/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
H A D | cms.h | 277 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 280 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 282 X509 *cert, X509 *peer); 306 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 357 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 358 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 378 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 465 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 473 X509 *cert);
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 114 {"cert", OPT_CERT, '-', "Put cert request into query"}, 138 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]", 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 232 cert = 1; in ts_main() 319 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main() 396 int cert, cons in query_command() 394 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) query_command() argument 441 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) create_query() argument [all...] |
/third_party/openssl/apps/ |
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 114 {"cert", OPT_CERT, '-', "Put cert request into query"}, 138 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]", 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 232 cert = 1; in ts_main() 319 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main() 396 int cert, cons in query_command() 394 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) query_command() argument 441 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) create_query() argument [all...] |
/third_party/openssl/test/ |
H A D | cmsapitest.c | 19 static X509 *cert = NULL; variable 36 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0)) in test_encrypt_decrypt() 43 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt() 379 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) { in setup_tests() 387 X509_free(cert); in setup_tests() 388 cert = NULL; in setup_tests() 393 X509_free(cert); in setup_tests() 394 cert = NULL; in setup_tests() 410 X509_free(cert); in cleanup_tests()
|
H A D | servername_test.c | 31 static char *cert = NULL; variable 211 &sctx, &cctx, cert, privkey)) in server_setup_sni() 262 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
H A D | sslcorrupttest.c | 179 static char *cert = NULL; variable 200 &sctx, &cctx, cert, privkey))) in test_ssl_corrupt() 266 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
H A D | sslapitest.c | 84 static char *cert = NULL; variable 366 &sctx, &cctx, cert, privkey))) in test_keylog() 449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key() 566 /* server key, cert, chain, and root */ in test_client_cert_verify_cb() 600 /* application provides intermediate certs needed to verify server cert */ in test_client_cert_verify_cb() 760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb() 802 &sctx, &cctx, cert, privkey)) { in test_no_ems() 862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher() 964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))) in execute_test_large_message() 976 max_version, &sctx, &cctx, cert, in execute_test_large_message() [all...] |
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | ipl.c | 2392 unsigned char flags, unsigned short cert) in ipl_report_add_component() 2404 comp->entry.certificate_index = cert; in ipl_report_add_component() 2414 struct ipl_report_certificate *cert; in ipl_report_add_certificate() local 2416 cert = vzalloc(sizeof(*cert)); in ipl_report_add_certificate() 2417 if (!cert) in ipl_report_add_certificate() 2419 list_add_tail(&cert->list, &report->certificates); in ipl_report_add_certificate() 2421 cert->entry.addr = addr; in ipl_report_add_certificate() 2422 cert->entry.len = len; in ipl_report_add_certificate() 2423 cert in ipl_report_add_certificate() 2391 ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf, unsigned char flags, unsigned short cert) ipl_report_add_component() argument 2453 struct ipl_report_certificate *cert; ipl_report_finish() local 2509 struct ipl_report_certificate *cert, *ncert; ipl_report_free() local [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | apps.c | 468 X509 *cert = NULL; in load_cert_pass() local 475 cert = X509_load_http(uri, NULL, NULL, 0 /* timeout */); in load_cert_pass() 478 NULL, NULL, NULL, &cert, NULL, NULL, NULL); in load_cert_pass() 479 if (cert == NULL) { in load_cert_pass() 483 return cert; in load_cert_pass() 653 static void warn_cert_msg(const char *uri, X509 *cert, const char *msg) in warn_cert_msg() argument 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() 662 static void warn_cert(const char *uri, X509 *cert, int warn_EE, in warn_cert() argument 665 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert() 666 int res = X509_cmp_timeframe(vpm, X509_get0_notBefore(cert), in warn_cert() 2243 adapt_keyid_ext(X509 *cert, X509V3_CTX *ext_ctx, const char *name, const char *value, int add_default) adapt_keyid_ext() argument 2272 do_X509_sign(X509 *cert, EVP_PKEY *pkey, const char *md, STACK_OF(OPENSSL_STRING) *sigopts, X509V3_CTX *ext_ctx) do_X509_sign() argument [all...] |
/third_party/openssl/apps/lib/ |
