| /third_party/openssl/crypto/pkcs7/ |
| H A D | pk7_smime.c | 279 p7->d.sign->cert)) { in PKCS7_verify() 425 && p7->d.sign->cert) in STACK_OF() 427 X509_find_by_issuer_and_serial(p7->d.sign->cert, in STACK_OF() 495 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) in PKCS7_decrypt() argument 511 if (cert && !X509_check_private_key(cert, pkey)) { in PKCS7_decrypt() 517 if ((tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert)) == NULL) { in PKCS7_decrypt()
|
| /third_party/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 152 * certain cert information is cached. So this is the point where the 162 /* attempt to compute cert hash */ in X509_cmp() 184 int ossl_x509_add_cert_new(STACK_OF(X509) **p_sk, X509 *cert, int flags) in STACK_OF() 190 return X509_add_cert(*p_sk, cert, flags); in STACK_OF() 193 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags) in STACK_OF() 207 if (X509_cmp(sk_X509_value(sk, i), cert) == 0) in STACK_OF() 212 int ret = X509_self_signed(cert, 0); in STACK_OF() 217 if (!sk_X509_insert(sk, cert, in STACK_OF() 223 (void)X509_up_ref(cert); in STACK_OF() 521 /* Invalid signature or LOS errors are for previous cert */ in X509_chain_check_suiteb() [all...] |
| /third_party/openssl/util/perl/TLSProxy/ |
| H A D | Proxy.pm | 79 $cert, 98 cert => $cert, 231 ." -cert ".$self->cert." -cert2 ".$self->cert 532 sub cert subroutine 535 return $self->{cert};
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
| H A D | osu_client.c | 218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument 229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert() 270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert() 272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert() 302 #define TMP_CERT_DL_FILE "tmp-cert-download" 309 char *cert; in download_cert() local 350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert() 352 if (cert == NULL) in download_cert() 355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert() 356 os_free(cert); in download_cert() 557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local 702 xml_node_t *cert; update_pps_file() local 2905 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
| H A D | osu_client.c | 218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument 229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert() 270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert() 272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert() 302 #define TMP_CERT_DL_FILE "tmp-cert-download" 309 char *cert; in download_cert() local 350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert() 352 if (cert == NULL) in download_cert() 355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert() 356 os_free(cert); in download_cert() 557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local 702 xml_node_t *cert; update_pps_file() local 2907 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument [all...] |
| /third_party/node/test/parallel/ |
| H A D | test-https-client-checkServerIdentity.js | 33 cert: fixtures.readKey('agent3-cert.pem') 48 ca: [fixtures.readKey('ca2-cert.pem')] 60 ca: [fixtures.readKey('ca2-cert.pem')], 61 checkServerIdentity: function(host, cert) {
|
| H A D | test-tls-handshake-exception.js | 24 const cert = fixtures.readKey('rsa_cert.crt'); 46 const options = { key, cert };
|
| H A D | test-tls-net-socket-keepalive.js | 14 const cert = fixtures.readKey('agent1-cert.pem'); 15 const ca = fixtures.readKey('ca1-cert.pem'); 18 cert,
|
| H A D | test-tls-socket-close.js | 25 const cert = fixtures.readKey('agent2-cert.pem'); 29 const tlsServer = tls.createServer({ cert, key }, (socket) => {
|
| H A D | test-tls-startcom-wosign-whitelist.js | 21 cert: loadPEM('agent8-cert') 24 ca: loadPEM('fake-startcom-root-cert'), 34 cert: loadPEM('agent9-cert') 37 ca: loadPEM('fake-startcom-root-cert'),
|
| H A D | test-http2-https-fallback.js | 20 const cert = fixtures.readKey('agent8-cert.pem'); 21 const ca = fixtures.readKey('fake-startcom-root-cert.pem'); 69 { cert, key, allowHTTP1: true }, 114 { cert, key },
|
| H A D | test-https-strict.js | 47 const cert1 = read('agent1-cert.pem'); 49 // key2 has a self signed cert 51 const cert2 = read('agent2-cert.pem'); 55 const cert3 = read('agent3-cert.pem'); 57 const ca1 = read('ca1-cert.pem'); 58 const ca2 = read('ca2-cert.pem'); 69 cert: cert1 74 cert: cert2 79 cert: cert3
|
| H A D | test-double-tls-server.js | 35 cert: fixtures.readKey('agent1-cert.pem'), 40 cert: fixtures.readKey('agent1-cert.pem'),
|
| H A D | test-http2-https-fallback-http-server-options.js | 17 const cert = fixtures.readKey('agent8-cert.pem'); 18 const ca = fixtures.readKey('fake-startcom-root-cert.pem'); 47 cert,
|
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
| H A D | sct.js | 22 function verifySCTs(cert, issuer, ctlogs) { 29 const clone = cert.clone();
|
| /third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
| H A D | pkcs12.rs | 22 cert: *mut *mut X509, in PKCS12_parse() 42 cert: *mut X509, in PKCS12_create()
|
| /third_party/libwebsockets/lib/tls/openssl/ |
| H A D | openssl-server.c | 58 lwsl_info("%s: client cert CN '%s'\n", __func__, ir.ns.name); in OpenSSL_verify_callback() 60 lwsl_info("%s: couldn't get client cert CN\n", __func__); in OpenSSL_verify_callback() 88 /* absolutely require the client cert */ in lws_tls_server_client_cert_verify_config() 154 const char *cert, const char *private_key, 177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m; 179 if (!cert && !private_key) 196 * the rights to read our own cert + key we saved. 201 cert = NULL; 206 * use the multi-cert interface for backwards compatibility in the 210 if (n != LWS_TLS_EXTANT_ALTERNATIVE && cert) { 153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument [all...] |
