| /foundation/communication/netstack/frameworks/js/napi/tls/src/ |
| H A D | tls_socket.cpp | 202 void TLSSecureOptions::SetCert(const std::string &cert) in SetCert() argument 204 cert_ = cert; in SetCert() 598 void TLSSocket::CallGetCertificateCallback(int32_t err, const X509CertRawData &cert, GetCertificateCallback callback) in CallGetCertificateCallback() argument 609 func(err, cert); in CallGetCertificateCallback() 613 void TLSSocket::CallGetRemoteCertificateCallback(int32_t err, const X509CertRawData &cert, in CallGetRemoteCertificateCallback() argument 625 func(err, cert); in CallGetRemoteCertificateCallback() 980 const auto &cert = tlsSocketInternal_.GetCertificate(); in GetCertificate() local 981 NETSTACK_LOGI("cert der is %{public}d", cert.encodingFormat); in GetCertificate() 983 if (!cert in GetCertificate() [all...] |
| /foundation/communication/netstack/test/unittest/tlssocket/server/ |
| H A D | TlsSocketServerTest.cpp | 208 server.GetRemoteCertificate(socketFd, [](int32_t errCode, const TlsSocket::X509CertRawData &cert) { in HWTEST_F() 231 [](int32_t errCode, const TlsSocket::X509CertRawData &cert) { EXPECT_TRUE(TlsSocket::TLSSOCKET_SUCCESS); }); in HWTEST_F()
|
| /foundation/communication/netstack/frameworks/native/tls_socket/src/ |
| H A D | tls_context.cpp | 222 for (const auto &cert : configuration.GetCaCertificate()) { in SetCaAndVerify() 223 TLSCertificate ca(cert, CA_CERT); in SetCaAndVerify() 225 NETSTACK_LOGE("Failed to add x509 cert"); in SetCaAndVerify()
|
| H A D | tls_context_server.cpp | 224 for (const auto &cert : configuration.GetCaCertificate()) { in SetCaAndVerify() 225 TLSCertificate ca(cert, CA_CERT); in SetCaAndVerify() 227 NETSTACK_LOGE("Failed to add x509 cert"); in SetCaAndVerify()
|
| /kernel/linux/linux-6.6/tools/net/ynl/generated/ |
| H A D | handshake-user.c | 71 [HANDSHAKE_A_X509_CERT] = { .name = "cert", .type = YNL_PT_U32, }, 124 dst->_present.cert = 1; in handshake_x509_parse() 125 dst->cert = mnl_attr_get_u32(attr); in handshake_x509_parse()
|
| /third_party/mbedtls/tests/include/test/ |
| H A D | ssl_helpers.h | 189 mbedtls_x509_crt *cert; member 201 mbedtls_test_ssl_endpoint_certificate cert; member
|
| /third_party/node/lib/ |
| H A D | https.js | 229 if (options.cert) 230 name += options.cert;
|
| /third_party/node/lib/internal/crypto/ |
| H A D | x509.js | 188 const cert = this[kHandle].getIssuerCert(); 189 if (cert)
|
| /third_party/node/test/sequential/ |
| H A D | test-async-wrap-getasyncid.js | 288 const cert = fixtures.readKey('rsa_cert.crt'); 291 const credentials = require('tls').createSecureContext({ ca, cert, key });
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | verify.c | 39 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 75 {"cert", 0, 0, "Certificate(s) to verify (optional; stdin used otherwise)"}, 302 X509 *cert = sk_X509_value(chain, j); in check() local 305 X509_get_subject_name(cert), in check() 357 /* Continue even if the leaf is a self-signed cert */ in cb()
|
| H A D | pkcs12.c | 37 static int get_cert_chain(X509 *cert, X509_STORE *store, 117 {"chain", OPT_CHAIN, '-', "Build and add certificate chain for EE cert,"}, 119 "which is the 1st cert from -in matching the private key (if given)"}, 166 /* use library defaults for the iter, maciter, cert, and key PBE */ in pkcs12_main() 570 "No cert in -in file '%s' matches private key\n", in pkcs12_main() 584 /* If chaining get chain from end entity cert */ in pkcs12_main() 591 /* Assume the first cert if we haven't got anything else */ in pkcs12_main() 996 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument 1009 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain() 1118 X509 *cert; in cert_load() local [all...] |
| /third_party/node/deps/openssl/openssl/util/ |
| H A D | check-format-test-negatives.c | 299 #define CB_ERR_IF(cond, ctx, cert, depth, err) \ 300 if ((cond) && ((depth) < 0 || verify_cb_cert(ctx, cert, depth, err) == 0)) \ 309 # define CMP_FALLBACK_CERT_FILE "cert.pem"
|
| /third_party/openssl/util/ |
| H A D | check-format-test-negatives.c | 299 #define CB_ERR_IF(cond, ctx, cert, depth, err) \ 300 if ((cond) && ((depth) < 0 || verify_cb_cert(ctx, cert, depth, err) == 0)) \ 309 # define CMP_FALLBACK_CERT_FILE "cert.pem"
|
| /third_party/openssl/apps/ |
| H A D | verify.c | 39 {OPT_HELP_STR, 1, '-', "Usage: %s [options] [cert...]\n"}, 75 {"cert", 0, 0, "Certificate(s) to verify (optional; stdin used otherwise)"}, 302 X509 *cert = sk_X509_value(chain, j); in check() local 305 X509_get_subject_name(cert), in check() 357 /* Continue even if the leaf is a self-signed cert */ in cb()
|
| H A D | pkcs12.c | 37 static int get_cert_chain(X509 *cert, X509_STORE *store, 117 {"chain", OPT_CHAIN, '-', "Build and add certificate chain for EE cert,"}, 119 "which is the 1st cert from -in matching the private key (if given)"}, 166 /* use library defaults for the iter, maciter, cert, and key PBE */ in pkcs12_main() 570 "No cert in -in file '%s' matches private key\n", in pkcs12_main() 584 /* If chaining get chain from end entity cert */ in pkcs12_main() 591 /* Assume the first cert if we haven't got anything else */ in pkcs12_main() 1000 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument 1013 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain() 1122 X509 *cert; in cert_load() local [all...] |
