Home
last modified time | relevance | path

Searched refs:cert (Results 176 - 200 of 1243) sorted by relevance

12345678910>>...50

/test/xts/acts/security/certificate_framework/js_api_test_one/entry/src/ohosTest/js/test/utils/certificate/
H A DpublicCertificatePromise.js18 import cert from "@ohos.security.cert";
42 certformat = cert.EncodingFormat.FORMAT_DER;
49 certformat = cert.EncodingFormat.FORMAT_PEM;
59 cert
82 certformat = cert.EncodingFormat.FORMAT_PEM;
85 certformat = cert.EncodingFormat.FORMAT_PEM;
97 cert
163 if (String(err).indexOf("check cert validity failed") != -1) {
326 certformat = cert
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
H A Dssl_lib.c191 CERT *cert; in SSL_CTX_new() local
208 cert = ssl_cert_new(rngctx); in SSL_CTX_new()
209 if (!cert) { in SSL_CTX_new()
222 ctx->cert = cert; in SSL_CTX_new()
235 lwsl_err("%s: unable to load cert bundle 0x%x\n", __func__, -n); in SSL_CTX_new()
237 lwsl_info("%s: loaded cert bundle %d\n", __func__, n); in SSL_CTX_new()
244 ssl_cert_free(cert); in SSL_CTX_new()
258 ssl_cert_free(ctx->cert); in SSL_CTX_free()
320 ssl->cert in SSL_new()
[all...]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
H A Dcert_manager_query.c232 CM_LOG_E("malloc certfile for cert failed"); in GetCertNameAndPath()
258 CM_LOG_D("no cert file in path"); in CreateCertFile()
278 CM_LOG_E("cert count beyond MAX"); in CreateCertFile()
284 CM_LOG_E("malloc certfile for cert failed"); in CreateCertFile()
408 X509 *cert = InitCertContext(certData->data, certData->size); in GetSysCertAlias() local
409 if (cert == NULL) { in GetSysCertAlias()
410 CM_LOG_E("cert data can't convert x509 format"); in GetSysCertAlias()
414 int32_t aliasLen = GetX509SubjectName(cert, CM_ORGANIZATION_NAME, (char *)alias->data, alias->size); in GetSysCertAlias()
416 aliasLen = GetX509SubjectName(cert, CM_COMMON_NAME, (char *)alias->data, alias->size); in GetSysCertAlias()
419 FreeCertContext(cert); in GetSysCertAlias()
452 X509 *cert = InitCertContext(certData->data, certData->size); CmGetCertSubjectName() local
[all...]
/third_party/openssl/test/
H A Dcmp_msg_test.c67 static X509 *cert = NULL; variable
173 /* newkey used by default for signing does not match cert: */ in test_cmp_create_ir_protection_fails()
174 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_cmp_create_ir_protection_fails()
262 || !TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_kur()
290 X509_dup(cert)))) { in test_cmp_create_certconf()
304 X509_dup(cert)))) { in test_cmp_create_certconf_badAlg()
318 X509_dup(cert)))) { in test_cmp_create_certconf_fail_info_max()
355 if (!TEST_true(OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, cert))) { in test_cmp_create_rr()
398 X509_dup(cert)) == NULL in execute_certrep_create()
408 if (certfromresp == NULL || !TEST_int_eq(X509_cmp(cert, certfromres in execute_certrep_create()
[all...]
/base/security/appverify/interfaces/innerkits/appverify/src/init/
H A Dhap_crl_manager.cpp173 bool HapCrlManager::CrlCheck(X509* cert, X509_CRL* targetCrl, Pkcs7Context& pkcs7Context) in CrlCheck() argument
175 if (cert == nullptr) { in CrlCheck()
189 if (X509_CRL_get0_by_cert(targetCrl, &revoked, cert) != 0) { in CrlCheck()
192 HapCertVerifyOpensslUtils::GetSerialNumberFromX509(cert, certNumber); in CrlCheck()
193 HapCertVerifyOpensslUtils::GetSubjectFromX509(cert, certSuject); in CrlCheck()
194 HAPVERIFY_LOG_ERROR("cert(issuer: %{public}s, subject: %{public}s, number:%{public}lld) is revoked", in CrlCheck()
/kernel/linux/linux-5.10/certs/
H A DMakefile26 cmd_extract_certs = scripts/extract-cert $(2) $@
29 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED_KEYS_FILENAME) FORCE
126 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
137 cmd_extract_certs = scripts/extract-cert $(2) $@
