/third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 114 {"cert", OPT_CERT, '-', "Put cert request into query"}, 138 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]", 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 232 cert = 1; in ts_main() 319 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main() 396 int cert, cons in query_command() 394 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) query_command() argument 441 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) create_query() argument [all...] |
/third_party/openssl/apps/ |
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 114 {"cert", OPT_CERT, '-', "Put cert request into query"}, 138 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]", 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 232 cert = 1; in ts_main() 319 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main() 396 int cert, cons in query_command() 394 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) query_command() argument 441 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) create_query() argument [all...] |
/third_party/openssl/test/ |
H A D | cmsapitest.c | 19 static X509 *cert = NULL; variable 36 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0)) in test_encrypt_decrypt() 43 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt() 379 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) { in setup_tests() 387 X509_free(cert); in setup_tests() 388 cert = NULL; in setup_tests() 393 X509_free(cert); in setup_tests() 394 cert = NULL; in setup_tests() 410 X509_free(cert); in cleanup_tests()
|
H A D | keymgmt_internal_test.c | 296 X509 *cert = NULL; in test_evp_pkey_export_to_provider() local 314 if ((cert = PEM_read_bio_X509(bio, NULL, NULL, NULL)) == NULL) { in test_evp_pkey_export_to_provider() 321 pubkey = X509_get_X509_PUBKEY(cert); in test_evp_pkey_export_to_provider() 343 X509_free(cert); in test_evp_pkey_export_to_provider()
|
H A D | sslapitest.c | 84 static char *cert = NULL; variable 366 &sctx, &cctx, cert, privkey))) in test_keylog() 449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key() 566 /* server key, cert, chain, and root */ in test_client_cert_verify_cb() 600 /* application provides intermediate certs needed to verify server cert */ in test_client_cert_verify_cb() 760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb() 802 &sctx, &cctx, cert, privkey)) { in test_no_ems() 862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher() 964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))) in execute_test_large_message() 976 max_version, &sctx, &cctx, cert, in execute_test_large_message() [all...] |
H A D | servername_test.c | 31 static char *cert = NULL; variable 211 &sctx, &cctx, cert, privkey)) in server_setup_sni() 262 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
H A D | sslcorrupttest.c | 179 static char *cert = NULL; variable 200 &sctx, &cctx, cert, privkey))) in test_ssl_corrupt() 266 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | ipl.c | 2392 unsigned char flags, unsigned short cert) in ipl_report_add_component() 2404 comp->entry.certificate_index = cert; in ipl_report_add_component() 2414 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2416 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2417 if (!cert) in ipl_report_add_certificate() 2419 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2421 cert->entry.addr = addr; in ipl_report_add_certificate() 2422 cert->entry.len = len; in ipl_report_add_certificate() 2423 cert in ipl_report_add_certificate() 2391 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument 2453 struct ipl_report_certificate *cert; ipl_report_finish() local 2509 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | apps.c | 468 X509 *cert = NULL; in load_cert_pass() local 475 cert = X509_load_http(uri, NULL, NULL, 0 /* timeout */); in load_cert_pass() 478 NULL, NULL, NULL, &cert, NULL, NULL, NULL); in load_cert_pass() 479 if (cert == NULL) { in load_cert_pass() 483 return cert; in load_cert_pass() 653 static void warn_cert_msg(const char *uri, X509 *cert, const char *msg) in warn_cert_msg() argument 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() 662 static void warn_cert(const char *uri, X509 *cert, int warn_EE, in warn_cert() argument 665 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert() 666 int res = X509_cmp_timeframe(vpm, X509_get0_notBefore(cert), in warn_cert() 2243 adapt_keyid_ext(X509 *cert, X509V3_CTX *ext_ctx, const char *name, const char *value, int add_default) adapt_keyid_ext() argument 2272 do_X509_sign(X509 *cert, EVP_PKEY *pkey, const char *md, STACK_OF(OPENSSL_STRING) *sigopts, X509V3_CTX *ext_ctx) do_X509_sign() argument [all...] |
