Home
last modified time | relevance | path

Searched refs:cert (Results 51 - 75 of 1048) sorted by relevance

12345678910>>...42

/third_party/openssl/crypto/pkcs12/
H A Dp12_crt.c32 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex()
54 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex()
59 if (pkey && cert) { in PKCS12_create_ex()
60 if (!X509_check_private_key(cert, pkey)) in PKCS12_create_ex()
62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex()
66 if (cert) { in PKCS12_create_ex()
67 bag = PKCS12_add_cert(&bags, cert); in PKCS12_create_ex()
134 PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, in PKCS12_create() argument
138 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
142 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) in STACK_OF()
31 PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_create_ex() argument
[all...]
H A Dp12_kiss.c27 * Parse and decrypt a PKCS#12 structure returning user key, user cert and
29 * should point to a valid STACK structure. pkey and/or cert may be NULL;
33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
41 if (cert != NULL) in PKCS12_parse()
42 *cert = NULL; in PKCS12_parse()
76 if ((cert != NULL || ca != NULL) in PKCS12_parse()
91 /* Split the certs in ocerts over *cert and *ca as far as requested */ in PKCS12_parse()
94 && cert != NULL && *cert == NULL) { in PKCS12_parse()
101 *cert in PKCS12_parse()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_ocsp.c111 struct x509_certificate *cert, in tls_process_ocsp_single_response()
233 if (serial_number_len != cert->serial_number_len || in tls_process_ocsp_single_response()
234 os_memcmp(serial_number, cert->serial_number, in tls_process_ocsp_single_response()
319 struct x509_certificate *cert, in tls_process_ocsp_responses()
339 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses()
454 struct x509_certificate *cert; in tls_process_basic_ocsp_response() local
465 cert = x509_certificate_parse(hdr.payload, hdr.length); in tls_process_basic_ocsp_response()
466 if (!cert) in tls_process_basic_ocsp_response()
469 last_cert->next = cert; in tls_process_basic_ocsp_response()
470 last_cert = cert; in tls_process_basic_ocsp_response()
110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument
318 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument
687 struct x509_certificate *cert; tls_process_ocsp_response() local
[all...]
H A Dtlsv1_client_write.c27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
33 while (cert) { in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
269 struct x509_certificate *cert; in tls_write_client_certificate() local
295 cert in tls_write_client_certificate()
[all...]
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_ocsp.c111 struct x509_certificate *cert, in tls_process_ocsp_single_response()
224 if (serial_number_len != cert->serial_number_len || in tls_process_ocsp_single_response()
225 os_memcmp(serial_number, cert->serial_number, in tls_process_ocsp_single_response()
312 struct x509_certificate *cert, in tls_process_ocsp_responses()
330 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses()
436 struct x509_certificate *cert; in tls_process_basic_ocsp_response() local
445 cert = x509_certificate_parse(hdr.payload, hdr.length); in tls_process_basic_ocsp_response()
446 if (!cert) in tls_process_basic_ocsp_response()
449 last_cert->next = cert; in tls_process_basic_ocsp_response()
450 last_cert = cert; in tls_process_basic_ocsp_response()
110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument
311 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument
656 struct x509_certificate *cert; tls_process_ocsp_response() local
[all...]
H A Dtlsv1_client_read.c280 struct x509_certificate *cert) in tls_peer_cert_event()
294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event()
295 cert->cert_len); in tls_peer_cert_event()
296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event()
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
315 if (cert->extensions_present & X509_EXT_CERTIFICATE_POLICY) { in tls_peer_cert_event()
316 if (cert->certificate_policy & X509_EXT_CERT_POLICY_TOD_STRICT) in tls_peer_cert_event()
318 else if (cert->certificate_policy & in tls_peer_cert_event()
329 struct x509_certificate *cert, in tls_cert_chain_failure_event()
337 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event()
279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument
328 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument
360 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local
830 struct x509_certificate *cert; tls_process_certificate_status() local
[all...]
