| /third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
| H A D | certificate.js | 58 paths = paths.filter((path) => path.some((cert) => this.trustedCerts.includes(cert))); 154 const validCAs = path.slice(1).every((cert) => cert.isCA); 174 const cert = path[i]; 176 if (cert.extBasicConstraints?.isCA) { 177 const pathLength = cert.extBasicConstraints.pathLenConstraint;
|
| /device/soc/rockchip/common/sdk_linux/scripts/ |
| H A D | Makefile | 16 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 17 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 18 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 24 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 25 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| /kernel/linux/linux-5.10/scripts/ |
| H A D | Makefile | 15 hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert 16 hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert 17 hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert 23 HOSTCFLAGS_extract-cert.o = $(CRYPTO_CFLAGS) 24 HOSTLDLIBS_extract-cert = $(CRYPTO_LIBS)
|
| /third_party/curl/docs/examples/ |
| H A D | sessioninfo.c | 61 gnutls_x509_crt_t cert; in wrfu() local 64 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { in wrfu() 66 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { in wrfu() 68 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { in wrfu() 75 gnutls_x509_crt_deinit(cert); in wrfu()
|
| H A D | usercertinmem.c | 48 X509 *cert = NULL; in sslctx_function() local 131 cert = PEM_read_bio_X509(bio, NULL, 0, NULL); in sslctx_function() 132 if(!cert) { in sslctx_function() 137 ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); in sslctx_function() 170 if(cert) in sslctx_function() 171 X509_free(cert); in sslctx_function()
|
| /third_party/node/test/parallel/ |
| H A D | test-tls-cert-regression.js | 30 const cert = 69 function test(cert, key, cb) { 71 cert, 78 test(cert, key, common.mustCall(function() { 79 test(Buffer.from(cert), Buffer.from(key), common.mustCall());
|
| H A D | test-tls-multi-key.js | 34 // Key is ordered as ec, rsa, cert is ordered as rsa, ec. 40 cert: [ 41 fixtures.readKey('agent1-cert.pem'), 42 fixtures.readKey('ec10-cert.pem'), 46 fixtures.readKey('ca5-cert.pem'), 47 fixtures.readKey('ca1-cert.pem'), 51 // Key and cert are ordered as ec, rsa. 57 cert: [ 58 fixtures.readKey('agent1-cert.pem'), 59 fixtures.readKey('ec10-cert [all...] |
| H A D | test-https-selfsigned-no-keycertsign-no-crash.js | 33 const cert = 34 fixtures.readKey(path.join('selfsigned-no-keycertsign', 'cert.pem')); 38 cert: cert 54 ca: cert
|
| H A D | test-tls-getcertificate-x509.js | 13 cert: fixtures.readKey('agent6-cert.pem') 21 const cert = socket.getX509Certificate(); 22 assert(cert instanceof X509Certificate); 24 cert.serialNumber,
|
| H A D | test-tls-enable-trace.js | 45 checkServerIdentity: (servername, cert) => { }, 46 ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, 49 cert: keys.agent6.cert,
|
| H A D | test-tls-secure-context-usage-order.js | 20 cert: loadPEM('agent2-cert'), 27 cert: loadPEM('agent1-cert'), 28 ca: [ loadPEM('ca2-cert') ] 33 cert: loadPEM('agent1-cert'), 34 ca: [ loadPEM('ca1-cert') ] 60 cert: loadPEM('agent1-cert'), [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_client_read.c | 280 struct x509_certificate *cert) in tls_peer_cert_event() 294 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_peer_cert_event() 295 cert->cert_len); in tls_peer_cert_event() 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 321 struct x509_certificate *cert, in tls_cert_chain_failure_event() 329 if (!conn->event_cb || !cert) in tls_cert_chain_failure_event() 334 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event() 338 cert_buf = wpabuf_alloc_copy(cert->cert_start, in tls_cert_chain_failure_event() 339 cert in tls_cert_chain_failure_event() 279 tls_peer_cert_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert) tls_peer_cert_event() argument 320 tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, struct x509_certificate *cert, enum tls_fail_reason reason, const char *reason_txt) tls_cert_chain_failure_event() argument 352 struct x509_certificate *chain = NULL, *last = NULL, *cert; tls_process_certificate() local 822 struct x509_certificate *cert; tls_process_certificate_status() local [all...] |
