| /base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/include/ |
| H A D | hks_client_service_dcm.h | 26 int32_t DcmGenerateCertChain(struct HksBlob *cert, const uint8_t *remoteObject);
|
| /third_party/libwebsockets/lib/tls/mbedtls/ |
| H A D | mbedtls-server.c | 37 lwsl_notice("no client cert required\n"); in lws_tls_server_client_cert_verify_config() 44 lwsl_notice("%s: vh %s requires client cert %d\n", __func__, vh->name, in lws_tls_server_client_cert_verify_config() 92 lwsl_err("%s: vhost %s matches SNI but no valid cert\n", in lws_mbedtls_sni_cb() 106 const char *cert, const char *private_key, in lws_tls_server_certs_load() 115 if ((!cert || !private_key) && (!mem_cert || !mem_privkey)) { in lws_tls_server_certs_load() 120 n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key); in lws_tls_server_certs_load() 138 * the rights to read our own cert + key we saved. in lws_tls_server_certs_load() 143 * The passed memory-buffer cert image is in DER, and the in lws_tls_server_certs_load() 146 cert = NULL; in lws_tls_server_certs_load() 149 if (lws_tls_alloc_pem_to_der_file(vhost->context, cert, mem_cer in lws_tls_server_certs_load() 105 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) lws_tls_server_certs_load() argument [all...] |
| /third_party/node/src/quic/ |
| H A D | tlscontext.cc | 186 const auto addCert = [&](uv_buf_t cert) { in InitializeSecureContext() 188 crypto::BIOPointer bio = crypto::NodeBIO::NewFixed(cert.base, cert.len); in InitializeSecureContext() 194 for (auto& cert : options.certs) { in InitializeSecureContext() 195 if (!addCert(cert).IsJust()) { in InitializeSecureContext() 229 // TODO(@jasnell): Possibly handle other bits. Such a pfx, client cert engine, in InitializeSecureContext() 499 MaybeLocal<Object> TLSContext::cert(Environment* env) const { in cert() function in node::quic::TLSContext
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | smime.c | 52 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 128 {"cert", 0, 0, "Recipient certs, used when encrypting"}, 140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 452 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main() 454 if (cert == NULL) in smime_main() 456 if (!sk_X509_push(encerts, cert)) in smime_main() 458 cert = NULL; in smime_main() 663 X509_free(cert); in smime_main()
|
| H A D | cms.c | 91 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 160 {"recip", OPT_RECIP, '<', "Recipient cert file"}, 161 {"cert...", OPT_PARAM, '.', 289 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local 619 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main() 621 if (cert == NULL) in cms_main() 623 if (!sk_X509_push(encerts, cert)) in cms_main() 625 cert = NULL; in cms_main() 831 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main() 833 if (cert in cms_main() [all...] |
| /third_party/openssl/apps/ |
| H A D | smime.c | 52 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 128 {"cert", 0, 0, "Recipient certs, used when encrypting"}, 140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 452 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main() 454 if (cert == NULL) in smime_main() 456 sk_X509_push(encerts, cert); in smime_main() 457 cert = NULL; in smime_main() 662 X509_free(cert); in smime_main()
|
| H A D | cms.c | 91 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 160 {"recip", OPT_RECIP, '<', "Recipient cert file"}, 161 {"cert...", OPT_PARAM, '.', 289 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local 619 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main() 621 if (cert == NULL) in cms_main() 623 sk_X509_push(encerts, cert); in cms_main() 624 cert = NULL; in cms_main() 829 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main() 831 if (cert in cms_main() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | tls_openssl_ocsp.c | 395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) in issuer_match() argument 412 iname = X509_get_issuer_name(cert); in issuer_match() 486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument 512 txt = integer_str(X509_get_serialNumber(cert)); in check_ocsp_resp() 577 "OpenSSL: BasicOCSPResponse cert %s", buf); in check_ocsp_resp() 792 X509_get_serialNumber(cert)) == 0 && in check_ocsp_resp() 793 issuer_match(cert, issuer, sresp->certID) == 0) { in check_ocsp_resp()
