Home
last modified time | relevance | path

Searched refs:cert (Results 301 - 325 of 1238) sorted by relevance

1...<<11121314151617181920>>...50

/third_party/node/test/parallel/
H A Dtest-tls-net-socket-keepalive.js14 const cert = fixtures.readKey('agent1-cert.pem');
15 const ca = fixtures.readKey('ca1-cert.pem');
18 cert,
H A Dtest-tls-socket-close.js25 const cert = fixtures.readKey('agent2-cert.pem');
29 const tlsServer = tls.createServer({ cert, key }, (socket) => {
H A Dtest-tls-startcom-wosign-whitelist.js21 cert: loadPEM('agent8-cert')
24 ca: loadPEM('fake-startcom-root-cert'),
34 cert: loadPEM('agent9-cert')
37 ca: loadPEM('fake-startcom-root-cert'),
H A Dtest-http2-https-fallback.js20 const cert = fixtures.readKey('agent8-cert.pem');
21 const ca = fixtures.readKey('fake-startcom-root-cert.pem');
69 { cert, key, allowHTTP1: true },
114 { cert, key },
H A Dtest-https-strict.js47 const cert1 = read('agent1-cert.pem');
49 // key2 has a self signed cert
51 const cert2 = read('agent2-cert.pem');
55 const cert3 = read('agent3-cert.pem');
57 const ca1 = read('ca1-cert.pem');
58 const ca2 = read('ca2-cert.pem');
69 cert: cert1
74 cert: cert2
79 cert: cert3
H A Dtest-double-tls-server.js35 cert: fixtures.readKey('agent1-cert.pem'),
40 cert: fixtures.readKey('agent1-cert.pem'),
H A Dtest-http2-https-fallback-http-server-options.js17 const cert = fixtures.readKey('agent8-cert.pem');
18 const ca = fixtures.readKey('fake-startcom-root-cert.pem');
47 cert,
H A Dtest-tls-getcipher.js35 cert: fixtures.readKey('agent2-cert.pem'),
80 cert: fixtures.readKey('agent2-cert.pem'),
H A Dtest-tls-socket-default-options.js42 cert: keys.agent1.cert,
51 // authentication of the server cert failed.
H A Dtest-tls-ticket-cluster.js99 const cert = fixtures.readKey('rsa_cert.crt');
101 const options = { key, cert };
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/
H A Dsct.js22 function verifySCTs(cert, issuer, ctlogs) {
29 const clone = cert.clone();
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Dpkcs12.rs22 cert: *mut *mut X509, in PKCS12_parse()
42 cert: *mut X509, in PKCS12_create()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dosu_client.c218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument
229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert()
270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert()
272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert()
302 #define TMP_CERT_DL_FILE "tmp-cert-download"
309 char *cert; in download_cert() local
350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert()
352 if (cert == NULL) in download_cert()
355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert()
356 os_free(cert); in download_cert()
557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local
702 xml_node_t *cert; update_pps_file() local
2905 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dosu_client.c218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument
229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert()
270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert()
272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert()
302 #define TMP_CERT_DL_FILE "tmp-cert-download"
309 char *cert; in download_cert() local
350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert()
352 if (cert == NULL) in download_cert()
355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert()
356 os_free(cert); in download_cert()
557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local
702 xml_node_t *cert; update_pps_file() local
2907 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument
[all...]
/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-server.c58 lwsl_info("%s: client cert CN '%s'\n", __func__, ir.ns.name); in OpenSSL_verify_callback()
60 lwsl_info("%s: couldn't get client cert CN\n", __func__); in OpenSSL_verify_callback()
88 /* absolutely require the client cert */ in lws_tls_server_client_cert_verify_config()
154 const char *cert, const char *private_key,
177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m;
179 if (!cert && !private_key)
196 * the rights to read our own cert + key we saved.
201 cert = NULL;
206 * use the multi-cert interface for backwards compatibility in the
210 if (n != LWS_TLS_EXTANT_ALTERNATIVE && cert) {
153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_ctx.c37 * and a cert verification callback function used for CMP server authentication.
63 * the CMP server and potentially others (TLS server, newly enrolled cert).
204 X509_free(ctx->cert); in OSSL_CMP_CTX_free()
285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument
290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert()
294 /* Set callback function for checking if the cert is ok or should be rejected */
478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */
643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert))
653 /* prevent misleading error later on malformed cert o
