Home
last modified time | relevance | path

Searched refs:cert (Results 401 - 425 of 1184) sorted by relevance

1...<<11121314151617181920>>...48

/third_party/openssl/test/
H A Dservername_test.c31 static char *cert = NULL; variable
211 &sctx, &cctx, cert, privkey)) in server_setup_sni()
262 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
H A Dsslcorrupttest.c179 static char *cert = NULL; variable
200 &sctx, &cctx, cert, privkey))) in test_ssl_corrupt()
266 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
H A Dsslapitest.c84 static char *cert = NULL; variable
366 &sctx, &cctx, cert, privkey))) in test_keylog()
449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key()
566 /* server key, cert, chain, and root */ in test_client_cert_verify_cb()
600 /* application provides intermediate certs needed to verify server cert */ in test_client_cert_verify_cb()
760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb()
802 &sctx, &cctx, cert, privkey)) { in test_no_ems()
862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher()
964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))) in execute_test_large_message()
976 max_version, &sctx, &cctx, cert, in execute_test_large_message()
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_util.c214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local
216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs()
217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
H A Dcmp_client.c425 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status()
435 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status()
440 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status()
444 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status()
460 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status()
488 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument
499 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb()
500 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb()
505 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb()
570 X509 *cert; cert_response() local
[all...]
/third_party/node/src/crypto/
H A Dcrypto_context.cc82 X509Pointer* cert, in SSL_CTX_use_certificate_chain()
85 CHECK(!*cert); in SSL_CTX_use_certificate_chain()
117 // Try getting issuer from a cert store in SSL_CTX_use_certificate_chain()
136 cert->reset(X509_dup(x.get())); in SSL_CTX_use_certificate_chain()
137 if (!*cert) in SSL_CTX_use_certificate_chain()
150 X509Pointer* cert, in SSL_CTX_use_certificate_chain()
193 cert, in SSL_CTX_use_certificate_chain()
232 for (X509* cert : root_certs_vector) { in NewRootCertStore()
233 X509_up_ref(cert); in NewRootCertStore()
234 X509_STORE_add_cert(store, cert); in NewRootCertStore()
79 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, X509Pointer&& x, STACK_OF(X509)* extra_certs, X509Pointer* cert, X509Pointer* issuer_) SSL_CTX_use_certificate_chain() argument
148 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, BIOPointer&& in, X509Pointer* cert, X509Pointer* issuer) SSL_CTX_use_certificate_chain() argument
1042 X509Pointer cert; LoadPKCS12() local
1316 X509* cert; GetCertificate() local
[all...]
/third_party/curl/lib/vtls/
H A Dsectransp.c963 CF_INLINE CFStringRef getsubject(SecCertificateRef cert) in getsubject() argument
969 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject()
975 SecCertificateCopyLongDescription(NULL, cert, NULL); in getsubject()
981 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject()
985 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); in getsubject()
991 SecCertificateRef cert, char **certp) in CopyCertSubject()
993 CFStringRef c = getsubject(cert); in CopyCertSubject()
1048 SecCertificateRef cert = NULL; in CopyIdentityWithLabelOldSchool() local
1066 (SecKeychainItemRef *)&cert); in CopyIdentityWithLabelOldSchool()
1067 if(status == noErr && cert) { in CopyIdentityWithLabelOldSchool()
990 CopyCertSubject(struct Curl_easy *data, SecCertificateRef cert, char **certp) CopyCertSubject() argument
1131 SecCertificateRef cert = NULL; CopyIdentityWithLabel() local
1869 SecCertificateRef cert = NULL; global() local
[all...]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
H A Dcert_manager_app_cert_process.c412 X509 *cert = NULL; in GetCredCertName() local
414 ret = CmParsePkcs12Cert(certParam->appCert, (char *)certParam->appCertPwd->data, priKey, appCert, &cert); in GetCredCertName()
420 ret = GetSubjectNameAndAlias(cert, certParam->certAlias, certName->subjectName, certName->displayName); in GetCredCertName()
432 if (cert != NULL) { in GetCredCertName()
433 FreeCertContext(cert); in GetCredCertName()
443 CM_LOG_E("cert count beyond maxcount, can't install"); in StoreKeyAndCert()
484 CM_LOG_E("construct app cert uri fail"); in CmInstallAppCertPro()
/base/update/updater/test/unittest/package/
H A Dpkg_verify_unittest.cpp130 X509 *cert = PEM_read_bio_X509(certbio, nullptr, nullptr, nullptr); in TestOpensslUtilFailed() local
136 boolResult = VerifyX509CertByIssuerCert(cert, cert); in TestOpensslUtilFailed()
148 stringResult = GetX509CertSubjectName(cert); in TestOpensslUtilFailed()
