Home
last modified time | relevance | path

Searched refs:cert (Results 201 - 225 of 1243) sorted by relevance

12345678910>>...50

/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dpkcs7_parser.c59 struct x509_certificate *cert; in pkcs7_free_message() local
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
66 x509_free_certificate(cert); in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
71 x509_free_certificate(cert); in pkcs7_free_message()
157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
158 ctx->certs = cert->next; in pkcs7_parse_message()
159 x509_free_certificate(cert); in pkcs7_parse_message()
[all...]
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dpkcs7_parser.c59 struct x509_certificate *cert; in pkcs7_free_message() local
64 cert = pkcs7->certs; in pkcs7_free_message()
65 pkcs7->certs = cert->next; in pkcs7_free_message()
66 x509_free_certificate(cert); in pkcs7_free_message()
69 cert = pkcs7->crl; in pkcs7_free_message()
70 pkcs7->crl = cert->next; in pkcs7_free_message()
71 x509_free_certificate(cert); in pkcs7_free_message()
157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local
158 ctx->certs = cert->next; in pkcs7_parse_message()
159 x509_free_certificate(cert); in pkcs7_parse_message()
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/
H A Dmbedtls-x509.c317 return lws_tls_mbedtls_cert_info(&x509->cert, type, buf, len); in lws_x509_info()
338 mbedtls_x509_crt_init(&x509->cert); in lws_x509_parse_from_pem()
340 ret = mbedtls_x509_crt_parse(&x509->cert, pem, len); in lws_x509_parse_from_pem()
343 mbedtls_x509_crt_free(&x509->cert); in lws_x509_parse_from_pem()
344 lwsl_err("%s: unable to parse PEM cert: -0x%x\n", in lws_x509_parse_from_pem()
360 ret = mbedtls_x509_crt_verify_with_profile(&x509->cert, &trusted->cert, in lws_x509_verify()
367 lwsl_err("%s: unable to parse PEM cert: -0x%x\n", in lws_x509_verify()
382 int kt = (int)mbedtls_pk_get_type(&x509->cert.MBEDTLS_PRIVATE_V30_ONLY(pk)), in lws_x509_public_to_jwk()
394 rsactx = mbedtls_pk_rsa(x509->cert in lws_x509_public_to_jwk()
[all...]
/third_party/openssl/test/
H A Dct_test.c93 X509 *cert = NULL; in load_pem_cert() local
100 cert = PEM_read_bio_X509(cert_io, NULL, NULL, NULL); in load_pem_cert()
105 return cert; in load_pem_cert()
227 X509 *cert = NULL, *issuer = NULL; in execute_cert_test() local
256 if (!TEST_ptr(cert = load_pem_cert(fixture->certs_dir, in execute_cert_test()
260 CT_POLICY_EVAL_CTX_set1_cert(ct_policy_ctx, cert); in execute_cert_test()
270 X509_get_ext_by_NID(cert, NID_ct_precert_scts, -1); in execute_cert_test()
271 sct_extension = X509_get_ext(cert, sct_extension_index); in execute_cert_test()
306 if (fixture->test_validity && cert != NULL) { in execute_cert_test()
324 X509_free(cert); in execute_cert_test()
[all...]
H A Denginetest.c361 X509 *cert = NULL, *dupcert = NULL; in test_x509_dup_w_engine() local
368 || !TEST_ptr(cert = PEM_read_bio_X509(b, NULL, NULL, NULL))) in test_x509_dup_w_engine()
372 if (!TEST_ptr(dupcert = X509_dup(cert))) in test_x509_dup_w_engine()
377 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine()
386 X509_free(cert); in test_x509_dup_w_engine()
387 cert = NULL; in test_x509_dup_w_engine()
404 || !TEST_ptr(cert = PEM_read_bio_X509(b, NULL, NULL, NULL))) in test_x509_dup_w_engine()
408 if (!TEST_ptr(dupcert = X509_dup(cert))) in test_x509_dup_w_engine()
411 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine()
420 X509_free(cert); in test_x509_dup_w_engine()
[all...]
