| /third_party/node/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux64-mips64/asm/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/solaris-x86-gcc/asm/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
| H A D | cmp.h | 88 * -- invalid cert. template or missing mandatory information 432 int OSSL_CMP_CTX_set1_srvCert(OSSL_CMP_CTX *ctx, X509 *cert); 439 int OSSL_CMP_CTX_set1_cert(OSSL_CMP_CTX *ctx, X509 *cert); 463 int OSSL_CMP_CTX_set1_oldCert(OSSL_CMP_CTX *ctx, X509 *cert); 468 typedef int (*OSSL_CMP_certConf_cb_t) (OSSL_CMP_CTX *ctx, X509 *cert, 470 int OSSL_CMP_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, 517 X509_STORE *trusted_store, X509 *cert);
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 527 cert = x509_certificate_parse(pos, cert_len); in tls_process_certificate() 528 if (cert == NULL) { in tls_process_certificate() 537 chain = cert; in tls_process_certificate() 539 last->next = cert; in tls_process_certificate() 540 last = cert; in tls_process_certificate()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 527 cert = x509_certificate_parse(pos, cert_len); in tls_process_certificate() 528 if (cert == NULL) { in tls_process_certificate() 537 chain = cert; in tls_process_certificate() 539 last->next = cert; in tls_process_certificate() 540 last = cert; in tls_process_certificate()
|
| /third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
| H A D | pk7_doit.c | 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 965 STACK_OF(X509) *cert; in PKCS7_dataVerify() 979 cert = p7->d.sign->cert; in PKCS7_dataVerify() 981 cert = p7->d.signed_and_enveloped->cert; in PKCS7_dataVerify() 989 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); in PKCS7_dataVerify() 991 /* were we able to find the cert in passed to us */ in PKCS7_dataVerify() 998 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { in PKCS7_dataVerify()
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_sd.c | 178 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, in ossl_cms_set1_SignerIdentifier() argument 183 if (!ossl_cms_set1_ias(&sid->d.issuerAndSerialNumber, cert)) in ossl_cms_set1_SignerIdentifier() 188 if (!ossl_cms_set1_keyid(&sid->d.subjectKeyIdentifier, cert)) in ossl_cms_set1_SignerIdentifier() 220 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) in ossl_cms_SignerIdentifier_cert_cmp() argument 223 return ossl_cms_ias_cert_cmp(sid->d.issuerAndSerialNumber, cert); in ossl_cms_SignerIdentifier_cert_cmp() 225 return ossl_cms_keyid_cert_cmp(sid->d.subjectKeyIdentifier, cert); in ossl_cms_SignerIdentifier_cert_cmp() 464 /* NB ignore -1 return for duplicate cert */ in CMS_add1_signer() 607 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) in CMS_SignerInfo_cert_cmp() argument 609 return ossl_cms_SignerIdentifier_cert_cmp(si->sid, cert); in CMS_SignerInfo_cert_cmp()
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | x509.c | 31 #define DEFAULT_DAYS 30 /* default cert validity period in days */ 38 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 65 {"passin", OPT_PASSIN, 's', "Private key and cert file pass-phrase source"}, 85 "No cert output (except for requested printing)"}, 125 "Check whether cert expires in the next arg seconds"}, 156 {"CAform", OPT_CAFORM, 'F', "CA cert format (PEM/DER/P12); has no effect"}, 193 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument 195 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req() 200 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req() 238 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument 1160 purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) purpose_print() argument [all...] |
| /third_party/openssl/crypto/cms/ |
| H A D | cms_sd.c | 178 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, in ossl_cms_set1_SignerIdentifier() argument 183 if (!ossl_cms_set1_ias(&sid->d.issuerAndSerialNumber, cert)) in ossl_cms_set1_SignerIdentifier() 188 if (!ossl_cms_set1_keyid(&sid->d.subjectKeyIdentifier, cert)) in ossl_cms_set1_SignerIdentifier() 220 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) in ossl_cms_SignerIdentifier_cert_cmp() argument 223 return ossl_cms_ias_cert_cmp(sid->d.issuerAndSerialNumber, cert); in ossl_cms_SignerIdentifier_cert_cmp() 225 return ossl_cms_keyid_cert_cmp(sid->d.subjectKeyIdentifier, cert); in ossl_cms_SignerIdentifier_cert_cmp() 456 /* NB ignore -1 return for duplicate cert */ in CMS_add1_signer() 603 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) in CMS_SignerInfo_cert_cmp() argument 605 return ossl_cms_SignerIdentifier_cert_cmp(si->sid, cert); in CMS_SignerInfo_cert_cmp()
|
| /third_party/openssl/apps/ |
| H A D | x509.c | 31 #define DEFAULT_DAYS 30 /* default cert validity period in days */ 38 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 65 {"passin", OPT_PASSIN, 's', "Private key and cert file pass-phrase source"}, 85 "No cert output (except for requested printing)"}, 125 "Check whether cert expires in the next arg seconds"}, 156 {"CAform", OPT_CAFORM, 'F', "CA cert format (PEM/DER/P12); has no effect"}, 193 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument 195 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req() 200 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req() 238 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument 1160 purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) purpose_print() argument [all...] |
| /third_party/openssl/crypto/pkcs7/ |
| H A D | pk7_doit.c | 118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo() 965 STACK_OF(X509) *cert; in PKCS7_dataVerify() 979 cert = p7->d.sign->cert; in PKCS7_dataVerify() 981 cert = p7->d.signed_and_enveloped->cert; in PKCS7_dataVerify() 989 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); in PKCS7_dataVerify() 991 /* were we able to find the cert in passed to us */ in PKCS7_dataVerify() 998 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { in PKCS7_dataVerify()
|
| /third_party/curl/lib/vtls/ |
| H A D | x509asn1.h | 73 int Curl_parseX509(struct Curl_X509certificate *cert,
|
| /third_party/libwebsockets/lib/tls/mbedtls/ |
| H A D | private-lib-tls-mbedtls.h | 31 mbedtls_x509_crt cert; /* has a .next for linked-list / chain */ member
|
| /third_party/node/test/parallel/ |
| H A D | test-crypto-verify-failure.js | 36 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http-request-agent.js | 17 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http-url.parse-https.request.js | 35 cert: readKey('agent1-cert.pem')
|
| H A D | test-https-agent-getname.js | 30 cert: 'cert', 51 '0.0.0.0:443:192.168.1.1:ca:cert:dynamic:ciphers:key:pfx:false:localhost:' +
|
| H A D | test-https-agent-servername.js | 13 cert: fixtures.readKey('agent1-cert.pem'), 14 ca: fixtures.readKey('ca1-cert.pem')
|
| H A D | test-https-byteswritten.js | 33 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-request-arguments.js | 12 cert: fixtures.readKey('agent1-cert.pem'), 13 ca: fixtures.readKey('ca1-cert.pem')
|
| H A D | test-https-server-close-destroy-timeout.js | 15 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-timeout-server.js | 37 cert: fixtures.readKey('agent1-cert.pem'),
|