x509_certs {
in to_x509_store() 64 store_builder.add_cert(cert).unwrap();
in to_x509_store() 73 x509_certs.iter().map(|cert| cert.to_der()).collect()
in to_der()
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/ |
| H A D | dlp_permission_async_proxy.cpp | 30 void DlpPermissionAsyncProxy::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument 42 if (!data.WriteUInt8Vector(cert)) { in OnGenerateDlpCertificate() 64 const std::vector<uint8_t>& cert) in OnParseDlpCertificate() 85 if (!data.WriteUInt8Vector(cert)) { in OnParseDlpCertificate() 63 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
|
| /foundation/communication/netstack/interfaces/innerkits/rust/ylong_http_client/src/reqwest_impl/async_impl/ |
| H A D | mod.rs | 301 /// # fn set_cert(cert: Certificate) { 302 /// let builder = ClientBuilder::new().add_root_certificate(cert); 305 pub fn add_root_certificate(mut self, cert: Certificate) -> Self { in add_root_certificate() 306 for cert in cert.into_inner() { in add_root_certificate() 307 self = Self(self.0.add_root_certificate(cert)); in add_root_certificate()
|
| /third_party/node/test/parallel/ |
| H A D | test-tls-client-getephemeralkeyinfo.js | 12 const cert = fixtures.readKey('agent2-cert.pem'); 26 cert: cert, 42 } = new X509Certificate(cert));
|
| H A D | test-tls-enable-trace-cli.js | 49 checkServerIdentity: (servername, cert) => { }, 50 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 53 cert: keys.agent6.cert,
|
| H A D | test-tls-enable-keylog-cli.js | 41 checkServerIdentity: (servername, cert) => { }, 42 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 45 cert: keys.agent6.cert,
|
| H A D | test-tls-sni-server-client.js | 38 cert: loadPEM('agent2-cert') 44 cert: loadPEM('agent1-cert') 48 cert: loadPEM('agent3-cert') 52 // NOTE: Contains ca3 chain cert 53 cert: loadPEM('agent6-cert') 59 ca: [loadPEM('ca1-cert')], [all...] |
| H A D | test-tls-no-rsa-key.js | 33 cert: fixtures.readKey('ec-cert.pem') 51 const cert = c.getPeerCertificate(); 52 assert.strictEqual(cert.subject.C, 'US');
|
| H A D | test-tls-peer-certificate-multi-keys.js | 33 cert: fixtures.readKey('rsa_cert.crt') 41 const cert = socket.getCertificate(); 42 // The server's local cert is the client's peer cert. 44 cert.subject.OU,
|
| H A D | test-tls-multiple-cas-as-string.js | 13 const ca1 = fixtures.readKey('ca1-cert.pem', 'utf8'); 14 const ca2 = fixtures.readKey('ca2-cert.pem', 'utf8'); 15 const cert = fixtures.readKey('agent3-cert.pem', 'utf8'); 19 const server = tls.createServer({ ca, cert, key }); 21 server.addContext('agent3', { ca, cert, key });
|
| /third_party/node/test/sequential/ |
| H A D | test-tls-session-timeout.js | 55 const cert = fixtures.readKey('rsa_cert.crt'); 58 cert: cert, 59 ca: [cert],
|
| /third_party/node/test/addons/openssl-client-cert-engine/ |
| H A D | testengine.cc | 20 #define AGENT_CERT "test/fixtures/keys/agent1-cert.pem" 58 std::string cert = LoadFile(AGENT_CERT); in EngineLoadSSLClientCert() local 59 if (cert.empty()) { in EngineLoadSSLClientCert() 63 BIO* bio = BIO_new_mem_buf(cert.data(), cert.size()); in EngineLoadSSLClientCert()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_rsa.c | 42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate() 50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local 74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file() 77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file() 84 if (cert == NULL) { in SSL_use_certificate_file() 146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey() 224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate() 258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert() 259 * key (when switching to a different cert & key, first this in ssl_set_cert() 282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_rsa.c | 42 return ssl_set_cert(ssl->cert, x); in SSL_use_certificate() 50 X509 *cert = NULL, *x = NULL; in SSL_use_certificate_file() local 74 cert = d2i_X509_bio(in, &x); in SSL_use_certificate_file() 77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, in SSL_use_certificate_file() 84 if (cert == NULL) { in SSL_use_certificate_file() 146 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey() 224 return ssl_set_cert(ctx->cert, x); in SSL_CTX_use_certificate() 258 * don't fail for a cert/key mismatch, just free current private in ssl_set_cert() 259 * key (when switching to a different cert & key, first this in ssl_set_cert() 282 X509 *x = NULL, *cert in SSL_CTX_use_certificate_file() local [all...] |
| /base/update/updater/services/package/pkg_verify/ |
| H A D | openssl_util.h | 30 std::string GetX509CertSubjectName(X509 *cert); 31 std::string GetX509CertIssuerName(X509 *cert); 32 bool VerifyX509CertByIssuerCert(X509 *cert, X509 *issuerCert);
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| H A D | x509_parser.h | 47 extern void x509_free_certificate(struct x509_certificate *cert); 56 extern int x509_get_sig_params(struct x509_certificate *cert); 57 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| H A D | x509_parser.h | 46 extern void x509_free_certificate(struct x509_certificate *cert); 55 extern int x509_get_sig_params(struct x509_certificate *cert); 56 extern int x509_check_for_self_signed(struct x509_certificate *cert);
|
| /test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/ |
| H A D | publicCertificateCallback.js | 18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert.createX509Cert(encodingBlob, (err, data) => {
81 certformat = cert.EncodingFormat.FORMAT_PEM;
84 certformat = cert.EncodingFormat.FORMAT_PEM;
96 cert.createX509Cert(encodingBlob, (err, data) => {
175 if (String(err).indexOf("check cert validity failed") != -1) {
344 certformat = cert [all...] |