| /test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/ |
| H A D | publicCertificatePromise.js | 18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert
82 certformat = cert.EncodingFormat.FORMAT_PEM;
85 certformat = cert.EncodingFormat.FORMAT_PEM;
97 cert
163 if (String(err).indexOf("check cert validity failed") != -1) {
326 certformat = cert [all...] |
| /third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
| H A D | ssl_lib.c | 191 CERT *cert; in SSL_CTX_new() local 208 cert = ssl_cert_new(rngctx); in SSL_CTX_new() 209 if (!cert) { in SSL_CTX_new() 222 ctx->cert = cert; in SSL_CTX_new() 235 lwsl_err("%s: unable to load cert bundle 0x%x\n", __func__, -n); in SSL_CTX_new() 237 lwsl_info("%s: loaded cert bundle %d\n", __func__, n); in SSL_CTX_new() 244 ssl_cert_free(cert); in SSL_CTX_new() 258 ssl_cert_free(ctx->cert); in SSL_CTX_free() 320 ssl->cert in SSL_new() [all...] |
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
| H A D | cert_manager_query.c | 232 CM_LOG_E("malloc certfile for cert failed");
in GetCertNameAndPath() 258 CM_LOG_D("no cert file in path");
in CreateCertFile() 278 CM_LOG_E("cert count beyond MAX");
in CreateCertFile() 284 CM_LOG_E("malloc certfile for cert failed");
in CreateCertFile() 408 X509 *cert = InitCertContext(certData->data, certData->size);
in GetSysCertAlias() local 409 if (cert == NULL) {
in GetSysCertAlias() 410 CM_LOG_E("cert data can't convert x509 format");
in GetSysCertAlias() 414 int32_t aliasLen = GetX509SubjectName(cert, CM_ORGANIZATION_NAME, (char *)alias->data, alias->size);
in GetSysCertAlias() 416 aliasLen = GetX509SubjectName(cert, CM_COMMON_NAME, (char *)alias->data, alias->size);
in GetSysCertAlias() 419 FreeCertContext(cert);
in GetSysCertAlias() 452 X509 *cert = InitCertContext(certData->data, certData->size); CmGetCertSubjectName() local [all...] |
| /third_party/openssl/test/ |
| H A D | cmp_msg_test.c | 67 static X509 *cert = NULL; variable 173 /* newkey used by default for signing does not match cert: */ in test_cmp_create_ir_protection_fails() 174 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_cmp_create_ir_protection_fails() 262 || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_kur() 290 X509_dup(cert)))) { in test_cmp_create_certconf() 304 X509_dup(cert)))) { in test_cmp_create_certconf_badAlg() 318 X509_dup(cert)))) { in test_cmp_create_certconf_fail_info_max() 355 if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_rr() 398 X509_dup(cert)) == NULL in execute_certrep_create() 408 if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromres in execute_certrep_create() [all...] |
| /base/security/appverify/interfaces/innerkits/appverify/src/init/ |
| H A D | hap_crl_manager.cpp | 173 bool HapCrlManager::CrlCheck(X509* cert, X509_CRL* targetCrl, Pkcs7Context& pkcs7Context)
in CrlCheck() argument 175 if (cert == nullptr) {
in CrlCheck() 189 if (X509_CRL_get0_by_cert(targetCrl, &revoked, cert) != 0) {
in CrlCheck() 192 HapCertVerifyOpensslUtils::GetSerialNumberFromX509(cert, certNumber);
in CrlCheck() 193 HapCertVerifyOpensslUtils::GetSubjectFromX509(cert, certSuject);
in CrlCheck() 194 HAPVERIFY_LOG_ERROR("cert(issuer: %{public}s, subject: %{public}s, number:%{public}lld) is revoked",
in CrlCheck()
|
| /kernel/linux/linux-5.10/certs/ |
| H A D | Makefile | 26 cmd_extract_certs = scripts/extract-cert $(2) $@ 29 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED_KEYS_FILENAME) FORCE 126 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE 137 cmd_extract_certs = scripts/extract-cert $(2) $@ 140 $(obj)/x509_revocation_list: scripts/extract-cert $(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(SYSTEM_REVOCATION_KEYS_FILENAME) FORCE
|
| /base/request/request/services/src/task/ |
