Home
last modified time | relevance | path

Searched refs:cert (Results 926 - 950 of 1184) sorted by relevance

1...<<31323334353637383940>>...48

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/dbus/
H A Ddbus_new.h249 const struct wpabuf *cert);
568 const struct wpabuf *cert) in wpas_dbus_signal_certification()
562 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) wpas_dbus_signal_certification() argument
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_lu.c568 X509 *cert = X509_OBJECT_get0_X509(sk_X509_OBJECT_value(objs, i)); in STACK_OF() local
570 if (cert != NULL in STACK_OF()
571 && !X509_add_cert(sk, cert, X509_ADD_FLAG_UP_REF)) in STACK_OF()
717 * Try to get issuer cert from |ctx->store| matching the subject name of |x|.
745 /* |*issuer| has taken over the cert reference from |obj| */ in X509_STORE_CTX_get1_issuer()
754 * Due to limitations of the API this can only retrieve a single cert. in X509_STORE_CTX_get1_issuer()
761 /* Find index of first currently valid cert accepted by 'check_issued' */ in X509_STORE_CTX_get1_issuer()
/third_party/openssl/crypto/x509/
H A Dx509_lu.c568 X509 *cert = X509_OBJECT_get0_X509(sk_X509_OBJECT_value(objs, i)); in STACK_OF() local
570 if (cert != NULL in STACK_OF()
571 && !X509_add_cert(sk, cert, X509_ADD_FLAG_UP_REF)) in STACK_OF()
717 * Try to get issuer cert from |ctx->store| matching the subject name of |x|.
745 /* |*issuer| has taken over the cert reference from |obj| */ in X509_STORE_CTX_get1_issuer()
754 * Due to limitations of the API this can only retrieve a single cert. in X509_STORE_CTX_get1_issuer()
761 /* Find index of first currently valid cert accepted by 'check_issued' */ in X509_STORE_CTX_get1_issuer()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_tls_common.c140 eap_tls_cert_params_from_conf(params, &config->cert); in eap_tls_params_from_conf1()
275 os_free(config->cert.pin); in eap_tls_init_connection()
276 config->cert.pin = NULL; in eap_tls_init_connection()
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_local.h165 /* tmp DH key no DH cert */
593 /* This is the cert and type for the other end. */
933 /* get client cert callback */
967 * (ClientHello and CertificateRequest) or just client cert requests for
969 * for client cert requests, and in preference to ca_names.
985 struct cert_st /* CERT */ *cert; member
1374 CERT_PKEY *cert; member
1511 /* client cert? */
1513 struct cert_st /* CERT */ *cert; member
1575 * (ClientHello and CertificateRequest) or just client cert request
[all...]
/third_party/openssl/ssl/
H A Dssl_local.h165 /* tmp DH key no DH cert */
586 /* This is the cert and type for the other end. */
924 /* get client cert callback */
958 * (ClientHello and CertificateRequest) or just client cert requests for
960 * for client cert requests, and in preference to ca_names.
976 struct cert_st /* CERT */ *cert; member
1350 CERT_PKEY *cert; member
1482 /* client cert? */
1484 struct cert_st /* CERT */ *cert; member
1546 * (ClientHello and CertificateRequest) or just client cert request
[all...]
/base/security/certificate_framework/frameworks/js/napi/certificate/src/
H A Dnapi_x509_cert_chain.cpp159 context->async->errMsg = "create cert chain failed"; in CreateCertChainExecute()
174 context->async->errMsg = "create cert chain failed"; in BuildX509CertChainExecute()
209 context->async->errMsg = "Failed to create napi cert chain class"; in CreateCertChainComplete()
210 LOGE("Failed to create napi cert chain class"); in CreateCertChainComplete()
225 LOGE("Build cert chain instance failed!"); in BuildCreateInstanceByBulidRlt()
232 LOGE("Build cert validate result failed!"); in BuildCreateInstanceByBulidRlt()
253 context->async->errMsg = "Failed to create napi cert chain class"; in BuildX509CertChainComplete()
254 LOGE("Failed to create napi cert chain class"); in BuildX509CertChainComplete()
294 context->async->errMsg = "create cert chain failed"; in ValidateExecute()
419 LOGE("get array cert fro in CreateX509CertChainByArray()
511 ConvertX509CertToNapiValue(napi_env env, HcfX509Certificate *cert) ConvertX509CertToNapiValue() argument
[all...]
/third_party/openssl/test/
H A Devp_libctx_test.c230 X509 *cert = NULL; in dhx_cert_load() local
