| /foundation/communication/netstack/test/fuzztest/netsslinner_fuzzer/ |
| H A D | netssl_inner_fuzzer.cpp | 162 X509 *cert = PemToX509(certBlob.data, certBlob.size); in SetFreeResourcesTest() local 165 FreeResources(&cert, &cert, &store, &ctx); in SetFreeResourcesTest()
|
| /third_party/node/deps/openssl/openssl/include/crypto/ |
| H A D | x509.h | 211 * This is a used when verifying cert chains. Since the gathering of the 212 * cert chain can take some time (and have to be 'retried', this needs to be 218 /* The cert to check */ 219 X509 *cert; member 232 /* get issuers cert from ctx */ 267 /* cert currently being tested as valid issuer */ 313 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags); 325 int ossl_x509_add_cert_new(STACK_OF(X509) **sk, X509 *cert, int flags); variable
|
| /third_party/node/deps/openssl/openssl/crypto/ocsp/ |
| H A D | ocsp_cl.c | 64 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) in OCSP_request_add1_cert() argument 69 if (cert == NULL) in OCSP_request_add1_cert() 71 return ossl_x509_add_cert_new(&req->optionalSignature->certs, cert, in OCSP_request_add1_cert()
|
| /third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
| H A D | pk7_asn1.c | 130 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 186 X509_free(ri->cert); 213 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
| /third_party/openssl/test/ |
| H A D | tls13ccstest.c | 16 static char *cert = NULL; variable 259 &sctx, &cctx, cert, privkey)) in test_tls13ccs() 500 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| H A D | asynciotest.c | 24 static char *cert = NULL; variable 302 &serverctx, &clientctx, cert, privkey))) in test_asyncio() 406 if (!TEST_ptr(cert = test_get_argument(0)) in setup_tests()
|
| H A D | danetest.c | 98 char *errtype = 0; /* if error: cert or pkey? */ in STACK_OF() 114 X509 *cert; in STACK_OF() local 117 if (!TEST_ptr(cert = d(0, &p, len)) in STACK_OF() 123 if (!TEST_true(sk_X509_push(chain, cert))) in STACK_OF()
|
| /third_party/openssl/crypto/ocsp/ |
| H A D | ocsp_cl.c | 64 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) in OCSP_request_add1_cert() argument 69 if (cert == NULL) in OCSP_request_add1_cert() 71 return ossl_x509_add_cert_new(&req->optionalSignature->certs, cert, in OCSP_request_add1_cert()
|
| /third_party/openssl/crypto/pkcs7/ |
| H A D | pk7_asn1.c | 130 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 186 X509_free(ri->cert); 213 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
| /third_party/openssl/include/crypto/ |
| H A D | x509.h | 211 * This is a used when verifying cert chains. Since the gathering of the 212 * cert chain can take some time (and have to be 'retried', this needs to be 218 /* The cert to check */ 219 X509 *cert; member 232 /* get issuers cert from ctx */ 267 /* cert currently being tested as valid issuer */ 313 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags); 325 int ossl_x509_add_cert_new(STACK_OF(X509) **sk, X509 *cert, int flags); variable
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | pkcs12.h | 196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 199 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 202 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
| /base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
| H A D | dcm_attest.c | 516 static int32_t IsValidAttestCert(struct HksAttestCert *cert)
in IsValidAttestCert() argument 518 if (IsValidAttestTbs(&cert->tbs)) {
in IsValidAttestCert() 522 if (IsValidTlv(cert->signAlg)) {
in IsValidAttestCert() 526 if (IsValidTlv(cert->signature)) {
in IsValidAttestCert() 530 if ((cert->signAlg.value.size != cert->tbs.signature.value.size) ||
in IsValidAttestCert() 531 (HksMemCmp(cert->signAlg.value.data, cert->tbs.signature.value.data, cert->signAlg.value.size) != 0)) {
in IsValidAttestCert() 557 static void ParseAttestCert(const struct HksBlob *devCert, struct HksAttestCert *cert)
in ParseAttestCert() argument 1419 struct HksBlob cert = { 0, NULL }; FormatCertToBuf() local [all...] |
| /base/request/request/services/include/ |
| H A D | request_cert_mgr_adapter.h | 47 void FreeCertData(struct CRequestCert *cert);
|
| /base/security/certificate_framework/frameworks/adapter/v1.0/inc/ |
| H A D | x509_cert_chain_openssl_ex.h | 40 X509 *GetX509FromHcfX509Certificate(const HcfCertificate *cert);
|
| /base/security/code_signature/interfaces/innerkits/local_code_sign/include/ |
| H A D | local_code_sign_proxy.h | 31 int32_t InitLocalCertificate(const ByteBuffer &challenge, ByteBuffer &cert) override;
|
| /base/security/code_signature/services/local_code_sign/include/ |
| H A D | local_code_sign_service.h | 36 int32_t InitLocalCertificate(const ByteBuffer &challenge, ByteBuffer &cert) override;
|
| /base/security/code_signature/utils/include/ |
| H A D | cert_utils.h | 35 bool GetSigningCertFromCerChain(const HksCertChain *certChain, ByteBuffer cert);
|
| H A D | openssl_utils.h | 43 bool ConvertCertToPEMString(const ByteBuffer &cert, std::string &pemString);
|
| H A D | pkcs7_data.h | 31 PKCS7Data(const EVP_MD *md, X509 *cert);
|
| /foundation/communication/dsoftbus/core/authentication/include/ |
| H A D | auth_attest_interface.h | 45 SoftbusBlob cert[SOFTBUS_CERTS_COUNT]; member
|
| /third_party/curl/lib/vtls/ |
| H A D | x509asn1.h | 73 int Curl_parseX509(struct Curl_X509certificate *cert,
|
| /third_party/libwebsockets/lib/tls/mbedtls/ |
| H A D | private-lib-tls-mbedtls.h | 31 mbedtls_x509_crt cert; /* has a .next for linked-list / chain */ member
|
| /third_party/node/test/parallel/ |
| H A D | test-crypto-verify-failure.js | 36 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http-request-agent.js | 17 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http-url.parse-https.request.js | 35 cert: readKey('agent1-cert.pem')
|