|
| H A D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | tls_openssl_ocsp.c | 395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) in issuer_match() argument 412 iname = X509_get_issuer_name(cert); in issuer_match() 486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument 512 txt = integer_str(X509_get_serialNumber(cert)); in check_ocsp_resp() 577 "OpenSSL: BasicOCSPResponse cert %s", buf); in check_ocsp_resp() 792 X509_get_serialNumber(cert)) == 0 && in check_ocsp_resp() 793 issuer_match(cert, issuer, sresp->certID) == 0) { in check_ocsp_resp()
|
| H A D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
| /base/security/code_signature/services/key_enable/utils/include/ |
| H A D | key_enable_adapter.h | 28 int32_t InitLocalCertificate(uint8_t *cert, uint32_t *certSize);
|
| /third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
| H A D | ssl_cert.h | 45 * @param cert - certification object point 49 void ssl_cert_free(CERT *cert);
|
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
| H A D | dlp_file.cpp | 107 // clear encrypt cert in ~DlpFile() 622 // get cert encrypt context in ParseDlpHeaderInRaw() 630 DLP_LOG_ERROR(LABEL, "can not read dlp file cert, %{public}s", strerror(errno)); in ParseDlpHeaderInRaw() 680 void DlpFile::GetEncryptCert(struct DlpBlob& cert) const in GetEncryptCert() 682 cert.data = cert_.data; in GetEncryptCert() 683 cert.size = cert_.size; in GetEncryptCert() 686 void DlpFile::GetOfflineCert(struct DlpBlob& cert) const in GetOfflineCert() 688 cert.data = offlineCert_.data; in GetOfflineCert() 689 cert.size = offlineCert_.size; in GetOfflineCert() 692 int32_t DlpFile::SetEncryptCert(const struct DlpBlob& cert) in SetEncryptCert() argument 715 UpdateFile(int32_t tmpFile, const std::vector<uint8_t>& cert, uint32_t oldTxtOffset) UpdateFile() argument 756 UpdateCertAndText(const std::vector<uint8_t>& cert, const std::string& workDir, struct DlpBlob certBlob) UpdateCertAndText() argument 811 WriteHeadAndCert(int32_t tmpFile, const std::vector<uint8_t>& cert) WriteHeadAndCert() argument [all...] |
| /third_party/rust/crates/rust-openssl/openssl/src/ssl/test/ |
| H A D | mod.rs | 44 static CERT: &[u8] = include_bytes!("../../../test/cert.pem"); 221 let cert = x509.current_cert().unwrap(); in verify_callback() 222 let digest = cert.digest(MessageDigest::sha1()).unwrap(); in verify_callback() 243 let cert = x509.current_cert().unwrap(); in ssl_verify_callback() 244 let digest = cert.digest(MessageDigest::sha1()).unwrap(); in ssl_verify_callback() 289 let cert = s.ssl().peer_certificate().unwrap(); in peer_certificate() 290 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in peer_certificate() 338 ctx.set_certificate_file(Path::new("test/cert.pem"), SslFiletype::PEM) in test_connect_with_srtp_ctx() 394 ctx.set_certificate_file(Path::new("test/cert.pem"), SslFiletype::PEM) in test_connect_with_srtp_ssl() 650 let cert in add_extra_chain_cert() [all...] |
| /base/security/certificate_framework/interfaces/inner_api/certificate/ |
| H A D | crl.h | 30 bool (*isRevoked)(HcfCrl *self, const HcfCertificate *cert);
|
| /base/security/code_signature/utils/include/ |
| H A D | huks_attest_verifier.h | 25 bool GetVerifiedCert(const ByteBuffer &buffer, const ByteBuffer &challenge, ByteBuffer &cert);
|
| /foundation/communication/netstack/interfaces/kits/c/net_ssl/include/ |
| H A D | net_ssl_c.h | 49 * @param cert Certificate to be verified. 71 uint32_t OH_NetStack_CertVerification(const struct NetStack_CertBlob *cert, const struct NetStack_CertBlob *caCert);
