/base/security/certificate_manager/frameworks/cert_manager_standard/main/common/src/ |
H A D | cm_pfx.c | 28 static int32_t CmGetAppCertChain(X509 *cert, STACK_OF(X509) *caCert, struct AppCert *appCert) in CmGetAppCertChain() argument 33 if (cert == NULL) { in CmGetAppCertChain() 34 CM_LOG_E("app terminal cert is null"); in CmGetAppCertChain() 45 /* copy app terminal cert to bio */ in CmGetAppCertChain() 46 if (PEM_write_bio_X509(out, cert) == 0) { in CmGetAppCertChain() 47 CM_LOG_E("Copy app cert to bio faild"); in CmGetAppCertChain() 52 /* copy app ca cert to bio */ in CmGetAppCertChain() 56 CM_LOG_E("Copy app ca cert to bio faild"); in CmGetAppCertChain() 89 X509 *cert = NULL; in CmParsePkcs12Cert() local 113 if (PKCS12_parse(p12, passWd, pkey, &cert, in CmParsePkcs12Cert() [all...] |
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/test/unittest/src/ |
H A D | dlp_permission_async_stub_test.cpp | 57 std::vector<uint8_t> cert; in HWTEST_F() local 59 callback->OnGenerateDlpCertificate(result, cert); in HWTEST_F() 78 std::vector<uint8_t> cert; in HWTEST_F() local 80 callback->OnGenerateDlpCertificate(result, cert); in HWTEST_F() 99 std::vector<uint8_t> cert; in HWTEST_F() local 101 callback->OnParseDlpCertificate(result, policy, cert); in HWTEST_F() 121 std::vector<uint8_t> cert; in HWTEST_F() local 123 callback->OnParseDlpCertificate(result, policy, cert); in HWTEST_F()
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
H A D | ssl_pkey.c | 131 if (ctx->cert->pkey == pkey) in SSL_CTX_use_PrivateKey() 134 if (ctx->cert->pkey) in SSL_CTX_use_PrivateKey() 135 EVP_PKEY_free(ctx->cert->pkey); in SSL_CTX_use_PrivateKey() 137 ctx->cert->pkey = pkey; in SSL_CTX_use_PrivateKey() 150 if (ssl->cert->pkey == pkey) in SSL_use_PrivateKey() 153 if (ssl->cert->pkey) in SSL_use_PrivateKey() 154 EVP_PKEY_free(ssl->cert->pkey); in SSL_use_PrivateKey() 156 ssl->cert->pkey = pkey; in SSL_use_PrivateKey()
|
/third_party/node/test/parallel/ |
H A D | test-tls-sni-option.js | 37 cert: loadPEM('agent2-cert'), 60 cert: loadPEM('agent1-cert'), 61 ca: [ loadPEM('ca2-cert') ] 65 cert: loadPEM('agent3-cert') 75 cert: loadPEM('agent1-cert'), 76 ca: [loadPEM('ca1-cert')], [all...] |
H A D | test-https-foafssl.js | 37 cert: fixtures.readKey('rsa_cert.crt'), 48 let cert; 53 cert = req.connection.getPeerCertificate(); 55 assert.strictEqual(cert.subjectaltname, webIdUrl); 56 assert.strictEqual(cert.exponent, exponent); 57 assert.strictEqual(cert.modulus, modulus); 67 '-cert', fixtures.path('keys/rsa_cert_foafssl_b.crt'),
|
H A D | test-tls-set-sigalgs.js | 23 checkServerIdentity: (servername, cert) => { }, 24 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 25 cert: keys.agent2.cert, 30 cert: keys.agent6.cert,
|
/base/security/code_signature/test/unittest/ |
H A D | cert_chain_verifier_test.cpp | 208 ByteBuffer cert, challenge, certBuffer; in HWTEST_F() local 209 EXPECT_EQ(GetVerifiedCert(cert, challenge, certBuffer), false); in HWTEST_F() 214 * @tc.desc: Get chain from empty cert chain 220 ByteBuffer cert, challenge, certBuffer; in HWTEST_F() local 222 cert.CopyFrom(reinterpret_cast<uint8_t *>(&count), sizeof(count)); in HWTEST_F() 223 EXPECT_EQ(GetVerifiedCert(cert, challenge, certBuffer), false); in HWTEST_F() 235 ByteBuffer cert, challenge, certBuffer; in HWTEST_F() local 237 cert.CopyFrom(reinterpret_cast<uint8_t *>(tmpBuffer.data()), tmpBuffer.size() * sizeof(uint32_t)); in HWTEST_F() 238 EXPECT_EQ(GetVerifiedCert(cert, challenge, certBuffer), false); in HWTEST_F() 240 // one cert i in HWTEST_F() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_cred.c | 35 x509_certificate_chain_free(cred->cert); in tlsv1_cred_free() 48 struct x509_certificate *cert, *p; in tlsv1_add_cert_der() local 51 cert = x509_certificate_parse(buf, len); in