Home
last modified time | relevance | path

Searched refs:cert (Results 226 - 250 of 1184) sorted by relevance

12345678910>>...48

/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/
H A Ddlp_permission_kit.cpp34 void ClientGenerateDlpCertificateCallback::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument
39 this->cert_ = cert; in OnGenerateDlpCertificate()
47 const std::vector<uint8_t>& cert) in OnParseDlpCertificate()
53 this->offlineCert_ = cert; in OnParseDlpCertificate()
60 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument
66 DLP_LOG_ERROR(LABEL, "begin generate cert fail, error: %{public}d", res); in GenerateDlpCertificate()
83 cert = callback->cert_; in GenerateDlpCertificate()
46 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/test/
H A Dverify_extra_test.c183 X509 *cert = load_cert_from_file(filename); /* may result in NULL */ in test_self_signed() local
188 ret = TEST_int_eq(X509_self_signed(cert, 1), expected); in test_self_signed()
190 if (cert != NULL) { in test_self_signed()
192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed()
193 ret = ret && TEST_true(X509_STORE_CTX_init(ctx, NULL, cert, NULL)); in test_self_signed()
200 X509_free(cert); in test_self_signed()
221 /* Verifying a cert where we have no trusted certs should fail */ in test_store_ctx()
310 || !TEST_ptr(sroot_cert = test_mk_file_path(certs_dir, "sroot-cert.pem")) in setup_tests()
311 || !TEST_ptr(ca_cert = test_mk_file_path(certs_dir, "ca-cert.pem")) in setup_tests()
312 || !TEST_ptr(ee_cert = test_mk_file_path(certs_dir, "ee-cert in setup_tests()
[all...]
H A Ddtlstest.c19 static char *cert = NULL; variable
83 &sctx, &cctx, cert, privkey))) in test_dtls_unprocessed()
205 &sctx, &cctx, cert, privkey))) in test_dtls_drop_records()
318 &sctx, &cctx, cert, privkey))) in test_cookie()
358 &sctx, &cctx, cert, privkey))) in test_dtls_duplicate_records()
425 &sctx, NULL, cert, privkey))) in test_just_finished()
484 &sctx, &cctx, cert, privkey))) in test_swap_records()
592 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
/third_party/openssl/crypto/cmp/
H A Dcmp_protect.c138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
140 && ctx->cert != NULL && ctx->pkey != NULL) { in ossl_cmp_msg_add_extraCerts()
147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts()
152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
164 /* make sure that at least our own signer cert is included first */ in ossl_cmp_msg_add_extraCerts()
165 if (!ossl_x509_add_cert_new(&msg->extraCerts, ctx->cert, prepend)) in ossl_cmp_msg_add_extraCerts()
167 ossl_cmp_debug(ctx, "fallback: adding just own CMP signer cert"); in ossl_cmp_msg_add_extraCerts()
284 } else if (ctx->cert ! in ossl_cmp_msg_protect()
[all...]
/third_party/openssl/crypto/x509/
H A Dx_x509.c163 X509 *cert = NULL;
165 cert = (X509 *)ASN1_item_new_ex(X509_it(), libctx, propq);
166 if (!ossl_x509_set0_libctx(cert, libctx, propq)) {
167 X509_free(cert);
168 cert = NULL;
170 return cert;
/base/security/dlp_permission_service/frameworks/dlp_permission/include/
H A Di_dlp_permission_callback.h29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0;
32 const std::vector<uint8_t>& cert) = 0;
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/
H A Ddlp_permission_callback.h29 virtual void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) = 0;
36 const std::vector<uint8_t>& cert) = 0;
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_conf.c435 c = cctx->ctx->cert; in cmd_Certificate()
439 c = cctx->ssl->cert; in cmd_Certificate()
476 CERT *cert; in do_store() local
483 cert = cctx->ctx->cert; in do_store()
486 cert = cctx->ssl->cert; in do_store()
495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store()
725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT
[all...]
/third_party/openssl/ssl/
H A Dssl_conf.c435 c = cctx->ctx->cert; in cmd_Certificate()
439 c = cctx->ssl->cert; in cmd_Certificate()
476 CERT *cert; in do_store() local
483 cert = cctx->ctx->cert; in do_store()
