| /third_party/node/deps/openssl/openssl/crypto/ts/ |
| H A D | ts_conf.c | 50 BIO *cert = NULL; in TS_CONF_load_cert() local 53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert() 55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert() 59 BIO_free(cert); in TS_CONF_load_cert() 195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert() 200 if (cert == NULL) { in TS_CONF_set_signer_cert() 201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert() 202 if (cert == NULL) { in TS_CONF_set_signer_cert() 207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert() 194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
|
| /third_party/openssl/crypto/ts/ |
| H A D | ts_conf.c | 50 BIO *cert = NULL; in TS_CONF_load_cert() local 53 if ((cert = BIO_new_file(file, "r")) == NULL) in TS_CONF_load_cert() 55 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); in TS_CONF_load_cert() 59 BIO_free(cert); in TS_CONF_load_cert() 195 const char *cert, TS_RESP_CTX *ctx) in TS_CONF_set_signer_cert() 200 if (cert == NULL) { in TS_CONF_set_signer_cert() 201 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); in TS_CONF_set_signer_cert() 202 if (cert == NULL) { in TS_CONF_set_signer_cert() 207 if ((cert_obj = TS_CONF_load_cert(cert)) == NULL) in TS_CONF_set_signer_cert() 194 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) TS_CONF_set_signer_cert() argument
|
| /third_party/rust/crates/rust-openssl/openssl/src/ |
| H A D | cms.rs | 71 /// Given the sender's private key, `pkey` and the recipient's certificate, `cert`, 74 pub fn decrypt<T>(&self, pkey: &PKeyRef<T>, cert: &X509) -> Result<Vec<u8>, ErrorStack> in decrypt() 80 let cert = cert.as_ptr(); in decrypt() 86 cert, in decrypt() 167 /// Given a signing cert `signcert`, private key `pkey`, a certificate stack `certs`, 295 // load cert with public key only in cms_encrypt_decrypt() 297 let pub_cert = X509::from_der(pub_cert_bytes).expect("failed to load pub cert"); in cms_encrypt_decrypt() 299 // load cert with private key in cms_encrypt_decrypt() 301 let priv_cert = Pkcs12::from_der(priv_cert_bytes).expect("failed to load priv cert"); in cms_encrypt_decrypt() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | tls_wolfssl.c | 473 "SSL: use client cert DER blob failed"); in tls_connection_client_cert() 476 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert() 484 "SSL: use client cert PEM file failed"); in tls_connection_client_cert() 489 "SSL: use client cert DER file failed"); in tls_connection_client_cert() 493 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert() 576 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument 584 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component() 601 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument 636 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject() 676 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument 746 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument 813 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument 833 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local 856 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local 1008 struct wpabuf *cert; tls_verify_cb() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | tls_wolfssl.c | 474 "SSL: use client cert DER blob failed"); in tls_connection_client_cert() 477 wpa_printf(MSG_DEBUG, "SSL: use client cert blob OK"); in tls_connection_client_cert() 485 "SSL: use client cert PEM file failed"); in tls_connection_client_cert() 490 "SSL: use client cert DER file failed"); in tls_connection_client_cert() 494 wpa_printf(MSG_DEBUG, "SSL: use client cert file OK"); in tls_connection_client_cert() 577 static int tls_match_alt_subject_component(WOLFSSL_X509 *cert, int type, in tls_match_alt_subject_component() argument 585 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component() 603 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument 638 if (tls_match_alt_subject_component(cert, type, pos, len) > 0) in tls_match_alt_subject() 678 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, cons argument 750 tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) tls_match_suffix() argument 817 get_x509_cert(WOLFSSL_X509 *cert) get_x509_cert() argument 837 struct wpabuf *cert = NULL; wolfssl_tls_fail_event() local 860 struct wpabuf *cert = NULL; wolfssl_tls_cert_event() local 1015 struct wpabuf *cert; tls_verify_cb() local [all...] |