H A Dtlsv1_client_write.c27 struct x509_certificate *cert; in tls_client_cert_chain_der_len() local
32 cert = conn->cred->cert; in tls_client_cert_chain_der_len()
33 while (cert) { in tls_client_cert_chain_der_len()
34 len += 3 + cert->cert_len; in tls_client_cert_chain_der_len()
35 if (x509_certificate_self_signed(cert)) in tls_client_cert_chain_der_len()
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_client_cert_chain_der_len()
38 &cert->issuer); in tls_client_cert_chain_der_len()
257 struct x509_certificate *cert; in tls_write_client_certificate() local
283 cert in tls_write_client_certificate()
[all...]
H A Dtlsv1_server_write.c27 struct x509_certificate *cert; in tls_server_cert_chain_der_len() local
29 cert = conn->cred ? conn->cred->cert : NULL; in tls_server_cert_chain_der_len()
30 while (cert) { in tls_server_cert_chain_der_len()
31 len += 3 + cert->cert_len; in tls_server_cert_chain_der_len()
32 if (x509_certificate_self_signed(cert)) in tls_server_cert_chain_der_len()
34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, in tls_server_cert_chain_der_len()
35 &cert->issuer); in tls_server_cert_chain_der_len()
194 struct x509_certificate *cert; in tls_write_server_certificate() local
228 cert in tls_write_server_certificate()
[all...]
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_kiss.c27 * Parse and decrypt a PKCS#12 structure returning user key, user cert and
29 * should point to a valid STACK structure. pkey and/or cert may be NULL;
33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument
41 if (cert != NULL) in PKCS12_parse()
42 *cert = NULL; in PKCS12_parse()
76 if ((cert != NULL || ca != NULL) in PKCS12_parse()
91 /* Split the certs in ocerts over *cert and *ca as far as requested */ in PKCS12_parse()
94 && cert != NULL && *cert == NULL) { in PKCS12_parse()
101 *cert in PKCS12_parse()
[all...]
/third_party/openssl/test/
H A Docspapitest.c28 X509 *cert = NULL; in get_cert_and_key() local
33 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL); in get_cert_and_key()
39 if (!TEST_ptr(cert) || !TEST_ptr(key)) in get_cert_and_key()
41 *cert_out = cert; in get_cert_and_key()
45 X509_free(cert); in get_cert_and_key()
53 X509 *cert = NULL; in get_cert() local
57 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL); in get_cert()
59 if (!TEST_ptr(cert)) in get_cert()
61 *cert_out = cert; in get_cert()
64 X509_free(cert); in get_cert()
[all...]
/third_party/node/test/parallel/
H A Dtest-https-foafssl.js37 cert: fixtures.readKey('rsa_cert.crt'),
48 let cert;
53 cert = req.connection.getPeerCertificate();
55 assert.strictEqual(cert.subjectaltname, webIdUrl);
56 assert.strictEqual(cert.exponent, exponent);
57 assert.strictEqual(cert.modulus, modulus);
67 '-cert', fixtures.path('keys/rsa_cert_foafssl_b.crt'),
H A Dtest-tls-set-sigalgs.js23 checkServerIdentity: (servername, cert) => { },
24 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`,
25 cert: keys.agent2.cert,
30 cert: keys.agent6.cert,
/third_party/node/deps/openssl/openssl/crypto/ct/
H A Dct_policy.c64 X509_free(ctx->cert); in CT_POLICY_EVAL_CTX_free()
70 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) in CT_POLICY_EVAL_CTX_set1_cert() argument
72 if (!X509_up_ref(cert)) in CT_POLICY_EVAL_CTX_set1_cert()
74 ctx->cert = cert; in CT_POLICY_EVAL_CTX_set1_cert()
99 return ctx->cert; in CT_POLICY_EVAL_CTX_get0_cert()
/third_party/openssl/crypto/ct/
H A Dct_policy.c64 X509_free(ctx->cert); in CT_POLICY_EVAL_CTX_free()
70 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) in CT_POLICY_EVAL_CTX_set1_cert() argument
72 if (!X509_up_ref(cert)) in CT_POLICY_EVAL_CTX_set1_cert()
74 ctx->cert = cert; in CT_POLICY_EVAL_CTX_set1_cert()
99 return ctx->cert; in CT_POLICY_EVAL_CTX_get0_cert()
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c566 mbedtls_test_ssl_endpoint_certificate *cert = &(ep->cert); in test_ssl_endpoint_certificate_free() local
567 if (cert != NULL) { in test_ssl_endpoint_certificate_free()
568 if (cert->ca_cert != NULL) { in test_ssl_endpoint_certificate_free()
569 mbedtls_x509_crt_free(cert->ca_cert); in test_ssl_endpoint_certificate_free()
