| /foundation/communication/netstack/frameworks/cj/http/src/ |
| H A D | net_http_request.cpp | 192 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in SetClientCert() 194 cert_ = cert; in SetClientCert() 206 std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) in GetClientCert() 208 cert = cert_; in GetClientCert() 191 SetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) SetClientCert() argument 205 GetClientCert( std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd) GetClientCert() argument
|
| /foundation/communication/netstack/frameworks/js/napi/http/options/src/ |
| H A D | http_request_options.cpp | 205 std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) in SetClientCert() 207 cert_ = cert; in SetClientCert() 219 std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) in GetClientCert() 221 cert = cert_; in GetClientCert() 204 SetClientCert( std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) SetClientCert() argument 218 GetClientCert( std::string &cert, std::string &certType, std::string &key, Secure::SecureChar &keyPasswd) GetClientCert() argument
|
| /third_party/openssl/test/ |
| H A D | pkcs7_test.c | 56 X509 *cert = NULL; in pkcs7_verify_test() local 78 && TEST_ptr(cert = d2i_X509_bio(x509_bio, NULL)) in pkcs7_verify_test() 81 && TEST_true(X509_STORE_add_cert(store, cert)) in pkcs7_verify_test() 88 X509_free(cert); in pkcs7_verify_test()
|
| H A D | localetest.c | 97 X509 *cert = NULL; in setup_tests() local 110 cert = d2i_X509(NULL, &p, sizeof(der_bytes)); in setup_tests() 111 if (!TEST_ptr(cert)) in setup_tests() 114 cert_pubkey = X509_get_X509_PUBKEY(cert); in setup_tests() 116 X509_free(cert); in setup_tests() 121 X509_free(cert); in setup_tests() 125 X509_free(cert); in setup_tests()
|
| /third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
| H A D | pkcs7.rs | 15 pub cert: *mut stack_st_X509, /* [ 0 ] */ 39 pub cert: *mut stack_st_X509, /* [ 0 ] */ 141 pub cert: *mut X509, /* get the pub-key from this */ 193 cert: *mut X509, in PKCS7_decrypt()
|
| /third_party/lwip/src/apps/altcp_tls/ |
| H A D | altcp_tls_mbedtls.c | 99 mbedtls_x509_crt *cert; member 703 conf->cert = mem; in altcp_tls_create_config() 802 const u8_t *cert, size_t cert_len) in altcp_tls_config_server_add_privkey_cert() 815 srvcert = config->cert + config->cert_count; in altcp_tls_config_server_add_privkey_cert() 822 ret = mbedtls_x509_crt_parse(srvcert, cert, cert_len); in altcp_tls_config_server_add_privkey_cert() 855 const u8_t *cert, size_t cert_len) in altcp_tls_create_config_server_privkey_cert() 863 privkey_pass, privkey_pass_len, cert, cert_len) != ERR_OK) { in altcp_tls_create_config_server_privkey_cert() 906 const u8_t *cert, size_t cert_len) in altcp_tls_create_config_client_2wayauth() 911 if (!cert || !privkey) { in altcp_tls_create_config_client_2wayauth() 922 mbedtls_x509_crt_init(conf->cert); in altcp_tls_create_config_client_2wayauth() 799 altcp_tls_config_server_add_privkey_cert(struct altcp_tls_config *config, const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_config_server_add_privkey_cert() argument 853 altcp_tls_create_config_server_privkey_cert(const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_create_config_server_privkey_cert() argument 904 altcp_tls_create_config_client_2wayauth(const u8_t *ca, size_t ca_len, const u8_t *privkey, size_t privkey_len, const u8_t *privkey_pass, size_t privkey_pass_len, const u8_t *cert, size_t cert_len) altcp_tls_create_config_client_2wayauth() argument [all...] |
| /kernel/linux/linux-5.10/arch/s390/kernel/ |
| H A D | ipl.c | 2090 unsigned char flags, unsigned short cert) in ipl_report_add_component() 2102 comp->entry.certificate_index = cert; in ipl_report_add_component() 2112 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2114 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2115 if (!cert) in ipl_report_add_certificate() 2117 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2119 cert->entry.addr = addr; in ipl_report_add_certificate() 2120 cert->entry.len = len; in ipl_report_add_certificate() 2121 cert in ipl_report_add_certificate() 2089 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument 2151 struct ipl_report_certificate *cert; ipl_report_finish() local 2207 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local [all...] |
