Home
last modified time | relevance | path

Searched refs:cert (Results 226 - 250 of 1243) sorted by relevance

12345678910>>...50

/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_conf.c50 BIO *cert = NULL; in TS_CONF_load_cert() local
53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert()
55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert()
59 BIO_free(cert); in TS_CONF_load_cert()
195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert()
200 if (cert == NULL) { in TS_CONF_set_signer_cert()
201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert()
202 if (cert == NULL) { in TS_CONF_set_signer_cert()
207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert()
194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
/third_party/openssl/crypto/ts/
H A Dts_conf.c50 BIO *cert = NULL; in TS_CONF_load_cert() local
53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert()
55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert()
59 BIO_free(cert); in TS_CONF_load_cert()
195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert()
200 if (cert == NULL) { in TS_CONF_set_signer_cert()
201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert()
202 if (cert == NULL) { in TS_CONF_set_signer_cert()
207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert()
194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dcms.rs71 /// Given the sender's private key, `pkey` and the recipient's certificate, `cert`,
74 pub fn decrypt<T>(&self, pkey: &PKeyRef<T>, cert: &X509) -> Result<Vec<u8>, ErrorStack> in decrypt()
80 let cert = cert.as_ptr(); in decrypt()
86 cert, in decrypt()
167 /// Given a signing cert `signcert`, private key `pkey`, a certificate stack `certs`,
295 // load cert with public key only in cms_encrypt_decrypt()
297 let pub_cert = X509::from_der(pub_cert_bytes).expect("failed to load pub cert"); in cms_encrypt_decrypt()
299 // load cert with private key in cms_encrypt_decrypt()
301 let priv_cert = Pkcs12::from_der(priv_cert_bytes).expect("failed to load priv cert"); in cms_encrypt_decrypt()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_wolfssl.c473 "SSL: use client cert DER blob failed"); in tls_connection_client_cert()
476 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert()
484 "SSL: use client cert PEM file failed"); in tls_connection_client_cert()
489 "SSL: use client cert DER file failed"); in tls_connection_client_cert()
493 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert()
576 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument
584 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component()
601 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument
636 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject()
676 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument
746 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument
813 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument
833 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local
856 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local
1008 struct wpabuf *cert; tls_verify_cb() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_wolfssl.c474 "SSL: use client cert DER blob failed"); in tls_connection_client_cert()
477 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert()
485 "SSL: use client cert PEM file failed"); in tls_connection_client_cert()
490 "SSL: use client cert DER file failed"); in tls_connection_client_cert()
494 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert()
577 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument
585 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component()
603 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument
638 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject()
678 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument
750 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument
817 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument
837 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local
860 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local
1015 struct wpabuf *cert; tls_verify_cb() local
[all...]
/base/security/certificate_framework/frameworks/js/napi/certificate/src/
H A Dnapi_cert_crl_common.cpp54 napi_value ConvertCertToNapiValue(napi_env env, HcfX509Certificate *cert) in ConvertCertToNapiValue() argument
56 if (cert == nullptr) { in ConvertCertToNapiValue()
57 LOGE("ConvertCertToNapiValue:cert is nullptr."); in ConvertCertToNapiValue()
61 CfResult res = GetCertObject(cert, &certObj); in ConvertCertToNapiValue()
66 NapiX509Certificate *x509Cert = new (std::nothrow) NapiX509Certificate(cert, certObj); in ConvertCertToNapiValue()
125 LOGE("napi cert object is nullptr!"); in GetArrayCertFromNapiValue()
175 LOGE("napi cert object is nullptr!"); in GetArrayCRLFromNapiValue()
/base/startup/hvb/libhvb/src/footer/
H A Dhvb_footer.c58 hvb_print("Invalid cert info in footer.\n"); in _footer_parser()
93 static enum hvb_errno _load_cert(struct hvb_ops *ops, struct hvb_buf *cert, const char *ptn, struct hvb_footer *footer) in _load_cert() argument
99 io_ret = ops->read_partition(ops, ptn, offset, cert->size, cert->addr, &read_bytes); in _load_cert()
105 if (cert->size != read_bytes) { in _load_cert()
143 hvb_print("error, alloc cert buf\n"); in footer_init_desc()
/third_party/node/src/crypto/
H A Dcrypto_spkac.cc118 ByteSource cert = ExportChallenge(input); in ExportChallenge()
119 if (!cert) in ExportChallenge()
123 Encode(env->isolate(), cert.data<char>(), cert.size(), BUFFER); in ExportChallenge()
/third_party/libwebsockets/lib/tls/
H A Dtls-network.c93 lwsl_vhost_notice(v, " vhost %s: cert expiry: %dd", v->name, in lws_tls_check_cert_lifetime()