570 mbedtls_free(cert->ca_cert); in test_ssl_endpoint_certificate_free()
571 cert->ca_cert = NULL; in test_ssl_endpoint_certificate_free()
573 if (cert->cert != NULL) { in test_ssl_endpoint_certificate_free()
574 mbedtls_x509_crt_free(cert in test_ssl_endpoint_certificate_free()
598 mbedtls_test_ssl_endpoint_certificate *cert = NULL; mbedtls_test_ssl_endpoint_certificate_init() local
[all...]
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
H A Dtls_test_common.c53 fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", in setup_ca_cert()
390 gnutls_datum_t * cert, in setup_session()
405 cert->size = strlen (srv_self_signed_cert_pem) + 1; in setup_session()
406 cert->data = malloc (cert->size); in setup_session()
407 if (NULL == cert->data) in setup_session()
413 memcpy (cert->data, srv_self_signed_cert_pem, cert->size); in setup_session()
414 gnutls_certificate_set_x509_key_mem (*xcred, cert, key, in setup_session()
435 gnutls_datum_t * cert, in teardown_session()
388 setup_session(gnutls_session_t * session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t * xcred) setup_session() argument
433 teardown_session(gnutls_session_t session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t xcred) teardown_session() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_gnutls.c480 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", in tls_connection_set_params()
488 "Failed to read CA cert '%s' in PEM format: %s", in tls_connection_set_params()
494 "GnuTLS: Successfully read CA cert '%s' in PEM format", in tls_connection_set_params()
498 "GnuTLS: Successfully read CA cert '%s' in DER format", in tls_connection_set_params()
511 "Failed to parse CA cert in DER format: %s", in tls_connection_set_params()
517 "Failed to parse CA cert in PEM format: %s", in tls_connection_set_params()
548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format", in tls_connection_set_params()
562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format", in tls_connection_set_params()
576 "cert/key in PEM format: %s", in tls_connection_set_params()
581 "GnuTLS: Successfully read client cert/ke in tls_connection_set_params()
610 gnutls_datum_t cert, key; tls_connection_set_params() local
928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument
955 server_eku_purpose(gnutls_x509_crt_t cert) server_eku_purpose() argument
1089 tls_match_suffix_helper(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix_helper() argument
1109 tls_match_suffix(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix() argument
1141 gnutls_x509_crt_t cert; tls_connection_verify_peer() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_gnutls.c480 "GnuTLS: Failed to read CA cert '%s' in DER format (%s) - try in PEM format", in tls_connection_set_params()
488 "Failed to read CA cert '%s' in PEM format: %s", in tls_connection_set_params()
494 "GnuTLS: Successfully read CA cert '%s' in PEM format", in tls_connection_set_params()
498 "GnuTLS: Successfully read CA cert '%s' in DER format", in tls_connection_set_params()
511 "Failed to parse CA cert in DER format: %s", in tls_connection_set_params()
517 "Failed to parse CA cert in PEM format: %s", in tls_connection_set_params()
548 "GnuTLS: Try to parse client cert '%s' and key '%s' in DER format", in tls_connection_set_params()
562 "GnuTLS: Failed to read client cert/key in DER format (%s) - try in PEM format", in tls_connection_set_params()
576 "cert/key in PEM format: %s", in tls_connection_set_params()
581 "GnuTLS: Successfully read client cert/ke in tls_connection_set_params()
610 gnutls_datum_t cert, key; tls_connection_set_params() local
928 gnutls_tls_fail_event(struct tls_connection *conn, const gnutls_datum_t *cert, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) gnutls_tls_fail_event() argument
955 server_eku_purpose(gnutls_x509_crt_t cert) server_eku_purpose() argument
1089 tls_match_suffix_helper(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix_helper() argument
1109 tls_match_suffix(gnutls_x509_crt_t cert, const char *match, int full) tls_match_suffix() argument
1141 gnutls_x509_crt_t cert; tls_connection_verify_peer() local
[all...]