| /base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
| H A D | napi_cert_crl_common.cpp | 54 napi_value ConvertCertToNapiValue(napi_env env, HcfX509Certificate *cert) in ConvertCertToNapiValue() argument 56 if (cert == nullptr) { in ConvertCertToNapiValue() 57 LOGE("ConvertCertToNapiValue:cert is nullptr."); in ConvertCertToNapiValue() 61 CfResult res = GetCertObject(cert, &certObj); in ConvertCertToNapiValue() 66 NapiX509Certificate *x509Cert = new (std::nothrow) NapiX509Certificate(cert, certObj); in ConvertCertToNapiValue() 125 LOGE("napi cert object is nullptr!"); in GetArrayCertFromNapiValue() 175 LOGE("napi cert object is nullptr!"); in GetArrayCRLFromNapiValue()
|
| /base/startup/hvb/libhvb/src/footer/ |
| H A D | hvb_footer.c | 58 hvb_print("Invalid cert info in footer.\n"); in _footer_parser() 93 static enum hvb_errno _load_cert(struct hvb_ops *ops, struct hvb_buf *cert, const char *ptn, struct hvb_footer *footer) in _load_cert() argument 99 io_ret = ops->read_partition(ops, ptn, offset, cert->size, cert->addr, &read_bytes); in _load_cert() 105 if (cert->size != read_bytes) { in _load_cert() 143 hvb_print("error, alloc cert buf\n"); in footer_init_desc()
|
| /third_party/node/src/crypto/ |
| H A D | crypto_spkac.cc | 118 ByteSource cert = ExportChallenge(input); in ExportChallenge() 119 if (!cert) in ExportChallenge() 123 Encode(env->isolate(), cert.data<char>(), cert.size(), BUFFER); in ExportChallenge()
|
| /third_party/libwebsockets/lib/tls/ |
| H A D | tls-network.c | 93 lwsl_vhost_notice(v, " vhost %s: cert expiry: %dd", v->name, in lws_tls_check_cert_lifetime() 96 lwsl_vhost_info(v, " vhost %s: no cert", v->name); in lws_tls_check_cert_lifetime() 121 * LWS_TLS_EXTANT_NO : skip adding the cert 122 * LWS_TLS_EXTANT_YES : use the cert and private key paths normally 126 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, in lws_tls_generic_cert_checks() argument 132 * The user code can choose to either pass the cert and in lws_tls_generic_cert_checks() 136 * set up the cert himself using the user callback in lws_tls_generic_cert_checks() 142 if (!cert || !private_key) in lws_tls_generic_cert_checks() 145 n = (int)lws_tls_use_any_upgrade_check_extant(cert); in lws_tls_generic_cert_checks() 154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_ke in lws_tls_generic_cert_checks() [all...] |
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | sess_id.c | 41 {"cert", OPT_CERT, '-', "Output certificate "}, 55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local 89 cert = ++num; in sess_id_main() 133 if (cert) { in sess_id_main() 141 if (!noout && !cert) { in sess_id_main()
|
| /third_party/openssl/apps/ |
| H A D | sess_id.c | 41 {"cert", OPT_CERT, '-', "Output certificate "}, 55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local 89 cert = ++num; in sess_id_main() 133 if (cert) { in sess_id_main() 141 if (!noout && !cert) { in sess_id_main()
|
| /base/security/dlp_permission_service/frameworks/dlp_permission/include/ |
| H A D | i_dlp_permission_callback.h | 29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0; 32 const std::vector<uint8_t>& cert) = 0;
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/ |
| H A D | dlp_permission_callback.h | 29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0; 36 const std::vector<uint8_t>& cert) = 0;
|
| /third_party/libcoap/src/ |
| H A D | coap_gnutls.c | 637 int self_signed; /* 1 if cert self-signed, 0 otherwise */ 647 gnutls_x509_crt_t cert; in get_san_or_cn() local 672 G_CHECK(gnutls_x509_crt_init(&cert), "gnutls_x509_crt_init"); in get_san_or_cn() 674 /* Interested only in first cert in chain */ in get_san_or_cn() 675 G_CHECK(gnutls_x509_crt_import(cert, &cert_info->cert_list[0], in get_san_or_cn() 678 cert_info->self_signed = gnutls_x509_crt_check_issuer(cert, cert); in get_san_or_cn() 682 ret = gnutls_x509_crt_get_subject_alt_name(cert, 0, dn, &size, NULL); in get_san_or_cn() 685 gnutls_x509_crt_deinit(cert); in get_san_or_cn() 691 G_CHECK(gnutls_x509_crt_get_dn(cert, d in get_san_or_cn() 884 gnutls_x509_crt_t cert; cert_verify_gnutls() local 1090 gnutls_datum_t cert; setup_pki_credentials() local 1236 gnutls_datum_t cert; setup_pki_credentials() local [all...] |