H A D | apps.c | 468 X509 *cert = NULL; in load_cert_pass() local 475 cert = X509_load_http(uri, NULL, NULL, 0 /* timeout */); in load_cert_pass() 478 NULL, NULL, NULL, &cert, NULL, NULL, NULL); in load_cert_pass() 479 if (cert == NULL) { in load_cert_pass() 483 return cert; in load_cert_pass() 653 static void warn_cert_msg(const char *uri, X509 *cert, const char *msg) in warn_cert_msg() argument 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() 662 static void warn_cert(const char *uri, X509 *cert, int warn_EE, in warn_cert() argument 665 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert() 666 int res = X509_cmp_timeframe(vpm, X509_get0_notBefore(cert), in warn_cert() 2236 adapt_keyid_ext(X509 *cert, X509V3_CTX *ext_ctx, const char *name, const char *value, int add_default) adapt_keyid_ext() argument 2265 do_X509_sign(X509 *cert, EVP_PKEY *pkey, const char *md, STACK_OF(OPENSSL_STRING) *sigopts, X509V3_CTX *ext_ctx) do_X509_sign() argument [all...] |
/foundation/communication/netstack/test/unittest/tls_test/server/ |
H A D | tls_socket_branch_test.cpp | 134 X509CertRawData cert; in HWTEST_F() local 136 server.CallGetCertificateCallback(err, cert, certificateCallback); in HWTEST_F() 139 server.CallGetRemoteCertificateCallback(err, cert, remoteCertificateCallback); in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/tlssocket/server/ |
H A D | tls_socket_branch_test.cpp | 134 X509CertRawData cert; in HWTEST_F() local 136 server.CallGetCertificateCallback(err, cert, certificateCallback); in HWTEST_F() 139 server.CallGetRemoteCertificateCallback(err, cert, remoteCertificateCallback); in HWTEST_F()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_util.c | 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local 216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs() 217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_util.c | 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local 216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs() 217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
|
/third_party/node/src/crypto/ |
H A D | crypto_context.cc | 82 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 85 CHECK(!*cert); in SSL_CTX_use_certificate_chain() 117 // Try getting issuer from a cert store in SSL_CTX_use_certificate_chain() 136 cert->reset(X509_dup(x.get())); in SSL_CTX_use_certificate_chain() 137 if (!*cert) in SSL_CTX_use_certificate_chain() 150 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 193 cert, in SSL_CTX_use_certificate_chain() 232 for (X509* cert : root_certs_vector) { in NewRootCertStore() 233 X509_up_ref(cert); in NewRootCertStore() 234 X509_STORE_add_cert(store, cert); in NewRootCertStore() 79 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, X509Pointer&& x, STACK_OF(X509)* extra_certs, X509Pointer* cert, X509Pointer* issuer_) SSL_CTX_use_certificate_chain() argument 148 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, BIOPointer&& in, X509Pointer* cert, X509Pointer* issuer) SSL_CTX_use_certificate_chain() argument 1042 X509Pointer cert; LoadPKCS12() local 1316 X509* cert; GetCertificate() local [all...] |
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 963 CF_INLINE CFStringRef getsubject(SecCertificateRef cert) in getsubject() argument 969 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 975 SecCertificateCopyLongDescription(NULL, cert, NULL); in getsubject() 981 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 985 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); in getsubject() 991 SecCertificateRef cert, char **certp) in CopyCertSubject() 993 CFStringRef c = getsubject(cert); in CopyCertSubject() 1048 SecCertificateRef cert = NULL; in CopyIdentityWithLabelOldSchool() local 1066 (SecKeychainItemRef *)&cert); in CopyIdentityWithLabelOldSchool() 1067 if(status == noErr && cert) { in CopyIdentityWithLabelOldSchool() 990 CopyCertSubject(struct Curl_easy *data, SecCertificateRef cert, char **certp) CopyCertSubject() argument 1131 SecCertificateRef cert = NULL; CopyIdentityWithLabel() local 1869 SecCertificateRef cert = NULL; global() local [all...] |
/foundation/communication/netstack/interfaces/innerkits/tls_socket/include/ |
H A D | tls_socket.h | 55 using GetCertificateCallback = std::function<void(int32_t errorNumber, const X509CertRawData &cert)>; 56 using GetRemoteCertificateCallback = std::function<void(int32_t errorNumber, const X509CertRawData &cert)>; 86 * Set root CA Chain to verify the server cert 93 * @param cert digital certificate sent to the server to verify validity 95 void SetCert(const std::string &cert); 140 * Get root CA Chain to verify the server cert 609 void CallGetCertificateCallback(int32_t err, const X509CertRawData &cert, GetCertificateCallback callback); 610 void CallGetRemoteCertificateCallback(int32_t err, const X509CertRawData &cert,
|
/kernel/linux/linux-5.10/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/kernel/linux/linux-6.6/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | ocsp.h | 185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert); 256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert); 257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert); 258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
|
/foundation/communication/netstack/frameworks/js/napi/websocket/async_context/include/ |
H A D | connect_context.h | 44 void SetClientCert(std::string &cert, Secure::SecureChar &key, Secure::SecureChar &keyPassword); 46 void GetClientCert(std::string &cert, Secure::SecureChar &key, Secure::SecureChar &keyPassword);
|
/kernel/linux/linux-6.6/tools/net/ynl/generated/ |
H A D | handshake-user.h | 27 __u32 cert:1; member 31 __u32 cert; member
|