| H A D | client.rs | 63 for cert in certs.into_iter() { 64 client = client.add_root_certificate(cert) 70 for cert in certificates.into_iter() { 71 client = client.add_root_certificate(cert) 186 let cert = cvt_res_error!( in build_task_certs() 188 "Parse task cert failed - idx: {}, path: {}", in build_task_certs() 192 certs.push(cert); in build_task_certs()
|
| /third_party/rust/crates/rust-openssl/openssl/examples/ |
| H A D | mk_certs.rs | 60 let cert = cert_builder.build(); in mk_ca_cert() 62 Ok((cert, key_pair)) in mk_ca_cert() 83 /// Make a certificate and private key signed by the given CA cert and private key 137 let cert = cert_builder.build(); in mk_ca_signed_cert() 139 Ok((cert, key_pair)) in mk_ca_signed_cert() 144 let (cert, _key_pair) = mk_ca_signed_cert(&ca_cert, &ca_key_pair)?; in real_main() 146 // Verify that this cert was issued by this ca in real_main() 147 match ca_cert.issued(&cert) { in real_main()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | notify.c | 1106 struct tls_cert_data *cert, in wpas_notify_certification() 1113 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 1115 cert->tod == 2 ? " tod=2" : "", in wpas_notify_certification() 1116 cert->tod == 1 ? " tod=1" : ""); in wpas_notify_certification() 1118 if (cert->cert) { in wpas_notify_certification() 1120 size_t len = wpabuf_len(cert->cert) * 2 + 1; in wpas_notify_certification() 1123 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert in wpas_notify_certification() 1105 wpas_notify_certification(struct wpa_supplicant *wpa_s, struct tls_cert_data *cert, const char *cert_hash) wpas_notify_certification() argument [all...] |
| /third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
| H A D | ssl_pm.c | 255 struct pkey_pm *pkey_pm = (struct pkey_pm *)ssl->cert->pkey->pkey_pm; in ssl_pm_reload_crt() 256 struct x509_pm *crt_pm = (struct x509_pm *)ssl->cert->x509->x509_pm; in ssl_pm_reload_crt() 321 printf("%s: cert reload failed\n", __func__); in ssl_pm_handshake() 375 struct x509_pm *x509_pm = (struct x509_pm *)ssl_ctx->cert->x509->x509_pm; in ssl_ctx_get_mbedtls_x509_crt() 850 * @brief set expected hostname on peer cert CN 960 if (!ctx->cert || !ctx->cert->x509) in SSL_set_SSL_CTX() 962 x509_pm = (struct x509_pm *)ctx->cert->x509->x509_pm; in SSL_set_SSL_CTX() 970 if (!ctx->cert || !ctx->cert in SSL_set_SSL_CTX() [all...] |
| /base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/ |
| H A D | parsecert_fuzzer.cpp | 44 std::vector<uint8_t> cert((data + offsize), data + size); in FuzzTest() 45 certParcel->cert = cert; in FuzzTest()
|
| /kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
| /kernel/linux/linux-6.6/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 19 struct cap_ioc_get_ims_certificate cert = { variable 66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main() 73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
|
| /third_party/node/test/parallel/ |
| H A D | test-https-agent-session-injection.js | 15 cert: fixtures.readKey('agent1-cert.pem'), 23 const ca = [ fixtures.readKey('ca1-cert.pem') ]; 41 'Host: nodejs.org. is not cert\'s CN: agent1'); 56 'Host: nodejs.org. is not cert\'s CN: agent1');
|
| H A D | test-tls-add-context.js | 17 cert: loadPEM('agent2-cert'), 18 ca: [ loadPEM('ca2-cert') ], 38 cert: loadPEM('agent1-cert'), 39 ca: [ loadPEM('ca1-cert') ], 46 cert: loadPEM('agent1-cert'), 47 ca: [ loadPEM('ca1-cert') ],
|
| /third_party/openssl/demos/pkcs12/ |
| H A D | pkwrite.c | 22 X509 *cert; in main() local 34 cert = PEM_read_X509(fp, NULL, NULL, NULL); in main() 38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); in main()