tlsv1_add_cert_der() 52 if (cert == NULL) { in tlsv1_add_cert_der() 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der() 66 p->next = cert; in tlsv1_add_cert_der() 69 cert->next = *chain; in tlsv1_add_cert_der() 70 *chain = cert; in tlsv1_add_cert_der() 73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der() 158 const char *cert, cons in tlsv1_set_cert_chain() 157 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert_chain() argument 194 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) tlsv1_set_ca_cert() argument 258 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert() argument 498 struct x509_certificate *cert; pkcs12_certbag() local [all...] |
H A D | tlsv1_client_ocsp.c | 111 struct x509_certificate *cert, in tls_process_ocsp_single_response() 224 if (serial_number_len != cert->serial_number_len || in tls_process_ocsp_single_response() 225 os_memcmp(serial_number, cert->serial_number, in tls_process_ocsp_single_response() 312 struct x509_certificate *cert, in tls_process_ocsp_responses() 330 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses() 436 struct x509_certificate *cert; in tls_process_basic_ocsp_response() local 445 cert = x509_certificate_parse(hdr.payload, hdr.length); in tls_process_basic_ocsp_response() 446 if (!cert) in tls_process_basic_ocsp_response() 449 last_cert->next = cert; in tls_process_basic_ocsp_response() 450 last_cert = cert; in tls_process_basic_ocsp_response() 110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument 311 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument 656 struct x509_certificate *cert; tls_process_ocsp_response() local [all...] |
/base/security/certificate_framework/frameworks/adapter/v1.0/inc/ |
H A D | certificate_openssl_common.h | 47 CfResult CompareNameObject(const X509 *cert, const CfBlob *derBlob, X509NameType type, bool *compareRes);
54 bool CheckIsSelfSigned(const X509 *cert);
55 bool CheckIsLeafCert(X509 *cert);
57 CfResult CheckSelfPubkey(X509 *cert, const EVP_PKEY *pubKey);
60 CfResult GetSubjectNameFromX509(X509 *cert, CfBlob **sub);
61 CfResult GetNameConstraintsFromX509(X509 *cert, CfBlob **name);
|
/base/security/code_signature/utils/src/ |
H A D | pkcs7_generator.cpp | 32 X509 *cert = nullptr;
in GenerateSignature() local 39 cert = LoadCertFromBuffer(certBuffer->GetBuffer(), certBuffer->GetSize());
in GenerateSignature() 40 if (cert == nullptr) {
in GenerateSignature() 48 PKCS7Data pkcs7(md, cert);
in GenerateSignature() 53 if (!signerInfo.InitSignerInfo(ownerID, cert, md, contentData)) {
in GenerateSignature() 69 X509_free(cert);
in GenerateSignature()
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_policy.c | 64 X509_free(ctx->cert); in CT_POLICY_EVAL_CTX_free() 70 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) in CT_POLICY_EVAL_CTX_set1_cert() argument 72 if (!X509_up_ref(cert)) in CT_POLICY_EVAL_CTX_set1_cert() 74 ctx->cert = cert; in CT_POLICY_EVAL_CTX_set1_cert() 99 return ctx->cert; in CT_POLICY_EVAL_CTX_get0_cert()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_policy.c | 64 X509_free(ctx->cert); in CT_POLICY_EVAL_CTX_free() 70 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) in CT_POLICY_EVAL_CTX_set1_cert() argument 72 if (!X509_up_ref(cert)) in CT_POLICY_EVAL_CTX_set1_cert() 74 ctx->cert = cert; in CT_POLICY_EVAL_CTX_set1_cert() 99 return ctx->cert; in CT_POLICY_EVAL_CTX_get0_cert()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | notify.c | 812 struct tls_cert_data *cert, in wpas_notify_certification() 819 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 821 cert->tod ? " tod=1" : ""); in wpas_notify_certification() 823 if (cert->cert) { in wpas_notify_certification() 825 size_t len = wpabuf_len(cert->cert) * 2 + 1; in wpas_notify_certification() 828 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert->cert), in wpas_notify_certification() 811 wpas_notify_certification(struct wpa_supplicant *wpa_s, struct tls_cert_data *cert, const char *cert_hash) wpas_notify_certification() argument [all...] |
