Home
last modified time | relevance | path

Searched refs:cert (Results 226 - 250 of 1114) sorted by relevance

12345678910>>...45

/third_party/openssl/crypto/pkcs7/
H A Dpk7_smime.c279 p7->d.sign->cert)) { in PKCS7_verify()
425 && p7->d.sign->cert) in STACK_OF()
427 X509_find_by_issuer_and_serial(p7->d.sign->cert, in STACK_OF()
495 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) in PKCS7_decrypt() argument
511 if (cert && !X509_check_private_key(cert, pkey)) { in PKCS7_decrypt()
517 if ((tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert)) == NULL) { in PKCS7_decrypt()
/third_party/openssl/crypto/x509/
H A Dx509_cmp.c152 * certain cert information is cached. So this is the point where the
162 /* attempt to compute cert hash */ in X509_cmp()
184 int ossl_x509_add_cert_new(STACK_OF(X509) **p_sk, X509 *cert, int flags) in STACK_OF()
190 return X509_add_cert(*p_sk, cert, flags); in STACK_OF()
193 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags) in STACK_OF()
207 if (X509_cmp(sk_X509_value(sk, i), cert) == 0) in STACK_OF()
212 int ret = X509_self_signed(cert, 0); in STACK_OF()
217 if (!sk_X509_insert(sk, cert, in STACK_OF()
223 (void)X509_up_ref(cert); in STACK_OF()
521 /* Invalid signature or LOS errors are for previous cert */ in X509_chain_check_suiteb()
[all...]
/third_party/openssl/util/perl/TLSProxy/
H A DProxy.pm79 $cert,
98 cert => $cert,
231 ." -cert ".$self->cert." -cert2 ".$self->cert
532 sub cert subroutine
535 return $self->{cert};
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dosu_client.c218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument
229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert()
270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert()
272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert()
302 #define TMP_CERT_DL_FILE "tmp-cert-download"
309 char *cert; in download_cert() local
350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert()
352 if (cert == NULL) in download_cert()
355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert()
356 os_free(cert); in download_cert()
557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local
702 xml_node_t *cert; update_pps_file() local
2905 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dosu_client.c218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument
229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert()
270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert()
272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert()
302 #define TMP_CERT_DL_FILE "tmp-cert-download"
309 char *cert; in download_cert() local
350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert()
352 if (cert == NULL) in download_cert()
355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert()
356 os_free(cert); in download_cert()
557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local
702 xml_node_t *cert; update_pps_file() local
2907 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument
[all...]
/third_party/node/test/parallel/
H A Dtest-https-client-checkServerIdentity.js33 cert: fixtures.readKey('agent3-cert.pem')
48 ca: [fixtures.readKey('ca2-cert.pem')]
60 ca: [fixtures.readKey('ca2-cert.pem')],
61 checkServerIdentity: function(host, cert) {
H A Dtest-tls-handshake-exception.js24 const cert = fixtures.readKey('rsa_cert.crt');
46 const options = { key, cert };
H A Dtest-tls-net-socket-keepalive.js14 const cert = fixtures.readKey('agent1-cert.pem');
15 const ca = fixtures.readKey('ca1-cert.pem');
18 cert,
H A Dtest-tls-socket-close.js25 const cert = fixtures.readKey('agent2-cert.pem');
29 const tlsServer = tls.createServer({ cert, key }, (socket) => {
H A Dtest-tls-startcom-wosign-whitelist.js21 cert: loadPEM('agent8-cert')
24 ca: loadPEM('fake-startcom-root-cert'),
34 cert: loadPEM('agent9-cert')
37 ca: loadPEM('fake-startcom-root-cert'),
H A Dtest-http2-https-fallback.js20 const cert = fixtures.readKey('agent8-cert.pem');
21 const ca = fixtures.readKey('fake-startcom-root-cert.pem');
69 { cert, key, allowHTTP1: true },
114 { cert, key },
H A Dtest-https-strict.js47 const cert1 = read('agent1-cert.pem');
49 // key2 has a self signed cert
51 const cert2 = read('agent2-cert.pem');
55 const cert3 = read('agent3-cert.pem');
57 const ca1 = read('ca1-cert.pem');
58 const ca2 = read('ca2-cert.pem');
69 cert: cert1
74 cert: cert2
79 cert: cert3
H A Dtest-double-tls-server.js35 cert: fixtures.readKey('agent1-cert.pem'),
40 cert: fixtures.readKey('agent1-cert.pem'),
H A Dtest-http2-https-fallback-http-server-options.js17 const cert = fixtures.readKey('agent8-cert.pem');
18 const ca = fixtures.readKey('fake-startcom-root-cert.pem');
47 cert,
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/
H A Dsct.js22 function verifySCTs(cert, issuer, ctlogs) {
29 const clone = cert.clone();
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Dpkcs12.rs22 cert: *mut *mut X509, in PKCS12_parse()
42 cert: *mut X509, in PKCS12_create()
/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-server.c58 lwsl_info("%s: client cert CN '%s'\n", __func__, ir.ns.name); in OpenSSL_verify_callback()
60 lwsl_info("%s: couldn't get client cert CN\n", __func__); in OpenSSL_verify_callback()
88 /* absolutely require the client cert */ in lws_tls_server_client_cert_verify_config()
154 const char *cert, const char *private_key,
177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m;
179 if (!cert && !private_key)
196 * the rights to read our own cert + key we saved.
201 cert = NULL;
206 * use the multi-cert interface for backwards compatibility in the
210 if (n != LWS_TLS_EXTANT_ALTERNATIVE && cert) {
153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_ctx.c37 * and a cert verification callback function used for CMP server authentication.
