Home
last modified time | relevance | path

Searched refs:cert (Results 201 - 225 of 1114) sorted by relevance

12345678910>>...45

/third_party/openssl/test/
H A Ddtlstest.c19 static char *cert = NULL; variable
83 &sctx, &cctx, cert, privkey))) in test_dtls_unprocessed()
205 &sctx, &cctx, cert, privkey))) in test_dtls_drop_records()
318 &sctx, &cctx, cert, privkey))) in test_cookie()
358 &sctx, &cctx, cert, privkey))) in test_dtls_duplicate_records()
425 &sctx, NULL, cert, privkey))) in test_just_finished()
484 &sctx, &cctx, cert, privkey))) in test_swap_records()
592 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
H A Dsslbuffertest.c157 char *cert, *pkey; in setup_tests() local
164 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
170 &serverctx, &clientctx, cert, pkey)) { in setup_tests()
H A Drecordlentest.c15 static char *cert = NULL; variable
107 &sctx, &cctx, cert, privkey))) in test_record_overflow()
193 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
H A Dpkcs7_test.c56 X509 *cert = NULL; in pkcs7_verify_test() local
78 && TEST_ptr(cert = d2i_X509_bio(x509_bio, NULL)) in pkcs7_verify_test()
81 && TEST_true(X509_STORE_add_cert(store, cert)) in pkcs7_verify_test()
88 X509_free(cert); in pkcs7_verify_test()
H A Dlocaletest.c97 X509 *cert = NULL; in setup_tests() local
110 cert = d2i_X509(NULL, &p, sizeof(der_bytes)); in setup_tests()
111 if (!TEST_ptr(cert)) in setup_tests()
114 cert_pubkey = X509_get_X509_PUBKEY(cert); in setup_tests()
116 X509_free(cert); in setup_tests()
121 X509_free(cert); in setup_tests()
125 X509_free(cert); in setup_tests()
/third_party/openssl/ohos_lite/include/openssl/
H A Dcms.h142 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert,
145 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert);
159 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert);
210 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert);
211 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert);
231 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
312 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert);
320 X509 *cert);
/third_party/node/lib/
H A D_tls_wrap.js807 // Clients (!isServer) always request a cert, servers request a client cert
1121 // It's not a peer cert, but the formatting is identical.
1130 const cert = this._handle?.getPeerX509Certificate();
1131 return cert ? new InternalX509Certificate(cert) : undefined;
1135 const cert = this._handle?.getX509Certificate();
1136 return cert ? new InternalX509Certificate(cert) : undefined;
1245 // cert fro
[all...]
/foundation/communication/netstack/frameworks/native/net_ssl/include/
H A Dnet_ssl_verify_cert.h114 X509 *CertBlobToX509(const CertBlob *cert);
116 uint32_t VerifyCert(const CertBlob *cert);
118 uint32_t VerifyCert(const CertBlob *cert, const CertBlob *caCert);
/third_party/node/test/parallel/
H A Dtest-tls-session-cache.js45 const cert = fixtures.readKey('rsa_cert.crt');
48 cert,
49 ca: [cert],
107 '-cert', fixtures.path('keys/rsa_cert.crt'),
H A Dtest-double-tls-client.js14 cert: fixtures.readKey('agent1-cert.pem'),
22 cert: fixtures.readKey('agent1-cert.pem'),
H A Dtest-https-truncate.js33 const cert = fixtures.readKey('agent1-cert.pem');
41 const sopt = { key, cert };
H A Dtest-tls-addca.js19 cert: keys.agent1.cert,
/third_party/node/benchmark/tls/
H A Dsecure-pair.js22 cert: fixtures.readKey('rsa_cert.crt'),
39 cert: options.cert,
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/signer/fulcio/
H A Dca.js35 const cert = resp.signedCertificateEmbeddedSct
39 return cert.chain.certificates;
/foundation/communication/netstack/frameworks/cj/http/src/
H A Dnet_http_request.cpp192 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in SetClientCert()
194 cert_ = cert; in SetClientCert()
206 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in GetClientCert()
208 cert = cert_; in GetClientCert()
191 SetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) SetClientCert() argument
205 GetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) GetClientCert() argument
/foundation/communication/netstack/frameworks/js/napi/http/options/src/
H A Dhttp_request_options.cpp205 std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) in SetClientCert()
207 cert_ = cert; in SetClientCert()
219 std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) in GetClientCert()
221 cert = cert_; in GetClientCert()
204 SetClientCert( std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) SetClientCert() argument
218 GetClientCert( std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) GetClientCert() argument
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Dpkcs7.rs15 pub cert: *mut stack_st_X509, /* [ 0 ] */
39 pub cert: *mut stack_st_X509, /* [ 0 ] */
141 pub cert: *mut X509, /* get the pub-key from this */
193 cert: *mut X509, in PKCS7_decrypt()
/third_party/lwip/src/apps/altcp_tls/
H A Daltcp_tls_mbedtls.c99 mbedtls_x509_crt *cert; member
703 conf->cert = mem; in altcp_tls_create_config()
802 const u8_t *cert, size_t cert_len) in altcp_tls_config_server_add_privkey_cert()
815 srvcert = config->cert + config->cert_count; in altcp_tls_config_server_add_privkey_cert()
822 ret = mbedtls_x509_crt_parse(srvcert, cert, cert_len); in altcp_tls_config_server_add_privkey_cert()
855 const u8_t *cert, size_t cert_len) in altcp_tls_create_config_server_privkey_cert()
863 privkey_pass, privkey_pass_len, cert, cert_len) != ERR_OK) { in altcp_tls_create_config_server_privkey_cert()
906 const u8_t *cert, size_t cert_len) in altcp_tls_create_config_client_2wayauth()
