| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message() [all...] |
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| H A D | pkcs7_parser.c | 59 struct x509_certificate *cert; in pkcs7_free_message() local 64 cert = pkcs7->certs; in pkcs7_free_message() 65 pkcs7->certs = cert->next; in pkcs7_free_message() 66 x509_free_certificate(cert); in pkcs7_free_message() 69 cert = pkcs7->crl; in pkcs7_free_message() 70 pkcs7->crl = cert->next; in pkcs7_free_message() 71 x509_free_certificate(cert); in pkcs7_free_message() 157 struct x509_certificate *cert = ctx->certs; in pkcs7_parse_message() local 158 ctx->certs = cert->next; in pkcs7_parse_message() 159 x509_free_certificate(cert); in pkcs7_parse_message() [all...] |
| /third_party/libwebsockets/lib/tls/mbedtls/ |
| H A D | mbedtls-x509.c | 317 return lws_tls_mbedtls_cert_info(&x509->cert, type, buf, len); in lws_x509_info() 338 mbedtls_x509_crt_init(&x509->cert); in lws_x509_parse_from_pem() 340 ret = mbedtls_x509_crt_parse(&x509->cert, pem, len); in lws_x509_parse_from_pem() 343 mbedtls_x509_crt_free(&x509->cert); in lws_x509_parse_from_pem() 344 lwsl_err("%s: unable to parse PEM cert: -0x%x\n", in lws_x509_parse_from_pem() 360 ret = mbedtls_x509_crt_verify_with_profile(&x509->cert, &trusted->cert, in lws_x509_verify() 367 lwsl_err("%s: unable to parse PEM cert: -0x%x\n", in lws_x509_verify() 382 int kt = (int)mbedtls_pk_get_type(&x509->cert.MBEDTLS_PRIVATE_V30_ONLY(pk)), in lws_x509_public_to_jwk() 394 rsactx = mbedtls_pk_rsa(x509->cert in lws_x509_public_to_jwk() [all...] |
| /third_party/openssl/test/ |
| H A D | ct_test.c | 93 X509 *cert = NULL; in load_pem_cert() local 100 cert = PEM_read_bio_X509(cert_io, NULL, NULL, NULL); in load_pem_cert() 105 return cert; in load_pem_cert() 227 X509 *cert = NULL, *issuer = NULL; in execute_cert_test() local 256 if (!TEST_ptr(cert = load_pem_cert(fixture->certs_dir, in execute_cert_test() 260 CT_POLICY_EVAL_CTX_set1_cert(ct_policy_ctx, cert); in execute_cert_test() 270 X509_get_ext_by_NID(cert, NID_ct_precert_scts, -1); in execute_cert_test() 271 sct_extension = X509_get_ext(cert, sct_extension_index); in execute_cert_test() 306 if (fixture->test_validity && cert != NULL) { in execute_cert_test() 324 X509_free(cert); in execute_cert_test() [all...] |
| H A D | enginetest.c | 361 X509 *cert = NULL, *dupcert = NULL; in test_x509_dup_w_engine() local 368 || !TEST_ptr(cert = PEM_read_bio_X509(b, NULL, NULL, NULL))) in test_x509_dup_w_engine() 372 if (!TEST_ptr(dupcert = X509_dup(cert))) in test_x509_dup_w_engine() 377 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine() 386 X509_free(cert); in test_x509_dup_w_engine() 387 cert = NULL; in test_x509_dup_w_engine() 404 || !TEST_ptr(cert = PEM_read_bio_X509(b, NULL, NULL, NULL))) in test_x509_dup_w_engine() 408 if (!TEST_ptr(dupcert = X509_dup(cert))) in test_x509_dup_w_engine() 411 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine() 420 X509_free(cert); in test_x509_dup_w_engine() [all...] |