| H A D | tlsv1_cred.c | 35 x509_certificate_chain_free(cred->cert); in tlsv1_cred_free() 48 struct x509_certificate *cert, *p; in tlsv1_add_cert_der() local 51 cert = x509_certificate_parse(buf, len); in tlsv1_add_cert_der() 52 if (cert == NULL) { in tlsv1_add_cert_der() 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der() 66 p->next = cert; in tlsv1_add_cert_der() 69 cert->next = *chain; in tlsv1_add_cert_der() 70 *chain = cert; in tlsv1_add_cert_der() 73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der() 158 const char *cert, cons in tlsv1_set_cert_chain() 157 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert_chain() argument 194 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) tlsv1_set_ca_cert() argument 258 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) tlsv1_set_cert() argument 506 struct x509_certificate *cert; pkcs12_certbag() local [all...] |
| /third_party/node/deps/openssl/openssl/engines/ |
| H A D | e_capi.c | 1298 PCCERT_CONTEXT cert) in capi_get_prov_info() 1303 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info() 1311 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info() 1346 static char *capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) in capi_cert_get_fname() argument 1352 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname() 1358 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname() 1371 static void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) in capi_dump_cert() argument 1378 fname = capi_cert_get_fname(ctx, cert); in capi_dump_cert() 1387 p = cert->pbCertEncoded; in capi_dump_cert() 1388 x = d2i_X509(NULL, &p, cert in capi_dump_cert() 1297 capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_prov_info() argument 1438 PCCERT_CONTEXT cert = NULL; capi_list_certs() local 1473 PCCERT_CONTEXT cert = NULL; capi_find_cert() local 1552 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_cert_key() argument 1569 PCCERT_CONTEXT cert; capi_find_key() local 1726 PCCERT_CONTEXT cert = NULL, excert = NULL; capi_load_ssl_client_cert() local 1849 PCCERT_CONTEXT cert; cert_select_dialog() local [all...] |
| /third_party/openssl/engines/ |
| H A D | e_capi.c | 1298 PCCERT_CONTEXT cert) in capi_get_prov_info() 1303 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info() 1311 if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, in capi_get_prov_info() 1346 static char *capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) in capi_cert_get_fname() argument 1352 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname() 1358 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, in capi_cert_get_fname() 1371 static void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) in capi_dump_cert() argument 1378 fname = capi_cert_get_fname(ctx, cert); in capi_dump_cert() 1387 p = cert->pbCertEncoded; in capi_dump_cert() 1388 x = d2i_X509(NULL, &p, cert in capi_dump_cert() 1297 capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_prov_info() argument 1438 PCCERT_CONTEXT cert = NULL; capi_list_certs() local 1473 PCCERT_CONTEXT cert = NULL; capi_find_cert() local 1552 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) capi_get_cert_key() argument 1569 PCCERT_CONTEXT cert; capi_find_key() local 1726 PCCERT_CONTEXT cert = NULL, excert = NULL; capi_load_ssl_client_cert() local 1849 PCCERT_CONTEXT cert; cert_select_dialog() local [all...] |