911 if (!cert || !privkey) { in altcp_tls_create_config_client_2wayauth()
922 mbedtls_x509_crt_init(conf->cert); in altcp_tls_create_config_client_2wayauth()
799 altcp_tls_config_server_add_privkey_cert(struct altcp_tls_config *config, const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_config_server_add_privkey_cert() argument
853 altcp_tls_create_config_server_privkey_cert(const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_create_config_server_privkey_cert() argument
904 altcp_tls_create_config_client_2wayauth(const u8_t *ca, size_t ca_len, const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_create_config_client_2wayauth() argument
[all...]
/kernel/linux/linux-5.10/arch/s390/kernel/
H A Dipl.c2090 unsigned char flags, unsigned short cert) in ipl_report_add_component()
2102 comp->entry.certificate_index = cert; in ipl_report_add_component()
2112 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local
2114 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate()
2115 if (!cert) in ipl_report_add_certificate()
2117 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate()
2119 cert->entry.addr = addr; in ipl_report_add_certificate()
2120 cert->entry.len = len; in ipl_report_add_certificate()
2121 cert in ipl_report_add_certificate()
2089 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument
2151 struct ipl_report_certificate *cert; ipl_report_finish() local
2207 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dcmp.c286 "Private or public key for the requested cert. Default: CSR key or client key"},
289 "Distinguished Name (DN) of subject to use in the requested cert template"},
291 "For kur, default is subject of -csr arg or reference cert (see -oldcert)"},
305 "Subject Alt Names (IPADDR/DNS/URI) to add as (critical) cert req extension"},
336 "Certificate to be updated (defaulting to -cert) or to be revoked in rr;"},
338 "also used as reference (defaulting to -cert) for subject DN and SANs."},
363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"},
380 "Server cert to pin and trust directly when verifying signed CMP responses"},
384 "Ignore CMP signer cert key usage, else 'digitalSignature' must be allowed"},
398 "Reference value to use as senderKID in case no -cert i
684 X509 *cert; load_cert_pwd() local
1108 X509 *cert = load_cert_pwd(opt_rsp_cert, opt_keypass, setup_srv_ctx() local
1273 X509 *cert; setup_ssl_ctx() local
1451 X509 *cert; setup_protection_ctx() local
2028 write_cert(BIO *bio, X509 *cert) write_cert() argument
[all...]
/third_party/openssl/apps/
H A Dcmp.c286 "Private or public key for the requested cert. Default: CSR key or client key"},
289 "Distinguished Name (DN) of subject to use in the requested cert template"},
291 "For kur, default is subject of -csr arg or reference cert (see -oldcert)"},
305 "Subject Alt Names (IPADDR/DNS/URI) to add as (critical) cert req extension"},
336 "Certificate to be updated (defaulting to -cert) or to be revoked in rr;"},
338 "also used as reference (defaulting to -cert) for subject DN and SANs."},
363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"},
380 "Server cert to pin and trust directly when verifying signed CMP responses"},
384 "Ignore CMP signer cert key usage, else 'digitalSignature' must be allowed"},
398 "Reference value to use as senderKID in case no -cert i
684 X509 *cert; load_cert_pwd() local
1108 X509 *cert = load_cert_pwd(opt_rsp_cert, opt_keypass, setup_srv_ctx() local
1273 X509 *cert; setup_ssl_ctx() local
1451 X509 *cert; setup_protection_ctx() local
2028 write_cert(BIO *bio, X509 *cert) write_cert() argument
[all...]
/third_party/ffmpeg/libavformat/
H A Dtls_gnutls.c184 "Unable to set cert/key files %s and %s: %s\n", in tls_open()
190 av_log(h, AV_LOG_ERROR, "cert and key required\n"); in tls_open()
211 gnutls_x509_crt_t cert; in tls_open() local
229 gnutls_x509_crt_init(&cert); in tls_open()
231 gnutls_x509_crt_import(cert, cert_list, GNUTLS_X509_FMT_DER); in tls_open()
232 ret = gnutls_x509_crt_check_hostname(cert, c->host); in tls_open()
233 gnutls_x509_crt_deinit(cert); in tls_open()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_cmp.c152 * certain cert information is cached. So this is the point where the
162 /* attempt to compute cert hash */ in X509_cmp()
184 int ossl_x509_add_cert_new(STACK_OF(X509) **p_sk, X509 *cert, int flags) in STACK_OF()
190 return X509_add_cert(*p_sk, cert, flags); in STACK_OF()
193 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags) in STACK_OF()
207 if (X509_cmp(sk_X509_value(sk, i), cert) == 0) in STACK_OF()
212 int ret = X509_self_signed(cert, 0); in STACK_OF()
217 if (!sk_X509_insert(sk, cert, in STACK_OF()
223 (void)X509_up_ref(cert); in STACK_OF()
524 /* Invalid signature or LOS errors are for previous cert */ in X509_chain_check_suiteb()
[all...]
/third_party/node/deps/openssl/openssl/crypto/pkcs7/
H A Dpk7_smime.c279 p7->d.sign->cert)) { in PKCS7_verify()
425 && p7->d.sign->cert) in STACK_OF()
427 X509_find_by_issuer_and_serial(p7->d.sign->cert, in STACK_OF()
495 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) in PKCS7_decrypt() argument
511 if (cert && !X509_check_private_key(cert, pkey)) { in PKCS7_decrypt()
517 if ((tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert)) == NULL) { in PKCS7_decrypt()
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DProxy.pm79 $cert,
98 cert => $cert,
231 ." -cert ".$self->cert." -cert2 ".$self->cert
532 sub cert subroutine
535 return $self->{cert};

Completed in 19 milliseconds

12345678910>>...45