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | cmp.c | 286 "Private or public key for the requested cert. Default: CSR key or client key"}, 289 "Distinguished Name (DN) of subject to use in the requested cert template"}, 291 "For kur, default is subject of -csr arg or reference cert (see -oldcert)"}, 305 "Subject Alt Names (IPADDR/DNS/URI) to add as (critical) cert req extension"}, 336 "Certificate to be updated (defaulting to -cert) or to be revoked in rr;"}, 338 "also used as reference (defaulting to -cert) for subject DN and SANs."}, 363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"}, 380 "Server cert to pin and trust directly when verifying signed CMP responses"}, 384 "Ignore CMP signer cert key usage, else 'digitalSignature' must be allowed"}, 398 "Reference value to use as senderKID in case no -cert i 684 X509 *cert; load_cert_pwd() local 1108 X509 *cert = load_cert_pwd(opt_rsp_cert, opt_keypass, setup_srv_ctx() local 1273 X509 *cert; setup_ssl_ctx() local 1451 X509 *cert; setup_protection_ctx() local 2028 write_cert(BIO *bio, X509 *cert) write_cert() argument [all...] |
| /third_party/openssl/apps/ |
| H A D | cmp.c | 286 "Private or public key for the requested cert. Default: CSR key or client key"}, 289 "Distinguished Name (DN) of subject to use in the requested cert template"}, 291 "For kur, default is subject of -csr arg or reference cert (see -oldcert)"}, 305 "Subject Alt Names (IPADDR/DNS/URI) to add as (critical) cert req extension"}, 336 "Certificate to be updated (defaulting to -cert) or to be revoked in rr;"}, 338 "also used as reference (defaulting to -cert) for subject DN and SANs."}, 363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"}, 380 "Server cert to pin and trust directly when verifying signed CMP responses"}, 384 "Ignore CMP signer cert key usage, else 'digitalSignature' must be allowed"}, 398 "Reference value to use as senderKID in case no -cert i 684 X509 *cert; load_cert_pwd() local 1108 X509 *cert = load_cert_pwd(opt_rsp_cert, opt_keypass, setup_srv_ctx() local 1273 X509 *cert; setup_ssl_ctx() local 1451 X509 *cert; setup_protection_ctx() local 2028 write_cert(BIO *bio, X509 *cert) write_cert() argument [all...] |
| /base/security/certificate_manager/frameworks/cert_manager_standard/main/os_dependency/cm_ipc/src/ |
| H A D | cm_ipc_client_serialization.c | 135 CM_LOG_E("get cert subjectName failed"); in GetInfoFromX509Cert() 141 CM_LOG_E("get cert issuerName failed"); in GetInfoFromX509Cert() 147 CM_LOG_E("get cert serial failed"); in GetInfoFromX509Cert() 153 CM_LOG_E("get cert notBefore failed"); in GetInfoFromX509Cert() 159 CM_LOG_E("get cert notAfter failed"); in GetInfoFromX509Cert() 165 CM_LOG_E("get cert fingerprintSha256 failed"); in GetInfoFromX509Cert() 173 X509 *cert = InitCertContext(cInfo->certInfo.data, cInfo->certInfo.size); in GetInfoFromCertData() local 174 if (cert == NULL) { in GetInfoFromCertData() 175 CM_LOG_E("Parse X509 cert fail"); in GetInfoFromCertData() 179 int32_t ret = GetInfoFromX509Cert(cert, cInf in GetInfoFromCertData() [all...] |
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
| H A D | dlp_file.h | 151 void GetEncryptCert(struct DlpBlob& cert) const; 152 void GetOfflineCert(struct DlpBlob& cert) const; 153 int32_t UpdateCertAndText(const std::vector<uint8_t>& cert, const std::string& workDir, struct DlpBlob certBlob); 155 int32_t SetEncryptCert(const struct DlpBlob& cert); 221 int32_t UpdateFile(int tmpFile, const std::vector<uint8_t>& cert, uint32_t oldTxtOffset);
|
| /third_party/ffmpeg/libavformat/ |
| H A D | tls_gnutls.c | 184 "Unable to set cert/key files %s and %s: %s\n", in tls_open() 190 av_log(h, AV_LOG_ERROR, "cert and key required\n"); in tls_open() 211 gnutls_x509_crt_t cert; in tls_open() local 229 gnutls_x509_crt_init(&cert); in tls_open() 231 gnutls_x509_crt_import(cert, cert_list, GNUTLS_X509_FMT_DER); in tls_open() 232 ret = gnutls_x509_crt_check_hostname(cert, c->host); in tls_open() 233 gnutls_x509_crt_deinit(cert); in tls_open()
|
| /base/update/packaging_tools/ |
| H A D | build_module_package.py | 28 Sign cert file path. 112 the specified arg is a sign cert. 350 cert = load_public_cert(sign_cert) 353 signed_data['certificates'] = [cert] 365 issuer = cert.issuer 366 serial_number = cert.serial_number 368 issuer_and_serial['issuer'] = cert.issuer 369 issuer_and_serial['serial_number'] = cert.serial_number 371 key_id = cert.key_identifier_value.native 451 default=None, help="Sign cert fil [all...] |
