Home
last modified time | relevance | path

Searched refs:cert (Results 726 - 750 of 1179) sorted by relevance

1...<<21222324252627282930>>...48

/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/test/unittest/src/
H A Ddlp_permission_kit_test.cpp306 std::vector<uint8_t> cert; in TestGenerateDlpCertWithInvalidParam() local
307 int32_t res = DlpPermissionKit::GenerateDlpCertificate(encPolicy, cert); in TestGenerateDlpCertWithInvalidParam()
429 std::vector<uint8_t> cert; in HWTEST_F() local
430 cert = { 1, 2, 3 }; in HWTEST_F()
431 generateDlpCertificateCallback->OnGenerateDlpCertificate(-1, cert); in HWTEST_F()
519 certParcel->cert = {1, 2, 3}; in HWTEST_F()
1215 std::vector<uint8_t> cert; in HWTEST_F() local
1217 generateDlpCertificateCallback->OnGenerateDlpCertificate(0, cert); in HWTEST_F()
/third_party/node/deps/openssl/openssl/crypto/pkcs7/
H A Dpk7_doit.c118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo()
965 STACK_OF(X509) *cert; in PKCS7_dataVerify()
979 cert = p7->d.sign->cert; in PKCS7_dataVerify()
981 cert = p7->d.signed_and_enveloped->cert; in PKCS7_dataVerify()
989 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); in PKCS7_dataVerify()
991 /* were we able to find the cert in passed to us */ in PKCS7_dataVerify()
998 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { in PKCS7_dataVerify()
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_sd.c178 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, in ossl_cms_set1_SignerIdentifier() argument
183 if (!ossl_cms_set1_ias(&sid->d.issuerAndSerialNumber, cert)) in ossl_cms_set1_SignerIdentifier()
188 if (!ossl_cms_set1_keyid(&sid->d.subjectKeyIdentifier, cert)) in ossl_cms_set1_SignerIdentifier()
220 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) in ossl_cms_SignerIdentifier_cert_cmp() argument
223 return ossl_cms_ias_cert_cmp(sid->d.issuerAndSerialNumber, cert); in ossl_cms_SignerIdentifier_cert_cmp()
225 return ossl_cms_keyid_cert_cmp(sid->d.subjectKeyIdentifier, cert); in ossl_cms_SignerIdentifier_cert_cmp()
464 /* NB ignore -1 return for duplicate cert */ in CMS_add1_signer()
607 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) in CMS_SignerInfo_cert_cmp() argument
609 return ossl_cms_SignerIdentifier_cert_cmp(si->sid, cert); in CMS_SignerInfo_cert_cmp()
/third_party/node/deps/openssl/openssl/apps/
H A Dx509.c31 #define DEFAULT_DAYS 30 /* default cert validity period in days */
38 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
65 {"passin", OPT_PASSIN, 's', "Private key and cert file pass-phrase source"},
85 "No cert output (except for requested printing)"},
125 "Check whether cert expires in the next arg seconds"},
156 {"CAform", OPT_CAFORM, 'F', "CA cert format (PEM/DER/P12); has no effect"},
193 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument
195 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req()
200 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req()
238 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument
1160 purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) purpose_print() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_sd.c178 int ossl_cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, in ossl_cms_set1_SignerIdentifier() argument
183 if (!ossl_cms_set1_ias(&sid->d.issuerAndSerialNumber, cert)) in ossl_cms_set1_SignerIdentifier()
188 if (!ossl_cms_set1_keyid(&sid->d.subjectKeyIdentifier, cert)) in ossl_cms_set1_SignerIdentifier()
220 int ossl_cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) in ossl_cms_SignerIdentifier_cert_cmp() argument
223 return ossl_cms_ias_cert_cmp(sid->d.issuerAndSerialNumber, cert); in ossl_cms_SignerIdentifier_cert_cmp()
225 return ossl_cms_keyid_cert_cmp(sid->d.subjectKeyIdentifier, cert); in ossl_cms_SignerIdentifier_cert_cmp()