302 || !TEST_ptr(cert = X509_new_ex(libctx, NULL)) in dhx_cert_load()
303 || !TEST_ptr(d2i_X509_bio(bio, &cert))) in dhx_cert_load()
307 X509_free(cert); in dhx_cert_load()
/third_party/mbedtls/library/
H A Dssl_tls13_server.c1149 key_cert->cert); in ssl_tls13_pick_key_cert()
1152 * This avoids sending the client a cert it'll reject based on in ssl_tls13_pick_key_cert()
1156 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert()
1158 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert()
1175 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert()
1178 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert()
1191 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_lib.c306 if (lu == NULL || s->s3.tmp.cert == NULL) { in tls_construct_cert_verify()
310 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify()
982 else if (s->cert->chain_store) in ssl_add_cert_chain()
983 chain_store = s->cert->chain_store; in ssl_add_cert_chain()
1002 * don't include the root cert in the chain). Therefore we deliberately in ssl_add_cert_chain()
1004 * the cert - we're just building as much of the chain as we can in ssl_add_cert_chain()
1576 if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL) in is_tls13_capable()
1597 * EC cert. See section 4.2.3 of RFC8446. in is_tls13_capable()
1599 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
/third_party/openssl/ssl/statem/
H A Dstatem_lib.c285 if (lu == NULL || s->s3.tmp.cert == NULL) { in tls_construct_cert_verify()
289 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify()
947 else if (s->cert->chain_store) in ssl_add_cert_chain()
948 chain_store = s->cert->chain_store; in ssl_add_cert_chain()
967 * don't include the root cert in the chain). Therefore we deliberately in ssl_add_cert_chain()
969 * the cert - we're just building as much of the chain as we can in ssl_add_cert_chain()
1541 if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL) in is_tls13_capable()
1562 * EC cert. See section 4.2.3 of RFC8446. in is_tls13_capable()
1564 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
/base/security/huks/interfaces/inner_api/huks_lite/
H A Dhks_types.h267 struct hks_blob *cert; /* cert array list */ member
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/
H A Dhks_types.h270 struct hks_blob *cert; /* cert array list */ member
/third_party/curl/src/
H A Dtool_cfgable.c117 Curl_safefree(config->cert); in free_config_fields()
/third_party/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
H A Dtpmtoken_import_tests.sh34 # Set the cert, key and combined cert and key filenames
35 export TPM_CERTFILE="$LTPTMP/tst_tpm.cert"
268 tpmtoken_import -t cert -n $TCID $TPM_KEYFILE 1>$TPM_TMPFILE 2>&1 || RC=$?
271 tst_resm TPASS "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' passed."
274 tst_res TFAIL $TPM_TMPFILE "'tpmtoken_import -t cert -n $TCID $TPM_KEYFILE' failed."
/third_party/node/src/crypto/
H A Dcrypto_context.h59 inline const X509Pointer& cert() const { return cert_; } in cert() function in node::crypto::final
/third_party/node/test/parallel/
H A Dtest-https-set-timeout-server.js38 cert: fixtures.readKey('agent1-cert.pem')
H A Dtest-tls-onread-static-buffer.js12 cert: fixtures.readKey('agent2-cert.pem')
/third_party/node/deps/openssl/openssl/apps/
H A Dcrl2pkcs7.c149 p7s->cert = cert_stack; in crl2pkcs7_main()
/third_party/openssl/apps/
H A Dcrl2pkcs7.c149 p7s->cert = cert_stack; in crl2pkcs7_main()
/third_party/openssl/ohos_lite/include/crypto/
H A Dx509.h191 * This is a used when verifying cert chains. Since the gathering of the
192 * cert chain can take some time (and have to be 'retried', this needs to be
198 /* The cert to check */
199 X509 *cert; member
212 /* get issuers cert from ctx */
244 /* cert currently being tested as valid issuer */
/third_party/openssl/ohos_lite/include/openssl/
H A Dct.h80 * Increments the reference count of cert.
83 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.h304 const u8 *cert; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dnotify.h135 struct tls_cert_data *cert,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.h304 const u8 *cert; member

Completed in 36 milliseconds

1...<<31323334353637383940>>...48