| /third_party/openssl/test/ |
| H A D | sslapitest.c | 84 static char *cert = NULL; variable 366 &sctx, &cctx, cert, privkey))) in test_keylog() 449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key() 566 /* server key, cert, chain, and root */ in test_client_cert_verify_cb() 600 /* application provides intermediate certs needed to verify server cert */ in test_client_cert_verify_cb() 760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb() 802 &sctx, &cctx, cert, privkey)) { in test_no_ems() 862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher() 964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))) in execute_test_large_message() 976 max_version, &sctx, &cctx, cert, in execute_test_large_message() [all...] |
| /third_party/curl/lib/vtls/ |
| H A D | sectransp.c | 963 CF_INLINE CFStringRef getsubject(SecCertificateRef cert) in getsubject() argument 969 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 975 SecCertificateCopyLongDescription(NULL, cert, NULL); in getsubject() 981 server_cert_summary = SecCertificateCopySubjectSummary(cert); in getsubject() 985 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); in getsubject() 991 SecCertificateRef cert, char **certp) in CopyCertSubject() 993 CFStringRef c = getsubject(cert); in CopyCertSubject() 1048 SecCertificateRef cert = NULL; in CopyIdentityWithLabelOldSchool() local 1066 (SecKeychainItemRef *)&cert); in CopyIdentityWithLabelOldSchool() 1067 if(status == noErr && cert) { in CopyIdentityWithLabelOldSchool() 990 CopyCertSubject(struct Curl_easy *data, SecCertificateRef cert, char **certp) CopyCertSubject() argument 1131 SecCertificateRef cert = NULL; CopyIdentityWithLabel() local 1869 SecCertificateRef cert = NULL; global() local [all...] |
| /base/security/certificate_framework/test/unittest/cf_adapter_test/src/ |
| H A D | cf_ability_test.cpp | 95 CfEncodingBlob cert = { const_cast<uint8_t *>(g_certData01), sizeof(g_certData01), CF_FORMAT_DER };
in HWTEST_F() local 96 ret = adapterFunc->adapterCreate(&cert, &obj001);
in HWTEST_F() 97 EXPECT_EQ(ret, CF_SUCCESS) << "create cert object failed, recode:" << ret;
in HWTEST_F() 100 EXPECT_EQ(ret, CF_SUCCESS) << "verify cert object failed, recode:" << ret;
in HWTEST_F()
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
| H A D | dlp_file_manager.h | 52 int32_t GenerateCertBlob(const std::vector<uint8_t>& cert, struct DlpBlob& certData) const; 54 const std::vector<uint8_t>& cert, std::shared_ptr<DlpFile>& filePtr);
|
| /base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/ |
| H A D | generatecert_fuzzer.cpp | 68 std::vector<uint8_t> cert; in FuzzTest() local 69 DlpPermissionKit::GenerateDlpCertificate(encPolicy, cert); in FuzzTest()
|
| /foundation/communication/netstack/frameworks/js/napi/websocket/async_context/include/ |
| H A D | connect_context.h | 44 void SetClientCert(std::string &cert, Secure::SecureChar &key, Secure::SecureChar &keyPassword); 46 void GetClientCert(std::string &cert, Secure::SecureChar &key, Secure::SecureChar &keyPassword);
|
| /kernel/linux/linux-6.6/tools/net/ynl/generated/ |
| H A D | handshake-user.h | 27 __u32 cert:1; member 31 __u32 cert; member
|
| /third_party/libwebsockets/lib/tls/ |
| H A D | private-network.h | 135 const char *cert, const char *private_key, 139 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert,
|
| /third_party/node/test/parallel/ |
| H A D | test-http2-create-client-secure-session.js | 38 function verifySecureSession(key, cert, ca, opts) { 39 const server = h2.createSecureServer({ cert, key }); 85 loadKey('agent8-cert.pem'), 86 loadKey('fake-startcom-root-cert.pem')); 91 loadKey('agent1-cert.pem'), 92 loadKey('ca1-cert.pem'), 97 loadKey('agent8-cert.pem'), 98 loadKey('fake-startcom-root-cert.pem'),
|
| H A D | test-tls-securepair-server.js | 37 const cert = fixtures.readKey('rsa_cert.crt'); 45 const sslcontext = tls.createSecureContext({ key, cert });
|
| H A D | test-tls-set-secure-context.js | 19 cert: fixtures.readKey('agent1-cert.pem'), 20 ca: fixtures.readKey('ca1-cert.pem') 24 cert: fixtures.readKey('agent2-cert.pem'), 25 ca: fixtures.readKey('ca2-cert.pem')
|
| /third_party/node/test/sequential/ |
| H A D | test-tls-securepair-client.js | 59 test('keys/agent4-key.pem', 'keys/agent4-cert.pem', check); 64 const cert = fixtures.readSync(certPath).toString(); 68 '-cert', fixtures.path(certPath), 128 const sslcontext = tls.createSecureContext({ key, cert });
|
| /third_party/node/deps/openssl/openssl/crypto/ct/ |
| H A D | ct_local.h | 110 X509 *cert; member 131 * If *cert does not have a poison extension, presigner must be NULL. 132 * If *cert does not have a poison extension, it may have a single SCT 134 * If either *cert or *presigner have an AKID (NID_authority_key_identifier) 138 __owur int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner);
|
| /third_party/openssl/crypto/ct/ |
| H A D | ct_local.h | 110 X509 *cert; member 131 * If *cert does not have a poison extension, presigner must be NULL. 132 * If *cert does not have a poison extension, it may have a single SCT 134 * If either *cert or *presigner have an AKID (NID_authority_key_identifier) 138 __owur int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner);