H A Dtls_openssl.c375 const CERT_CONTEXT *cert; member
498 if (priv->cert) in cryptoapi_free_data()
499 CertFreeCertificateContext(priv->cert); in cryptoapi_free_data()
526 if (strncmp(name, "cert://", 7) == 0) { in cryptoapi_find_cert()
561 X509 *cert = NULL; in tls_cryptoapi_cert() local
567 (strncmp(name, "cert://", 7) != 0 && in tls_cryptoapi_cert()
581 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); in tls_cryptoapi_cert()
582 if (priv->cert == NULL) { in tls_cryptoapi_cert()
583 priv->cert = cryptoapi_find_cert( in tls_cryptoapi_cert()
586 if (priv->cert in tls_cryptoapi_cert()
664 X509 *cert; tls_cryptoapi_ca_cert() local
1721 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) tls_match_altsubject_component() argument
1746 tls_match_altsubject(X509 *cert, const char *match) tls_match_altsubject() argument
1870 match_dn_field(const X509 *cert, int nid, const char *field, const char *value, const struct tls_dn_field_order_cnt *dn_cnt) match_dn_field() argument
1943 get_value_from_field(const X509 *cert, char *field_str, struct tls_dn_field_order_cnt *dn_cnt) get_value_from_field() argument
2003 tls_match_dn_field(X509 *cert, const char *match) tls_match_dn_field() argument
2036 tls_match_suffix_helper(X509 *cert, const char *match, size_t match_len, int full) tls_match_suffix_helper() argument
2107 tls_match_suffix(X509 *cert, const char *match, int full) tls_match_suffix() argument
2164 get_x509_cert(X509 *cert) get_x509_cert() argument
2189 struct wpabuf *cert = NULL; openssl_tls_fail_event() local
2208 openssl_cert_tod(X509 *cert) openssl_cert_tod() argument
2243 struct wpabuf *cert = NULL; openssl_tls_cert_event() local
2340 debug_print_cert(X509 *cert, const char *title) debug_print_cert() argument
2440 struct wpabuf *cert; tls_verify_cb() local
2483 X509 *cert; tls_verify_cb() local
2726 X509 *cert = d2i_X509(NULL, tls_connection_ca_cert() local
3494 X509 *cert; tls_parse_pkcs12() local
3675 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) tls_engine_get_cert() argument
3682 X509 *cert; tls_engine_get_cert() member
3713 X509 *cert; tls_connection_engine_client_cert() local
3740 X509 *cert; tls_connection_engine_ca_cert() local
4976 X509 *cert; ocsp_resp_cb() local
5473 openssl_debug_dump_certificate(int i, X509 *cert) openssl_debug_dump_certificate() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Dhttp_curl.c56 int (*cert_cb)(void *ctx, struct http_cert *cert);
179 static void debug_dump_cert(const char *title, X509 *cert) in debug_dump_cert() argument
189 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); in debug_dump_cert()
204 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_othername() argument
212 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername()
216 cert->othername = on; in add_alt_name_othername()
217 on = &on[cert->num_othername]; in add_alt_name_othername()
232 cert->num_othername++; in add_alt_name_othername()
236 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_dns() argument
257 add_alt_name(struct http_ctx *ctx, struct http_cert *cert, const GENERAL_NAME *name) add_alt_name() argument
271 add_alt_names(struct http_ctx *ctx, struct http_cert *cert, GENERAL_NAMES *names) add_alt_names() argument
799 add_logotype_ext(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert) add_logotype_ext() argument
870 parse_cert(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert, GENERAL_NAMES **names) parse_cert() argument
906 validate_server_cert(struct http_ctx *ctx, X509 *cert) validate_server_cert() argument
