/third_party/openssl/test/ |
H A D | servername_test.c | 31 static char *cert = NULL; variable 211 &sctx, &cctx, cert, privkey)) in server_setup_sni() 262 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
H A D | sslcorrupttest.c | 179 static char *cert = NULL; variable 200 &sctx, &cctx, cert, privkey))) in test_ssl_corrupt() 266 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
H A D | sslapitest.c | 84 static char *cert = NULL; variable 366 &sctx, &cctx, cert, privkey))) in test_keylog() 449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key() 566 /* server key, cert, chain, and root */ in test_client_cert_verify_cb() 600 /* application provides intermediate certs needed to verify server cert */ in test_client_cert_verify_cb() 760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb() 802 &sctx, &cctx, cert, privkey)) { in test_no_ems() 862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher() 964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))) in execute_test_large_message() 976 max_version, &sctx, &cctx, cert, in execute_test_large_message() [all...] |
/third_party/openssl/crypto/cmp/ |
H A D | cmp_util.c | 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs() local 216 if (!only_self_signed || X509_self_signed(cert, 0) == 1) in ossl_cmp_X509_STORE_add1_certs() 217 if (!X509_STORE_add_cert(store, cert)) /* ups cert ref counter */ in ossl_cmp_X509_STORE_add1_certs()
|
H A D | cmp_client.c | 425 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status() 435 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status() 440 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status() 444 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status() 460 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status() 488 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 499 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 500 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 505 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb() 570 X509 *cert; cert_response() local [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_context.cc | 82 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 85 CHECK(!*cert); in SSL_CTX_use_certificate_chain() 117 // Try getting issuer from a cert store in SSL_CTX_use_certificate_chain() 136 cert->reset(X509_dup(x.get())); in SSL_CTX_use_certificate_chain() 137 if (!*cert) in SSL_CTX_use_certificate_chain() 150 X509Pointer* cert, in SSL_CTX_use_certificate_chain() 193 cert, in SSL_CTX_use_certificate_chain() 232 for (X509* cert : root_certs_vector) { in NewRootCertStore() 233 X509_up_ref(cert); in NewRootCertStore() 234 X509_STORE_add_cert(store, cert); in NewRootCertStore() 79 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, X509Pointer&& x, STACK_OF(X509)* extra_certs, X509Pointer* cert, X509Pointer* issuer_) SSL_CTX_use_certificate_chain() argument 148 SSL_CTX_use_certificate_chain(SSL_CTX* ctx, BIOPointer&& in, X509Pointer* cert, X509Pointer* issuer) SSL_CTX_use_certificate_chain() argument 1042 X509Pointer cert; LoadPKCS12() local 1316 X509* cert; GetCertificate() local [all...] |
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 963 CF_INLINE CFStringRef getsubject(SecCertificateRef cert) in getsubject() argument 969 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 975 SecCertificateCopyLongDescription(NULL, cert, NULL); in getsubject() 981 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 985 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); in getsubject() 991 SecCertificateRef cert, char **certp) in CopyCertSubject() 993 CFStringRef c = getsubject(cert); in CopyCertSubject() 1048 SecCertificateRef cert = NULL; in CopyIdentityWithLabelOldSchool() local 1066 (SecKeychainItemRef *)&cert); in CopyIdentityWithLabelOldSchool() 1067 if(status == noErr && cert) { in CopyIdentityWithLabelOldSchool() 990 CopyCertSubject(struct Curl_easy *data, SecCertificateRef cert, char **certp) CopyCertSubject() argument 1131 SecCertificateRef cert = NULL; CopyIdentityWithLabel() local 1869 SecCertificateRef cert = NULL; global() local [all...] |
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_app_cert_process.c | 412 X509 *cert = NULL; in GetCredCertName() local 414 ret = CmParsePkcs12Cert(certParam->appCert, (char *)certParam->appCertPwd->data, priKey, appCert, &cert); in GetCredCertName() 420 ret = GetSubjectNameAndAlias(cert, certParam->certAlias, certName->subjectName, certName->displayName); in GetCredCertName() 432 if (cert != NULL) { in GetCredCertName() 433 FreeCertContext(cert); in GetCredCertName() 443 CM_LOG_E("cert count beyond maxcount, can't install"); in StoreKeyAndCert() 484 CM_LOG_E("construct app cert uri fail"); in CmInstallAppCertPro()