456 /* NB ignore -1 return for duplicate cert */ in CMS_add1_signer()
603 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) in CMS_SignerInfo_cert_cmp() argument
605 return ossl_cms_SignerIdentifier_cert_cmp(si->sid, cert); in CMS_SignerInfo_cert_cmp()
/third_party/openssl/apps/
H A Dx509.c31 #define DEFAULT_DAYS 30 /* default cert validity period in days */
38 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
65 {"passin", OPT_PASSIN, 's', "Private key and cert file pass-phrase source"},
85 "No cert output (except for requested printing)"},
125 "Check whether cert expires in the next arg seconds"},
156 {"CAform", OPT_CAFORM, 'F', "CA cert format (PEM/DER/P12); has no effect"},
193 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument
195 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req()
200 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req()
238 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument
1160 purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) purpose_print() argument
[all...]
/third_party/openssl/crypto/pkcs7/
H A Dpk7_doit.c118 pkey = X509_get0_pubkey(ri->cert); in pkcs7_encode_rinfo()
965 STACK_OF(X509) *cert; in PKCS7_dataVerify()
979 cert = p7->d.sign->cert; in PKCS7_dataVerify()
981 cert = p7->d.signed_and_enveloped->cert; in PKCS7_dataVerify()
989 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); in PKCS7_dataVerify()
991 /* were we able to find the cert in passed to us */ in PKCS7_dataVerify()
998 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { in PKCS7_dataVerify()
/base/security/certificate_framework/test/unittest/v1.0/include/
H A Dcf_mock.h104 MOCK_METHOD(int, PKCS12_parse, (PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca));
105 MOCK_METHOD(bool, CheckIsSelfSigned, (const X509 *cert));
/third_party/nghttp2/src/
H A Dshrpx_tls.h125 // Verify |cert| using numeric IP address. |hostname| and |addr|
128 int verify_numeric_hostname(X509 *cert, const StringRef &hostname,
131 // Verify |cert| using DNS name hostname. This function returns 0 if
133 int verify_dns_hostname(X509 *cert, const StringRef &hostname);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls.h54 const struct wpabuf *cert; member
69 const struct wpabuf *cert; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls.h54 const struct wpabuf *cert; member
69 const struct wpabuf *cert; member
/base/security/appverify/interfaces/innerkits/appverify/include/init/
H A Dhap_crl_manager.h37 DLL_EXPORT bool CrlCheck(X509* cert, X509_CRL* targetCrl, Pkcs7Context& pkcs7Context);
/base/security/code_signature/interfaces/innerkits/local_code_sign/include/
H A Dlocal_code_sign_client.h39 int32_t InitLocalCertificate(ByteBuffer &cert);
/third_party/node/test/parallel/
H A Dtest-http-default-port.js35 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-http2-client-connection-tunnelling.js19 cert: fixtures.readKey('agent1-cert.pem'),
H A Dtest-https-agent-session-eviction.js15 cert: readKey('agent1-cert.pem'),
H A Dtest-https-agent-sockets-leak.js13 cert: fixtures.readKey('agent1-cert.pem'),
14 ca: fixtures.readKey('ca1-cert.pem')
H A Dtest-https-agent-sni.js12 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-https-client-resume.js37 cert: fixtures.readKey('agent2-cert.pem')
H A Dtest-https-resume-after-renew.js12 cert: fixtures.readKey('agent1-cert.pem'),
13 ca: fixtures.readKey('ca1-cert.pem')
H A Dtest-https-keep-alive-drop-requests.js22 cert: readKey('agent1-cert.pem')
H A Dtest-https-server-close-all.js16 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-https-simple.js37 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-https-socket-options.js34 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-tls-async-cb-after-socket-end.js19 cert: fixtures.readKey('rsa_cert.crt')

Completed in 18 milliseconds

1...<<21222324252627282930>>...48