Home
last modified time | relevance | path

Searched refs:cert (Results 451 - 475 of 1243) sorted by relevance

1...<<11121314151617181920>>...50

/base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/include/
H A Dhks_client_service_dcm.h26 int32_t DcmGenerateCertChain(struct HksBlob *cert, const uint8_t *remoteObject);
/third_party/libwebsockets/lib/tls/mbedtls/
H A Dmbedtls-server.c37 lwsl_notice("no client cert required\n"); in lws_tls_server_client_cert_verify_config()
44 lwsl_notice("%s: vh %s requires client cert %d\n", __func__, vh->name, in lws_tls_server_client_cert_verify_config()
92 lwsl_err("%s: vhost %s matches SNI but no valid cert\n", in lws_mbedtls_sni_cb()
106 const char *cert, const char *private_key, in lws_tls_server_certs_load()
115 if ((!cert || !private_key) && (!mem_cert || !mem_privkey)) { in lws_tls_server_certs_load()
120 n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key); in lws_tls_server_certs_load()
138 * the rights to read our own cert + key we saved. in lws_tls_server_certs_load()
143 * The passed memory-buffer cert image is in DER, and the in lws_tls_server_certs_load()
146 cert = NULL; in lws_tls_server_certs_load()
149 if (lws_tls_alloc_pem_to_der_file(vhost->context, cert, mem_cer in lws_tls_server_certs_load()
105 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) lws_tls_server_certs_load() argument
[all...]
/third_party/node/src/quic/
H A Dtlscontext.cc186 const auto addCert = [&](uv_buf_t cert) { in InitializeSecureContext()
188 crypto::BIOPointer bio = crypto::NodeBIO::NewFixed(cert.base, cert.len); in InitializeSecureContext()
194 for (auto& cert : options.certs) { in InitializeSecureContext()
195 if (!addCert(cert).IsJust()) { in InitializeSecureContext()
229 // TODO(@jasnell): Possibly handle other bits. Such a pfx, client cert engine, in InitializeSecureContext()
499 MaybeLocal<Object> TLSContext::cert(Environment* env) const { in cert() function in node::quic::TLSContext
/third_party/node/deps/openssl/openssl/apps/
H A Dsmime.c52 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
128 {"cert", 0, 0, "Recipient certs, used when encrypting"},
140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local
452 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main()
454 if (cert == NULL) in smime_main()
456 if (!sk_X509_push(encerts, cert)) in smime_main()
458 cert = NULL; in smime_main()
663 X509_free(cert); in smime_main()
H A Dcms.c91 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
160 {"recip", OPT_RECIP, '<', "Recipient cert file"},
161 {"cert...", OPT_PARAM, '.',
289 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local
619 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main()
621 if (cert == NULL) in cms_main()
623 if (!sk_X509_push(encerts, cert)) in cms_main()
625 cert = NULL; in cms_main()
831 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main()
833 if (cert in cms_main()
[all...]
/third_party/openssl/apps/
H A Dsmime.c52 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
128 {"cert", 0, 0, "Recipient certs, used when encrypting"},
140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local
452 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main()
454 if (cert == NULL) in smime_main()
456 sk_X509_push(encerts, cert); in smime_main()
457 cert = NULL; in smime_main()
662 X509_free(cert); in smime_main()
H A Dcms.c91 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
160 {"recip", OPT_RECIP, '<', "Recipient cert file"},
161 {"cert...", OPT_PARAM, '.',
289 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local
619 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main()
621 if (cert == NULL) in cms_main()
623 sk_X509_push(encerts, cert); in cms_main()
624 cert = NULL; in cms_main()
829 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main()
831 if (cert in cms_main()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl_ocsp.c395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) in issuer_match() argument
