| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/ |
| H A D | dlp_permission_kit.cpp | 34 void ClientGenerateDlpCertificateCallback::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument 39 this->cert_ = cert; in OnGenerateDlpCertificate() 47 const std::vector<uint8_t>& cert) in OnParseDlpCertificate() 53 this->offlineCert_ = cert; in OnParseDlpCertificate() 60 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument 66 DLP_LOG_ERROR(LABEL, "begin generate cert fail, error: %{public}d", res); in GenerateDlpCertificate() 83 cert = callback->cert_; in GenerateDlpCertificate() 46 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x_x509.c | 163 X509 *cert = NULL; 165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq); 166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) { 167 X509_free(cert); 168 cert = NULL; 170 return cert;
|
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_protect.c | 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts() 165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts() 167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 284 } else if (ctx->cert ! in ossl_cmp_msg_protect() [all...] |
| /third_party/openssl/test/ |
| H A D | verify_extra_test.c | 183 X509 *cert = load_cert_from_file(filename); /* may result in NULL */ in test_self_signed() local 188 ret = TEST_int_eq(X509_self_signed(cert, 1), expected); in test_self_signed() 190 if (cert != NULL) { in test_self_signed() 192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed() 193 ret = ret && TEST_true(X509_STORE_CTX_init(ctx, NULL, cert, NULL)); in test_self_signed() 200 X509_free(cert); in test_self_signed() 221 /* Verifying a cert where we have no trusted certs should fail */ in test_store_ctx() 310 || !TEST_ptr(sroot_cert = test_mk_file_path(certs_dir, "sroot-cert.pem")) in setup_tests() 311 || !TEST_ptr(ca_cert = test_mk_file_path(certs_dir, "ca-cert.pem")) in setup_tests() 312 || !TEST_ptr(ee_cert = test_mk_file_path(certs_dir, "ee-cert in setup_tests() [all...] |
| H A D | dtlstest.c | 19 static char *cert = NULL; variable 83 &sctx, &cctx, cert, privkey))) in test_dtls_unprocessed() 205 &sctx, &cctx, cert, privkey))) in test_dtls_drop_records() 318 &sctx, &cctx, cert, privkey))) in test_cookie() 358 &sctx, &cctx, cert, privkey))) in test_dtls_duplicate_records() 425 &sctx, NULL, cert, privkey))) in test_just_finished() 484 &sctx, &cctx, cert, privkey))) in test_swap_records() 592 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_protect.c | 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts() 165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts() 167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 284 } else if (ctx->cert ! in ossl_cmp_msg_protect() [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x_x509.c | 163 X509 *cert = NULL; 165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq); 166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) { 167 X509_free(cert); 168 cert = NULL; 170 return cert;
|
| /base/security/dlp_permission_service/frameworks/dlp_permission/include/ |
| H A D | i_dlp_permission_callback.h | 29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0; 32 const std::vector<uint8_t>& cert) = 0;
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/ |
| H A D | dlp_permission_callback.h | 29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0; 36 const std::vector<uint8_t>& cert) = 0;
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_conf.c | 435 c = cctx->ctx->cert; in cmd_Certificate() 439 c = cctx->ssl->cert; in cmd_Certificate() 476 CERT *cert; in do_store() local 483 cert = cctx->ctx->cert; in do_store() 486 cert = cctx->ssl->cert; in do_store() 495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store() 725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_conf.c | 435 c = cctx->ctx->cert; in cmd_Certificate() 439 c = cctx->ssl->cert; in cmd_Certificate() 476 CERT *cert; in do_store() local 483 cert = cctx->ctx->cert; in do_store() 486 cert = cctx->ssl->cert; in do_store() 495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store() 725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT [all...] |
| /third_party/openssl/test/helpers/ |
| H A D | pkcs12.c | 79 X509 *cert = NULL; in load_cert_asn1() local 81 cert = d2i_X509(NULL, &bytes, len); in load_cert_asn1() 82 if (!TEST_ptr(cert)) in load_cert_asn1() 85 return cert; in load_cert_asn1() 379 X509 *cert = NULL; in add_certbag() local 385 cert = load_cert_asn1(bytes, len); in add_certbag() 386 if (!TEST_ptr(cert)) { in add_certbag() 391 name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in add_certbag() 395 bag = PKCS12_add_cert(&pb->bags, cert); in add_certbag() 406 X509_free(cert); in add_certbag() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
| H A D | est.c | 66 certs = p7->d.sign->cert; in pkcs7_to_cert() 69 certs = p7->d.signed_and_enveloped->cert; in pkcs7_to_cert() 98 X509 *cert = sk_X509_value(certs, i); in pkcs7_to_cert() local 99 X509_print(out, cert); in pkcs7_to_cert() 100 PEM_write_bio_X509(out, cert); in pkcs7_to_cert() 444 X509 *cert; in generate_csr() local 450 cert = PEM_read_X509(f, NULL, NULL, NULL); in generate_csr() 453 if (cert == NULL) in generate_csr() 456 X509_get_subject_name(cert)); in generate_csr() 457 X509_free(cert); in generate_csr() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
| H A D | est.c | 66 certs = p7->d.sign->cert; in pkcs7_to_cert() 69 certs = p7->d.signed_and_enveloped->cert; in pkcs7_to_cert() 98 X509 *cert = sk_X509_value(certs, i); in pkcs7_to_cert() local 99 X509_print(out, cert); in pkcs7_to_cert() 100 PEM_write_bio_X509(out, cert); in pkcs7_to_cert() 444 X509 *cert; in generate_csr() local 450 cert = PEM_read_X509(f, NULL, NULL, NULL); in generate_csr() 453 if (cert == NULL) in generate_csr() 456 X509_get_subject_name(cert)); in generate_csr() 457 X509_free(cert); in generate_csr() [all...] |
