Home
last modified time | relevance | path

Searched refs:cert (Results 751 - 775 of 1055) sorted by relevance

1...<<31323334353637383940>>...43

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_config.h84 * cert://substring_to_match
405 * cert - Certificate parameters for Phase 1
407 struct eap_peer_cert_config cert; member
412 * This is like cert, but used for Phase 2 (inside
420 * This is like cert, but used for Phase 2 (inside EAP-TEAP tunnel)
H A Dikev2.c492 const u8 *cert, size_t cert_len) in ikev2_process_cert()
496 if (cert == NULL) { in ikev2_process_cert()
509 cert_encoding = cert[0]; in ikev2_process_cert()
510 cert++; in ikev2_process_cert()
514 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert()
639 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted()
491 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
/third_party/python/Modules/
H A D_ssl.c477 /* verify code for cert validation error */ in fill_and_set_sslerror()
1755 #include "_ssl/cert.c"
1770 BIO *cert; in _ssl__test_decode_cert_impl() local
1773 if ((cert=BIO_new(BIO_s_file())) == NULL) { in _ssl__test_decode_cert_impl()
1779 if (BIO_read_filename(cert, PyBytes_AsString(path)) <= 0) { in _ssl__test_decode_cert_impl()
1785 x = PEM_read_bio_X509(cert, NULL, NULL, NULL); in _ssl__test_decode_cert_impl()
1797 if (cert != NULL) BIO_free(cert); in _ssl__test_decode_cert_impl()
1836 /* return cert in DER-encoded format */ in _ssl__SSLSocket_getpeercert_impl()
1886 /* OpenSSL does not include peer cert fo in _ssl__SSLSocket_get_unverified_chain_impl()
3978 X509 *cert = NULL; _add_ca_certs() local
4663 X509 *cert; _ssl__SSLContext_get_ca_certs_impl() local
5554 PyObject *keyusage = NULL, *cert = NULL, *enc = NULL, *tup = NULL; _ssl_enum_certificates_impl() local
[all...]
/kernel/linux/linux-6.6/tools/net/ynl/generated/
H A Dhandshake-user.c71 [HANDSHAKE_A_X509_CERT] = { .name = "cert", .type = YNL_PT_U32, },
124 dst->_present.cert = 1; in handshake_x509_parse()
125 dst->cert = mnl_attr_get_u32(attr); in handshake_x509_parse()
/third_party/mbedtls/tests/include/test/
H A Dssl_helpers.h189 mbedtls_x509_crt *cert; member
201 mbedtls_test_ssl_endpoint_certificate cert; member
/third_party/node/lib/
H A Dhttps.js229 if (options.cert)
230 name += options.cert;
/third_party/node/lib/internal/crypto/
H A Dx509.js188 const cert = this[kHandle].getIssuerCert();
189 if (cert)
/third_party/node/test/sequential/
H A Dtest-async-wrap-getasyncid.js288 const cert = fixtures.readKey('rsa_cert.crt');
291 const credentials = require('tls').createSecureContext({ ca, cert, key });
/third_party/node/deps/openssl/openssl/apps/
H A Dverify.c39 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
75 {"cert", 0, 0, "Certificate(s) to verify (optional; stdin used otherwise)"},
302 X509 *cert = sk_X509_value(chain, j); in check() local
305 X509_get_subject_name(cert), in check()
357 /* Continue even if the leaf is a self-signed cert */ in cb()
H A Dpkcs12.c37 static int get_cert_chain(X509 *cert, X509_STORE *store,
117 {"chain", OPT_CHAIN, '-', "Build and add certificate chain for EE cert,"},
119 "which is the 1st cert from -in matching the private key (if given)"},
166 /* use library defaults for the iter, maciter, cert, and key PBE */ in pkcs12_main()
570 "No cert in -in file '%s' matches private key\n", in pkcs12_main()
584 /* If chaining get chain from end entity cert */ in pkcs12_main()
591 /* Assume the first cert if we haven't got anything else */ in pkcs12_main()
996 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument
1009 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain()
1118 X509 *cert; in cert_load() local
[all...]
/third_party/node/deps/openssl/openssl/util/
H A Dcheck-format-test-negatives.c299 #define CB_ERR_IF(cond, ctx, cert, depth, err) \
300 if ((cond) && ((depth) < 0 || verify_cb_cert(ctx, cert, depth, err) == 0)) \
309 # define CMP_FALLBACK_CERT_FILE "cert.pem"
/third_party/openssl/util/
H A Dcheck-format-test-negatives.c299 #define CB_ERR_IF(cond, ctx, cert, depth, err) \
300 if ((cond) && ((depth) < 0 || verify_cb_cert(ctx, cert, depth, err) == 0)) \
309 # define CMP_FALLBACK_CERT_FILE "cert.pem"
/third_party/openssl/apps/
H A Dverify.c39 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"},
75 {"cert", 0, 0, "Certificate(s) to verify (optional; stdin used otherwise)"},
302 X509 *cert = sk_X509_value(chain, j); in check() local
305 X509_get_subject_name(cert), in check()
357 /* Continue even if the leaf is a self-signed cert */ in cb()
H A Dpkcs12.c37 static int get_cert_chain(X509 *cert, X509_STORE *store,
117 {"chain", OPT_CHAIN, '-', "Build and add certificate chain for EE cert,"},
119 "which is the 1st cert from -in matching the private key (if given)"},