486 cert = cctx->ssl->cert; in do_store()
495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store()
725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT
[all...]
/third_party/openssl/test/helpers/
H A Dpkcs12.c79 X509 *cert = NULL; in load_cert_asn1() local
81 cert = d2i_X509(NULL, &bytes, len); in load_cert_asn1()
82 if (!TEST_ptr(cert)) in load_cert_asn1()
85 return cert; in load_cert_asn1()
379 X509 *cert = NULL; in add_certbag() local
385 cert = load_cert_asn1(bytes, len); in add_certbag()
386 if (!TEST_ptr(cert)) { in add_certbag()
391 name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in add_certbag()
395 bag = PKCS12_add_cert(&pb->bags, cert); in add_certbag()
406 X509_free(cert); in add_certbag()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dest.c66 certs = p7->d.sign->cert; in pkcs7_to_cert()
69 certs = p7->d.signed_and_enveloped->cert; in pkcs7_to_cert()
98 X509 *cert = sk_X509_value(certs, i); in pkcs7_to_cert() local
99 X509_print(out, cert); in pkcs7_to_cert()
100 PEM_write_bio_X509(out, cert); in pkcs7_to_cert()
444 X509 *cert; in generate_csr() local
450 cert = PEM_read_X509(f, NULL, NULL, NULL); in generate_csr()
453 if (cert == NULL) in generate_csr()
456 X509_get_subject_name(cert)); in generate_csr()
457 X509_free(cert); in generate_csr()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dest.c66 certs = p7->d.sign->cert; in pkcs7_to_cert()
69 certs = p7->d.signed_and_enveloped->cert; in pkcs7_to_cert()
98 X509 *cert = sk_X509_value(certs, i); in pkcs7_to_cert() local
99 X509_print(out, cert); in pkcs7_to_cert()
100 PEM_write_bio_X509(out, cert); in pkcs7_to_cert()
444 X509 *cert; in generate_csr() local
450 cert = PEM_read_X509(f, NULL, NULL, NULL); in generate_csr()
453 if (cert == NULL) in generate_csr()
456 X509_get_subject_name(cert)); in generate_csr()
457 X509_free(cert); in generate_csr()
[all...]
/base/security/certificate_framework/test/unittest/cf_sdk_test/src/
H A Dcf_extension_test.cpp373 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER }; in HWTEST_F() local
374 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object); in HWTEST_F()
388 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */ in HWTEST_F() local
389 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object); in HWTEST_F()
403 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */ in HWTEST_F() local
404 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object); in HWTEST_F()
417 CfEncodingBlob cert = { const_cast<uint8_t *>(g_extensionData03), sizeof(g_extensionData03), CF_FORMAT_PEM }; in HWTEST_F() local
418 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object); in HWTEST_F()
H A Dcf_cert_test.cpp276 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER }; in HWTEST_F() local
277 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object); in HWTEST_F()
291 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */ in HWTEST_F() local
292 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object); in HWTEST_F()
306 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */ in HWTEST_F() local
307 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object); in HWTEST_F()
321 CfEncodingBlob cert = { reinterpret_cast<uint8_t *>(g_certData02), sizeof(g_certData02), in HWTEST_F() local
323 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object); in HWTEST_F()
/base/security/appverify/interfaces/innerkits/appverify/src/util/
H A Dhap_verify_openssl_utils.cpp78 HapCertVerifyOpensslUtils::GenerateCertSignFromCertStack(p7->d.sign->cert, certVisitSign); in GetCertChains()
100 X509* cert = PKCS7_cert_from_signer_info(p7, signInfo); in GetCertChains() local
101 if (cert == nullptr) { in GetCertChains()
102 HAPVERIFY_LOG_ERROR("get cert for %{public}dst signInfo failed", i); in GetCertChains()
107 pkcs7Context.certChains[i].push_back(X509_dup(cert)); in GetCertChains()
109 certVisitSign[cert] = true; in GetCertChains()
122 HAPVERIFY_LOG_ERROR("get cert chain for signInfo failed"); in VerifyCertChain()