| /base/security/certificate_framework/test/unittest/cf_sdk_test/src/ |
| H A D | cf_extension_test.cpp | 373 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER };
in HWTEST_F() local 374 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 388 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */
in HWTEST_F() local 389 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 403 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */
in HWTEST_F() local 404 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 417 CfEncodingBlob cert = { const_cast<uint8_t *>(g_extensionData03), sizeof(g_extensionData03), CF_FORMAT_PEM };
in HWTEST_F() local 418 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F()
|
| H A D | cf_cert_test.cpp | 276 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER };
in HWTEST_F() local 277 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 291 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */
in HWTEST_F() local 292 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 306 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */
in HWTEST_F() local 307 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 321 CfEncodingBlob cert = { reinterpret_cast<uint8_t *>(g_certData02), sizeof(g_certData02),
in HWTEST_F() local 323 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F()
|
| /base/security/appverify/interfaces/innerkits/appverify/src/util/ |
| H A D | hap_verify_openssl_utils.cpp | 78 HapCertVerifyOpensslUtils::GenerateCertSignFromCertStack(p7->d.sign->cert, certVisitSign); in GetCertChains() 100 X509* cert = PKCS7_cert_from_signer_info(p7, signInfo); in GetCertChains() local 101 if (cert == nullptr) { in GetCertChains() 102 HAPVERIFY_LOG_ERROR("get cert for %{public}dst signInfo failed", i); in GetCertChains() 107 pkcs7Context.certChains[i].push_back(X509_dup(cert)); in GetCertChains() 109 certVisitSign[cert] = true; in GetCertChains() 122 HAPVERIFY_LOG_ERROR("get cert chain for signInfo failed"); in VerifyCertChain() 212 X509* cert = pkcs7Context.certChains[signInfoNum][0]; variable 215 EVP_PKEY* pkey = X509_get0_pubkey(cert); 226 if (PKCS7_signatureVerify(p7Bio, pkcs7Context.p7, signInfo, cert) < [all...] |
| /base/update/updater/services/package/pkg_verify/ |
| H A D | pkcs7_signed_data.cpp | 158 PKG_LOGE("init cert verify fail"); in Init() 389 PKG_LOGE("signer cert info is nullptr!"); in SignerInfoParse() 423 STACK_OF(X509) *certStack = pkcs7_->d.sign->cert; in Pkcs7SignleSignerVerify() 430 X509 *cert = X509_find_by_issuer_and_serial(certStack, signerInfo.issuerName, signerInfo.serialNumber); in Pkcs7SignleSignerVerify() local 431 if (cert == nullptr) { in Pkcs7SignleSignerVerify() 432 PKG_LOGE("cert is empty"); in Pkcs7SignleSignerVerify() 437 if (CertVerify::GetInstance().CheckCertChain(certStack, cert) != 0) { in Pkcs7SignleSignerVerify() 438 PKG_LOGE("public cert check fail"); in Pkcs7SignleSignerVerify() 443 return VerifyDigest(cert, signerInfo, hash, sig); in Pkcs7SignleSignerVerify() 446 int32_t Pkcs7SignedData::VerifyDigest(X509 *cert, cons argument [all...] |
| /third_party/mbedtls/library/ |
| H A D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify() 642 mbedtls_pkcs7_data_or_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen, const int is_data_hash) mbedtls_pkcs7_data_or_hash_verify() argument 722 mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen) mbedtls_pkcs7_signed_data_verify() argument 733 mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *hash, size_t hashlen) mbedtls_pkcs7_signed_hash_verify() argument
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | cms.h | 142 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 145 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 159 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 210 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 211 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 231 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 312 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 320 X509 *cert);
|
| /base/security/appverify/interfaces/innerkits/appverify/include/util/ |
| H A D | pkcs7_context.h | 56 for (auto cert : certChain) {
in ~Pkcs7Context() 57 X509_free(cert);
in ~Pkcs7Context()
|
| /base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
| H A D | local_code_sign_kit.cpp | 23 int32_t LocalCodeSignKit::InitLocalCertificate(ByteBuffer &cert)
in InitLocalCertificate() argument 25 return LocalCodeSignClient::GetInstance().InitLocalCertificate(cert);
in InitLocalCertificate()
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/ |
| H A D | dlp_permission_async_proxy.h | 35 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override; 37 const std::vector<uint8_t>& cert) override;
|
| /third_party/node/lib/ |
| H A D | _tls_wrap.js | 807 // Clients (!isServer) always request a cert, servers request a client cert 1121 // It's not a peer cert, but the formatting is identical. 1130 const cert = this._handle?.getPeerX509Certificate(); 1131 return cert ? new InternalX509Certificate(cert) : undefined; 1135 const cert = this._handle?.getX509Certificate(); 1136 return cert ? new InternalX509Certificate(cert) : undefined; 1245 // cert fro [all...] |
| /base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
| H A D | napi_x509_crl_match_parameters.cpp | 59 HcfX509Certificate *cert = napiX509Cert->GetX509Cert(); in GetX509Cert() local 60 if (cert == nullptr) { in GetX509Cert() 61 LOGE("cert is null!"); in GetX509Cert() 64 out = &(cert->base); in GetX509Cert()
|