H A Dcmp_protect_test.c27 X509 *cert; member
68 static X509 *cert = NULL; variable
240 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_MSG_protect_with_certificate_and_key()
330 /* The cert chain tests use EC certs so we skip them in no-ec builds */
337 X509_build_chain(fixture->cert, fixture->certs, NULL, in execute_cmp_build_cert_chain_test()
352 chain = X509_build_chain(fixture->cert, fixture->certs, store, in execute_cmp_build_cert_chain_test()
370 fixture->cert = endentity2; in test_cmp_build_cert_chain()
396 fixture->cert = endentity2; in test_cmp_build_cert_chain_missing_intermediate()
414 fixture->cert = endentity2; in test_cmp_build_cert_chain_no_root()
432 fixture->with_ss = 0; /* still chain must include the only cert (roo in test_cmp_build_cert_chain_only_root()
[all...]
H A Dfatalerrtest.c16 static char *cert = NULL; variable
33 &sctx, &cctx, cert, privkey))) in test_fatalerr()
94 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_tls.c36 struct eap_peer_cert_config *cert; in eap_tls_init() local
41 cert = &config->cert; in eap_tls_init()
43 cert = &config->machine_cert; in eap_tls_init()
45 cert = &config->phase2_cert; in eap_tls_init()
46 if (!cert->private_key && cert->engine == 0) { in eap_tls_init()
61 if (cert->engine) { in eap_tls_init()
66 } else if (cert->private_key && !cert in eap_tls_init()
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-x509.js23 const cert = readFileSync(fixtures.path('keys', 'agent1-cert.pem'));
25 const ca = readFileSync(fixtures.path('keys', 'ca1-cert.pem'));
52 CA Issuers - URI:http://ca.nodejs.org/ca.cert`;
88 const x509 = new X509Certificate(cert);
122 cert.toString().replaceAll('\r\n', '\n'));
278 'CA Issuers - URI': ['http://ca.nodejs.org/ca.cert']
354 const cert = new X509Certificate(certPem);
355 assert.throws(() => cert.publicKey, {
360 assert.strictEqual(cert
[all...]
H A Dtest-tls-client-mindhsize.js11 const cert = fixtures.readKey('agent2-cert.pem');
23 cert: cert,
H A Dtest-tls-dhe.js39 const cert = fixtures.readKey('agent2-cert.pem');
58 cert,
99 } = new X509Certificate(cert);
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_smime.c674 EVP_PKEY *pk, X509 *cert, X509 *peer) in cms_kari_set1_pkey_and_peer()
685 if (cert != NULL && CMS_RecipientEncryptedKey_cert_cmp(rek, cert)) in cms_kari_set1_pkey_and_peer()
692 return cert == NULL ? 0 : -1; in cms_kari_set1_pkey_and_peer()
697 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) in CMS_decrypt_set1_pkey() argument
699 return CMS_decrypt_set1_pkey_and_peer(cms, pk, cert, NULL); in CMS_decrypt_set1_pkey()
703 X509 *cert, X509 *peer) in CMS_decrypt_set1_pkey_and_peer()
736 r = cms_kari_set1_pkey_and_peer(cms, ri, pk, cert, peer); in CMS_decrypt_set1_pkey_and_peer()
742 /* If we have a cert, try matching RecipientInfo, else try them all */ in CMS_decrypt_set1_pkey_and_peer()
743 else if (cert in CMS_decrypt_set1_pkey_and_peer()
672 cms_kari_set1_pkey_and_peer(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *cert, X509 *peer) cms_kari_set1_pkey_and_peer() argument
702 CMS_decrypt_set1_pkey_and_peer(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, X509 *peer) CMS_decrypt_set1_pkey_and_peer() argument