63 * the CMP server and potentially others (TLS server, newly enrolled cert).
204 X509_free(ctx->cert); in OSSL_CMP_CTX_free()
285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument
290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert()
294 /* Set callback function for checking if the cert is ok or should be rejected */
478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */
643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert))
653 /* prevent misleading error later on malformed cert o
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_ctx.c37 * and a cert verification callback function used for CMP server authentication.
63 * the CMP server and potentially others (TLS server, newly enrolled cert).
204 X509_free(ctx->cert); in OSSL_CMP_CTX_free()
285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument
290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert()
294 /* Set callback function for checking if the cert is ok or should be rejected */
478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */
643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert))
653 /* prevent misleading error later on malformed cert o
[all...]
/third_party/nghttp2/src/
H A Dshrpx_tls.cc276 auto cert = SSL_CTX_get0_certificate(ssl_ctx); in servername_callback() local
279 auto pubkey = X509_get0_pubkey(cert); in servername_callback()
281 auto pubkey = X509_get_pubkey(cert); in servername_callback()
1782 StringRef get_common_name(X509 *cert) { in get_common_name() argument
1783 auto subjectname = X509_get_subject_name(cert); in get_common_name()
1817 int verify_numeric_hostname(X509 *cert, const StringRef &hostname, in verify_numeric_hostname() argument
1835 X509_get_ext_d2i(cert, NID_subject_alt_name, nullptr, nullptr)); in verify_numeric_hostname()
1863 auto cn = get_common_name(cert); in verify_numeric_hostname()
1879 int verify_dns_hostname(X509 *cert, const StringRef &hostname) { in verify_dns_hostname() argument
1881 X509_get_ext_d2i(cert, NID_subject_alt_nam in verify_dns_hostname()
1949 verify_hostname(X509 *cert, const StringRef &hostname, const Address *addr) verify_hostname() argument
1961 auto cert = SSL_get0_peer_certificate(ssl); check_cert() local
2121 auto cert = SSL_CTX_get0_certificate(ssl_ctx); cert_lookup_tree_add_ssl_ctx() local
2125 auto cert = load_certificate(tls_ctx_data->cert_file); cert_lookup_tree_add_ssl_ctx() local
2261 auto cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); load_certificate() local
2545 auto cert = SSL_CTX_get0_certificate(ssl_ctx); verify_ocsp_response() local
[all...]
/foundation/communication/netmanager_base/frameworks/native/netconnclient/src/
H A Dnetwork_security_config.cpp139 NETMGR_LOG_E("Fail to read cert fail [%{public}s]", fileName.c_str()); in ReadCertFile()
273 NETMGR_LOG_E("fail to open cert file."); in ReHashCAPathForX509()
277 NETMGR_LOG_D("Rehased cert generated. [%{public}s]", rehashedCaFile.c_str()); in ReHashCAPathForX509()
285 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in CreateRehashedCertFiles()
286 ReHashCAPathForX509(cert); in CreateRehashedCertFiles()
289 for (auto &cert : domainConfig.trustAnchors_.certs_) { in CreateRehashedCertFiles()
290 ReHashCAPathForX509(cert); in CreateRehashedCertFiles()
652 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in DumpConfigs()
653 NETMGR_LOG_I("[%{public}s]", cert.c_str()); in DumpConfigs()
669 for (auto &cert in DumpConfigs()
[all...]
/third_party/openssl/test/
H A Dcmp_vfy_test.c35 X509 *cert; member
145 ts, fixture->cert)); in execute_validate_cert_path_test()
204 static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_trusted() argument
206 return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trustedStore(ctx), cert); in add_trusted()
209 static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_untrusted() argument
211 return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert, in add_untrusted()
253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert()
386 (*fixture)->cert = endentity2; in setup_path()
412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor()
583 "insta.cert
[all...]
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c929 * Check cert parameters compatible with extensions: currently just checks EC
1313 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1328 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1335 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg()
1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1395 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs()
1396 return s->cert->client_sigalgslen; in tls12_get_psigalgs()
1397 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs()
1398 *psigs = s->cert in tls12_get_psigalgs()
2311 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument
[all...]
/third_party/openssl/ssl/
H A Dt1_lib.c909 * Check cert parameters compatible with extensions: currently just checks EC
1293 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1308 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1315 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg()
1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1375 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs()
1376 return s->cert->client_sigalgslen; in tls12_get_psigalgs()
1377 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs()
1378 *psigs = s->cert in tls12_get_psigalgs()
2291 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dpkcs7.h186 * \param cert Certificate containing key to verify signature.
196 const mbedtls_x509_crt *cert,
215 * \param cert Certificate containing key to verify signature.
225 const mbedtls_x509_crt *cert,

Completed in 24 milliseconds

12345678910>>...45