Home
last modified time | relevance | path

Searched refs:cert (Results 976 - 1000 of 1210) sorted by relevance

1...<<31323334353637383940>>...49

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/
H A Deapol_supp_sm.h257 * @cert: Certificate information
260 void (*cert_cb)(void *ctx, struct tls_cert_data *cert,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dnotify.h189 struct tls_cert_data *cert,
H A Ddpp_supplicant.c1290 /* TODO: ssid->eap.cert.ca_cert */ in wpas_dpp_add_network()
1318 ssid->eap.cert.client_cert = os_strdup(blobname); in wpas_dpp_add_network()
1319 if (!ssid->eap.cert.client_cert) in wpas_dpp_add_network()
1353 ssid->eap.cert.private_key = os_strdup(blobname); in wpas_dpp_add_network()
1354 if (!ssid->eap.cert.private_key) in wpas_dpp_add_network()
1359 ssid->eap.cert.domain_suffix_match = in wpas_dpp_add_network()
1361 if (!ssid->eap.cert.domain_suffix_match) in wpas_dpp_add_network()
/third_party/mbedtls/library/
H A Dssl_tls12_server.c729 cur->cert); in ssl_pick_cert()
737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert()
743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert()
751 * This avoids sending the client a cert it'll reject based on in ssl_pick_cert()
758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert()
767 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert()
782 ssl->handshake->key_cert->cert); in ssl_pick_cert()
2446 * 4 . 4 cert type count in ssl_write_certificate_request()
2447 * 5 .. m-1 cert types in ssl_write_certificate_request()
4207 MBEDTLS_SSL_DEBUG_MSG(1, ("sig_alg doesn't match cert ke in ssl_parse_certificate_verify()
[all...]
H A Dssl_misc.h827 mbedtls_ssl_key_cert *key_cert; /*!< chosen key/cert pair (server) */
829 mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */
1031 const mbedtls_x509_crt *dn_hints; /*!< acceptable client cert issuers */
1248 mbedtls_x509_crt *cert; /*!< cert */ member
1250 mbedtls_ssl_key_cert *next; /*!< next key/cert pair */
1676 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert()
1683 * Warning: cert_endpoint is the endpoint of the cert (ie, of our peer when we
1684 * check a cert we received from them)!
1689 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
[all...]
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/
H A Ddaemon.c510 gnutls_datum_t cert; in MHD_init_daemon_certificate() local
522 cert.data = (unsigned char *) daemon->https_mem_trust; in MHD_init_daemon_certificate()
523 cert.size = strlen (daemon->https_mem_trust); in MHD_init_daemon_certificate()
524 if (gnutls_certificate_set_x509_trust_mem (daemon->x509_cred, &cert, in MHD_init_daemon_certificate()
546 cert.data = (unsigned char *) daemon->https_mem_cert; in MHD_init_daemon_certificate()
547 cert.size = strlen (daemon->https_mem_cert); in MHD_init_daemon_certificate()
552 &cert, &key, in MHD_init_daemon_certificate()
567 &cert, &key, in MHD_init_daemon_certificate()
/third_party/curl/lib/vtls/
H A Dgtls.c474 /* set the trusted CA cert bundle file */ in gtls_client_init()
482 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init()
495 /* set the trusted CA cert directory */ in gtls_client_init()
500 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init()
754 gnutls_x509_crt_t cert, in pkp_pin_peer_pubkey()
770 if(!cert) in pkp_pin_peer_pubkey()
779 ret = gnutls_pubkey_import_x509(key, cert, 0); in pkp_pin_peer_pubkey()
862 /* no peer cert, but auth is ok if we have SRP user and cipher and no in Curl_gtls_verifyserver()
867 failf(data, "failed to get server cert"); in Curl_gtls_verifyserver()
904 failf(data, "server cert verif in Curl_gtls_verifyserver()
753 pkp_pin_peer_pubkey(struct Curl_easy *data, gnutls_x509_crt_t cert, const char *pinnedpubkey) pkp_pin_peer_pubkey() argument
