| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | ocsp.c | 59 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, 157 {"rcid", OPT_RCID, 's', "Use specified algorithm for cert id in response"}, 199 {"cert", OPT_CERT, '<', "Certificate to check"}, 230 X509 *issuer = NULL, *cert = NULL; in ocsp_main() local 439 X509_free(cert); in ocsp_main() 440 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main() 441 if (cert == NULL) in ocsp_main() 445 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) in ocsp_main() 517 "%s: Digest must be before -cert or -serial\n", in ocsp_main() 543 BIO_printf(bio_err, "%s: Digest must be before -cert o in ocsp_main() 903 add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, STACK_OF(OCSP_CERTID) *ids) add_ocsp_cert() argument [all...] |
| /third_party/openssl/apps/ |
| H A D | ocsp.c | 59 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, 157 {"rcid", OPT_RCID, 's', "Use specified algorithm for cert id in response"}, 199 {"cert", OPT_CERT, '<', "Certificate to check"}, 230 X509 *issuer = NULL, *cert = NULL; in ocsp_main() local 439 X509_free(cert); in ocsp_main() 440 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main() 441 if (cert == NULL) in ocsp_main() 445 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) in ocsp_main() 517 "%s: Digest must be before -cert or -serial\n", in ocsp_main() 543 BIO_printf(bio_err, "%s: Digest must be before -cert o in ocsp_main() 903 add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, STACK_OF(OCSP_CERTID) *ids) add_ocsp_cert() argument [all...] |
| /base/startup/init/interfaces/innerkits/fs_manager/libfs_hvb/include/ |
| H A D | fs_hvb.h | 61 int FsHvbConstructVerityTarget(DmVerityTarget *target, const char *devName, struct hvb_cert *cert);
|
| /third_party/node/test/parallel/ |
| H A D | test-http2-connect-tls-with-delay.js | 13 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http2-socket-proxy-handler-for-has.js | 13 cert: fixtures.readKey('agent1-cert.pem') 26 ca: fixtures.readKey('agent1-cert.pem'),
|
| H A D | test-https-agent-disable-session-reuse.js | 16 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-agent.js | 34 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-client-get-url.js | 37 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-client-override-global-agent.js | 14 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-eof-for-eom.js | 42 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-close.js | 11 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-localaddress-bind-error.js | 34 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-localaddress.js | 37 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-tls-client-destroy-soon.js | 37 cert: fixtures.readKey('agent2-cert.pem')
|
| H A D | test-tls-cnnic-whitelist.js | 18 // agent6-cert.pem is signed by intermediate cert of ca3. 19 // The server has a cert chain of agent6->ca3->ca1(root) but 27 cert: loadPEM('agent6-cert')
|
| H A D | test-tls-connect-address-family.js | 16 cert: fixtures.readKey('agent1-cert.pem'),
|
| H A D | test-tls-close-event-after-write.js | 28 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-tls-delayed-attach.js | 43 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-tls-ecdh-auto.js | 24 cert: loadPEM('agent2-cert'),
|
| H A D | test-tls-ecdh.js | 39 cert: fixtures.readKey('agent2-cert.pem'),
|
| H A D | test-tls-fast-writing.js | 32 cert: fixtures.readKey('rsa_cert.crt'),
|
| H A D | test-tls-env-extra-ca.js | 28 cert: fixtures.readKey('agent1-cert.pem'), 39 NODE_EXTRA_CA_CERTS: fixtures.path('keys', 'ca1-cert.pem')
|
| H A D | test-tls-hello-parser-failure.js | 40 cert: fixtures.readKey('rsa_cert.crt')
|
| /third_party/node/test/pummel/ |
| H A D | test-tls-server-large-request.js | 36 cert: fixtures.readKey('agent1-cert.pem'),
|
| /foundation/communication/netstack/test/unittest/tls_test/server/ |
| H A D | tls_socket_server_branch_test.cpp | 415 tlsSocketServer->GetCertificate([&callbackCalled](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in HWTEST_F() 429 sockFd, [&callbackCalled](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in HWTEST_F() 447 sockFd, [&callbackCalled, testLen](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in HWTEST_F() 449 EXPECT_EQ(cert.data.Length(), testLen); in HWTEST_F() 466 sockFd, [&callbackCalled, testLen](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in HWTEST_F() 468 EXPECT_EQ(cert.data.Length(), testLen); in HWTEST_F() 610 EXPECT_EQ(std::get<1>(result), "IP: 192.168.1.3 is not in the cert's list"); in HWTEST_F()
|