| /third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
| H A D | est.c | 66 certs = p7->d.sign->cert; in pkcs7_to_cert() 69 certs = p7->d.signed_and_enveloped->cert; in pkcs7_to_cert() 98 X509 *cert = sk_X509_value(certs, i); in pkcs7_to_cert() local 99 X509_print(out, cert); in pkcs7_to_cert() 100 PEM_write_bio_X509(out, cert); in pkcs7_to_cert() 444 X509 *cert; in generate_csr() local 450 cert = PEM_read_X509(f, NULL, NULL, NULL); in generate_csr() 453 if (cert == NULL) in generate_csr() 456 X509_get_subject_name(cert)); in generate_csr() 457 X509_free(cert); in generate_csr() [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_conf.c | 435 c = cctx->ctx->cert; in cmd_Certificate() 439 c = cctx->ssl->cert; in cmd_Certificate() 476 CERT *cert; in do_store() local 483 cert = cctx->ctx->cert; in do_store() 486 cert = cctx->ssl->cert; in do_store() 495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store() 725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_conf.c | 435 c = cctx->ctx->cert; in cmd_Certificate() 439 c = cctx->ssl->cert; in cmd_Certificate() 476 CERT *cert; in do_store() local 483 cert = cctx->ctx->cert; in do_store() 486 cert = cctx->ssl->cert; in do_store() 495 st = verify_store ? &cert->verify_store : &cert->chain_store; in do_store() 725 SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICAT [all...] |
| /base/security/certificate_framework/test/unittest/cf_sdk_test/src/ |
| H A D | cf_extension_test.cpp | 373 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER };
in HWTEST_F() local 374 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 388 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */
in HWTEST_F() local 389 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 403 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */
in HWTEST_F() local 404 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F() 417 CfEncodingBlob cert = { const_cast<uint8_t *>(g_extensionData03), sizeof(g_extensionData03), CF_FORMAT_PEM };
in HWTEST_F() local 418 int32_t ret = CfCreate(CF_OBJ_TYPE_EXTENSION, &cert, &object);
in HWTEST_F()
|
| H A D | cf_cert_test.cpp | 276 CfEncodingBlob cert = { invalidData, sizeof(invalidData), CF_FORMAT_DER };
in HWTEST_F() local 277 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 291 CfEncodingBlob cert = { nullptr, sizeof(invalidData), CF_FORMAT_DER }; /* in's data is nullptr */
in HWTEST_F() local 292 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 306 CfEncodingBlob cert = { invalidData, 0, CF_FORMAT_DER }; /* in's size is 0 */
in HWTEST_F() local 307 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F() 321 CfEncodingBlob cert = { reinterpret_cast<uint8_t *>(g_certData02), sizeof(g_certData02),
in HWTEST_F() local 323 int32_t ret = CfCreate(CF_OBJ_TYPE_CERT, &cert, &object);
in HWTEST_F()
|
| /base/security/appverify/interfaces/innerkits/appverify/src/util/ |
| H A D | hap_verify_openssl_utils.cpp | 78 HapCertVerifyOpensslUtils::GenerateCertSignFromCertStack(p7->d.sign->cert, certVisitSign); in GetCertChains() 100 X509* cert = PKCS7_cert_from_signer_info(p7, signInfo); in GetCertChains() local 101 if (cert == nullptr) { in GetCertChains() 102 HAPVERIFY_LOG_ERROR("get cert for %{public}dst signInfo failed", i); in GetCertChains() 107 pkcs7Context.certChains[i].push_back(X509_dup(cert)); in GetCertChains() 109 certVisitSign[cert] = true; in GetCertChains() 122 HAPVERIFY_LOG_ERROR("get cert chain for signInfo failed"); in VerifyCertChain() 212 X509* cert = pkcs7Context.certChains[signInfoNum][0]; variable 215 EVP_PKEY* pkey = X509_get0_pubkey(cert); 226 if (PKCS7_signatureVerify(p7Bio, pkcs7Context.p7, signInfo, cert) < [all...] |
| /base/update/updater/services/package/pkg_verify/ |
| H A D | pkcs7_signed_data.cpp | 158 PKG_LOGE("init cert verify fail"); in Init() 389 PKG_LOGE("signer cert info is nullptr!"); in SignerInfoParse() 423 STACK_OF(X509) *certStack = pkcs7_->d.sign->cert; in Pkcs7SignleSignerVerify() 430 X509 *cert = X509_find_by_issuer_and_serial(certStack, signerInfo.issuerName, signerInfo.serialNumber); in Pkcs7SignleSignerVerify() local 431 if (cert == nullptr) { in Pkcs7SignleSignerVerify() 432 PKG_LOGE("cert is empty"); in Pkcs7SignleSignerVerify() 437 if (CertVerify::GetInstance().CheckCertChain(certStack, cert) != 0) { in Pkcs7SignleSignerVerify() 438 PKG_LOGE("public cert check fail"); in Pkcs7SignleSignerVerify() 443 return VerifyDigest(cert, signerInfo, hash, sig); in Pkcs7SignleSignerVerify() 446 int32_t Pkcs7SignedData::VerifyDigest(X509 *cert, cons argument [all...] |
| /third_party/mbedtls/library/ |
| H A D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify() 642 mbedtls_pkcs7_data_or_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen, const int is_data_hash) mbedtls_pkcs7_data_or_hash_verify() argument 722 mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *data, size_t datalen) mbedtls_pkcs7_signed_data_verify() argument 733 mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7, const mbedtls_x509_crt *cert, const unsigned char *hash, size_t hashlen) mbedtls_pkcs7_signed_hash_verify() argument