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dmod.rs118 /// * `cert` - The certificate that should be verified.
130 cert: &X509Ref, in init()
151 cert.as_ptr(), in init()
1797 "X509_CRL_get0_by_{{serial,cert}} should only return 0, 1, or 2." in from_ffi_status()
1886 pub fn get_by_cert<'a>(&'a self, cert: &X509) -> CrlStatus<'a> { in get_by_cert()
1890 ffi::X509_CRL_get0_by_cert(self.as_ptr(), &mut ret as *mut _, cert.as_ptr()); in get_by_cert()
/base/security/certificate_framework/test/fuzztest/v1.0/x509certchain_fuzzer/
H A Dx509certchain_fuzzer.cpp202 const CfEncodingBlob cert = { reinterpret_cast<uint8_t *>(const_cast<char *>(g_testSelfSignedCaCert)), in CreateChainByArr() local
204 (void)HcfX509CertificateCreate(&cert, &x509CertObj); in CreateChainByArr()
436 certsData->count = 2; /* level-2 cert chain. */ in ConstructCertData()
509 certsData.count = *reinterpret_cast<const uint32_t *>(data); /* level-2 cert chain. */ in X509CertChainValidatorCreateFuzzTest()
/foundation/communication/netstack/frameworks/js/napi/http/async_context/src/
H A Drequest_context.cpp73 {HTTP_SSL_CACERT_BADFILE, "Problem with the SSL CA cert (path? access rights?)"},
715 std::string cert = NapiUtils::GetStringPropertyUtf8(GetEnv(), clientCertValue, HttpConstant::HTTP_CLIENT_CERT); in ParseClientCert() local
721 options.SetClientCert(cert, certType, key, keyPasswd); in ParseClientCert()
/third_party/node/test/parallel/
H A Dtest-crypto-sign-verify.js287 function testVerify(cert, vector) {
291 key: cert,
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_rsp_sign.c706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local
707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
/third_party/openssl/test/
H A Dcmp_ctx_test.c320 static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, in test_certConf_cb() argument
749 DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, cert, X509) in DEFINE_SET_CB_TEST()
H A Dssl_old_test.c676 " -s_key arg - Server key file (default: same as -cert)\n"); in sv_usage()
771 X509 *cert; in print_details() local
779 cert = SSL_get0_peer_certificate(c_ssl); in print_details()
780 if (cert != NULL) { in print_details()
781 EVP_PKEY* pubkey = X509_get0_pubkey(cert); in print_details()
2918 printf("In app_verify_callback, allowing cert. "); in app_verify_callback()
2920 printf("Finished printing do we have a context? 0x%p a cert? 0x%p\n", in app_verify_callback()
2925 printf("cert depth=%d %s\n", in app_verify_callback()
/third_party/openssl/ohos_lite/include/openssl/
H A Dx509v3.h367 # define EXFLAG_SS 0x2000 /* cert is apparently self-signed */
570 X509 *cert);
582 const char *section, X509 *cert); variable
/third_party/openssl/crypto/ts/
H A Dts_rsp_sign.c706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() local
707 PKCS7_add_certificate(p7, cert); in ts_RESP_sign()
/foundation/communication/netstack/frameworks/js/napi/tls/src/
H A Dtls_socket_server.cpp482 const auto &cert = TLSServerConfiguration_.GetCertificate(); in GetCertificate() local
483 NETSTACK_LOGI("cert der is %{public}d", cert.encodingFormat); in GetCertificate()
484 if (!cert.data.Length()) { in GetCertificate()
485 CallOnErrorCallback(-1, "cert not data Length"); in GetCertificate()
489 callback(TlsSocket::TLSSOCKET_SUCCESS, cert); in GetCertificate()
1154 reason = IP + hostName + " is not in the cert's list"; in CheckIpAndDnsName()
1165 tmpStr = ". is not in the cert's altnames"; in CheckIpAndDnsName()
1174 tmpStr = ". is not cert's CN"; in CheckIpAndDnsName()
1254 return HOST_NAME + hostname + ". is cert' in CheckServerIdentityLegal()
[all...]
/foundation/communication/netstack/frameworks/js/napi/http/http_exec/src/
H A Dhttp_exec.cpp907 std::string cert; in AddCurlHandle() local
