| /third_party/node/test/parallel/ |
| H A D | test-tls-net-socket-keepalive.js | 14 const cert = fixtures.readKey('agent1-cert.pem'); 15 const ca = fixtures.readKey('ca1-cert.pem'); 18 cert,
|
| H A D | test-tls-socket-close.js | 25 const cert = fixtures.readKey('agent2-cert.pem'); 29 const tlsServer = tls.createServer({ cert, key }, (socket) => {
|
| H A D | test-tls-startcom-wosign-whitelist.js | 21 cert: loadPEM('agent8-cert') 24 ca: loadPEM('fake-startcom-root-cert'), 34 cert: loadPEM('agent9-cert') 37 ca: loadPEM('fake-startcom-root-cert'),
|
| H A D | test-http2-https-fallback.js | 20 const cert = fixtures.readKey('agent8-cert.pem'); 21 const ca = fixtures.readKey('fake-startcom-root-cert.pem'); 69 { cert, key, allowHTTP1: true }, 114 { cert, key },
|
| H A D | test-https-strict.js | 47 const cert1 = read('agent1-cert.pem'); 49 // key2 has a self signed cert 51 const cert2 = read('agent2-cert.pem'); 55 const cert3 = read('agent3-cert.pem'); 57 const ca1 = read('ca1-cert.pem'); 58 const ca2 = read('ca2-cert.pem'); 69 cert: cert1 74 cert: cert2 79 cert: cert3
|
| H A D | test-double-tls-server.js | 35 cert: fixtures.readKey('agent1-cert.pem'), 40 cert: fixtures.readKey('agent1-cert.pem'),
|
| H A D | test-http2-https-fallback-http-server-options.js | 17 const cert = fixtures.readKey('agent8-cert.pem'); 18 const ca = fixtures.readKey('fake-startcom-root-cert.pem'); 47 cert,
|
| H A D | test-tls-getcipher.js | 35 cert: fixtures.readKey('agent2-cert.pem'), 80 cert: fixtures.readKey('agent2-cert.pem'),
|
| H A D | test-tls-socket-default-options.js | 42 cert: keys.agent1.cert, 51 // authentication of the server cert failed.
|
| H A D | test-tls-ticket-cluster.js | 99 const cert = fixtures.readKey('rsa_cert.crt'); 101 const options = { key, cert };
|
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
| H A D | sct.js | 22 function verifySCTs(cert, issuer, ctlogs) { 29 const clone = cert.clone();
|
| /third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
| H A D | pkcs12.rs | 22 cert: *mut *mut X509, in PKCS12_parse() 42 cert: *mut X509, in PKCS12_create()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
| H A D | osu_client.c | 218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument 229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert() 270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert() 272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert() 302 #define TMP_CERT_DL_FILE "tmp-cert-download" 309 char *cert; in download_cert() local 350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert() 352 if (cert == NULL) in download_cert() 355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert() 356 os_free(cert); in download_cert() 557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local 702 xml_node_t *cert; update_pps_file() local 2905 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
| H A D | osu_client.c | 218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, in process_est_cert() argument 229 fingerprint = xml_node_get_text(ctx->xml, cert); in process_est_cert() 270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); in process_est_cert() 272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", in process_est_cert() 302 #define TMP_CERT_DL_FILE "tmp-cert-download" 309 char *cert; in download_cert() local 350 cert = os_readfile(TMP_CERT_DL_FILE, &len); in download_cert() 352 if (cert == NULL) in download_cert() 355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { in download_cert() 356 os_free(cert); in download_cert() 557 xml_node_t *tnds, *mo, *cert; hs20_add_pps_mo() local 702 xml_node_t *cert; update_pps_file() local 2907 osu_cert_cb(void *_ctx, struct http_cert *cert) osu_cert_cb() argument [all...] |
| /third_party/libwebsockets/lib/tls/openssl/ |
| H A D | openssl-server.c | 58 lwsl_info("%s: client cert CN '%s'\n", __func__, ir.ns.name); in OpenSSL_verify_callback() 60 lwsl_info("%s: couldn't get client cert CN\n", __func__); in OpenSSL_verify_callback() 88 /* absolutely require the client cert */ in lws_tls_server_client_cert_verify_config() 154 const char *cert, const char *private_key, 177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m; 179 if (!cert && !private_key) 196 * the rights to read our own cert + key we saved. 201 cert = NULL; 206 * use the multi-cert interface for backwards compatibility in the 210 if (n != LWS_TLS_EXTANT_ALTERNATIVE && cert) { 153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument [all...] |