/third_party/openssl/apps/lib/ |
H A D | apps.c | 468 X509 *cert = NULL; in load_cert_pass() local 475 cert = X509_load_http(uri, NULL, NULL, 0 /* timeout */); in load_cert_pass() 478 NULL, NULL, NULL, &cert, NULL, NULL, NULL); in load_cert_pass() 479 if (cert == NULL) { in load_cert_pass() 483 return cert; in load_cert_pass() 653 static void warn_cert_msg(const char *uri, X509 *cert, const char *msg) in warn_cert_msg() argument 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() 662 static void warn_cert(const char *uri, X509 *cert, int warn_EE, in warn_cert() argument 665 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert() 666 int res = X509_cmp_timeframe(vpm, X509_get0_notBefore(cert), in warn_cert() 2236 adapt_keyid_ext(X509 *cert, X509V3_CTX *ext_ctx, const char *name, const char *value, int add_default) adapt_keyid_ext() argument 2265 do_X509_sign(X509 *cert, EVP_PKEY *pkey, const char *md, STACK_OF(OPENSSL_STRING) *sigopts, X509V3_CTX *ext_ctx) do_X509_sign() argument [all...] |
/third_party/fsverity-utils/ |
H A D | Makefile | 253 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null 256 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_hdr.c | 305 * If neither protection cert nor oldCert nor subject are given, in ossl_cmp_hdr_init() 308 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init() 323 else if (ctx->cert != NULL) in ossl_cmp_hdr_init() 324 rcp = X509_get_issuer_name(ctx->cert); in ossl_cmp_hdr_init()
|
H A D | cmp_util.c | 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local 216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs() 217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_hdr.c | 305 * If neither protection cert nor oldCert nor subject are given, in ossl_cmp_hdr_init() 308 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init() 323 else if (ctx->cert != NULL) in ossl_cmp_hdr_init() 324 rcp = X509_get_issuer_name(ctx->cert); in ossl_cmp_hdr_init()
|
H A D | cmp_util.c | 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local 216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs() 217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
|
/third_party/node/src/crypto/ |
H A D | crypto_context.cc | 82 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 85 CHECK(!*cert); in SSL_CTX_use_certificate_chain() 117 // Try getting issuer from a cert store in SSL_CTX_use_certificate_chain() 136 cert->reset(X509_dup(x.get())); in SSL_CTX_use_certificate_chain() 137 if (!*cert) in SSL_CTX_use_certificate_chain() 150 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 193 cert, in SSL_CTX_use_certificate_chain() 232 for (X509* cert : root_certs_vector) { in NewRootCertStore() 233 X509_up_ref(cert); in NewRootCertStore() 234 X509_STORE_add_cert(store, cert); in NewRootCertStore() 79 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, X509Pointer&& x, STACK_OF(X509)* extra_certs, X509Pointer* cert, X509Pointer* issuer_) SSL_CTX_use_certificate_chain() argument 148 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, BIOPointer&& in, X509Pointer* cert, X509Pointer* issuer) SSL_CTX_use_certificate_chain() argument 1042 X509Pointer cert; LoadPKCS12() local 1316 X509* cert; GetCertificate() local [all...] |
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 963 CF_INLINE CFStringRef getsubject(SecCertificateRef cert) in getsubject() argument 969 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 975 SecCertificateCopyLongDescription(NULL, cert, NULL); in getsubject() 981 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 985 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); in getsubject() 991 SecCertificateRef cert, char **certp) in CopyCertSubject() 993 CFStringRef c = getsubject(cert); in CopyCertSubject() 1048 SecCertificateRef cert = NULL; in CopyIdentityWithLabelOldSchool() local 1066 (SecKeychainItemRef *)&cert); in CopyIdentityWithLabelOldSchool() 1067 if(status == noErr && cert) { in CopyIdentityWithLabelOldSchool() 990 CopyCertSubject(struct Curl_easy *data, SecCertificateRef cert, char **certp) CopyCertSubject() argument 1131 SecCertificateRef cert = NULL; CopyIdentityWithLabel() local 1869 SecCertificateRef cert = NULL; global() local [all...] |
/kernel/linux/linux-5.10/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/kernel/linux/linux-6.6/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|