| H A D | cmp_protect_test.c | 27 X509 *cert; member 68 static X509 *cert = NULL; variable 240 || !TEST_true(OSSL_CMP_CTX_set1_cert(fixture->cmp_ctx, cert))) { in test_MSG_protect_with_certificate_and_key() 330 /* The cert chain tests use EC certs so we skip them in no-ec builds */ 337 X509_build_chain(fixture->cert, fixture->certs, NULL, in execute_cmp_build_cert_chain_test() 352 chain = X509_build_chain(fixture->cert, fixture->certs, store, in execute_cmp_build_cert_chain_test() 370 fixture->cert = endentity2; in test_cmp_build_cert_chain() 396 fixture->cert = endentity2; in test_cmp_build_cert_chain_missing_intermediate() 414 fixture->cert = endentity2; in test_cmp_build_cert_chain_no_root() 432 fixture->with_ss = 0; /* still chain must include the only cert (roo in test_cmp_build_cert_chain_only_root() [all...] |
| H A D | fatalerrtest.c | 16 static char *cert = NULL; variable 33 &sctx, &cctx, cert, privkey))) in test_fatalerr() 94 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| H A D | eap_tls.c | 36 struct eap_peer_cert_config *cert; in eap_tls_init() local 41 cert = &config->cert; in eap_tls_init() 43 cert = &config->machine_cert; in eap_tls_init() 45 cert = &config->phase2_cert; in eap_tls_init() 46 if (!cert->private_key && cert->engine == 0) { in eap_tls_init() 61 if (cert->engine) { in eap_tls_init() 66 } else if (cert->private_key && !cert in eap_tls_init() [all...] |
| /third_party/node/test/parallel/ |
| H A D | test-crypto-x509.js | 23 const cert = readFileSync(fixtures.path('keys', 'agent1-cert.pem')); 25 const ca = readFileSync(fixtures.path('keys', 'ca1-cert.pem')); 52 CA Issuers - URI:http://ca.nodejs.org/ca.cert`; 88 const x509 = new X509Certificate(cert); 122 cert.toString().replaceAll('\r\n', '\n')); 278 'CA Issuers - URI': ['http://ca.nodejs.org/ca.cert'] 354 const cert = new X509Certificate(certPem); 355 assert.throws(() => cert.publicKey, { 360 assert.strictEqual(cert [all...] |
| H A D | test-tls-client-mindhsize.js | 11 const cert = fixtures.readKey('agent2-cert.pem'); 23 cert: cert,
|
| H A D | test-tls-dhe.js | 39 const cert = fixtures.readKey('agent2-cert.pem'); 58 cert, 99 } = new X509Certificate(cert);
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_smime.c | 674 EVP_PKEY *pk, X509 *cert, X509 *peer) in cms_kari_set1_pkey_and_peer() 685 if (cert != NULL && CMS_RecipientEncryptedKey_cert_cmp(rek, cert)) in cms_kari_set1_pkey_and_peer() 692 return cert == NULL ? 0 : -1; in cms_kari_set1_pkey_and_peer() 697 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) in CMS_decrypt_set1_pkey() argument 699 return CMS_decrypt_set1_pkey_and_peer(cms, pk, cert, NULL); in CMS_decrypt_set1_pkey() 703 X509 *cert, X509 *peer) in CMS_decrypt_set1_pkey_and_peer() 736 r = cms_kari_set1_pkey_and_peer(cms, ri, pk, cert, peer); in CMS_decrypt_set1_pkey_and_peer() 742 /* If we have a cert, try matching RecipientInfo, else try them all */ in CMS_decrypt_set1_pkey_and_peer() 743 else if (cert in CMS_decrypt_set1_pkey_and_peer() 672 cms_kari_set1_pkey_and_peer(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *cert, X509 *peer) cms_kari_set1_pkey_and_peer() argument 702 CMS_decrypt_set1_pkey_and_peer(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, X509 *peer) CMS_decrypt_set1_pkey_and_peer() argument 858 CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, BIO *dcont, BIO *out, unsigned int flags) CMS_decrypt() argument [all...] |
| /third_party/openssl/crypto/cms/ |
