| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) in ikev2_process_cert() 562 if (cert == NULL) { in ikev2_process_cert() 575 cert_encoding = cert[0]; in ikev2_process_cert() 576 cert++; in ikev2_process_cert() 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| H A D | ikev2.c | 492 const u8 *cert, size_t cert_len) in ikev2_process_cert() 496 if (cert == NULL) { in ikev2_process_cert() 509 cert_encoding = cert[0]; in ikev2_process_cert() 510 cert++; in ikev2_process_cert() 514 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 639 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 491 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) in ikev2_process_cert() 562 if (cert == NULL) { in ikev2_process_cert() 575 cert_encoding = cert[0]; in ikev2_process_cert() 576 cert++; in ikev2_process_cert() 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); in ikev2_process_cert() 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || in ikev2_process_sa_auth_decrypted() 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) ikev2_process_cert() argument
|
| /third_party/curl/lib/vtls/ |
| H A D | openssl.c | 1352 X509 *cert; in cert_stuff() member 1356 params.cert = NULL; in cert_stuff() 1368 failf(data, "ssl engine cannot load client cert with id" in cert_stuff() 1375 if(!params.cert) { in cert_stuff() 1381 if(SSL_CTX_use_certificate(ctx, params.cert) != 1) { in cert_stuff() 1387 X509_free(params.cert); /* we don't need the handle any more... */ in cert_stuff() 1483 * Note that sk_X509_pop() is used below to make sure the cert is in cert_stuff() 1645 /* Now we know that a key and cert have been set against in cert_stuff() 2104 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"", in subj_alt_hostcheck() 2146 bool dNSName = FALSE; /* if a dNSName field exists in the cert */ in Curl_ossl_verifyhost() 2346 X509 *cert; verifystatus() local 4034 ossl_pkp_pin_peer_pubkey(struct Curl_easy *data, X509* cert, const char *pinnedpubkey) ossl_pkp_pin_peer_pubkey() argument [all...] |
| /base/update/updater/services/package/pkg_algorithm/ |
| H A D | pkg_algo_sign.h | 36 X509 *cert;
member
|
| /base/update/updater/services/package/pkg_verify/ |
| H A D | pkcs7_signed_data.h | 97 int32_t VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash,
|
| /kernel/linux/linux-5.10/arch/s390/include/asm/ |
| H A D | ipl.h | 127 unsigned char flags, unsigned short cert);
|
| /kernel/linux/linux-6.6/arch/s390/include/asm/ |
| H A D | ipl.h | 139 unsigned char flags, unsigned short cert);
|
| /third_party/node/test/parallel/ |
| H A D | test-http2-connect.js | 79 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-http2-server-startup.js | 20 cert: commonFixtures.readKey('agent2-cert.pem')
|
| H A D | test-https-agent-abort-controller.js | 17 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-abortcontroller.js | 14 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-https-agent-session-reuse.js | 14 cert: fixtures.readKey('agent1-cert.pem') 17 const ca = fixtures.readKey('ca1-cert.pem');
|
| H A D | test-https-insecure-parse-per-stream.js | 16 cert: fixtures.readKey('agent1-cert.pem'), 17 ca: fixtures.readKey('ca1-cert.pem'),
|
| H A D | test-https-max-header-size-per-stream.js | 18 cert: fixtures.readKey('agent1-cert.pem'), 19 ca: fixtures.readKey('ca1-cert.pem'),
|
| H A D | test-tls-alert-handling.js | 27 cert: loadPEM('agent2-cert')
|
| H A D | test-tls-cert-ext-encoding.js | 19 // The key property of this cert is that subjectAltName contains a string with 72 cert: pem,
|
| H A D | test-tls-client-reject.js | 33 cert: fixtures.readKey('rsa_cert.crt')
|
| H A D | test-tls-connect-abort-controller.js | 13 cert: fixtures.readKey('agent1-cert.pem')
|
| H A D | test-tls-ticket.js | 48 cert: fixtures.readKey('agent1-cert.pem'),
|
| /third_party/node/src/quic/ |
| H A D | tlscontext.h | 123 v8::MaybeLocal<v8::Object> cert(Environment* env) const;
|
| /third_party/node/test/async-hooks/ |
| H A D | test-tlswrap.js | 27 cert: fixtures.readKey('rsa_cert.crt'),
|
| /foundation/communication/netstack/frameworks/js/napi/tls/src/ |
| H A D | tlssocket_exec.cpp | 128 shared->GetCertificate([&context](int32_t errorNumber, const X509CertRawData &cert) { in ExecGetCertificate() 129 context->localCert_ = cert; in ExecGetCertificate() 220 shared->GetRemoteCertificate([&context](int32_t errorNumber, const X509CertRawData &cert) { in ExecGetRemoteCertificate() 221 context->remoteCert_ = cert; in ExecGetRemoteCertificate()
|
| H A D | tlssocketserver_exec.cpp | 54 tlsSocketServer->GetCertificate([&context](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in ExecGetCertificate() 55 context->localCert_ = cert; in ExecGetCertificate() 127 context->clientId_, [&context](int32_t errorNumber, const TlsSocket::X509CertRawData &cert) { in ExecGetRemoteCertificate() 128 context->remoteCert_ = cert; in ExecGetRemoteCertificate()
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | pcy_tree.c | 216 (++level)->cert = x; in tree_init() 608 cache = ossl_policy_cache_set(curr->cert); in tree_evaluate() 641 X509_free(curr->cert); in X509_policy_tree_free()
|