935 X509 *cert; http_parse_x509_certificate() local
996 X509 *cert; curl_cb_ssl_verify() local
1168 X509 *cert; ocsp_resp_cb() local
1746 http_set_cert_cb(struct http_ctx *ctx, int (*cb)(void *ctx, struct http_cert *cert), void *cb_ctx) http_set_cert_cb() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Dhttp_curl.c56 int (*cert_cb)(void *ctx, struct http_cert *cert);
179 static void debug_dump_cert(const char *title, X509 *cert) in debug_dump_cert() argument
189 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); in debug_dump_cert()
204 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_othername() argument
212 on = os_realloc_array(cert->othername, cert->num_othername + 1, in add_alt_name_othername()
216 cert->othername = on; in add_alt_name_othername()
217 on = &on[cert->num_othername]; in add_alt_name_othername()
232 cert->num_othername++; in add_alt_name_othername()
236 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, in add_alt_name_dns() argument
257 add_alt_name(struct http_ctx *ctx, struct http_cert *cert, const GENERAL_NAME *name) add_alt_name() argument
271 add_alt_names(struct http_ctx *ctx, struct http_cert *cert, GENERAL_NAMES *names) add_alt_names() argument
799 add_logotype_ext(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert) add_logotype_ext() argument
870 parse_cert(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert, GENERAL_NAMES **names) parse_cert() argument
906 validate_server_cert(struct http_ctx *ctx, X509 *cert) validate_server_cert() argument
935 X509 *cert; http_parse_x509_certificate() local
996 X509 *cert; curl_cb_ssl_verify() local
1168 X509 *cert; ocsp_resp_cb() local
1746 http_set_cert_cb(struct http_ctx *ctx, int (*cb)(void *ctx, struct http_cert *cert), void *cb_ctx) http_set_cert_cb() argument
[all...]
/third_party/openssl/test/helpers/
H A Dcmp_testlib.c59 * Up refs and push a cert onto sk.
63 int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert) in STACK_OF()
67 if (sk == NULL || cert == NULL) in STACK_OF()
69 if (!X509_up_ref(cert)) in STACK_OF()
71 res = sk_X509_push(sk, cert); in STACK_OF()
73 X509_free(cert); /* down-ref */ in STACK_OF()
/third_party/node/deps/openssl/openssl/crypto/store/
H A Dstore_result.c463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert()
464 * to reading it as a normal cert (just X509), but if in try_cert()
466 * trusted cert, then no fallback should be engaged. in try_cert()
471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local
473 if (cert == NULL) in try_cert()
481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert()
484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert()
486 X509_free(cert); in try_cert()
487 cert = NULL; in try_cert()
490 if (cert ! in try_cert()
549 X509 *cert = NULL; try_pkcs12() local
[all...]
/third_party/openssl/crypto/store/
H A Dstore_result.c463 * data as a trusted cert (X509 + X509_AUX) and fall back in try_cert()
464 * to reading it as a normal cert (just X509), but if in try_cert()
466 * trusted cert, then no fallback should be engaged. in try_cert()
471 X509 *cert = X509_new_ex(libctx, propq); in try_cert() local
473 if (cert == NULL) in try_cert()
481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data, in try_cert()
484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data, in try_cert()
486 X509_free(cert); in try_cert()
487 cert = NULL; in try_cert()
490 if (cert ! in try_cert()
549 X509 *cert = NULL; try_pkcs12() local
[all...]

Completed in 20 milliseconds

12345678910>>...42