| H A D | cms_smime.c | 674 EVP_PKEY *pk, X509 *cert, X509 *peer) in cms_kari_set1_pkey_and_peer() 685 if (cert != NULL && CMS_RecipientEncryptedKey_cert_cmp(rek, cert)) in cms_kari_set1_pkey_and_peer() 692 return cert == NULL ? 0 : -1; in cms_kari_set1_pkey_and_peer() 697 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) in CMS_decrypt_set1_pkey() argument 699 return CMS_decrypt_set1_pkey_and_peer(cms, pk, cert, NULL); in CMS_decrypt_set1_pkey() 703 X509 *cert, X509 *peer) in CMS_decrypt_set1_pkey_and_peer() 736 r = cms_kari_set1_pkey_and_peer(cms, ri, pk, cert, peer); in CMS_decrypt_set1_pkey_and_peer() 742 /* If we have a cert, try matching RecipientInfo, else try them all */ in CMS_decrypt_set1_pkey_and_peer() 743 else if (cert in CMS_decrypt_set1_pkey_and_peer() 672 cms_kari_set1_pkey_and_peer(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, X509 *cert, X509 *peer) cms_kari_set1_pkey_and_peer() argument 702 CMS_decrypt_set1_pkey_and_peer(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, X509 *peer) CMS_decrypt_set1_pkey_and_peer() argument 858 CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, BIO *dcont, BIO *out, unsigned int flags) CMS_decrypt() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
| H A D | eapol_test.c | 440 const struct wpabuf *cert) in eapol_test_write_cert() 444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert() 501 static void eapol_test_cert_cb(void *ctx, struct tls_cert_data *cert, in eapol_test_cert_cb() argument 509 cert->depth, cert->subject, in eapol_test_cert_cb() 513 if (cert->cert) { in eapol_test_cert_cb() 515 size_t len = wpabuf_len(cert->cert) * in eapol_test_cert_cb() 439 eapol_test_write_cert(FILE *f, const char *subject, const struct wpabuf *cert) eapol_test_write_cert() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | eapol_test.c | 440 const struct wpabuf *cert) in eapol_test_write_cert() 444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert() 501 static void eapol_test_cert_cb(void *ctx, struct tls_cert_data *cert, in eapol_test_cert_cb() argument 509 cert->depth, cert->subject, in eapol_test_cert_cb() 513 if (cert->cert) { in eapol_test_cert_cb() 515 size_t len = wpabuf_len(cert->cert) * in eapol_test_cert_cb() 439 eapol_test_write_cert(FILE *f, const char *subject, const struct wpabuf *cert) eapol_test_write_cert() argument [all...] |
| /third_party/libwebsockets/lib/tls/openssl/ |
| H A D | openssl-x509.c | 169 lwsl_info("%s: cert public key extraction failed\n", in lws_tls_openssl_cert_info() 355 return lws_tls_openssl_cert_info(x509->cert, type, buf, len); in lws_x509_info() 388 lwsl_debug("no peer cert\n"); in lws_tls_peer_cert_info() 413 (*x509)->cert = NULL; in lws_x509_create() 424 x509->cert = PEM_read_bio_X509(bio, NULL, NULL, NULL); in lws_x509_parse_from_pem() 426 if (!x509->cert) { in lws_x509_parse_from_pem() 427 lwsl_err("%s: unable to parse PEM cert\n", __func__); in lws_x509_parse_from_pem() 444 X509_NAME *xn = X509_get_subject_name(x509->cert); in lws_x509_verify() 460 ret = X509_check_issued(trusted->cert, x509->cert); in lws_x509_verify() [all...] |
| /foundation/communication/netstack/interfaces/innerkits/net_ssl/include/ |
| H A D | net_ssl.h | 26 * @param cert Certificates to be verified
29 uint32_t NetStackVerifyCertification(const CertBlob *cert);
33 * @param cert Certificates to be verified
37 uint32_t NetStackVerifyCertification(const CertBlob *cert, const CertBlob *caCert);
|
| /base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