911 context->options.GetClientCert(cert, certType, key, keyPasswd); in AddCurlHandle()
912 if (cert.empty()) { in AddCurlHandle()
916 NETSTACK_CURL_EASY_SET_OPTION(curl, CURLOPT_SSLCERT, cert.c_str(), context); in AddCurlHandle()
957 NETSTACK_LOGE("loading certificates from context cert error."); in AddCurlHandle()
970 // add app cert path in AddCurlHandle()
976 // add user cert path in AddCurlHandle()
979 // add system cert path in AddCurlHandle()
1013 // in real life, you should buy a ssl certification and rename it to /etc/ssl/cert.pem in AddCurlHandle()
/third_party/node/deps/openssl/openssl/apps/
H A Ds_client.c519 {"cert", OPT_CERT, '<', "Client certificate file to use"},
525 {"key", OPT_KEY, 's', "Private key file to use; default: -cert file"},
527 {"pass", OPT_PASS, 's', "Private key and cert file pass phrase source"},
789 X509 *cert = NULL; in s_client_main() local
1635 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main()
1637 if (cert == NULL) in s_client_main()
1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main()
3096 X509_free(cert); in s_client_main()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_clnt.c48 /* TLS does not like anon-DH with client cert */ in cert_req_allowed()
579 * For TLS, cert_req is set to 2, so a cert chain of nothing is in ossl_statem_client_write_transition()
1780 /* prepare server cert verification by setting s->session->peer_chain from pkt */
1864 * Verify the s->session->peer_chain and check server cert type.
3413 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client
3425 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && in ssl3_check_client_certificate()
3438 /* Let cert callback update client certificates if required */ in tls_prepare_client_certificate()
3439 if (s->cert->cert_cb) { in tls_prepare_client_certificate()
3440 i = s->cert->cert_cb(s, s->cert in tls_prepare_client_certificate()
[all...]
/third_party/openssl/apps/
H A Ds_client.c519 {"cert", OPT_CERT, '<', "Client certificate file to use"},
525 {"key", OPT_KEY, 's', "Private key file to use; default: -cert file"},
527 {"pass", OPT_PASS, 's', "Private key and cert file pass phrase source"},
789 X509 *cert = NULL; in s_client_main() local
1635 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main()
1637 if (cert == NULL) in s_client_main()
1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main()
3096 X509_free(cert); in s_client_main()
/third_party/openssl/ssl/statem/
H A Dstatem_clnt.c48 /* TLS does not like anon-DH with client cert */ in cert_req_allowed()
579 * For TLS, cert_req is set to 2, so a cert chain of nothing is in ossl_statem_client_write_transition()
1772 /* prepare server cert verification by setting s->session->peer_chain from pkt */
1856 * Verify the s->session->peer_chain and check server cert type.
3405 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client
3417 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && in ssl3_check_client_certificate()
3430 /* Let cert callback update client certificates if required */ in tls_prepare_client_certificate()
3431 if (s->cert->cert_cb) { in tls_prepare_client_certificate()
3432 i = s->cert->cert_cb(s, s->cert in tls_prepare_client_certificate()
[all...]
/foundation/communication/netstack/test/unittest/tls_test/client/
H A DTlsSocketUnilateralConnection.cpp280 [](int32_t errCode, const X509CertRawData &cert) { EXPECT_TRUE(errCode == TLSSOCKET_SUCCESS); }); in HWTEST_F()
H A DTlsSocketCertChainOneWayTest.cpp229 [](int32_t errCode, const X509CertRawData &cert) { EXPECT_TRUE(errCode == TLSSOCKET_SUCCESS); }); in HWTEST_F()
H A DTlsSocketOneWayTest.cpp229 [](int32_t errCode, const X509CertRawData &cert) { EXPECT_TRUE(errCode == TLSSOCKET_SUCCESS); }); in HWTEST_F()

Completed in 71 milliseconds

1...<<31323334353637383940>>...49