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | t_x509.c | 398 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags) in ossl_x509_print_ex_brief() argument 403 if (cert == NULL) in ossl_x509_print_ex_brief() 406 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_SUBJECT)) in ossl_x509_print_ex_brief() 408 if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { in ossl_x509_print_ex_brief() 413 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_ISSUER)) in ossl_x509_print_ex_brief() 416 if (!X509_print_ex(bio, cert, flags, in ossl_x509_print_ex_brief() 419 if (X509_cmp_current_time(X509_get0_notBefore(cert)) > 0) in ossl_x509_print_ex_brief() 422 if (X509_cmp_current_time(X509_get0_notAfter(cert)) < 0) in ossl_x509_print_ex_brief() 425 return X509_print_ex(bio, cert, flag in ossl_x509_print_ex_brief() 437 X509 *cert = sk_X509_value(certs, i); print_certs() local [all...] |
| H A D | x509_vfy.c | 59 static int check_key_level(X509_STORE_CTX *ctx, X509 *cert); 60 static int check_sig_level(X509_STORE_CTX *ctx, X509 *cert); 61 static int check_curve(X509 *cert); 87 * Return 1 if given cert is considered self-signed, 0 if not, or -1 on error. 90 * to match issuer and subject names (i.e., the cert being self-issued) and any 93 int X509_self_signed(X509 *cert, int verify_signature) in X509_self_signed() argument 97 if ((pkey = X509_get0_pubkey(cert)) == NULL) { /* handles cert == NULL */ in X509_self_signed() 101 if (!ossl_x509v3_cache_extensions(cert)) in X509_self_signed() 103 if ((cert in X509_self_signed() 192 X509 *cert = sk_X509_value(ctx->chain, i); check_auth_level() local 2652 dane_i2d(X509 *cert, uint8_t selector, unsigned int *i2dlen) dane_i2d() argument 2685 dane_match(X509_STORE_CTX *ctx, X509 *cert, int depth) dane_match() argument 2832 X509 *cert; check_dane_issuer() local 2858 X509 *cert = sk_X509_value(ctx->chain, num - 1); check_dane_pkeys() local 2900 check_leaf_suiteb(X509_STORE_CTX *ctx, X509 *cert) check_leaf_suiteb() argument 2911 X509 *cert = ctx->cert; dane_verify() local 2975 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument 3380 check_key_level(X509_STORE_CTX *ctx, X509 *cert) check_key_level() argument 3410 check_curve(X509 *cert) check_curve() argument 3437 check_sig_level(X509_STORE_CTX *ctx, X509 *cert) check_sig_level() argument [all...] |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | t_x509.c | 400 int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags) in ossl_x509_print_ex_brief() argument 405 if (cert == NULL) in ossl_x509_print_ex_brief() 408 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_SUBJECT)) in ossl_x509_print_ex_brief() 410 if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { in ossl_x509_print_ex_brief() 415 || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_ISSUER)) in ossl_x509_print_ex_brief() 418 if (!X509_print_ex(bio, cert, flags, in ossl_x509_print_ex_brief() 421 if (X509_cmp_current_time(X509_get0_notBefore(cert)) > 0) in ossl_x509_print_ex_brief() 424 if (X509_cmp_current_time(X509_get0_notAfter(cert)) < 0) in ossl_x509_print_ex_brief() 427 return X509_print_ex(bio, cert, flag in ossl_x509_print_ex_brief() 439 X509 *cert = sk_X509_value(certs, i); print_certs() local [all...] |
| H A D | x509_vfy.c | 59 static int check_key_level(X509_STORE_CTX *ctx, X509 *cert); 60 static int check_sig_level(X509_STORE_CTX *ctx, X509 *cert); 61 static int check_curve(X509 *cert); 87 * Return 1 if given cert is considered self-signed, 0 if not, or -1 on error. 90 * to match issuer and subject names (i.e., the cert being self-issued) and any 93 int X509_self_signed(X509 *cert, int verify_signature) in X509_self_signed() argument 97 if ((pkey = X509_get0_pubkey(cert)) == NULL) { /* handles cert == NULL */ in X509_self_signed() 101 if (!ossl_x509v3_cache_extensions(cert)) in X509_self_signed() 103 if ((cert in X509_self_signed() 192 X509 *cert = sk_X509_value(ctx->chain, i); check_auth_level() local 2654 dane_i2d(X509 *cert, uint8_t selector, unsigned int *i2dlen) dane_i2d() argument 2687 dane_match(X509_STORE_CTX *ctx, X509 *cert, int depth) dane_match() argument 2834 X509 *cert; check_dane_issuer() local 2860 X509 *cert = sk_X509_value(ctx->chain, num - 1); check_dane_pkeys() local 2902 check_leaf_suiteb(X509_STORE_CTX *ctx, X509 *cert) check_leaf_suiteb() argument 2913 X509 *cert = ctx->cert; dane_verify() local 2977 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument 3382 check_key_level(X509_STORE_CTX *ctx, X509 *cert) check_key_level() argument 3412 check_curve(X509 *cert) check_curve() argument 3439 check_sig_level(X509_STORE_CTX *ctx, X509 *cert) check_sig_level() argument [all...] |