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_lib.c | 337 X509 *cert = NULL; in dane_tlsa_add() local 342 if (!d2i_X509(&cert, &p, ilen) || p < data || in dane_tlsa_add() 344 X509_free(cert); in dane_tlsa_add() 349 if (X509_get0_pubkey(cert) == NULL) { in dane_tlsa_add() 350 X509_free(cert); in dane_tlsa_add() 369 X509_free(cert); in dane_tlsa_add() 382 !sk_X509_push(dane->certs, cert)) { in dane_tlsa_add() 384 X509_free(cert); in dane_tlsa_add() 727 OSSL_default_cipher_list(), ctx->cert); in SSL_CTX_set_ssl_version() 788 s->cert in SSL_new() 5230 X509 *cert = s->session != NULL ? s->session->peer : NULL; ct_extract_x509v3_extension_scts() local 5348 X509 *cert = s->session != NULL ? s->session->peer : NULL; ssl_validate_ct() local [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_lib.c | 337 X509 *cert = NULL; in dane_tlsa_add() local 342 if (!d2i_X509(&cert, &p, ilen) || p < data || in dane_tlsa_add() 344 X509_free(cert); in dane_tlsa_add() 349 if (X509_get0_pubkey(cert) == NULL) { in dane_tlsa_add() 350 X509_free(cert); in dane_tlsa_add() 357 X509_free(cert); in dane_tlsa_add() 371 !sk_X509_push(dane->certs, cert)) { in dane_tlsa_add() 373 X509_free(cert); in dane_tlsa_add() 667 OSSL_default_cipher_list(), ctx->cert); in SSL_CTX_set_ssl_version() 728 s->cert in SSL_new() 5111 X509 *cert = s->session != NULL ? s->session->peer : NULL; ct_extract_x509v3_extension_scts() local 5229 X509 *cert = s->session != NULL ? s->session->peer : NULL; ssl_validate_ct() local [all...] |
| /third_party/python/Lib/test/ |
| H A D | test_ssl.py | 135 # cert with all kinds of subject alt names 686 """Wrapping with an empty cert file""" 699 def ok(cert, hostname): 700 ssl.match_hostname(cert, hostname) 701 def fail(cert, hostname): 703 ssl.match_hostname, cert, hostname) 707 cert = {'subject': ((('commonName', 'example.com'),),)} 708 ok(cert, 'example.com') 709 ok(cert, 'ExAmple.cOm') 710 fail(cert, 'ww [all...] |
| /base/security/dlp_permission_service/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/ |
| H A D | parsecertstub_fuzzer.cpp | 73 std::vector<uint8_t> cert; in FuzzTest() local 74 cert.assign(certStr.begin(), certStr.end()); in FuzzTest() 75 certParcel->cert = cert; in FuzzTest()
|
| /kernel/linux/linux-5.10/scripts/ |
| H A D | extract-cert.c | 39 "Usage: scripts/extract-cert <source> <dest>\n"); in format() 94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert() 125 X509 *cert; in main() member 129 parms.cert = NULL; in main() 142 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 143 write_cert(parms.cert); in main()
|
| /kernel/linux/linux-6.6/certs/ |
| H A D | extract-cert.c | 39 "Usage: extract-cert <source> <dest>\n"); in format() 94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert() 128 X509 *cert; in main() member 132 parms.cert = NULL; in main() 145 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main() 146 write_cert(parms.cert); in main()
|
| /third_party/openssl/test/recipes/ |
| H A D | tconversion.pl | 123 my $cert = shift @_; 128 run(app(["openssl", "x509", "-noout", "-text", "-in", $cert, "-out", $out])); 130 "$cert should ".($expected ? "" : "not ")."contain $pattern"); 148 my $cert = shift @_; 154 "-in", $cert, "-out", $out])); 156 "$cert '$exts' output should contain $expected different lines");
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | x509v3.h | 126 void x509_certificate_free(struct x509_certificate *cert); 137 void x509_certificate_chain_free(struct x509_certificate *cert); 143 struct x509_certificate *cert); 150 int x509_certificate_self_signed(struct x509_certificate *cert);
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | x509v3.h | 133 void x509_certificate_free(struct x509_certificate *cert); 144 void x509_certificate_chain_free(struct x509_certificate *cert); 150 struct x509_certificate *cert); 157 int x509_certificate_self_signed(struct x509_certificate *cert);
|