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_ctx.c | 37 * and a cert verification callback function used for CMP server authentication. 63 * the CMP server and potentially others (TLS server, newly enrolled cert). 204 X509_free(ctx->cert); in OSSL_CMP_CTX_free() 285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument 290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert() 294 /* Set callback function for checking if the cert is ok or should be rejected */ 478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */ 643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert)) 653 /* prevent misleading error later on malformed cert o [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_ctx.c | 37 * and a cert verification callback function used for CMP server authentication. 63 * the CMP server and potentially others (TLS server, newly enrolled cert). 204 X509_free(ctx->cert); in OSSL_CMP_CTX_free() 285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument 290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert() 294 /* Set callback function for checking if the cert is ok or should be rejected */ 478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */ 643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert)) 653 /* prevent misleading error later on malformed cert o [all...] |
| /third_party/nghttp2/src/ |
| H A D | shrpx_tls.cc | 276 auto cert = SSL_CTX_get0_certificate(ssl_ctx); in servername_callback() local 279 auto pubkey = X509_get0_pubkey(cert); in servername_callback() 281 auto pubkey = X509_get_pubkey(cert); in servername_callback() 1782 StringRef get_common_name(X509 *cert) { in get_common_name() argument 1783 auto subjectname = X509_get_subject_name(cert); in get_common_name() 1817 int verify_numeric_hostname(X509 *cert, const StringRef &hostname, in verify_numeric_hostname() argument 1835 X509_get_ext_d2i(cert, NID_subject_alt_name, nullptr, nullptr)); in verify_numeric_hostname() 1863 auto cn = get_common_name(cert); in verify_numeric_hostname() 1879 int verify_dns_hostname(X509 *cert, const StringRef &hostname) { in verify_dns_hostname() argument 1881 X509_get_ext_d2i(cert, NID_subject_alt_nam in verify_dns_hostname() 1949 verify_hostname(X509 *cert, const StringRef &hostname, const Address *addr) verify_hostname() argument 1961 auto cert = SSL_get0_peer_certificate(ssl); check_cert() local 2121 auto cert = SSL_CTX_get0_certificate(ssl_ctx); cert_lookup_tree_add_ssl_ctx() local 2125 auto cert = load_certificate(tls_ctx_data->cert_file); cert_lookup_tree_add_ssl_ctx() local 2261 auto cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); load_certificate() local 2545 auto cert = SSL_CTX_get0_certificate(ssl_ctx); verify_ocsp_response() local [all...] |
| /foundation/communication/netmanager_base/frameworks/native/netconnclient/src/ |
| H A D | network_security_config.cpp | 139 NETMGR_LOG_E("Fail to read cert fail [%{public}s]", fileName.c_str()); in ReadCertFile() 273 NETMGR_LOG_E("fail to open cert file."); in ReHashCAPathForX509() 277 NETMGR_LOG_D("Rehased cert generated. [%{public}s]", rehashedCaFile.c_str()); in ReHashCAPathForX509() 285 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in CreateRehashedCertFiles() 286 ReHashCAPathForX509(cert); in CreateRehashedCertFiles() 289 for (auto &cert : domainConfig.trustAnchors_.certs_) { in CreateRehashedCertFiles() 290 ReHashCAPathForX509(cert); in CreateRehashedCertFiles() 652 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in DumpConfigs() 653 NETMGR_LOG_I("[%{public}s]", cert.c_str()); in DumpConfigs() 669 for (auto &cert in DumpConfigs() [all...] |
| /third_party/openssl/test/ |
| H A D | cmp_vfy_test.c | 35 X509 *cert; member 145 ts, fixture->cert)); in execute_validate_cert_path_test() 204 static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_trusted() argument 206 return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trustedStore(ctx), cert); in add_trusted() 209 static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_untrusted() argument 211 return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert, in add_untrusted() 253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert() 386 (*fixture)->cert = endentity2; in setup_path() 412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor() 583 "insta.cert [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | t1_lib.c | 929 * Check cert parameters compatible with extensions: currently just checks EC 1313 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1328 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1335 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg() 1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1395 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs() 1396 return s->cert->client_sigalgslen; in tls12_get_psigalgs() 1397 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs() 1398 *psigs = s->cert in tls12_get_psigalgs() 2311 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument [all...] |
| /third_party/openssl/ssl/ |
| H A D | t1_lib.c | 909 * Check cert parameters compatible with extensions: currently just checks EC 1293 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1308 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1315 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg() 1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1375 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs() 1376 return s->cert->client_sigalgslen; in tls12_get_psigalgs() 1377 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs() 1378 *psigs = s->cert in tls12_get_psigalgs() 2291 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument [all...] |
| /third_party/mbedtls/include/mbedtls/ |
| H A D | pkcs7.h | 186 * \param cert Certificate containing key to verify signature. 196 const mbedtls_x509_crt *cert, 215 * \param cert Certificate containing key to verify signature. 225 const mbedtls_x509_crt *cert,
|