/third_party/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 32 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex() 54 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex() 59 if (pkey && cert) { in PKCS12_create_ex() 60 if (!X509_check_private_key(cert, pkey)) in PKCS12_create_ex() 62 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 66 if (cert) { in PKCS12_create_ex() 67 bag = PKCS12_add_cert(&bags, cert); in PKCS12_create_ex() 134 PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, in PKCS12_create() argument 138 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create() 142 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) in STACK_OF() 31 PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_create_ex() argument [all...] |
H A D | p12_kiss.c | 27 * Parse and decrypt a PKCS#12 structure returning user key, user cert and 29 * should point to a valid STACK structure. pkey and/or cert may be NULL; 33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 41 if (cert != NULL) in PKCS12_parse() 42 *cert = NULL; in PKCS12_parse() 76 if ((cert != NULL || ca != NULL) in PKCS12_parse() 91 /* Split the certs in ocerts over *cert and *ca as far as requested */ in PKCS12_parse() 94 && cert != NULL && *cert == NULL) { in PKCS12_parse() 101 *cert in PKCS12_parse() [all...] |
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | x509_cert_chain_openssl_ex.c | 55 X509 *cert = sk_X509_value(x509CertChain, i);
in CfToString() local 56 int len = X509_print(bio, cert);
in CfToString() 95 X509 *cert = sk_X509_value(x509CertChain, i);
in CfHashCode() local 96 int len = i2d_X509_bio(bio, cert);
in CfHashCode() 124 X509 *GetX509FromHcfX509Certificate(const HcfCertificate *cert)
in GetX509FromHcfX509Certificate() argument 126 if (!CfIsClassMatch((CfObjectBase *)cert, HCF_X509_CERTIFICATE_CLASS)) {
in GetX509FromHcfX509Certificate() 130 HcfX509CertificateImpl *impl = (HcfX509CertificateImpl *)cert;
in GetX509FromHcfX509Certificate() 168 X509 *cert = GetX509FromHcfX509Certificate((HcfCertificate *)retCerts.data[j]);
in GetCertChainFromCollection() local 169 if (cert == NULL) {
in GetCertChainFromCollection() 175 X509 *certDup = X509_dup(cert);
in GetCertChainFromCollection() [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 27 * Parse and decrypt a PKCS#12 structure returning user key, user cert and 29 * should point to a valid STACK structure. pkey and/or cert may be NULL; 33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, in PKCS12_parse() argument 41 if (cert != NULL) in PKCS12_parse() 42 *cert = NULL; in PKCS12_parse() 76 if ((cert != NULL || ca != NULL) in PKCS12_parse() 91 /* Split the certs in ocerts over *cert and *ca as far as requested */ in PKCS12_parse() 94 && cert != NULL && *cert == NULL) { in PKCS12_parse() 101 *cert in PKCS12_parse() [all...] |
/third_party/openssl/test/ |
H A D | ocspapitest.c | 28 X509 *cert = NULL; in get_cert_and_key() local 33 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL); in get_cert_and_key() 39 if (!TEST_ptr(cert) || !TEST_ptr(key)) in get_cert_and_key() 41 *cert_out = cert; in get_cert_and_key() 45 X509_free(cert); in get_cert_and_key() 53 X509 *cert = NULL; in get_cert() local 57 cert = PEM_read_bio_X509(certbio, NULL, NULL, NULL); in get_cert() 59 if (!TEST_ptr(cert)) in get_cert() 61 *cert_out = cert; in get_cert() 64 X509_free(cert); in get_cert() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 111 struct x509_certificate *cert, in tls_process_ocsp_single_response() 233 if (serial_number_len != cert->serial_number_len || in