166 /* use library defaults for the iter, maciter, cert, and key PBE */ in pkcs12_main()
570 "No cert in -in file '%s' matches private key\n", in pkcs12_main()
584 /* If chaining get chain from end entity cert */ in pkcs12_main()
591 /* Assume the first cert if we haven't got anything else */ in pkcs12_main()
1000 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument
1013 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain()
1122 X509 *cert; in cert_load() local
[all...]
/third_party/openssl/test/
H A Dalgorithmid_test.c103 static int test_x509_spki_aid(X509 *cert, const char *filename) in test_x509_spki_aid() argument
105 X509_PUBKEY *pubkey = X509_get_X509_PUBKEY(cert); in test_x509_spki_aid()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dextensions.c460 num_exts = builtin_num + s->cert->custext.meths_count; in tls_validate_all_contexts()
471 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts()
595 custom_ext_methods *exts = &s->cert->custext; in tls_collect_extensions()
606 custom_ext_init(&s->cert->custext); in tls_collect_extensions()
777 numexts += s->cert->custext.meths_count; in tls_parse_all_extensions()
862 custom_ext_init(&s->cert->custext); in tls_construct_extensions()
/third_party/python/Lib/
H A Dssl.py376 def match_hostname(cert, hostname):
377 """Verify that *cert* (in decoded format as returned by
394 if not cert:
404 san = cert.get('subjectAltName', ())
417 for sub in cert.get('subject', ()):
580 for cert, encoding, trust in enum_certificates(storename):
584 certs.extend(cert)
1543 If 'ca_certs' is specified, validate the server cert against it.
/third_party/openssl/ssl/statem/
H A Dextensions.c432 num_exts = builtin_num + s->cert->custext.meths_count; in tls_validate_all_contexts()
443 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts()
567 custom_ext_methods *exts = &s->cert->custext; in tls_collect_extensions()
578 custom_ext_init(&s->cert->custext); in tls_collect_extensions()
749 numexts += s->cert->custext.meths_count; in tls_parse_all_extensions()
834 custom_ext_init(&s->cert->custext); in tls_construct_extensions()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dikev2.c490 const u8 *cert, size_t cert_len) in ikev2_process_cert()
494 if (cert == NULL) { in ikev2_process_cert()
507 cert_encoding = cert[0]; in ikev2_process_cert()
508 cert++; in ikev2_process_cert()
512 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert()
637 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted()
489 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Dikev2.c558 const u8 *cert, size_t cert_len) in ikev2_process_cert()
562 if (cert == NULL) { in ikev2_process_cert()
575 cert_encoding = cert[0]; in ikev2_process_cert()
576 cert++; in ikev2_process_cert()
580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert()
703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted()
557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Dikev2.c558 const u8 *cert, size_t cert_len) in ikev2_process_cert()
562 if (cert == NULL) { in ikev2_process_cert()
575 cert_encoding = cert[0]; in ikev2_process_cert()
576 cert++; in ikev2_process_cert()
580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert()
703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted()
557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
/third_party/curl/lib/vtls/
H A Dopenssl.c1352 X509 *cert; in cert_stuff() member
1356 params.cert = NULL; in cert_stuff()
1368 failf(data, "ssl engine cannot load client cert with id" in cert_stuff()
1375 if(!params.cert) { in cert_stuff()
1381 if(SSL_CTX_use_certificate(ctx, params.cert) != 1) { in cert_stuff()
1387 X509_free(params.cert); /* we don't need the handle any more... */ in cert_stuff()
1483 * Note that sk_X509_pop() is used below to make sure the cert is in cert_stuff()
1645 /* Now we know that a key and cert have been set against in cert_stuff()
2104 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"", in subj_alt_hostcheck()
2146 bool dNSName = FALSE; /* if a dNSName field exists in the cert */ in Curl_ossl_verifyhost()
2346 X509 *cert; verifystatus() local
4034 ossl_pkp_pin_peer_pubkey(struct Curl_easy *data, X509* cert, const char *pinnedpubkey) ossl_pkp_pin_peer_pubkey() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dpcy_tree.c216 (++level)->cert = x; in tree_init()
608 cache = ossl_policy_cache_set(curr->cert); in tree_evaluate()
641 X509_free(curr->cert); in X509_policy_tree_free()
/third_party/openssl/crypto/x509/
H A Dpcy_tree.c216 (++level)->cert = x; in tree_init()
608 cache = ossl_policy_cache_set(curr->cert); in tree_evaluate()
641 X509_free(curr->cert); in X509_policy_tree_free()
/kernel/linux/linux-5.10/arch/s390/include/asm/
H A Dipl.h127 unsigned char flags, unsigned short cert);

Completed in 32 milliseconds

1...<<31323334353637383940>>...43