858 CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, BIO *dcont, BIO *out, unsigned int flags) CMS_decrypt() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_smime.c674 EVP_PKEY *pk, X509 *cert, X509 *peer) in cms_kari_set1_pkey_and_peer()
685 if (cert != NULL && CMS_RecipientEncryptedKey_cert_cmp(rek, cert)) in cms_kari_set1_pkey_and_peer()
692 return cert == NULL ? 0 : -1; in cms_kari_set1_pkey_and_peer()
697 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) in CMS_decrypt_set1_pkey() argument
699 return CMS_decrypt_set1_pkey_and_peer(cms, pk, cert, NULL); in CMS_decrypt_set1_pkey()
703 X509 *cert, X509 *peer) in CMS_decrypt_set1_pkey_and_peer()
736 r = cms_kari_set1_pkey_and_peer(cms, ri, pk, cert, peer); in CMS_decrypt_set1_pkey_and_peer()
742 /* If we have a cert, try matching RecipientInfo, else try them all */ in CMS_decrypt_set1_pkey_and_peer()
743 else if (cert in CMS_decrypt_set1_pkey_and_peer()
672 cms_kari_set1_pkey_and_peer(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *cert, X509 *peer) cms_kari_set1_pkey_and_peer() argument
702 CMS_decrypt_set1_pkey_and_peer(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, X509 *peer) CMS_decrypt_set1_pkey_and_peer() argument
858 CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, BIO *dcont, BIO *out, unsigned int flags) CMS_decrypt() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Deapol_test.c440 const struct wpabuf *cert) in eapol_test_write_cert()
444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert()
501 static void eapol_test_cert_cb(void *ctx, struct tls_cert_data *cert, in eapol_test_cert_cb() argument
509 cert->depth, cert->subject, in eapol_test_cert_cb()
513 if (cert->cert) { in eapol_test_cert_cb()
515 size_t len = wpabuf_len(cert->cert) * in eapol_test_cert_cb()
439 eapol_test_write_cert(FILE *f, const char *subject, const struct wpabuf *cert) eapol_test_write_cert() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Deapol_test.c440 const struct wpabuf *cert) in eapol_test_write_cert()
444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert()
501 static void eapol_test_cert_cb(void *ctx, struct tls_cert_data *cert, in eapol_test_cert_cb() argument
509 cert->depth, cert->subject, in eapol_test_cert_cb()
513 if (cert->cert) { in eapol_test_cert_cb()
515 size_t len = wpabuf_len(cert->cert) * in eapol_test_cert_cb()
439 eapol_test_write_cert(FILE *f, const char *subject, const struct wpabuf *cert) eapol_test_write_cert() argument
[all...]
/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-x509.c169 lwsl_info("%s: cert public key extraction failed\n", in lws_tls_openssl_cert_info()
355 return lws_tls_openssl_cert_info(x509->cert, type, buf, len); in lws_x509_info()
388 lwsl_debug("no peer cert\n"); in lws_tls_peer_cert_info()
413 (*x509)->cert = NULL; in lws_x509_create()
424 x509->cert = PEM_read_bio_X509(bio, NULL, NULL, NULL); in lws_x509_parse_from_pem()
426 if (!x509->cert) { in lws_x509_parse_from_pem()
427 lwsl_err("%s: unable to parse PEM cert\n", __func__); in lws_x509_parse_from_pem()
444 X509_NAME *xn = X509_get_subject_name(x509->cert); in lws_x509_verify()
460 ret = X509_check_issued(trusted->cert, x509->cert); in lws_x509_verify()
[all...]