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_ctx.c37 * and a cert verification callback function used for CMP server authentication.
63 * the CMP server and potentially others (TLS server, newly enrolled cert).
204 X509_free(ctx->cert); in OSSL_CMP_CTX_free()
285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument
290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert()
294 /* Set callback function for checking if the cert is ok or should be rejected */
478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */
643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert))
653 /* prevent misleading error later on malformed cert o
[all...]
/third_party/nghttp2/src/
H A Dshrpx_tls.cc276 auto cert = SSL_CTX_get0_certificate(ssl_ctx); in servername_callback() local
279 auto pubkey = X509_get0_pubkey(cert); in servername_callback()
281 auto pubkey = X509_get_pubkey(cert); in servername_callback()
1782 StringRef get_common_name(X509 *cert) { in get_common_name() argument
1783 auto subjectname = X509_get_subject_name(cert); in get_common_name()
1817 int verify_numeric_hostname(X509 *cert, const StringRef &hostname, in verify_numeric_hostname() argument
1835 X509_get_ext_d2i(cert, NID_subject_alt_name, nullptr, nullptr)); in verify_numeric_hostname()
1863 auto cn = get_common_name(cert); in verify_numeric_hostname()
1879 int verify_dns_hostname(X509 *cert, const StringRef &hostname) { in verify_dns_hostname() argument
1881 X509_get_ext_d2i(cert, NID_subject_alt_nam in verify_dns_hostname()
1949 verify_hostname(X509 *cert, const StringRef &hostname, const Address *addr) verify_hostname() argument
1961 auto cert = SSL_get0_peer_certificate(ssl); check_cert() local
2121 auto cert = SSL_CTX_get0_certificate(ssl_ctx); cert_lookup_tree_add_ssl_ctx() local
2125 auto cert = load_certificate(tls_ctx_data->cert_file); cert_lookup_tree_add_ssl_ctx() local
2261 auto cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); load_certificate() local
2545 auto cert = SSL_CTX_get0_certificate(ssl_ctx); verify_ocsp_response() local
[all...]
/base/security/code_signature/utils/src/
H A Dcert_utils.cpp147 LOG_ERROR("empty cert chain buffer."); in GetCertChainFormBuffer()
168 ByteBuffer cert; in GetCertChainFormBuffer() local
169 ret = CheckSizeAndCopy(rawPtr, restSize, certSize, cert); in GetCertChainFormBuffer()
170 chain.emplace_back(cert); in GetCertChainFormBuffer()
/foundation/communication/netmanager_base/frameworks/native/netconnclient/src/
H A Dnetwork_security_config.cpp139 NETMGR_LOG_E("Fail to read cert fail [%{public}s]", fileName.c_str()); in ReadCertFile()
273 NETMGR_LOG_E("fail to open cert file."); in ReHashCAPathForX509()
277 NETMGR_LOG_D("Rehased cert generated. [%{public}s]", rehashedCaFile.c_str()); in ReHashCAPathForX509()
285 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in CreateRehashedCertFiles()
286 ReHashCAPathForX509(cert); in CreateRehashedCertFiles()
289 for (auto &cert : domainConfig.trustAnchors_.certs_) { in CreateRehashedCertFiles()
290 ReHashCAPathForX509(cert); in CreateRehashedCertFiles()
652 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in DumpConfigs()
653 NETMGR_LOG_I("[%{public}s]", cert.c_str()); in DumpConfigs()
669 for (auto &cert in DumpConfigs()
[all...]
/third_party/openssl/test/
H A Dcmp_vfy_test.c35 X509 *cert; member
145 ts, fixture->cert)); in execute_validate_cert_path_test()
204 static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_trusted() argument
206 return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trustedStore(ctx), cert); in add_trusted()
209 static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_untrusted() argument
211 return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert, in add_untrusted()
253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert()
386 (*fixture)->cert = endentity2; in setup_path()
412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor()
583 "insta.cert
[all...]
/base/security/certificate_framework/frameworks/core/v1.0/spi/
H A Dx509_crl_spi.h35 bool (*engineIsRevoked)(HcfX509CrlSpi *self, const HcfCertificate *cert);
51 CfResult (*engineGetRevokedCertWithCert)(HcfX509CrlSpi *self, HcfX509Certificate *cert,
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_proxy.cpp26 int32_t LocalCodeSignProxy::InitLocalCertificate(const ByteBuffer &challenge, ByteBuffer &cert) in InitLocalCertificate() argument
48 return ReadResultFromReply(reply, cert); in InitLocalCertificate()
/third_party/mbedtls/include/mbedtls/
H A Dpkcs7.h186 * \param cert Certificate containing key to verify signature.
196 const mbedtls_x509_crt *cert,
215 * \param cert Certificate containing key to verify signature.
225 const mbedtls_x509_crt *cert,
/third_party/node/test/addons/openssl-key-engine/
H A Dtest.js15 common.skip('no client cert engine');
21 const agentCert = fs.readFileSync(fixture.path('/keys/agent1-cert.pem'));
22 const agentCa = fs.readFileSync(fixture.path('/keys/ca1-cert.pem'));
26 cert: agentCert,
43 cert: agentCert,

Completed in 15 milliseconds

1...<<11121314151617181920>>...50