152 stringResult = GetX509CertIssuerName(cert); in TestOpensslUtilFailed()
/kernel/linux/linux-5.10/scripts/
H A Dinsert-sys-cert.c10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile>
281 char *cert; in main() local
310 cert = read_file(cert_file, &cert_size); in main()
311 if (!cert) in main()
388 /* If the existing cert is the same, don't overwrite */ in main()
390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main()
398 memcpy(cert_sym.content, cert, cert_size); in main()
/kernel/linux/linux-6.6/scripts/
H A Dinsert-sys-cert.c10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile>
281 char *cert; in main() local
310 cert = read_file(cert_file, &cert_size); in main()
311 if (!cert) in main()
388 /* If the existing cert is the same, don't overwrite */ in main()
390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main()
398 memcpy(cert_sym.content, cert, cert_size); in main()
/third_party/node/deps/openssl/openssl/crypto/ocsp/
H A Docsp_vfy.c22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer()
303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument
340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid()
347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid()
360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
/third_party/openssl/crypto/ocsp/
H A Docsp_vfy.c22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer()
303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument
340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid()
347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid()
360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
/third_party/openssl/ohos_lite/include/openssl/
H A Docsp.h185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert);
257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert);
258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_client.c422 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status()
432 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status()
437 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status()
441 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status()
457 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status()
485 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument
496 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb()
497 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb()
502 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb()
567 X509 *cert; cert_response() local
[all...]
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/
H A Dcf_ability_test.cpp95 CfEncodingBlob cert = { const_cast<uint8_t *>(g_certData01), sizeof(g_certData01), CF_FORMAT_DER }; in HWTEST_F() local
96 ret = adapterFunc->adapterCreate(&cert, &obj001); in HWTEST_F()
97 EXPECT_EQ(ret, CF_SUCCESS) << "create cert object failed, recode:" << ret; in HWTEST_F()
100 EXPECT_EQ(ret, CF_SUCCESS) << "verify cert object failed, recode:" << ret; in HWTEST_F()
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/
H A Ddlp_file_manager.h52 int32_t GenerateCertBlob(const std::vector<uint8_t>& cert, struct DlpBlob& certData) const;
54 const std::vector<uint8_t>& cert, std::shared_ptr<DlpFile>& filePtr);
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/
H A Dgeneratecert_fuzzer.cpp68 std::vector<uint8_t> cert; in FuzzTest() local
69 DlpPermissionKit::GenerateDlpCertificate(encPolicy, cert); in FuzzTest()
/kernel/linux/linux-6.6/tools/net/ynl/generated/
H A Dhandshake-user.h27 __u32 cert:1; member
31 __u32 cert; member
/third_party/libwebsockets/lib/tls/
H A Dprivate-network.h135 const char *cert, const char *private_key,
139 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert,
/third_party/node/test/parallel/
H A Dtest-http2-create-client-secure-session.js38 function verifySecureSession(key, cert, ca, opts) {
39 const server = h2.createSecureServer({ cert, key });
85 loadKey('agent8-cert.pem'),
86 loadKey('fake-startcom-root-cert.pem'));
91 loadKey('agent1-cert.pem'),
92 loadKey('ca1-cert.pem'),
97 loadKey('agent8-cert.pem'),
98 loadKey('fake-startcom-root-cert.pem'),
H A Dtest-tls-securepair-server.js37 const cert = fixtures.readKey('rsa_cert.crt');
45 const sslcontext = tls.createSecureContext({ key, cert });
H A Dtest-tls-set-secure-context.js19 cert: fixtures.readKey('agent1-cert.pem'),
20 ca: fixtures.readKey('ca1-cert.pem')
24 cert: fixtures.readKey('agent2-cert.pem'),
25 ca: fixtures.readKey('ca2-cert.pem')
/third_party/node/test/sequential/
H A Dtest-tls-securepair-client.js59 test('keys/agent4-key.pem', 'keys/agent4-cert.pem', check);
64 const cert = fixtures.readSync(certPath).toString();
68 '-cert', fixtures.path(certPath),
128 const sslcontext = tls.createSecureContext({ key, cert });
/third_party/node/deps/openssl/openssl/crypto/ct/
H A Dct_local.h110 X509 *cert; member
131 * If *cert does not have a poison extension, presigner must be NULL.
132 * If *cert does not have a poison extension, it may have a single SCT
134 * If either *cert or *presigner have an AKID (NID_authority_key_identifier)
138 __owur int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner);

Completed in 22 milliseconds

1...<<11121314151617181920>>...48