/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct.c | 360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1) in SCT_validate()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct.c | 360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1) in SCT_validate()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 251 * @cert: Certificate information 254 void (*cert_cb)(void *ctx, struct tls_cert_data *cert,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 257 * @cert: Certificate information 260 void (*cert_cb)(void *ctx, struct tls_cert_data *cert,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | notify.h | 189 struct tls_cert_data *cert,
|
H A D | dpp_supplicant.c | 1290 /* TODO: ssid->eap.cert.ca_cert */ in wpas_dpp_add_network() 1318 ssid->eap.cert.client_cert = os_strdup(blobname); in wpas_dpp_add_network() 1319 if (!ssid->eap.cert.client_cert) in wpas_dpp_add_network() 1353 ssid->eap.cert.private_key = os_strdup(blobname); in wpas_dpp_add_network() 1354 if (!ssid->eap.cert.private_key) in wpas_dpp_add_network() 1359 ssid->eap.cert.domain_suffix_match = in wpas_dpp_add_network() 1361 if (!ssid->eap.cert.domain_suffix_match) in wpas_dpp_add_network()
|
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
H A D | daemon.c | 510 gnutls_datum_t cert; in MHD_init_daemon_certificate() local 522 cert.data = (unsigned char *) daemon->https_mem_trust; in MHD_init_daemon_certificate() 523 cert.size = strlen (daemon->https_mem_trust); in MHD_init_daemon_certificate() 524 if (gnutls_certificate_set_x509_trust_mem (daemon->x509_cred, &cert, in MHD_init_daemon_certificate() 546 cert.data = (unsigned char *) daemon->https_mem_cert; in MHD_init_daemon_certificate() 547 cert.size = strlen (daemon->https_mem_cert); in MHD_init_daemon_certificate() 552 &cert, &key, in MHD_init_daemon_certificate() 567 &cert, &key, in MHD_init_daemon_certificate()
|
/third_party/curl/lib/vtls/ |
H A D | gtls.c | 474 /* set the trusted CA cert bundle file */ in gtls_client_init() 482 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 495 /* set the trusted CA cert directory */ in gtls_client_init() 500 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 754 gnutls_x509_crt_t cert, in pkp_pin_peer_pubkey() 770 if(!cert) in pkp_pin_peer_pubkey() 779 ret = gnutls_pubkey_import_x509(key, cert, 0); in pkp_pin_peer_pubkey() 862 /* no peer cert, but auth is ok if we have SRP user and cipher and no in Curl_gtls_verifyserver() 867 failf(data, "failed to get server cert"); in Curl_gtls_verifyserver() 904 failf(data, "server cert verif in Curl_gtls_verifyserver() 753 pkp_pin_peer_pubkey(struct Curl_easy *data, gnutls_x509_crt_t cert, const char *pinnedpubkey) pkp_pin_peer_pubkey() argument [all...] |
/third_party/mbedtls/library/ |
H A D | ssl_misc.h | 827 mbedtls_ssl_key_cert *key_cert; /*!< chosen key/cert pair (server) */ 829 mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */ 1031 const mbedtls_x509_crt *dn_hints; /*!< acceptable client cert issuers */ 1248 mbedtls_x509_crt *cert; /*!< cert */ member 1250 mbedtls_ssl_key_cert *next; /*!< next key/cert pair */ 1676 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1683 * Warning: cert_endpoint is the endpoint of the cert (ie, of our peer when we 1684 * check a cert we received from them)! 1689 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | mod.rs | 118 /// * `cert` - The certificate that should be verified. 130 cert: &X509Ref, in init() 151 cert.as_ptr(), in init() 1797 "X509_CRL_get0_by_{{serial,cert}} should only return 0, 1, or 2." in from_ffi_status() 1886 pub fn get_by_cert<'a>(&'a self, cert: &X509) -> CrlStatus<'a> { in get_by_cert() 1890 ffi::X509_CRL_get0_by_cert(self.as_ptr(), &mut ret as *mut _, cert.as_ptr()); in get_by_cert()
|
/third_party/node/test/parallel/ |
H A D | test-crypto-sign-verify.js | 287 function testVerify(cert, vector) { 291 key: cert,
|
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local 707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
|
/third_party/openssl/test/ |
H A D | cmp_ctx_test.c | 320 static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in test_certConf_cb() argument 749 DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, cert, X509) in DEFINE_SET_CB_TEST()
|
H A D | ssl_old_test.c | 676 " -s_key arg - Server key file (default: same as -cert)\n"); in sv_usage() 771 X509 *cert; in print_details() local 779 cert = SSL_get0_peer_certificate(c_ssl); in print_details() 780 if (cert != NULL) { in print_details() 781 EVP_PKEY* pubkey = X509_get0_pubkey(cert); in print_details() 2918 printf("In app_verify_callback, allowing cert. "); in app_verify_callback() 2920 printf("Finished printing do we have a context? 0x%p a cert? 0x%p\n", in app_verify_callback() 2925 printf("cert depth=%d %s\n", in app_verify_callback()