412 iname = X509_get_issuer_name(cert); in issuer_match()
486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument
512 txt = integer_str(X509_get_serialNumber(cert)); in check_ocsp_resp()
577 "OpenSSL: BasicOCSPResponse cert %s", buf); in check_ocsp_resp()
792 X509_get_serialNumber(cert)) == 0 && in check_ocsp_resp()
793 issuer_match(cert, issuer, sresp->certID) == 0) { in check_ocsp_resp()
H A Dtls_openssl.h16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl_ocsp.c395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) in issuer_match() argument
412 iname = X509_get_issuer_name(cert); in issuer_match()
486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, in check_ocsp_resp() argument
512 txt = integer_str(X509_get_serialNumber(cert)); in check_ocsp_resp()
577 "OpenSSL: BasicOCSPResponse cert %s", buf); in check_ocsp_resp()
792 X509_get_serialNumber(cert)) == 0 && in check_ocsp_resp()
793 issuer_match(cert, issuer, sresp->certID) == 0) { in check_ocsp_resp()
H A Dtls_openssl.h16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
/base/security/code_signature/services/key_enable/utils/include/
H A Dkey_enable_adapter.h28 int32_t InitLocalCertificate(uint8_t *cert, uint32_t *certSize);
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/
H A Dssl_cert.h45 * @param cert - certification object point
49 void ssl_cert_free(CERT *cert);
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/
H A Ddlp_file.cpp107 // clear encrypt cert in ~DlpFile()
622 // get cert encrypt context in ParseDlpHeaderInRaw()
630 DLP_LOG_ERROR(LABEL, "can not read dlp file cert, %{public}s", strerror(errno)); in ParseDlpHeaderInRaw()
680 void DlpFile::GetEncryptCert(struct DlpBlob& cert) const in GetEncryptCert()
682 cert.data = cert_.data; in GetEncryptCert()
683 cert.size = cert_.size; in GetEncryptCert()
686 void DlpFile::GetOfflineCert(struct DlpBlob& cert) const in GetOfflineCert()
688 cert.data = offlineCert_.data; in GetOfflineCert()
689 cert.size = offlineCert_.size; in GetOfflineCert()
692 int32_t DlpFile::SetEncryptCert(const struct DlpBlob& cert) in SetEncryptCert() argument
715 UpdateFile(int32_t tmpFile, const std::vector<uint8_t>& cert, uint32_t oldTxtOffset) UpdateFile() argument
756 UpdateCertAndText(const std::vector<uint8_t>& cert, const std::string& workDir, struct DlpBlob certBlob) UpdateCertAndText() argument
811 WriteHeadAndCert(int32_t tmpFile, const std::vector<uint8_t>& cert) WriteHeadAndCert() argument
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/ssl/test/
H A Dmod.rs44 static CERT: &[u8] = include_bytes!("../../../test/cert.pem");
221 let cert = x509.current_cert().unwrap(); in verify_callback()
222 let digest = cert.digest(MessageDigest::sha1()).unwrap(); in verify_callback()
243 let cert = x509.current_cert().unwrap(); in ssl_verify_callback()
244 let digest = cert.digest(MessageDigest::sha1()).unwrap(); in ssl_verify_callback()
289 let cert = s.ssl().peer_certificate().unwrap(); in peer_certificate()
290 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in peer_certificate()
338 ctx.set_certificate_file(Path::new("test/cert.pem"), SslFiletype::PEM) in test_connect_with_srtp_ctx()
394 ctx.set_certificate_file(Path::new("test/cert.pem"), SslFiletype::PEM) in test_connect_with_srtp_ssl()
650 let cert in add_extra_chain_cert()
[all...]
/base/security/certificate_framework/interfaces/inner_api/certificate/
H A Dcrl.h30 bool (*isRevoked)(HcfCrl *self, const HcfCertificate *cert);
/base/security/code_signature/utils/include/
H A Dhuks_attest_verifier.h25 bool GetVerifiedCert(const ByteBuffer &buffer, const ByteBuffer &challenge, ByteBuffer &cert);
/foundation/communication/netstack/interfaces/kits/c/net_ssl/include/
H A Dnet_ssl_c.h49 * @param cert Certificate to be verified.
71 uint32_t OH_NetStack_CertVerification(const struct NetStack_CertBlob *cert, const struct NetStack_CertBlob *caCert);