212 X509* cert = pkcs7Context.certChains[signInfoNum][0]; variable
215 EVP_PKEY* pkey = X509_get0_pubkey(cert);
226 if (PKCS7_signatureVerify(p7Bio, pkcs7Context.p7, signInfo, cert) <
[all...]
/base/update/updater/services/package/pkg_verify/
H A Dpkcs7_signed_data.cpp158 PKG_LOGE("init cert verify fail"); in Init()
389 PKG_LOGE("signer cert info is nullptr!"); in SignerInfoParse()
423 STACK_OF(X509) *certStack = pkcs7_->d.sign->cert; in Pkcs7SignleSignerVerify()
430 X509 *cert = X509_find_by_issuer_and_serial(certStack, signerInfo.issuerName, signerInfo.serialNumber); in Pkcs7SignleSignerVerify() local
431 if (cert == nullptr) { in Pkcs7SignleSignerVerify()
432 PKG_LOGE("cert is empty"); in Pkcs7SignleSignerVerify()
437 if (CertVerify::GetInstance().CheckCertChain(certStack, cert) != 0) { in Pkcs7SignleSignerVerify()
438 PKG_LOGE("public cert check fail"); in Pkcs7SignleSignerVerify()
443 return VerifyDigest(cert, signerInfo, hash, sig); in Pkcs7SignleSignerVerify()
446 int32_t Pkcs7SignedData::VerifyDigest(X509 *cert, cons argument
[all...]
/third_party/mbedtls/library/
H A Dpkcs7.c643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify()
650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify()
659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify()
660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify()
723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify()
730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify()
734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify()
741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
642 mbedtls_pkcs7_data_or_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen, const int is_data_hash) mbedtls_pkcs7_data_or_hash_verify() argument
722 mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen) mbedtls_pkcs7_signed_data_verify() argument
733 mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *hash, size_t hashlen) mbedtls_pkcs7_signed_hash_verify() argument
/third_party/openssl/ohos_lite/include/openssl/
H A Dcms.h142 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert,
145 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert);
159 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert);
210 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert);
211 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert);
231 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
312 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert);
320 X509 *cert);
/base/security/appverify/interfaces/innerkits/appverify/include/util/
H A Dpkcs7_context.h56 for (auto cert : certChain) { in ~Pkcs7Context()
57 X509_free(cert); in ~Pkcs7Context()
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_kit.cpp23 int32_t LocalCodeSignKit::InitLocalCertificate(ByteBuffer &cert) in InitLocalCertificate() argument
25 return LocalCodeSignClient::GetInstance().InitLocalCertificate(cert); in InitLocalCertificate()
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/
H A Ddlp_permission_async_proxy.h35 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override;
37 const std::vector<uint8_t>& cert) override;
/third_party/node/lib/
H A D_tls_wrap.js807 // Clients (!isServer) always request a cert, servers request a client cert
1121 // It's not a peer cert, but the formatting is identical.
1130 const cert = this._handle?.getPeerX509Certificate();
1131 return cert ? new InternalX509Certificate(cert) : undefined;
1135 const cert = this._handle?.getX509Certificate();
1136 return cert ? new InternalX509Certificate(cert) : undefined;
1245 // cert fro
[all...]
/base/security/certificate_framework/frameworks/js/napi/certificate/src/
H A Dnapi_x509_crl_match_parameters.cpp59 HcfX509Certificate *cert = napiX509Cert->GetX509Cert(); in GetX509Cert() local
60 if (cert == nullptr) { in GetX509Cert()
61 LOGE("cert is null!"); in GetX509Cert()
64 out = &(cert->base); in GetX509Cert()

Completed in 16 milliseconds

12345678910>>...48