|
| /third_party/openssl/test/ |
| H A D | dtlstest.c | 19 static char *cert = NULL; variable 83 &sctx, &cctx, cert, privkey))) in test_dtls_unprocessed() 205 &sctx, &cctx, cert, privkey))) in test_dtls_drop_records() 318 &sctx, &cctx, cert, privkey))) in test_cookie() 358 &sctx, &cctx, cert, privkey))) in test_dtls_duplicate_records() 425 &sctx, NULL, cert, privkey))) in test_just_finished() 484 &sctx, &cctx, cert, privkey))) in test_swap_records() 592 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| H A D | sslbuffertest.c | 157 char *cert, *pkey; in setup_tests() local 164 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests() 170 &serverctx, &clientctx, cert, pkey)) { in setup_tests()
|
| H A D | recordlentest.c | 15 static char *cert = NULL; variable 107 &sctx, &cctx, cert, privkey))) in test_record_overflow() 193 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | cms.h | 142 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 145 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 159 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 210 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 211 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 231 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 312 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 320 X509 *cert);
|
| /third_party/node/test/parallel/ |
| H A D | test-double-tls-client.js | 14 cert: fixtures.readKey('agent1-cert.pem'), 22 cert: fixtures.readKey('agent1-cert.pem'),
|
| H A D | test-https-truncate.js | 33 const cert = fixtures.readKey('agent1-cert.pem'); 41 const sopt = { key, cert };
|
| H A D | test-tls-addca.js | 19 cert: keys.agent1.cert,
|
| H A D | test-tls-session-cache.js | 45 const cert = fixtures.readKey('rsa_cert.crt'); 48 cert, 49 ca: [cert], 107 '-cert', fixtures.path('keys/rsa_cert.crt'),
|
| /third_party/node/deps/npm/node_modules/@sigstore/sign/dist/signer/fulcio/ |
| H A D | ca.js | 35 const cert = resp.signedCertificateEmbeddedSct 39 return cert.chain.certificates;
|
| /third_party/node/lib/ |
| H A D | _tls_wrap.js | 807 // Clients (!isServer) always request a cert, servers request a client cert 1121 // It's not a peer cert, but the formatting is identical. 1130 const cert = this._handle?.getPeerX509Certificate(); 1131 return cert ? new InternalX509Certificate(cert) : undefined; 1135 const cert = this._handle?.getX509Certificate(); 1136 return cert ? new InternalX509Certificate(cert) : undefined; 1245 // cert fro [all...] |
| /base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
| H A D | napi_x509_crl_match_parameters.cpp | 59 HcfX509Certificate *cert = napiX509Cert->GetX509Cert(); in GetX509Cert() local 60 if (cert == nullptr) { in GetX509Cert() 61 LOGE("cert is null!"); in GetX509Cert() 64 out = &(cert->base); in GetX509Cert()
|
| /base/security/appverify/interfaces/innerkits/appverify/src/init/ |
| H A D | trusted_root_ca.cpp | 111 X509* cert = HapCertVerifyOpensslUtils::GetX509CertFromPemString(jsonPair.second);
in GetTrustedRootCAFromJson() local 112 if (cert == nullptr) {
in GetTrustedRootCAFromJson() 118 rootCertMap[jsonPair.first] = cert;
in GetTrustedRootCAFromJson() 122 HAPVERIFY_LOG_ERROR("no root cert");
in GetTrustedRootCAFromJson()
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/ |
| H A D | dlp_permission_kit.h | 41 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override; 56 const std::vector<uint8_t>& cert) override; 68 static int32_t GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert);
|
| /foundation/communication/netstack/frameworks/native/net_ssl/include/ |
| H A D | net_ssl_verify_cert.h | 114 X509 *CertBlobToX509(const CertBlob *cert);
116 uint32_t VerifyCert(const CertBlob *cert);
118 uint32_t VerifyCert(const CertBlob *cert, const CertBlob *caCert);
|
| /third_party/node/benchmark/tls/ |
| H A D | secure-pair.js | 22 cert: fixtures.readKey('rsa_cert.crt'), 39 cert: options.cert,
|
| /base/security/code_signature/test/unittest/ |
| H A D | local_code_sign_test.cpp | 59 ByteBuffer cert;
in HWTEST_F() local 61 int ret = LocalCodeSignKit::InitLocalCertificate(cert);
in HWTEST_F() 74 ByteBuffer cert;
in HWTEST_F() local 75 int ret = LocalCodeSignKit::InitLocalCertificate(cert);
in HWTEST_F()
|
| /foundation/communication/netstack/frameworks/cj/http/src/ |
| H A D | net_http_request.cpp | 192 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in SetClientCert() 194 cert_ = cert; in SetClientCert() 206 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in GetClientCert() 208 cert = cert_; in GetClientCert() 191 SetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) SetClientCert() argument 205 GetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) GetClientCert() argument
|