Home
last modified time | relevance | path

Searched refs:cert (Results 326 - 350 of 1243) sorted by relevance

1...<<11121314151617181920>>...50

/third_party/node/test/addons/openssl-key-engine/
H A Dtest.js15 common.skip('no client cert engine');
21 const agentCert = fs.readFileSync(fixture.path('/keys/agent1-cert.pem'));
22 const agentCa = fs.readFileSync(fixture.path('/keys/ca1-cert.pem'));
26 cert: agentCert,
43 cert: agentCert,
/third_party/node/test/fixtures/0-dns/
H A Dcreate-cert.js66 const cert = {
73 const pem = rfc5280.Certificate.encode(cert, 'pem', {label: 'CERTIFICATE'});
75 fs.writeFileSync('./0-dns-cert.pem', pem + '\n');
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/trust/
H A Dindex.js49 certChain: ca.certChain.certificates.map((cert) => {
50 return core_1.X509Certificate.parse(cert.rawBytes);
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/timestamp/
H A Dtsa.js57 const validAtSigningTime = ca.certChain.every((cert) => cert.validForDate(signingTime));
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
H A Dtls_test_common.h127 gnutls_datum_t * cert,
133 gnutls_datum_t * cert,
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dstore.rs97 pub fn add_cert(&mut self, cert: X509) -> Result<(), ErrorStack> { in add_cert()
98 unsafe { cvt(ffi::X509_STORE_add_cert(self.as_ptr(), cert.as_ptr())).map(|_| ()) } in add_cert()
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c929 * Check cert parameters compatible with extensions: currently just checks EC
1313 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1328 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1335 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg()
1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1395 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs()
1396 return s->cert->client_sigalgslen; in tls12_get_psigalgs()
1397 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs()
1398 *psigs = s->cert in tls12_get_psigalgs()
2311 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument
[all...]
H A Ds3_lib.c3469 s->cert->dh_tmp_auto = larg; in ssl3_ctrl()
3576 *(STACK_OF(X509) **)parg = s->cert->key->chain; in ssl3_ctrl()
3581 return ssl_cert_select_current(s->cert, (X509 *)parg); in ssl3_ctrl()
3597 if (s->s3.tmp.cert == NULL) in ssl3_ctrl()
3599 s->cert->key = s->s3.tmp.cert; in ssl3_ctrl()
3602 return ssl_cert_set_current(s->cert, larg); in ssl3_ctrl()
3658 return tls1_set_sigalgs(s->cert, parg, larg, 0); in ssl3_ctrl()
3661 return tls1_set_sigalgs_list(s->cert, parg, 0); in ssl3_ctrl()
3664 return tls1_set_sigalgs(s->cert, par in ssl3_ctrl()
[all...]
/third_party/openssl/ssl/
H A Dt1_lib.c909 * Check cert parameters compatible with extensions: currently just checks EC
1293 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1308 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1315 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg()
1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs()
1375 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs()
1376 return s->cert->client_sigalgslen; in tls12_get_psigalgs()
1377 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs()
1378 *psigs = s->cert in tls12_get_psigalgs()
2291 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument
[all...]
H A Ds3_lib.c3469 s->cert->dh_tmp_auto = larg; in ssl3_ctrl()
3576 *(STACK_OF(X509) **)parg = s->cert->key->chain; in ssl3_ctrl()
3581 return ssl_cert_select_current(s->cert, (X509 *)parg); in ssl3_ctrl()
3597 if (s->s3.tmp.cert == NULL) in ssl3_ctrl()
3599 s->cert->key = s->s3.tmp.cert; in ssl3_ctrl()
3602 return ssl_cert_set_current(s->cert, larg); in ssl3_ctrl()
3658 return tls1_set_sigalgs(s->cert, parg, larg, 0); in ssl3_ctrl()
3661 return tls1_set_sigalgs_list(s->cert, parg, 0); in ssl3_ctrl()
3664 return tls1_set_sigalgs(s->cert, par in ssl3_ctrl()
[all...]
/base/security/certificate_framework/frameworks/core/v1.0/certificate/
H A Dx509_crl.c68 LOGE("Cert not support! [cert]: %s", certType); in FindAbility()
101 static bool IsRevoked(HcfCrl *self, const HcfCertificate *cert) in IsRevoked() argument
103 if ((self == NULL) || (cert == NULL)) { in IsRevoked()
112 ((HcfX509CrlImpl *)self)->spiObj, cert); in IsRevoked()
213 static CfResult GetRevokedCertWithCert(HcfX509Crl *self, HcfX509Certificate *cert, HcfX509CrlEntry **entryOut) in GetRevokedCertWithCert() argument
215 if ((self == NULL) || (cert == NULL) || (entryOut == NULL)) { in GetRevokedCertWithCert()
224 ((HcfX509CrlImpl *)self)->spiObj, cert, entryOut); in GetRevokedCertWithCert()
H A Dcert_crl_collection.c71 HcfX509Certificate *cert = inCerts->data[i]; in GetMatchCerts() local
73 CfResult res = cert->match(cert, matchParams, &out); in GetMatchCerts()
82 res = CloneCertificateObj(cert, &(tmpArr.data[outInd])); in GetMatchCerts()
84 LOGE("cert clone failed"); in GetMatchCerts()
251 LOGE("Failed to clone cert!"); in CloneCertArray()
313 LOGE("Failed to clone cert array!"); in HcfCertCrlCollectionCreate()
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_local.h140 /* Set to 1 if we have no cert and need extra safety measures for MMA */
162 /* Recipient Key and cert */
408 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert,
414 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
426 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert);
427 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
428 int ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert);