| /third_party/openssl/test/ |
| H A D | algorithmid_test.c | 103 static int test_x509_spki_aid(X509 *cert, const char *filename) in test_x509_spki_aid() argument 105 X509_PUBKEY *pubkey = X509_get_X509_PUBKEY(cert); in test_x509_spki_aid()
|
| /third_party/python/Modules/ |
| H A D | _ssl.c | 477 /* verify code for cert validation error */ in fill_and_set_sslerror() 1755 #include "_ssl/cert.c" 1770 BIO *cert; in _ssl__test_decode_cert_impl() local 1773 if ((cert=BIO_new(BIO_s_file())) == NULL) { in _ssl__test_decode_cert_impl() 1779 if (BIO_read_filename(cert, PyBytes_AsString(path)) <= 0) { in _ssl__test_decode_cert_impl() 1785 x = PEM_read_bio_X509(cert, NULL, NULL, NULL); in _ssl__test_decode_cert_impl() 1797 if (cert != NULL) BIO_free(cert); in _ssl__test_decode_cert_impl() 1836 /* return cert in DER-encoded format */ in _ssl__SSLSocket_getpeercert_impl() 1886 /* OpenSSL does not include peer cert fo in _ssl__SSLSocket_get_unverified_chain_impl() 3978 X509 *cert = NULL; _add_ca_certs() local 4663 X509 *cert; _ssl__SSLContext_get_ca_certs_impl() local 5554 PyObject *keyusage = NULL, *cert = NULL, *enc = NULL, *tup = NULL; _ssl_enum_certificates_impl() local [all...] |
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/test/ |
| H A D | dlp_file_test.cpp | 83 uint8_t* cert = new (std::nothrow) uint8_t[16]; in initDlpFileCiper() local 84 if (cert == nullptr) { in initDlpFileCiper() 88 .data = cert, in initDlpFileCiper() 726 * @tc.desc: test parse dlp file header failed when no cert data 864 * @tc.desc: test set encrypt cert params invalid 873 struct DlpBlob cert = { in HWTEST_F() local 878 EXPECT_EQ(DLP_PARSE_ERROR_VALUE_INVALID, testFile.SetEncryptCert(cert)); in HWTEST_F() 882 cert.data = data; in HWTEST_F() 883 cert.size = DLP_MAX_CERT_SIZE + 1; in HWTEST_F() 884 EXPECT_EQ(DLP_PARSE_ERROR_VALUE_INVALID, testFile.SetEncryptCert(cert)); in HWTEST_F() 899 struct DlpBlob cert = { HWTEST_F() local 924 struct DlpBlob cert = { HWTEST_F() local [all...] |
| /third_party/node/deps/openssl/openssl/ssl/statem/ |
| H A D | extensions.c | 460 num_exts = builtin_num + s->cert->custext.meths_count; in tls_validate_all_contexts() 471 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts() 595 custom_ext_methods *exts = &s->cert->custext; in tls_collect_extensions() 606 custom_ext_init(&s->cert->custext); in tls_collect_extensions() 777 numexts += s->cert->custext.meths_count; in tls_parse_all_extensions() 862 custom_ext_init(&s->cert->custext); in tls_construct_extensions()
|
| /third_party/python/Lib/ |
| H A D | ssl.py | 376 def match_hostname(cert, hostname): 377 """Verify that *cert* (in decoded format as returned by 394 if not cert: 404 san = cert.get('subjectAltName', ()) 417 for sub in cert.get('subject', ()): 580 for cert, encoding, trust in enum_certificates(storename): 584 certs.extend(cert) 1543 If 'ca_certs' is specified, validate the server cert against it.
|
| /third_party/openssl/ssl/statem/ |
| H A D | extensions.c | 432 num_exts = builtin_num + s->cert->custext.meths_count; in tls_validate_all_contexts() 443 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts() 567 custom_ext_methods *exts = &s->cert->custext; in tls_collect_extensions() 578 custom_ext_init(&s->cert->custext); in tls_collect_extensions() 749 numexts += s->cert->custext.meths_count; in tls_parse_all_extensions() 834 custom_ext_init(&s->cert->custext); in tls_construct_extensions()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
| H A D | ikev2.c | 490 const u8 *cert, size_t cert_len) in ikev2_process_cert() 494 if (cert == NULL) { in ikev2_process_cert() 507 cert_encoding = cert[0]; in ikev2_process_cert() 508 cert++; in ikev2_process_cert() 512 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 637 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 489 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) in ikev2_process_cert() 562 if (cert == NULL) { in ikev2_process_cert() 575 cert_encoding = cert[0]; in ikev2_process_cert() 576 cert++; in ikev2_process_cert() 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| H A D | ikev2.c | 492 const u8 *cert, size_t cert_len) in ikev2_process_cert() 496 if (cert == NULL) { in ikev2_process_cert() 509 cert_encoding = cert[0]; in ikev2_process_cert() 510 cert++; in ikev2_process_cert() 514 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 639 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 491 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) in ikev2_process_cert() 562 if (cert == NULL) { in ikev2_process_cert() 575 cert_encoding = cert[0]; in ikev2_process_cert() 576 cert++; in ikev2_process_cert() 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|