/foundation/communication/netstack/interfaces/innerkits/net_ssl/include/
H A Dnet_ssl.h26 * @param cert Certificates to be verified
29 uint32_t NetStackVerifyCertification(const CertBlob *cert);
33 * @param cert Certificates to be verified
37 uint32_t NetStackVerifyCertification(const CertBlob *cert, const CertBlob *caCert);
/base/security/appverify/interfaces/innerkits/appverify_lite/src/
H A Dapp_verify.c369 static int32_t GetCertTypeBySourceName(const TrustAppCert *cert) in GetCertTypeBySourceName() argument
371 if (cert == NULL) { in GetCertTypeBySourceName()
373 } else if (strcmp(cert->name, "huawei app gallary") == 0) { in GetCertTypeBySourceName()
375 } else if (strcmp(cert->name, "huawei system apps") == 0) { in GetCertTypeBySourceName()
378 } else if (strcmp(cert->name, "OpenHarmony apps") == 0) { in GetCertTypeBySourceName()
403 /* only support first signer cert */ in GetProfileCertTypeBySignInfo()
412 LOG_ERROR("cert maxdepth error: %d", signer->depth); in GetProfileCertTypeBySignInfo()
434 /* only support first signer cert */ in GetAppCertTypeBySignInfo()
443 LOG_ERROR("cert maxdepth error: %d %d", trustCert->maxCertPath, signer->depth); in GetAppCertTypeBySignInfo()
450 /* get singer cert typ
656 mbedtls_x509_crt *cert = APPV_MALLOC(sizeof(mbedtls_x509_crt)); ParseCertGetPk() local
842 mbedtls_x509_crt cert; LoadCertAndCmpDest() local
[all...]
/base/update/sys_installer/services/module_update/src/
H A Dmodule_dm.cpp45 LOG(ERROR) << "invalid cert num " << vd->num_loaded_certs; in CheckVerifiedData()
56 struct hvb_cert cert; in CreateDmDevice() local
67 hr = hvb_cert_parser(&cert, &(vd->certs[0].data)); in CreateDmDevice()
69 LOG(ERROR) << "parse cert error " << hr; in CreateDmDevice()
72 ret = FsHvbConstructVerityTarget(&target, deviceName.c_str(), &cert); in CreateDmDevice()
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
H A Dtest_https_multi_daemon.c98 FILE *cert; in main() local
110 if ((cert = setup_ca_cert ()) == NULL) in main()
128 fclose (cert); in main()
H A Dtest_https_time_out.c107 gnutls_datum_t cert; in main() local
132 if (0 != setup_session (&session, &key, &cert, &xcred)) in main()
138 teardown_session (session, &key, &cert, xcred); in main()
/third_party/node/lib/
H A Dtls.js280 exports.checkServerIdentity = function checkServerIdentity(hostname, cert) {
281 const subject = cert.subject;
282 const altNames = cert.subjectaltname;
309 reason = `IP: ${hostname} is not in the cert's list: ` +
319 `Host: ${hostname}. is not in the cert's altnames: ${altNames}`;
330 reason = `Host: ${hostname}. is not cert's CN: ${cn}`;
337 return new ERR_TLS_CERT_ALTNAME_INVALID(reason, hostname, cert);
/third_party/node/src/crypto/
H A Dcrypto_x509.h23 explicit ManagedX509(X509Pointer&& cert);
53 X509Pointer cert,
58 std::shared_ptr<ManagedX509> cert,
73 X509Pointer cert);
129 std::shared_ptr<ManagedX509> cert,
/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
304 ret = ['$G_NEXT_SRV_NO_CERT', '--http', '--disable-client-cert', '--debug=4']
306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs):
307 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
308 cert=cert, ke
[all...]
/third_party/node/test/fixtures/x509-escaping/
H A Dcreate-certs.js331 const cert = {
344 const pem = rfc5280.Certificate.encode(cert, 'pem', {
347 writeFileSync(`./alt-${i}-cert.pem`, `${pem}\n`);
372 value: 'good.example.com\nOCSP - URI:http://ca.nodejs.org/ca.cert',
485 const cert = {
498 const pem = rfc5280.Certificate.encode(cert, 'pem', {
501 writeFileSync(`./info-${i}-cert.pem`, `${pem}\n`);
626 const cert = {
639 const pem = rfc5280.Certificate.encode(cert, 'pem', {
642 writeFileSync(`./subj-${i}-cert
[all...]

Completed in 16 milliseconds

12345678910>>...50