96 lwsl_vhost_info(v, " vhost %s: no cert", v->name); in lws_tls_check_cert_lifetime()
121 * LWS_TLS_EXTANT_NO : skip adding the cert
122 * LWS_TLS_EXTANT_YES : use the cert and private key paths normally
126 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, in lws_tls_generic_cert_checks() argument
132 * The user code can choose to either pass the cert and in lws_tls_generic_cert_checks()
136 * set up the cert himself using the user callback in lws_tls_generic_cert_checks()
142 if (!cert || !private_key) in lws_tls_generic_cert_checks()
145 n = (int)lws_tls_use_any_upgrade_check_extant(cert); in lws_tls_generic_cert_checks()
154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_ke in lws_tls_generic_cert_checks()
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dsess_id.c41 {"cert", OPT_CERT, '-', "Output certificate "},
55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local
89 cert = ++num; in sess_id_main()
133 if (cert) { in sess_id_main()
141 if (!noout && !cert) { in sess_id_main()
/third_party/openssl/apps/
H A Dsess_id.c41 {"cert", OPT_CERT, '-', "Output certificate "},
55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local
89 cert = ++num; in sess_id_main()
133 if (cert) { in sess_id_main()
141 if (!noout && !cert) { in sess_id_main()
/base/security/dlp_permission_service/frameworks/dlp_permission/include/
H A Di_dlp_permission_callback.h29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0;
32 const std::vector<uint8_t>& cert) = 0;
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/
H A Ddlp_permission_callback.h29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0;
36 const std::vector<uint8_t>& cert) = 0;
/third_party/libcoap/src/
H A Dcoap_gnutls.c637 int self_signed; /* 1 if cert self-signed, 0 otherwise */
647 gnutls_x509_crt_t cert; in get_san_or_cn() local
672 G_CHECK(gnutls_x509_crt_init(&cert), "gnutls_x509_crt_init"); in get_san_or_cn()
674 /* Interested only in first cert in chain */ in get_san_or_cn()
675 G_CHECK(gnutls_x509_crt_import(cert, &cert_info->cert_list[0], in get_san_or_cn()
678 cert_info->self_signed = gnutls_x509_crt_check_issuer(cert, cert); in get_san_or_cn()
682 ret = gnutls_x509_crt_get_subject_alt_name(cert, 0, dn, &size, NULL); in get_san_or_cn()
685 gnutls_x509_crt_deinit(cert); in get_san_or_cn()
691 G_CHECK(gnutls_x509_crt_get_dn(cert, d in get_san_or_cn()
884 gnutls_x509_crt_t cert; cert_verify_gnutls() local
1090 gnutls_datum_t cert; setup_pki_credentials() local
1236 gnutls_datum_t cert; setup_pki_credentials() local
[all...]
/base/startup/hvb/tools/
H A Dhvbtool.py111 def __init__(self, cert=None):
112 self.cert = cert
116 with os.fdopen(os.open('cert.bin', flags, modes), 'wb') as cert_fd:
117 cert_fd.write(self.cert)
119 if self.cert:
120 self.mgc, self.major, self.minor = struct.unpack('4s2I', self.cert[0:12])
123 raise HvbError('Given cert does not look like a HVB cert.')
124 self.img_org_len, self.img_len, self.partition = struct.unpack('2Q64s', self.cert[4
[all...]
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/
H A Ddlp_permission_kit.cpp34 void ClientGenerateDlpCertificateCallback::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument
39 this->cert_ = cert; in OnGenerateDlpCertificate()
47 const std::vector<uint8_t>& cert) in OnParseDlpCertificate()
53 this->offlineCert_ = cert; in OnParseDlpCertificate()
60 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument
66 DLP_LOG_ERROR(LABEL, "begin generate cert fail, error: %{public}d", res); in GenerateDlpCertificate()
83 cert = callback->cert_; in GenerateDlpCertificate()
46 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/test/
H A Dverify_extra_test.c183 X509 *cert = load_cert_from_file(filename); /* may result in NULL */ in test_self_signed() local
188 ret = TEST_int_eq(X509_self_signed(cert, 1), expected); in test_self_signed()
190 if (cert != NULL) { in test_self_signed()
192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed()
193 ret = ret && TEST_true(X509_STORE_CTX_init(ctx, NULL, cert, NULL)); in test_self_signed()
200 X509_free(cert); in test_self_signed()
221 /* Verifying a cert where we have no trusted certs should fail */ in test_store_ctx()
310 || !TEST_ptr(sroot_cert = test_mk_file_path(certs_dir, "sroot-cert.pem")) in setup_tests()
311 || !TEST_ptr(ca_cert = test_mk_file_path(certs_dir, "ca-cert.pem")) in setup_tests()
312 || !TEST_ptr(ee_cert = test_mk_file_path(certs_dir, "ee-cert in setup_tests()
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/base/security/appverify/interfaces/innerkits/appverify/include/util/
H A Dpkcs7_context.h56 for (auto cert : certChain) { in ~Pkcs7Context()
57 X509_free(cert); in ~Pkcs7Context()
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_kit.cpp23 int32_t LocalCodeSignKit::InitLocalCertificate(ByteBuffer &cert) in InitLocalCertificate() argument
25 return LocalCodeSignClient::GetInstance().InitLocalCertificate(cert); in InitLocalCertificate()
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/
H A Ddlp_permission_async_proxy.h35 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override;
37 const std::vector<uint8_t>& cert) override;
/third_party/openssl/test/helpers/
H A Dpkcs12.c79 X509 *cert = NULL; in load_cert_asn1() local
81 cert = d2i_X509(NULL, &bytes, len); in load_cert_asn1()
82 if (!TEST_ptr(cert)) in load_cert_asn1()
85 return cert; in load_cert_asn1()
379 X509 *cert = NULL; in add_certbag() local
385 cert = load_cert_asn1(bytes, len); in add_certbag()
386 if (!TEST_ptr(cert)) { in add_certbag()
391 name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in add_certbag()
395 bag = PKCS12_add_cert(&pb->bags, cert); in add_certbag()
406 X509_free(cert); in add_certbag()
[all...]

Completed in 15 milliseconds

12345678910>>...50