| H A D | x_all.c | 455 int X509_digest(const X509 *cert, const EVP_MD *md, unsigned char *data, in X509_digest() argument 458 if (EVP_MD_is_a(md, SN_sha1) && (cert->ex_flags & EXFLAG_SET) != 0 in X509_digest() 459 && (cert->ex_flags & EXFLAG_NO_FINGERPRINT) == 0) { in X509_digest() 462 *len = sizeof(cert->sha1_hash); in X509_digest() 463 memcpy(data, cert->sha1_hash, sizeof(cert->sha1_hash)); in X509_digest() 466 return ossl_asn1_item_digest_ex(ASN1_ITEM_rptr(X509), md, (char *)cert, in X509_digest() 467 data, len, cert->libctx, cert->propq); in X509_digest() 470 /* calculate cert diges 471 X509_digest_sig(const X509 *cert, EVP_MD **md_used, int *md_is_fallback) X509_digest_sig() argument [all...] |
| /third_party/lwip/src/include/lwip/ |
| H A D | altcp_tls.h | 74 const u8_t *cert, size_t cert_len); 83 const u8_t *cert, size_t cert_len); 88 struct altcp_tls_config *altcp_tls_create_config_client(const u8_t *cert, size_t cert_len); 95 const u8_t *cert, size_t cert_len);
|
| /third_party/fsverity-utils/lib/ |
| H A D | sign_digest.c | 85 X509 *cert; in read_certificate() local 99 cert = PEM_read_bio_X509(bio, NULL, NULL, NULL); in read_certificate() 100 if (!cert) { in read_certificate() 107 *cert_ret = cert; in read_certificate() 117 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7() 131 serial = ASN1_INTEGER_to_BN(X509_get_serialNumber(cert), NULL); in sign_pkcs7() 139 name_der_len = i2d_X509_NAME(X509_get_subject_name(cert), &name_der); in sign_pkcs7() 254 EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, in sign_pkcs7() 296 if (!PKCS7_sign_add_signer(p7, cert, pkey, md, pkcs7_flags)) { in sign_pkcs7() 407 X509 *cert in libfsverity_sign_digest() local 116 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument 253 sign_pkcs7(const void *data_to_sign, size_t data_size, EVP_PKEY *pkey, X509 *cert, const EVP_MD *md, u8 **sig_ret, size_t *sig_size_ret) sign_pkcs7() argument [all...] |
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_lib.c | 524 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 546 cch->d.certificate = cert; in CMS_add0_cert() 550 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 553 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 555 X509_up_ref(cert); in CMS_add1_cert() 679 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 682 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 685 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 688 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 697 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 716 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |
| /third_party/openssl/crypto/cms/ |
| H A D | cms_lib.c | 511 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add0_cert() argument 523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert() 533 cch->d.certificate = cert; in CMS_add0_cert() 537 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) in CMS_add1_cert() argument 540 r = CMS_add0_cert(cms, cert); in CMS_add1_cert() 542 X509_up_ref(cert); in CMS_add1_cert() 666 int ossl_cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) in ossl_cms_ias_cert_cmp() argument 669 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); in ossl_cms_ias_cert_cmp() 672 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get0_serialNumber(cert)); in ossl_cms_ias_cert_cmp() 675 int ossl_cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) in ossl_cms_keyid_cert_cmp() argument 684 ossl_cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) ossl_cms_set1_ias() argument 703 ossl_cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) ossl_cms_set1_keyid() argument [all...] |