| /third_party/node/test/addons/openssl-key-engine/ |
| H A D | test.js | 15 common.skip('no client cert engine'); 21 const agentCert = fs.readFileSync(fixture.path('/keys/agent1-cert.pem')); 22 const agentCa = fs.readFileSync(fixture.path('/keys/ca1-cert.pem')); 26 cert: agentCert, 43 cert: agentCert,
|
| /third_party/node/test/fixtures/0-dns/ |
| H A D | create-cert.js | 66 const cert = { 73 const pem = rfc5280.Certificate.encode(cert, 'pem', {label: 'CERTIFICATE'}); 75 fs.writeFileSync('./0-dns-cert.pem', pem + '\n');
|
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/trust/ |
| H A D | index.js | 49 certChain: ca.certChain.certificates.map((cert) => { 50 return core_1.X509Certificate.parse(cert.rawBytes);
|
| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/timestamp/ |
| H A D | tsa.js | 57 const validAtSigningTime = ca.certChain.every((cert) => cert.validForDate(signingTime));
|
| /third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
| H A D | tls_test_common.h | 127 gnutls_datum_t * cert, 133 gnutls_datum_t * cert,
|
| /third_party/rust/crates/rust-openssl/openssl/src/x509/ |
| H A D | store.rs | 97 pub fn add_cert(&mut self, cert: X509) -> Result<(), ErrorStack> { in add_cert() 98 unsafe { cvt(ffi::X509_STORE_add_cert(self.as_ptr(), cert.as_ptr())).map(|_| ()) } in add_cert()
|
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | t1_lib.c | 929 * Check cert parameters compatible with extensions: currently just checks EC 1313 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1328 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1335 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg() 1394 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1395 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs() 1396 return s->cert->client_sigalgslen; in tls12_get_psigalgs() 1397 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs() 1398 *psigs = s->cert in tls12_get_psigalgs() 2311 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument [all...] |
| H A D | s3_lib.c | 3469 s->cert->dh_tmp_auto = larg; in ssl3_ctrl() 3576 *(STACK_OF(X509) **)parg = s->cert->key->chain; in ssl3_ctrl() 3581 return ssl_cert_select_current(s->cert, (X509 *)parg); in ssl3_ctrl() 3597 if (s->s3.tmp.cert == NULL) in ssl3_ctrl() 3599 s->cert->key = s->s3.tmp.cert; in ssl3_ctrl() 3602 return ssl_cert_set_current(s->cert, larg); in ssl3_ctrl() 3658 return tls1_set_sigalgs(s->cert, parg, larg, 0); in ssl3_ctrl() 3661 return tls1_set_sigalgs_list(s->cert, parg, 0); in ssl3_ctrl() 3664 return tls1_set_sigalgs(s->cert, par in ssl3_ctrl() [all...] |
| /third_party/openssl/ssl/ |
| H A D | t1_lib.c | 909 * Check cert parameters compatible with extensions: currently just checks EC 1293 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1308 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1315 idx = s->cert->key - s->cert->pkeys; in tls1_get_legacy_sigalg() 1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { in tls12_get_psigalgs() 1375 *psigs = s->cert->client_sigalgs; in tls12_get_psigalgs() 1376 return s->cert->client_sigalgslen; in tls12_get_psigalgs() 1377 } else if (s->cert->conf_sigalgs) { in tls12_get_psigalgs() 1378 *psigs = s->cert in tls12_get_psigalgs() 2291 tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert) tls1_save_sigalgs() argument [all...] |
| H A D | s3_lib.c | 3469 s->cert->dh_tmp_auto = larg; in ssl3_ctrl() 3576 *(STACK_OF(X509) **)parg = s->cert->key->chain; in ssl3_ctrl() 3581 return ssl_cert_select_current(s->cert, (X509 *)parg); in ssl3_ctrl() 3597 if (s->s3.tmp.cert == NULL) in ssl3_ctrl() 3599 s->cert->key = s->s3.tmp.cert; in ssl3_ctrl() 3602 return ssl_cert_set_current(s->cert, larg); in ssl3_ctrl() 3658 return tls1_set_sigalgs(s->cert, parg, larg, 0); in ssl3_ctrl() 3661 return tls1_set_sigalgs_list(s->cert, parg, 0); in ssl3_ctrl() 3664 return tls1_set_sigalgs(s->cert, par in ssl3_ctrl() [all...] |
| /base/security/certificate_framework/frameworks/core/v1.0/certificate/ |
| H A D | x509_crl.c | 68 LOGE("Cert not support! [cert]: %s", certType); in FindAbility() 101 static bool IsRevoked(HcfCrl *self, const HcfCertificate *cert) in IsRevoked() argument 103 if ((self == NULL) || (cert == NULL)) { in IsRevoked() 112 ((HcfX509CrlImpl *)self)->spiObj, cert); in IsRevoked() 213 static CfResult GetRevokedCertWithCert(HcfX509Crl *self, HcfX509Certificate *cert, HcfX509CrlEntry **entryOut) in GetRevokedCertWithCert() argument 215 if ((self == NULL) || (cert == NULL) || (entryOut == NULL)) { in GetRevokedCertWithCert() 224 ((HcfX509CrlImpl *)self)->spiObj, cert, entryOut); in GetRevokedCertWithCert()
|
| H A D | cert_crl_collection.c | 71 HcfX509Certificate *cert = inCerts->data[i]; in GetMatchCerts() local 73 CfResult res = cert->match(cert, matchParams, &out); in GetMatchCerts() 82 res = CloneCertificateObj(cert, &(tmpArr.data[outInd])); in GetMatchCerts() 84 LOGE("cert clone failed"); in GetMatchCerts() 251 LOGE("Failed to clone cert!"); in CloneCertArray() 313 LOGE("Failed to clone cert array!"); in HcfCertCrlCollectionCreate()
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_local.h | 140 /* Set to 1 if we have no cert and need extra safety measures for MMA */ 162 /* Recipient Key and cert */ 408 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, 414 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert); 426 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert); 427 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert); 428 int ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert); 429 int ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert);