/third_party/node/deps/openssl/openssl/apps/lib/
H A Ds_cb.c62 BIO_puts(bio_err, "<no cert>\n"); in verify_callback()
139 * Now we know that a key and cert have been set against the SSL in set_cert_stuff()
151 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument
156 if (cert == NULL) in set_cert_key_stuff()
158 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff()
171 * Now we know that a key and cert have been set against the SSL context in set_cert_key_stuff()
662 {"cert type", TLSEXT_TYPE_cert_type},
864 X509 *cert; member
934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb()
935 BIO_printf(bio_err, "Checking cert chai in set_cert_cb()
[all...]
/third_party/openssl/apps/lib/
H A Ds_cb.c62 BIO_puts(bio_err, "<no cert>\n"); in verify_callback()
139 * Now we know that a key and cert have been set against the SSL in set_cert_stuff()
151 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument
156 if (cert == NULL) in set_cert_key_stuff()
158 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff()
171 * Now we know that a key and cert have been set against the SSL context in set_cert_key_stuff()
662 {"cert type", TLSEXT_TYPE_cert_type},
864 X509 *cert; member
934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb()
935 BIO_printf(bio_err, "Checking cert chai in set_cert_cb()
[all...]
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_srvr.c199 * cert. in ossl_statem_server_read_transition()
344 && s->cert->psk_identity_hint) in send_server_key_exchange()
369 /* don't request cert unless asked for it: */ in send_certificate_request()
378 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert in send_certificate_request()
384 * never request cert in anonymous ciphersuites (see in send_certificate_request()
2095 if (s->s3.tmp.cert != NULL) { in tls_handle_status_request()
2100 s->cert->key = s->s3.tmp.cert; in tls_handle_status_request()
2220 /* Let cert callback update server certificates if required */ in tls_post_process_client_hello()
2221 if (!s->hit && s->cert in tls_post_process_client_hello()
2475 CERT *cert = s->cert; tls_construct_server_key_exchange() local
[all...]
/third_party/openssl/ssl/statem/
H A Dstatem_srvr.c198 * cert. in ossl_statem_server_read_transition()
343 && s->cert->psk_identity_hint) in send_server_key_exchange()
368 /* don't request cert unless asked for it: */ in send_certificate_request()
377 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert in send_certificate_request()
383 * never request cert in anonymous ciphersuites (see in send_certificate_request()
2075 if (s->s3.tmp.cert != NULL) { in tls_handle_status_request()
2080 s->cert->key = s->s3.tmp.cert; in tls_handle_status_request()
2200 /* Let cert callback update server certificates if required */ in tls_post_process_client_hello()
2201 if (!s->hit && s->cert in tls_post_process_client_hello()
2454 CERT *cert = s->cert; tls_construct_server_key_exchange() local
[all...]
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_client.cpp141 int32_t LocalCodeSignClient::InitLocalCertificate(ByteBuffer &cert) in InitLocalCertificate() argument
157 if (!GetVerifiedCert(certChainBuffer, *challenge, cert)) { in InitLocalCertificate()
/foundation/communication/netstack/interfaces/innerkits/rust/ylong_http_client/src/reqwest_impl/
H A Dconfig.rs356 /// # fn cert() {
357 /// let file = std::fs::read("./cert.pem").unwrap();
358 /// let cert = reqwest::Certificate::from_pem(&file);
382 let cert = reqwest::Certificate::from_pem(slice) in from_pem()
384 inner.push(cert); in from_pem()
/foundation/communication/netstack/frameworks/cj/http/include/
H A Dnet_http_request.h84 void SetClientCert(std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd);
126 void GetClientCert(std::string &cert, std::string &certType, std::string &key, SecureChar &keyPasswd);

Completed in 26 milliseconds

1...<<11121314151617181920>>...50