| H A D | app_verify.c | 369 static int32_t GetCertTypeBySourceName(const TrustAppCert *cert) in GetCertTypeBySourceName() argument 371 if (cert == NULL) { in GetCertTypeBySourceName() 373 } else if (strcmp(cert->name, "huawei app gallary") == 0) { in GetCertTypeBySourceName() 375 } else if (strcmp(cert->name, "huawei system apps") == 0) { in GetCertTypeBySourceName() 378 } else if (strcmp(cert->name, "OpenHarmony apps") == 0) { in GetCertTypeBySourceName() 403 /* only support first signer cert */ in GetProfileCertTypeBySignInfo() 412 LOG_ERROR("cert maxdepth error: %d", signer->depth); in GetProfileCertTypeBySignInfo() 434 /* only support first signer cert */ in GetAppCertTypeBySignInfo() 443 LOG_ERROR("cert maxdepth error: %d %d", trustCert->maxCertPath, signer->depth); in GetAppCertTypeBySignInfo() 450 /* get singer cert typ 656 mbedtls_x509_crt *cert = APPV_MALLOC(sizeof(mbedtls_x509_crt)); ParseCertGetPk() local 842 mbedtls_x509_crt cert; LoadCertAndCmpDest() local [all...] |
| /base/update/sys_installer/services/module_update/src/ |
| H A D | module_dm.cpp | 45 LOG(ERROR) << "invalid cert num " << vd->num_loaded_certs; in CheckVerifiedData() 56 struct hvb_cert cert; in CreateDmDevice() local 67 hr = hvb_cert_parser(&cert, &(vd->certs[0].data)); in CreateDmDevice() 69 LOG(ERROR) << "parse cert error " << hr; in CreateDmDevice() 72 ret = FsHvbConstructVerityTarget(&target, deviceName.c_str(), &cert); in CreateDmDevice()
|
| /third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
| H A D | test_https_multi_daemon.c | 98 FILE *cert; in main() local 110 if ((cert = setup_ca_cert ()) == NULL) in main() 128 fclose (cert); in main()
|
| H A D | test_https_time_out.c | 107 gnutls_datum_t cert; in main() local 132 if (0 != setup_session (&session, &key, &cert, &xcred)) in main() 138 teardown_session (session, &key, &cert, xcred); in main()
|
| /third_party/node/lib/ |
| H A D | tls.js | 280 exports.checkServerIdentity = function checkServerIdentity(hostname, cert) { 281 const subject = cert.subject; 282 const altNames = cert.subjectaltname; 309 reason = `IP: ${hostname} is not in the cert's list: ` + 319 `Host: ${hostname}. is not in the cert's altnames: ${altNames}`; 330 reason = `Host: ${hostname}. is not cert's CN: ${cn}`; 337 return new ERR_TLS_CERT_ALTNAME_INVALID(reason, hostname, cert);
|
| /third_party/node/src/crypto/ |
| H A D | crypto_x509.h | 23 explicit ManagedX509(X509Pointer&& cert); 53 X509Pointer cert, 58 std::shared_ptr<ManagedX509> cert, 73 X509Pointer cert); 129 std::shared_ptr<ManagedX509> cert,
|
| /third_party/mbedtls/tests/scripts/ |
| H A D | generate_tls13_compat_tests.py | 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] 304 ret = ['$G_NEXT_SRV_NO_CERT', '--http', '--disable-client-cert', '--debug=4'] 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 307 ret += ['--x509certfile {cert} --x509keyfile {key}'.format( 308 cert=cert, ke [all...] |
| /third_party/node/test/fixtures/x509-escaping/ |
| H A D | create-certs.js | 331 const cert = { 344 const pem = rfc5280.Certificate.encode(cert, 'pem', { 347 writeFileSync(`./alt-${i}-cert.pem`, `${pem}\n`); 372 value: 'good.example.com\nOCSP - URI:http://ca.nodejs.org/ca.cert', 485 const cert = { 498 const pem = rfc5280.Certificate.encode(cert, 'pem', { 501 writeFileSync(`./info-${i}-cert.pem`, `${pem}\n`); 626 const cert = { 639 const pem = rfc5280.Certificate.encode(cert, 'pem', { 642 writeFileSync(`./subj-${i}-cert [all...] |