|
| H A D | cms_kari.c | 97 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_kari_orig_id_cmp() argument 107 return ossl_cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); in CMS_RecipientInfo_kari_orig_id_cmp() 109 return ossl_cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); in CMS_RecipientInfo_kari_orig_id_cmp() 149 X509 *cert) in CMS_RecipientEncryptedKey_cert_cmp() 154 return ossl_cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); in CMS_RecipientEncryptedKey_cert_cmp() 157 cert); in CMS_RecipientEncryptedKey_cert_cmp() 148 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) CMS_RecipientEncryptedKey_cert_cmp() argument
|
| /third_party/openssl/crypto/cms/ |
| H A D | cms_local.h | 140 /* Set to 1 if we have no cert and need extra safety measures for MMA */ 162 /* Recipient Key and cert */ 409 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, 415 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert); 427 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert); 428 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert); 429 int ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert); 430 int ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert);
|
| H A D | cms_kari.c | 97 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) in CMS_RecipientInfo_kari_orig_id_cmp() argument 107 return ossl_cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); in CMS_RecipientInfo_kari_orig_id_cmp() 109 return ossl_cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); in CMS_RecipientInfo_kari_orig_id_cmp() 149 X509 *cert) in CMS_RecipientEncryptedKey_cert_cmp() 154 return ossl_cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); in CMS_RecipientEncryptedKey_cert_cmp() 157 cert); in CMS_RecipientEncryptedKey_cert_cmp() 148 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) CMS_RecipientEncryptedKey_cert_cmp() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_common.c | 165 struct x509_certificate *cert; in tls_parse_cert() local 174 cert = x509_certificate_parse(buf, len); in tls_parse_cert() 175 if (cert == NULL) { in tls_parse_cert() 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert() 194 x509_certificate_free(cert); in tls_parse_cert()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_common.c | 165 struct x509_certificate *cert; in tls_parse_cert() local 174 cert = x509_certificate_parse(buf, len); in tls_parse_cert() 175 if (cert == NULL) { in tls_parse_cert() 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert() 194 x509_certificate_free(cert); in tls_parse_cert()
|
| /third_party/node/deps/openssl/openssl/engines/ |
| H A D | e_loader_attic.c | 321 X509 *cert = NULL; in try_decode_PKCS12() local 343 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { in try_decode_PKCS12() 359 if (ok && cert != NULL) { in try_decode_PKCS12() 360 if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL in try_decode_PKCS12() 361 /* clearing cert here avoids case distinctions */ in try_decode_PKCS12() 362 && (cert = NULL) == NULL in try_decode_PKCS12() 380 X509_free(cert); in try_decode_PKCS12() 762 X509 *cert = NULL; in try_decode_X509Certificate() local 766 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert in try_decode_X509Certificate() [all...] |
| /third_party/openssl/engines/ |
| H A D | e_loader_attic.c | 321 X509 *cert = NULL; in try_decode_PKCS12() local 343 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { in try_decode_PKCS12() 359 if (ok && cert != NULL) { in try_decode_PKCS12() 360 if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL in try_decode_PKCS12() 361 /* clearing cert here avoids case distinctions */ in try_decode_PKCS12() 362 && (cert = NULL) == NULL in try_decode_PKCS12() 380 X509_free(cert); in try_decode_PKCS12() 762 X509 *cert = NULL; in try_decode_X509Certificate() local 766 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert in try_decode_X509Certificate() [all...] |
| /foundation/communication/netstack/test/unittest/tls_test/core/ |
| H A D | tls_certificate.test.cpp | 236 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local 239 auto len = i2d_X509(cert, &der); in HWTEST_F() 256 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local 259 auto len = i2d_X509(cert, &der); in HWTEST_F()
|
| /foundation/communication/netstack/test/unittest/tlssocket/core/ |
| H A D | tls_certificate.test.cpp | 236 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local 239 auto len = i2d_X509(cert, &der); in HWTEST_F() 256 auto cert = PEM_read_X509(fp, nullptr, nullptr, nullptr); in HWTEST_F() local 259 auto len = i2d_X509(cert, &der); in HWTEST_F()
|
| /third_party/fsverity-utils/ |
| H A D | Makefile | 253 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null 256 --key=testdata/key.pem --cert=testdata/cert.pem > /dev/null
|
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_hdr.c | 305 * If neither protection cert nor oldCert nor subject are given, in ossl_cmp_hdr_init() 308 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init() 323 else if (ctx->cert != NULL) in ossl_cmp_hdr_init() 324 rcp = X509_get_issuer_name(ctx->cert); in ossl_cmp_hdr_init()
|
| /third_party/openssl/test/ |
| H A D | keymgmt_internal_test.c | 296 X509 *cert = NULL; in test_evp_pkey_export_to_provider() local 314 if ((cert = PEM_read_bio_X509(bio, NULL, NULL, NULL)) == NULL) { in test_evp_pkey_export_to_provider() 321 pubkey = X509_get_X509_PUBKEY(cert); in test_evp_pkey_export_to_provider() 343 X509_free(cert); in test_evp_pkey_export_to_provider()
|