tls_process_ocsp_single_response() 234 os_memcmp(serial_number, cert->serial_number, in tls_process_ocsp_single_response() 319 struct x509_certificate *cert, in tls_process_ocsp_responses() 339 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses() 454 struct x509_certificate *cert; in tls_process_basic_ocsp_response() local 465 cert = x509_certificate_parse(hdr.payload, hdr.length); in tls_process_basic_ocsp_response() 466 if (!cert) in tls_process_basic_ocsp_response() 469 last_cert->next = cert; in tls_process_basic_ocsp_response() 470 last_cert = cert; in tls_process_basic_ocsp_response() 110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument 318 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument 687 struct x509_certificate *cert; tls_process_ocsp_response() local [all...] |
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
H A D | hap_cert_verify_openssl_utils.h | 38 DLL_EXPORT static bool CertVerify(X509* cert, const X509* issuerCert);
39 DLL_EXPORT static bool GetSubjectFromX509(const X509* cert, std::string& subject);
40 DLL_EXPORT static bool GetIssuerFromX509(const X509* cert, std::string& issuer);
41 DLL_EXPORT static bool GetSerialNumberFromX509(const X509* cert, long long& certNumber);
50 DLL_EXPORT static bool GetPublickeyBase64(const X509* cert, std::string& publicKey);
55 DLL_EXPORT static X509* FindCertOfIssuer(X509* cert, CertSign& certVisitSign);
58 DLL_EXPORT static X509_CRL* GetCrlBySignedCertIssuer(STACK_OF(X509_CRL)* crls, const X509* cert);
member in OHOS::Security::Verify::HapCertVerifyOpensslUtils
|
/base/security/dlp_permission_service/frameworks/test/mock/ |
H A D | dlp_permission_kit.cpp | 32 int32_t DlpPermissionKit::GenerateDlpCertificate(const PermissionPolicy& policy, std::vector<uint8_t>& cert) in GenerateDlpCertificate() argument 40 cert = std::vector<uint8_t>(certStr.begin(), certStr.end()); in GenerateDlpCertificate() 47 std::string encJsonStr(certParcel->cert.begin(), certParcel->cert.end()); in ParseDlpCertificate() 53 certParcel->offlineCert = certParcel->cert; in ParseDlpCertificate()
|
/base/update/updater/services/include/package/ |
H A D | cert_verify.h | 33 virtual int32_t CertChainCheck(STACK_OF(X509) *certStack, X509 *cert) = 0; member in Hpackage::CertHelper 44 int32_t CheckCertChain(STACK_OF(X509) *certStack, X509 *cert); member in Hpackage::CertVerify 58 int32_t CertChainCheck(STACK_OF(X509) *certStack, X509 *cert) override; 62 int32_t VerifySingleCert(X509 *cert); 63 int32_t CompareCertSubjectAndIssuer(X509 *cert);
|
/third_party/openssl/test/helpers/ |
H A D | cmp_testlib.c | 59 * Up refs and push a cert onto sk. 63 int STACK_OF_X509_push1(STACK_OF(X509) *sk, X509 *cert) in STACK_OF() 67 if (sk == NULL || cert == NULL) in STACK_OF() 69 if (!X509_up_ref(cert)) in STACK_OF() 71 res = sk_X509_push(sk, cert); in STACK_OF() 73 X509_free(cert); /* down-ref */ in STACK_OF()
|
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
H A D | tls_test_common.c | 53 fprintf (stderr, "Error: failed to flush ca cert file stream. %s\n", in setup_ca_cert() 390 gnutls_datum_t * cert, in setup_session() 405 cert->size = strlen (srv_self_signed_cert_pem) + 1; in setup_session() 406 cert->data = malloc (cert->size); in setup_session() 407 if (NULL == cert->data) in setup_session() 413 memcpy (cert->data, srv_self_signed_cert_pem, cert->size); in setup_session() 414 gnutls_certificate_set_x509_key_mem (*xcred, cert, key, in setup_session() 435 gnutls_datum_t * cert, in teardown_session() 388 setup_session(gnutls_session_t * session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t * xcred) setup_session() argument 433 teardown_session(gnutls_session_t session, gnutls_datum_t * key, gnutls_datum_t * cert, gnutls_certificate_credentials_t xcred) teardown_session() argument [all...] |