| /base/startup/hvb/tools/ |
| H A D | hvbtool.py | 111 def __init__(self, cert=None): 112 self.cert = cert 116 with os.fdopen(os.open('cert.bin', flags, modes), 'wb') as cert_fd: 117 cert_fd.write(self.cert) 119 if self.cert: 120 self.mgc, self.major, self.minor = struct.unpack('4s2I', self.cert[0:12]) 123 raise HvbError('Given cert does not look like a HVB cert.') 124 self.img_org_len, self.img_len, self.partition = struct.unpack('2Q64s', self.cert[4 [all...] |
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/ |
| H A D | dlp_permission_kit.cpp | 34 void ClientGenerateDlpCertificateCallback::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument 39 this->cert_ = cert; in OnGenerateDlpCertificate() 47 const std::vector<uint8_t>& cert) in OnParseDlpCertificate() 53 this->offlineCert_ = cert; in OnParseDlpCertificate() 60 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument 66 DLP_LOG_ERROR(LABEL, "begin generate cert fail, error: %{public}d", res); in GenerateDlpCertificate() 83 cert = callback->cert_; in GenerateDlpCertificate() 46 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x_x509.c | 163 X509 *cert = NULL; 165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq); 166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) { 167 X509_free(cert); 168 cert = NULL; 170 return cert;
|
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_protect.c | 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts() 165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts() 167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 284 } else if (ctx->cert ! in ossl_cmp_msg_protect() [all...] |
| /third_party/openssl/test/ |
| H A D | verify_extra_test.c | 183 X509 *cert = load_cert_from_file(filename); /* may result in NULL */ in test_self_signed() local 188 ret = TEST_int_eq(X509_self_signed(cert, 1), expected); in test_self_signed() 190 if (cert != NULL) { in test_self_signed() 192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed() 193 ret = ret && TEST_true(X509_STORE_CTX_init(ctx, NULL, cert, NULL)); in test_self_signed() 200 X509_free(cert); in test_self_signed() 221 /* Verifying a cert where we have no trusted certs should fail */ in test_store_ctx() 310 || !TEST_ptr(sroot_cert = test_mk_file_path(certs_dir, "sroot-cert.pem")) in setup_tests() 311 || !TEST_ptr(ca_cert = test_mk_file_path(certs_dir, "ca-cert.pem")) in setup_tests() 312 || !TEST_ptr(ee_cert = test_mk_file_path(certs_dir, "ee-cert in setup_tests() [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_protect.c | 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts() 165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts() 167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 284 } else if (ctx->cert ! in ossl_cmp_msg_protect() [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x_x509.c | 163 X509 *cert = NULL; 165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq); 166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) { 167 X509_free(cert); 168 cert = NULL; 170 return cert;
|
| /base/security/appverify/interfaces/innerkits/appverify/include/util/ |
| H A D | pkcs7_context.h | 56 for (auto cert : certChain) {
in ~Pkcs7Context() 57 X509_free(cert);
in ~Pkcs7Context()
|
| /base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
| H A D | local_code_sign_kit.cpp | 23 int32_t LocalCodeSignKit::InitLocalCertificate(ByteBuffer &cert)
in InitLocalCertificate() argument 25 return LocalCodeSignClient::GetInstance().InitLocalCertificate(cert);
in InitLocalCertificate()
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/ |
| H A D | dlp_permission_async_proxy.h | 35 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override; 37 const std::vector<uint8_t>& cert) override;
|
| /third_party/openssl/test/helpers/ |
| H A D | pkcs12.c | 79 X509 *cert = NULL; in load_cert_asn1() local 81 cert = d2i_X509(NULL, &bytes, len); in load_cert_asn1() 82 if (!TEST_ptr(cert)) in load_cert_asn1() 85 return cert; in load_cert_asn1() 379 X509 *cert = NULL; in add_certbag() local 385 cert = load_cert_asn1(bytes, len); in add_certbag() 386 if (!TEST_ptr(cert)) { in add_certbag() 391 name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in add_certbag() 395 bag = PKCS12_add_cert(&pb->bags, cert); in add_certbag() 406 X509_free(cert); in add_certbag() [all...] |