|
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
| H A D | cert_manager_app_cert_process.c | 412 X509 *cert = NULL; in GetCredCertName() local 414 ret = CmParsePkcs12Cert(certParam->appCert, (char *)certParam->appCertPwd->data, priKey, appCert, &cert); in GetCredCertName() 420 ret = GetSubjectNameAndAlias(cert, certParam->certAlias, certName->subjectName, certName->displayName); in GetCredCertName() 432 if (cert != NULL) { in GetCredCertName() 433 FreeCertContext(cert); in GetCredCertName() 443 CM_LOG_E("cert count beyond maxcount, can't install"); in StoreKeyAndCert() 484 CM_LOG_E("construct app cert uri fail"); in CmInstallAppCertPro()
|
| /base/update/updater/test/unittest/package/ |
| H A D | pkg_verify_unittest.cpp | 130 X509 *cert = PEM_read_bio_X509(certbio, nullptr, nullptr, nullptr); in TestOpensslUtilFailed() local 136 boolResult = VerifyX509CertByIssuerCert(cert, cert); in TestOpensslUtilFailed() 148 stringResult = GetX509CertSubjectName(cert); in TestOpensslUtilFailed() 152 stringResult = GetX509CertIssuerName(cert); in TestOpensslUtilFailed()
|
| /foundation/communication/netstack/interfaces/innerkits/tls_socket/include/ |
| H A D | tls_socket.h | 55 using GetCertificateCallback = std::function<void(int32_t errorNumber, const X509CertRawData &cert)>; 56 using GetRemoteCertificateCallback = std::function<void(int32_t errorNumber, const X509CertRawData &cert)>; 86 * Set root CA Chain to verify the server cert 93 * @param cert digital certificate sent to the server to verify validity 95 void SetCert(const std::string &cert); 140 * Get root CA Chain to verify the server cert 609 void CallGetCertificateCallback(int32_t err, const X509CertRawData &cert, GetCertificateCallback callback); 610 void CallGetRemoteCertificateCallback(int32_t err, const X509CertRawData &cert,
|
| /kernel/linux/linux-5.10/scripts/ |
| H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
| /kernel/linux/linux-6.6/scripts/ |
| H A D | insert-sys-cert.c | 10 * Usage: insert-sys-cert [-s <System.map> -b <vmlinux> -c <certfile> 281 char *cert; in main() local 310 cert = read_file(cert_file, &cert_size); in main() 311 if (!cert) in main() 388 /* If the existing cert is the same, don't overwrite */ in main() 390 strncmp(cert_sym.content, cert, cert_size) == 0) { in main() 398 memcpy(cert_sym.content, cert, cert_size); in main()
|
| /third_party/node/deps/openssl/openssl/crypto/ocsp/ |
| H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
| /third_party/openssl/crypto/ocsp/ |
| H A D | ocsp_vfy.c | 22 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 53 * Locally disable revocation status checking for OCSP responder cert. in ocsp_verify_signer() 303 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, in ocsp_match_issuerid() argument 340 iname = X509_get_subject_name(cert); in ocsp_match_issuerid() 347 if (!X509_pubkey_digest(cert, dgst, md, NULL)) { in ocsp_match_issuerid() 360 ret = ocsp_match_issuerid(cert, tmpid, NULL); in ocsp_match_issuerid()
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | ocsp.h | 185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert); 256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert); 257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert); 258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
|
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_client.c | 422 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status() 432 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status() 437 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status() 441 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status() 457 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status() 485 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 496 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 497 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 502 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb() 567 X509 *cert; cert_response() local [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_client.c | 425 "received \"waiting\" status for cert when actually aiming to extract cert"); in get1_cert_status() 435 ossl_cmp_err(ctx, "received \"rejection\" status rather than cert"); in get1_cert_status() 440 "received \"revocationWarning\" - a revocation of the cert is imminent"); in get1_cert_status() 444 "received \"revocationNotification\" - a revocation of the cert has occurred"); in get1_cert_status() 460 if (crt == NULL) /* according to PKIStatus, we can expect a cert */ in get1_cert_status() 488 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in OSSL_CMP_certConf_cb() argument 499 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 500 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 505 ossl_cmp_debug(ctx, "validating newly enrolled cert"); in OSSL_CMP_certConf_cb() 570 X509 *cert; cert_response() local [all...] |
| /base/startup/init/test/mock/hvb/libhvb/cert/ |
| H A D | hvb_cert.c | 18 enum hvb_errno hvb_cert_parser(struct hvb_cert *cert, struct hvb_buf *cert_buf) in hvb_cert_parser() argument
|