|
/base/update/updater/test/unittest/package/ |
H A D | pkg_verify_unittest.cpp | 130 X509 *cert = PEM_read_bio_X509(certbio, nullptr, nullptr, nullptr); in TestOpensslUtilFailed() local 136 boolResult = VerifyX509CertByIssuerCert(cert, cert); in TestOpensslUtilFailed() 148 stringResult = GetX509CertSubjectName(cert); in TestOpensslUtilFailed() 152 stringResult = GetX509CertIssuerName(cert); in TestOpensslUtilFailed()
|
/kernel/linux/linux-5.10/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/kernel/linux/linux-6.6/scripts/ |
H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | ocsp.h | 185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert); 256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert); 257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert); 258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_client.c | 422 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status() 432 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status() 437 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status() 441 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status() 457 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status() 485 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 496 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 497 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 502 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb() 567 X509 *cert; cert_response() local [all...] |
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/ |
H A D | cf_ability_test.cpp | 95 CfEncodingBlob cert = { const_cast<uint8_t *>(g_certData01), sizeof(g_certData01), CF_FORMAT_DER };
in HWTEST_F() local 96 ret = adapterFunc->adapterCreate(&cert, &obj001);
in HWTEST_F() 97 EXPECT_EQ(ret, CF_SUCCESS) << "create cert object failed, recode:" << ret;
in HWTEST_F() 100 EXPECT_EQ(ret, CF_SUCCESS) << "verify cert object failed, recode:" << ret;
in HWTEST_F()
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
H A D | dlp_file_manager.h | 52 int32_t GenerateCertBlob(const std::vector<uint8_t>& cert, struct DlpBlob& certData) const; 54 const std::vector<uint8_t>& cert, std::shared_ptr<DlpFile>& filePtr);
|
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/ |
H A D | generatecert_fuzzer.cpp | 68 std::vector<uint8_t> cert; in FuzzTest() local 69 DlpPermissionKit::GenerateDlpCertificate(encPolicy, cert); in FuzzTest()
|
/kernel/linux/linux-6.6/tools/net/ynl/generated/ |
H A D | handshake-user.h | 27 __u32 cert:1; member 31 __u32 cert; member
|
/third_party/libwebsockets/lib/tls/ |
H A D | private-network.h | 135 const char *cert, const char *private_key, 139 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert,
|
/third_party/node/test/parallel/ |
H A D | test-http2-create-client-secure-session.js | 38 function verifySecureSession(key, cert, ca, opts) { 39 const server = h2.createSecureServer({ cert, key }); 85 loadKey('agent8-cert.pem'), 86 loadKey('fake-startcom-root-cert.pem')); 91 loadKey('agent1-cert.pem'), 92 loadKey('ca1-cert.pem'), 97 loadKey('agent8-cert.pem'), 98 loadKey('fake-startcom-root-cert.pem'),
|
H A D | test-tls-securepair-server.js | 37 const cert = fixtures.readKey('rsa_cert.crt'); 45 const sslcontext = tls.createSecureContext({ key, cert });
|
H A D | test-tls-set-secure-context.js | 19 cert: fixtures.readKey('agent1-cert.pem'), 20 ca: fixtures.readKey('ca1-cert.pem') 24 cert: fixtures.readKey('agent2-cert.pem'), 25 ca: fixtures.readKey('ca2-cert.pem')
|
/third_party/node/test/sequential/ |
H A D | test-tls-securepair-client.js | 59 test('keys/agent4-key.pem', 'keys/agent4-cert.pem', check); 64 const cert = fixtures.readSync(certPath).toString(); 68 '-cert', fixtures.path(certPath), 128 const sslcontext = tls.createSecureContext({ key, cert });
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_local.h | 110 X509 *cert; member 131 * If *cert does not have a poison extension, presigner must be NULL. 132 * If *cert does not have a poison extension, it may have a single SCT 134 * If either *cert or *presigner have an AKID (NID_authority_key_identifier) 138 __owur int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner);
|