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_ctx.c | 37 * and a cert verification callback function used for CMP server authentication. 63 * the CMP server and potentially others (TLS server, newly enrolled cert). 204 X509_free(ctx->cert); in OSSL_CMP_CTX_free() 285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument 290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert() 294 /* Set callback function for checking if the cert is ok or should be rejected */ 478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */ 643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert)) 653 /* prevent misleading error later on malformed cert o [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_ctx.c | 37 * and a cert verification callback function used for CMP server authentication. 63 * the CMP server and potentially others (TLS server, newly enrolled cert). 204 X509_free(ctx->cert); in OSSL_CMP_CTX_free() 285 int ossl_cmp_ctx_set0_validatedSrvCert(OSSL_CMP_CTX *ctx, X509 *cert) in ossl_cmp_ctx_set0_validatedSrvCert() argument 290 ctx->validatedSrvCert = cert; in ossl_cmp_ctx_set0_validatedSrvCert() 294 /* Set callback function for checking if the cert is ok or should be rejected */ 478 /* Returns the cert chain computed by OSSL_CMP_certConf_cb(), NULL on error */ 643 #define X509_invalid(cert) (!ossl_x509v3_cache_extensions(cert)) 653 /* prevent misleading error later on malformed cert o [all...] |
| /third_party/nghttp2/src/ |
| H A D | shrpx_tls.cc | 276 auto cert = SSL_CTX_get0_certificate(ssl_ctx); in servername_callback() local 279 auto pubkey = X509_get0_pubkey(cert); in servername_callback() 281 auto pubkey = X509_get_pubkey(cert); in servername_callback() 1782 StringRef get_common_name(X509 *cert) { in get_common_name() argument 1783 auto subjectname = X509_get_subject_name(cert); in get_common_name() 1817 int verify_numeric_hostname(X509 *cert, const StringRef &hostname, in verify_numeric_hostname() argument 1835 X509_get_ext_d2i(cert, NID_subject_alt_name, nullptr, nullptr)); in verify_numeric_hostname() 1863 auto cn = get_common_name(cert); in verify_numeric_hostname() 1879 int verify_dns_hostname(X509 *cert, const StringRef &hostname) { in verify_dns_hostname() argument 1881 X509_get_ext_d2i(cert, NID_subject_alt_nam in verify_dns_hostname() 1949 verify_hostname(X509 *cert, const StringRef &hostname, const Address *addr) verify_hostname() argument 1961 auto cert = SSL_get0_peer_certificate(ssl); check_cert() local 2121 auto cert = SSL_CTX_get0_certificate(ssl_ctx); cert_lookup_tree_add_ssl_ctx() local 2125 auto cert = load_certificate(tls_ctx_data->cert_file); cert_lookup_tree_add_ssl_ctx() local 2261 auto cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); load_certificate() local 2545 auto cert = SSL_CTX_get0_certificate(ssl_ctx); verify_ocsp_response() local [all...] |
| /base/security/code_signature/utils/src/ |
| H A D | cert_utils.cpp | 147 LOG_ERROR("empty cert chain buffer.");
in GetCertChainFormBuffer() 168 ByteBuffer cert;
in GetCertChainFormBuffer() local 169 ret = CheckSizeAndCopy(rawPtr, restSize, certSize, cert);
in GetCertChainFormBuffer() 170 chain.emplace_back(cert);
in GetCertChainFormBuffer()
|
| /foundation/communication/netmanager_base/frameworks/native/netconnclient/src/ |
| H A D | network_security_config.cpp | 139 NETMGR_LOG_E("Fail to read cert fail [%{public}s]", fileName.c_str()); in ReadCertFile() 273 NETMGR_LOG_E("fail to open cert file."); in ReHashCAPathForX509() 277 NETMGR_LOG_D("Rehased cert generated. [%{public}s]", rehashedCaFile.c_str()); in ReHashCAPathForX509() 285 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in CreateRehashedCertFiles() 286 ReHashCAPathForX509(cert); in CreateRehashedCertFiles() 289 for (auto &cert : domainConfig.trustAnchors_.certs_) { in CreateRehashedCertFiles() 290 ReHashCAPathForX509(cert); in CreateRehashedCertFiles() 652 for (auto &cert : baseConfig_.trustAnchors_.certs_) { in DumpConfigs() 653 NETMGR_LOG_I("[%{public}s]", cert.c_str()); in DumpConfigs() 669 for (auto &cert in DumpConfigs() [all...] |
| /third_party/openssl/test/ |
| H A D | cmp_vfy_test.c | 35 X509 *cert; member 145 ts, fixture->cert)); in execute_validate_cert_path_test() 204 static int add_trusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_trusted() argument 206 return X509_STORE_add_cert(OSSL_CMP_CTX_get0_trustedStore(ctx), cert); in add_trusted() 209 static int add_untrusted(OSSL_CMP_CTX *ctx, X509 *cert) in add_untrusted() argument 211 return X509_add_cert(OSSL_CMP_CTX_get0_untrusted(ctx), cert, in add_untrusted() 253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert() 386 (*fixture)->cert = endentity2; in setup_path() 412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor() 583 "insta.cert [all...] |
| /base/security/certificate_framework/frameworks/core/v1.0/spi/ |
| H A D | x509_crl_spi.h | 35 bool (*engineIsRevoked)(HcfX509CrlSpi *self, const HcfCertificate *cert); 51 CfResult (*engineGetRevokedCertWithCert)(HcfX509CrlSpi *self, HcfX509Certificate *cert,
|
| /base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
| H A D | local_code_sign_proxy.cpp | 26 int32_t LocalCodeSignProxy::InitLocalCertificate(const ByteBuffer &challenge, ByteBuffer &cert)
in InitLocalCertificate() argument 48 return ReadResultFromReply(reply, cert);
in InitLocalCertificate()
|
| /third_party/mbedtls/include/mbedtls/ |
| H A D | pkcs7.h | 186 * \param cert Certificate containing key to verify signature. 196 const mbedtls_x509_crt *cert, 215 * \param cert Certificate containing key to verify signature. 225 const mbedtls_x509_crt *cert,
|
| /third_party/node/test/addons/openssl-key-engine/ |
| H A D | test.js | 15 common.skip('no client cert engine'); 21 const agentCert = fs.readFileSync(fixture.path('/keys/agent1-cert.pem')); 22 const agentCa = fs.readFileSync(fixture.path('/keys/ca1-cert.pem')); 26 cert: agentCert, 43 cert: agentCert,
|