|
| /third_party/node/deps/openssl/openssl/apps/lib/ |
| H A D | s_cb.c | 62 BIO_puts(bio_err, "<no cert>\n"); in verify_callback() 139 * Now we know that a key and cert have been set against the SSL in set_cert_stuff() 151 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument 156 if (cert == NULL) in set_cert_key_stuff() 158 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff() 171 * Now we know that a key and cert have been set against the SSL context in set_cert_key_stuff() 662 {"cert type", TLSEXT_TYPE_cert_type}, 864 X509 *cert; member 934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb() 935 BIO_printf(bio_err, "Checking cert chai in set_cert_cb() [all...] |
| /third_party/openssl/apps/lib/ |
| H A D | s_cb.c | 62 BIO_puts(bio_err, "<no cert>\n"); in verify_callback() 139 * Now we know that a key and cert have been set against the SSL in set_cert_stuff() 151 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument 156 if (cert == NULL) in set_cert_key_stuff() 158 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff() 171 * Now we know that a key and cert have been set against the SSL context in set_cert_key_stuff() 662 {"cert type", TLSEXT_TYPE_cert_type}, 864 X509 *cert; member 934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb() 935 BIO_printf(bio_err, "Checking cert chai in set_cert_cb() [all...] |
| /third_party/node/deps/openssl/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 199 * cert. in ossl_statem_server_read_transition() 344 && s->cert->psk_identity_hint) in send_server_key_exchange() 369 /* don't request cert unless asked for it: */ in send_certificate_request() 378 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert in send_certificate_request() 384 * never request cert in anonymous ciphersuites (see in send_certificate_request() 2095 if (s->s3.tmp.cert != NULL) { in tls_handle_status_request() 2100 s->cert->key = s->s3.tmp.cert; in tls_handle_status_request() 2220 /* Let cert callback update server certificates if required */ in tls_post_process_client_hello() 2221 if (!s->hit && s->cert in tls_post_process_client_hello() 2475 CERT *cert = s->cert; tls_construct_server_key_exchange() local [all...] |
| /third_party/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 198 * cert. in ossl_statem_server_read_transition() 343 && s->cert->psk_identity_hint) in send_server_key_exchange() 368 /* don't request cert unless asked for it: */ in send_certificate_request() 377 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert in send_certificate_request() 383 * never request cert in anonymous ciphersuites (see in send_certificate_request() 2075 if (s->s3.tmp.cert != NULL) { in tls_handle_status_request() 2080 s->cert->key = s->s3.tmp.cert; in tls_handle_status_request() 2200 /* Let cert callback update server certificates if required */ in tls_post_process_client_hello() 2201 if (!s->hit && s->cert in tls_post_process_client_hello() 2454 CERT *cert = s->cert; tls_construct_server_key_exchange() local [all...] |
| /base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
| H A D | local_code_sign_client.cpp | 141 int32_t LocalCodeSignClient::InitLocalCertificate(ByteBuffer &cert)
in InitLocalCertificate() argument 157 if (!GetVerifiedCert(certChainBuffer, *challenge, cert)) {
in InitLocalCertificate()
|
| /foundation/communication/netstack/interfaces/innerkits/rust/ylong_http_client/src/reqwest_impl/ |
| H A D | config.rs | 356 /// # fn cert() { 357 /// let file = std::fs::read("./cert.pem").unwrap(); 358 /// let cert = reqwest::Certificate::from_pem(&file); 382 let cert = reqwest::Certificate::from_pem(slice) in from_pem() 384 inner.push(cert); in from_pem()
|
| /foundation/communication/netstack/frameworks/cj/http/include/ |
| H A D | net_http_request.h | 84 void SetClientCert(std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd); 126 void GetClientCert(std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd);
|