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | x509v3.h | 367 # define EXFLAG_SS 0x2000 /* cert is apparently self-signed */ 570 X509 *cert); 582 const char *section, X509 *cert); variable
|
/third_party/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local 707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_client.c | 519 {"cert", OPT_CERT, '<', "Client certificate file to use"}, 525 {"key", OPT_KEY, 's', "Private key file to use; default: -cert file"}, 527 {"pass", OPT_PASS, 's', "Private key and cert file pass phrase source"}, 789 X509 *cert = NULL; in s_client_main() local 1635 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main() 1637 if (cert == NULL) in s_client_main() 1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main() 3096 X509_free(cert); in s_client_main()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 48 /* TLS does not like anon-DH with client cert */ in cert_req_allowed() 579 * For TLS, cert_req is set to 2, so a cert chain of nothing is in ossl_statem_client_write_transition() 1780 /* prepare server cert verification by setting s->session->peer_chain from pkt */ 1864 * Verify the s->session->peer_chain and check server cert type. 3413 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client 3425 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && in ssl3_check_client_certificate() 3438 /* Let cert callback update client certificates if required */ in tls_prepare_client_certificate() 3439 if (s->cert->cert_cb) { in tls_prepare_client_certificate() 3440 i = s->cert->cert_cb(s, s->cert in tls_prepare_client_certificate() [all...] |
/third_party/openssl/apps/ |
H A D | s_client.c | 519 {"cert", OPT_CERT, '<', "Client certificate file to use"}, 525 {"key", OPT_KEY, 's', "Private key file to use; default: -cert file"}, 527 {"pass", OPT_PASS, 's', "Private key and cert file pass phrase source"}, 789 X509 *cert = NULL; in s_client_main() local 1635 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main() 1637 if (cert == NULL) in s_client_main() 1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main() 3096 X509_free(cert); in s_client_main()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 48 /* TLS does not like anon-DH with client cert */ in cert_req_allowed() 579 * For TLS, cert_req is set to 2, so a cert chain of nothing is in ossl_statem_client_write_transition() 1772 /* prepare server cert verification by setting s->session->peer_chain from pkt */ 1856 * Verify the s->session->peer_chain and check server cert type. 3405 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client 3417 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && in ssl3_check_client_certificate() 3430 /* Let cert callback update client certificates if required */ in tls_prepare_client_certificate() 3431 if (s->cert->cert_cb) { in tls_prepare_client_certificate() 3432 i = s->cert->cert_cb(s, s->cert in tls_prepare_client_certificate() [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-client.c | 185 * Set up the per-connection client cert in lws_ssl_client_bio_create() 231 lwsl_notice("%s: set system client cert %u\n", __func__, in lws_ssl_client_bio_create() 238 lwsl_err("%s: unable to set up system client cert %d\n", __func__, in lws_ssl_client_bio_create() 300 lwsl_info("peer did not provide cert\n"); in lws_tls_client_confirm_peer_cert() 301 lws_snprintf(ebuf, ebuf_len, "no peer cert"); in lws_tls_client_confirm_peer_cert() 334 lwsl_info("%s: cert problem: %s\n", __func__, type); in lws_tls_client_confirm_peer_cert() 355 "server's cert didn't look good, %s (use_ssl 0x%x) X509_V_ERR = %d: %s\n", in lws_tls_client_confirm_peer_cert() 381 X509 *d2i_X509(X509 **cert, const unsigned char *buffer, long len); in lws_tls_client_create_vhost_context() 418 lwsl_err("Load CA cert file %s failed\n", ca_filepath); in lws_tls_client_create_vhost_context() 428 lwsl_info("%s: using mem client CA cert in lws_tls_client_create_vhost_context() [all...] |
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm/include/openssl/ |
H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/openssl/ |
H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
/third_party/node/deps/openssl/config/archs/linux-aarch64/no-asm/include/openssl/ |
H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
/third_party/node/deps/openssl/config/archs/linux-elf/asm/include/openssl/ |
H A D | ct.h | 151 * Increments the reference count of cert. 154 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|