429 int ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert);
H A Dcms_kari.c97 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_kari_orig_id_cmp() argument
107 return ossl_cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); in CMS_RecipientInfo_kari_orig_id_cmp()
109 return ossl_cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); in CMS_RecipientInfo_kari_orig_id_cmp()
149 X509 *cert) in CMS_RecipientEncryptedKey_cert_cmp()
154 return ossl_cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); in CMS_RecipientEncryptedKey_cert_cmp()
157 cert); in CMS_RecipientEncryptedKey_cert_cmp()
148 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) CMS_RecipientEncryptedKey_cert_cmp() argument
/third_party/openssl/crypto/cms/
H A Dcms_local.h140 /* Set to 1 if we have no cert and need extra safety measures for MMA */
162 /* Recipient Key and cert */
409 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert,
415 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
427 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert);
428 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert);
429 int ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert);
430 int ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert);
H A Dcms_kari.c97 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_kari_orig_id_cmp() argument
107 return ossl_cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); in CMS_RecipientInfo_kari_orig_id_cmp()
109 return ossl_cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); in CMS_RecipientInfo_kari_orig_id_cmp()
149 X509 *cert) in CMS_RecipientEncryptedKey_cert_cmp()
154 return ossl_cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); in CMS_RecipientEncryptedKey_cert_cmp()
157 cert); in CMS_RecipientEncryptedKey_cert_cmp()
148 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) CMS_RecipientEncryptedKey_cert_cmp() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_common.c165 struct x509_certificate *cert; in tls_parse_cert() local
174 cert = x509_certificate_parse(buf, len); in tls_parse_cert()
175 if (cert == NULL) { in tls_parse_cert()
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert()
194 x509_certificate_free(cert); in tls_parse_cert()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_common.c165 struct x509_certificate *cert; in tls_parse_cert() local
174 cert = x509_certificate_parse(buf, len); in tls_parse_cert()
175 if (cert == NULL) { in tls_parse_cert()
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert()
194 x509_certificate_free(cert); in tls_parse_cert()
/third_party/node/deps/openssl/openssl/engines/
H A De_loader_attic.c321 X509 *cert = NULL; in try_decode_PKCS12() local
343 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { in try_decode_PKCS12()
359 if (ok && cert != NULL) { in try_decode_PKCS12()
360 if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL in try_decode_PKCS12()
361 /* clearing cert here avoids case distinctions */ in try_decode_PKCS12()
362 && (cert = NULL) == NULL in try_decode_PKCS12()
380 X509_free(cert); in try_decode_PKCS12()
762 X509 *cert = NULL; in try_decode_X509Certificate() local
766 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert in try_decode_X509Certificate()
[all...]
/third_party/openssl/engines/
H A De_loader_attic.c321 X509 *cert = NULL; in try_decode_PKCS12() local
343 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { in try_decode_PKCS12()
359 if (ok && cert != NULL) { in try_decode_PKCS12()
360 if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL in try_decode_PKCS12()
361 /* clearing cert here avoids case distinctions */ in try_decode_PKCS12()
362 && (cert = NULL) == NULL in try_decode_PKCS12()
380 X509_free(cert); in try_decode_PKCS12()
762 X509 *cert = NULL; in try_decode_X509Certificate() local
766 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert in try_decode_X509Certificate()
[all...]
/foundation/communication/netstack/test/unittest/tls_test/core/
H A Dtls_certificate.test.cpp236 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local
239 auto len = i2d_X509(cert, &der); in HWTEST_F()
256 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local
259 auto len = i2d_X509(cert, &der); in HWTEST_F()
/foundation/communication/netstack/test/unittest/tlssocket/core/
H A Dtls_certificate.test.cpp236 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local
239 auto len = i2d_X509(cert, &der); in HWTEST_F()
256 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local
259 auto len = i2d_X509(cert, &der); in HWTEST_F()
/third_party/fsverity-utils/
H A DMakefile253 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null
256 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_hdr.c305 * If neither protection cert nor oldCert nor subject are given, in ossl_cmp_hdr_init()
308 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init()
323 else if (ctx->cert != NULL) in ossl_cmp_hdr_init()
324 rcp = X509_get_issuer_name(ctx->cert); in ossl_cmp_hdr_init()
/third_party/openssl/test/
H A Dkeymgmt_internal_test.c296 X509 *cert = NULL; in test_evp_pkey_export_to_provider() local
314 if ((cert = PEM_read_bio_X509(bio, NULL, NULL, NULL)) == NULL) { in test_evp_pkey_export_to_provider()
321 pubkey = X509_get_X509_PUBKEY(cert); in test_evp_pkey_export_to_provider()
343 X509_free(cert); in test_evp_pkey_export_to_provider()

Completed in 33 milliseconds

1...<<11121314151617181920>>...50