140 $(obj)/x509_revocation_list: scripts/extract-cert $(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(SYSTEM_REVOCATION_KEYS_FILENAME) FORCE
/base/request/request/services/src/task/
H A Dclient.rs63 for cert in certs.into_iter() {
64 client = client.add_root_certificate(cert)
70 for cert in certificates.into_iter() {
71 client = client.add_root_certificate(cert)
186 let cert = cvt_res_error!( in build_task_certs()
188 "Parse task cert failed - idx: {}, path: {}", in build_task_certs()
192 certs.push(cert); in build_task_certs()
/third_party/rust/crates/rust-openssl/openssl/examples/
H A Dmk_certs.rs60 let cert = cert_builder.build(); in mk_ca_cert()
62 Ok((cert, key_pair)) in mk_ca_cert()
83 /// Make a certificate and private key signed by the given CA cert and private key
137 let cert = cert_builder.build(); in mk_ca_signed_cert()
139 Ok((cert, key_pair)) in mk_ca_signed_cert()
144 let (cert, _key_pair) = mk_ca_signed_cert(&ca_cert, &ca_key_pair)?; in real_main()
146 // Verify that this cert was issued by this ca in real_main()
147 match ca_cert.issued(&cert) { in real_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dnotify.c1106 struct tls_cert_data *cert, in wpas_notify_certification()
1113 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification()
1115 cert->tod == 2 ? " tod=2" : "", in wpas_notify_certification()
1116 cert->tod == 1 ? " tod=1" : ""); in wpas_notify_certification()
1118 if (cert->cert) { in wpas_notify_certification()
1120 size_t len = wpabuf_len(cert->cert) * 2 + 1; in wpas_notify_certification()
1123 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert in wpas_notify_certification()
1105 wpas_notify_certification(struct wpa_supplicant *wpa_s, struct tls_cert_data *cert, const char *cert_hash) wpas_notify_certification() argument
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/
H A Dssl_pm.c255 struct pkey_pm *pkey_pm = (struct pkey_pm *)ssl->cert->pkey->pkey_pm; in ssl_pm_reload_crt()
256 struct x509_pm *crt_pm = (struct x509_pm *)ssl->cert->x509->x509_pm; in ssl_pm_reload_crt()
321 printf("%s: cert reload failed\n", __func__); in ssl_pm_handshake()
375 struct x509_pm *x509_pm = (struct x509_pm *)ssl_ctx->cert->x509->x509_pm; in ssl_ctx_get_mbedtls_x509_crt()
850 * @brief set expected hostname on peer cert CN
960 if (!ctx->cert || !ctx->cert->x509) in SSL_set_SSL_CTX()
962 x509_pm = (struct x509_pm *)ctx->cert->x509->x509_pm; in SSL_set_SSL_CTX()
970 if (!ctx->cert || !ctx->cert in SSL_set_SSL_CTX()
[all...]
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/parsecert_fuzzer/
H A Dparsecert_fuzzer.cpp44 std::vector<uint8_t> cert((data + offsize), data + size); in FuzzTest()
45 certParcel->cert = cert; in FuzzTest()
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c19 struct cap_ioc_get_ims_certificate cert = { variable
66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main()
73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
/kernel/linux/linux-6.6/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c19 struct cap_ioc_get_ims_certificate cert = { variable
66 ret = ioctl(fd, CAP_IOC_GET_IMS_CERTIFICATE, &cert); in main()
73 printf("IMS Certificate size: %d\n", cert.cert_size); in main()
/third_party/node/test/parallel/
H A Dtest-https-agent-session-injection.js15 cert: fixtures.readKey('agent1-cert.pem'),
23 const ca = [ fixtures.readKey('ca1-cert.pem') ];
41 'Host: nodejs.org. is not cert\'s CN: agent1');
56 'Host: nodejs.org. is not cert\'s CN: agent1');
H A Dtest-tls-add-context.js17 cert: loadPEM('agent2-cert'),
18 ca: [ loadPEM('ca2-cert') ],
38 cert: loadPEM('agent1-cert'),
39 ca: [ loadPEM('ca1-cert') ],
46 cert: loadPEM('agent1-cert'),
47 ca: [ loadPEM('ca1-cert') ],
/third_party/openssl/demos/pkcs12/
H A Dpkwrite.c22 X509 *cert; in main() local
34 cert = PEM_read_X509(fp, NULL, NULL, NULL); in main()
38 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0); in main()