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 152 * certain cert information is cached. So this is the point where the 162 /* attempt to compute cert hash */ in X509_cmp() 184 int ossl_x509_add_cert_new(STACK_OF(X509) **p_sk, X509 *cert, int flags) in STACK_OF() 190 return X509_add_cert(*p_sk, cert, flags); in STACK_OF() 193 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags) in STACK_OF() 207 if (X509_cmp(sk_X509_value(sk, i), cert) == 0) in STACK_OF() 212 int ret = X509_self_signed(cert, 0); in STACK_OF() 217 if (!sk_X509_insert(sk, cert, in STACK_OF() 223 (void)X509_up_ref(cert); in STACK_OF() 524 /* Invalid signature or LOS errors are for previous cert */ in X509_chain_check_suiteb() [all...] |
| /third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
| H A D | pk7_smime.c | 279 p7->d.sign->cert)) { in PKCS7_verify() 425 && p7->d.sign->cert) in STACK_OF() 427 X509_find_by_issuer_and_serial(p7->d.sign->cert, in STACK_OF() 495 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) in PKCS7_decrypt() argument 511 if (cert && !X509_check_private_key(cert, pkey)) { in PKCS7_decrypt() 517 if ((tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert)) == NULL) { in PKCS7_decrypt()
|
| /third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
| H A D | Proxy.pm | 79 $cert, 98 cert => $cert, 231 ." -cert ".$self->cert." -cert2 ".$self->cert 532 sub cert subroutine 535 return $self->{cert};
|
| /third_party/openssl/crypto/pkcs7/ |
| H A D | pk7_smime.c | 279 p7->d.sign->cert)) { in PKCS7_verify() 425 && p7->d.sign->cert) in STACK_OF() 427 X509_find_by_issuer_and_serial(p7->d.sign->cert, in STACK_OF() 495 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) in PKCS7_decrypt() argument 511 if (cert && !X509_check_private_key(cert, pkey)) { in PKCS7_decrypt() 517 if ((tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert)) == NULL) { in PKCS7_decrypt()
|
| /third_party/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 152 * certain cert information is cached. So this is the point where the 162 /* attempt to compute cert hash */ in X509_cmp() 184 int ossl_x509_add_cert_new(STACK_OF(X509) **p_sk, X509 *cert, int flags) in STACK_OF() 190 return X509_add_cert(*p_sk, cert, flags); in STACK_OF() 193 int X509_add_cert(STACK_OF(X509) *sk, X509 *cert, int flags) in STACK_OF() 207 if (X509_cmp(sk_X509_value(sk, i), cert) == 0) in STACK_OF() 212 int ret = X509_self_signed(cert, 0); in STACK_OF() 217 if (!sk_X509_insert(sk, cert, in STACK_OF() 223 (void)X509_up_ref(cert); in STACK_OF() 521 /* Invalid signature or LOS errors are for previous cert */ in X509_chain_check_suiteb() [all...] |
| /third_party/openssl/util/perl/TLSProxy/ |
| H A D | Proxy.pm | 79 $cert, 98 cert => $cert, 231 ." -cert ".$self->cert." -cert2 ".$self->cert 532 sub cert subroutine 535 return $self->{cert};
|
| /base/security/code_signature/utils/include/ |
| H A D | signer_info.h | 37 bool InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md, const ByteBuffer &contentData,
47 int GetSignAlgorithmID(const X509 *cert);
|
| /base/security/code_signature/utils/src/ |
| H A D | pkcs7_data.cpp | 29 PKCS7Data::PKCS7Data(const EVP_MD *md, X509 *cert)
in PKCS7Data() argument 30 : cert_(cert), md_(md)
in PKCS7Data()
|
| /base/security/dlp_permission_service/frameworks/common/src/ |
| H A D | cert_parcel.cpp | 42 if (!data.WriteUInt8Vector(this->cert)) { in Marshalling() 74 if (!data.ReadUInt8Vector(&parcel->cert)) { in Unmarshalling() 75 DLP_LOG_ERROR(LABEL, "Read cert fail"); in Unmarshalling()
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/include/ |
| H A D | dlp_permission_async_stub.h | 36 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) override; 38 const std::vector<uint8_t>& cert) override;
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| H A D | dlp_cert_parcel_test.cpp | 66 info.cert = {1, 2, 3}; in HWTEST_F() 83 info.cert = {1, 2, 3}; in HWTEST_F()
|
| /third_party/node/test/parallel/ |
| H A D | test-https-client-checkServerIdentity.js | 33 cert: fixtures.readKey('agent3-cert.pem') 48 ca: [fixtures.readKey('ca2-cert.pem')] 60 ca: [fixtures.readKey('ca2-cert.pem')], 61 checkServerIdentity: function(host, cert) {
|