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_lib.c337 X509 *cert = NULL; in dane_tlsa_add() local
342 if (!d2i_X509(&cert, &p, ilen) || p < data || in dane_tlsa_add()
344 X509_free(cert); in dane_tlsa_add()
349 if (X509_get0_pubkey(cert) == NULL) { in dane_tlsa_add()
350 X509_free(cert); in dane_tlsa_add()
369 X509_free(cert); in dane_tlsa_add()
382 !sk_X509_push(dane->certs, cert)) { in dane_tlsa_add()
384 X509_free(cert); in dane_tlsa_add()
727 OSSL_default_cipher_list(), ctx->cert); in SSL_CTX_set_ssl_version()
788 s->cert in SSL_new()
5230 X509 *cert = s->session != NULL ? s->session->peer : NULL; ct_extract_x509v3_extension_scts() local
5348 X509 *cert = s->session != NULL ? s->session->peer : NULL; ssl_validate_ct() local
[all...]
/third_party/openssl/ssl/
H A Dssl_lib.c337 X509 *cert = NULL; in dane_tlsa_add() local
342 if (!d2i_X509(&cert, &p, ilen) || p < data || in dane_tlsa_add()
344 X509_free(cert); in dane_tlsa_add()
349 if (X509_get0_pubkey(cert) == NULL) { in dane_tlsa_add()
350 X509_free(cert); in dane_tlsa_add()
357 X509_free(cert); in dane_tlsa_add()
371 !sk_X509_push(dane->certs, cert)) { in dane_tlsa_add()
373 X509_free(cert); in dane_tlsa_add()
667 OSSL_default_cipher_list(), ctx->cert); in SSL_CTX_set_ssl_version()
728 s->cert in SSL_new()
5111 X509 *cert = s->session != NULL ? s->session->peer : NULL; ct_extract_x509v3_extension_scts() local
5229 X509 *cert = s->session != NULL ? s->session->peer : NULL; ssl_validate_ct() local
[all...]
/third_party/python/Lib/test/
H A Dtest_ssl.py135 # cert with all kinds of subject alt names
686 """Wrapping with an empty cert file"""
699 def ok(cert, hostname):
700 ssl.match_hostname(cert, hostname)
701 def fail(cert, hostname):
703 ssl.match_hostname, cert, hostname)
707 cert = {'subject': ((('commonName', 'example.com'),),)}
708 ok(cert, 'example.com')
709 ok(cert, 'ExAmple.cOm')
710 fail(cert, 'ww
[all...]
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/stub_fuzzer/parsecertstub_fuzzer/
H A Dparsecertstub_fuzzer.cpp73 std::vector<uint8_t> cert; in FuzzTest() local
74 cert.assign(certStr.begin(), certStr.end()); in FuzzTest()
75 certParcel->cert = cert; in FuzzTest()
/kernel/linux/linux-5.10/scripts/
H A Dextract-cert.c39 "Usage: scripts/extract-cert <source> <dest>\n"); in format()
94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert()
125 X509 *cert; in main() member
129 parms.cert = NULL; in main()
142 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
143 write_cert(parms.cert); in main()
/kernel/linux/linux-6.6/certs/
H A Dextract-cert.c39 "Usage: extract-cert <source> <dest>\n"); in format()
94 fprintf(stderr, "Extracted cert: %s\n", buf); in write_cert()
128 X509 *cert; in main() member
132 parms.cert = NULL; in main()
145 ERR(!parms.cert, "Get X.509 from PKCS#11"); in main()
146 write_cert(parms.cert); in main()
/third_party/openssl/test/recipes/
H A Dtconversion.pl123 my $cert = shift @_;
128 run(app(["openssl", "x509", "-noout", "-text", "-in", $cert, "-out", $out]));
130 "$cert should ".($expected ? "" : "not ")."contain $pattern");
148 my $cert = shift @_;
154 "-in", $cert, "-out", $out]));
156 "$cert '$exts' output should contain $expected different lines");
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dx509v3.h126 void x509_certificate_free(struct x509_certificate *cert);
137 void x509_certificate_chain_free(struct x509_certificate *cert);
143 struct x509_certificate *cert);
150 int x509_certificate_self_signed(struct x509_certificate *cert);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dx509v3.h133 void x509_certificate_free(struct x509_certificate *cert);
144 void x509_certificate_chain_free(struct x509_certificate *cert);
150 struct x509_certificate *cert);
157 int x509_certificate_self_signed(struct x509_certificate *cert);

Completed in 22 milliseconds

12345678910>>...50