/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 33 sig->data = cert->tbs; in x509_get_sig_params() 34 sig->data_size = cert->tbs_size; in x509_get_sig_params() 36 if (!cert->pub->pkey_algo) in x509_get_sig_params() 37 cert->unsupported_key = true; in x509_get_sig_params() 40 cert->unsupported_sig = true; in x509_get_sig_params() 44 cert->unsupported_sig = true; in x509_get_sig_params() 48 sig->s = kmemdup(cert->raw_sig, cert in x509_get_sig_params() 104 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 163 struct x509_certificate *cert; x509_key_preparse() local [all...] |
H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 22 const void *cert_start; /* Start of cert content */ 46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 48 if (cert) { in x509_free_certificate() 49 public_key_free(cert->pub); in x509_free_certificate() 50 public_key_signature_free(cert->sig); in x509_free_certificate() 51 kfree(cert->issuer); in x509_free_certificate() 52 kfree(cert->subject); in x509_free_certificate() 53 kfree(cert->id); in x509_free_certificate() 54 kfree(cert in x509_free_certificate() 65 struct x509_certificate *cert; x509_cert_parse() local [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-passphrase.js | 33 const cert = fixtures.readKey('rsa_cert.crt'); 36 assert(Buffer.isBuffer(cert)); 38 assert.strictEqual(typeof cert.toString(), 'string'); 47 cert: cert, 48 ca: [cert], 59 cert: cert, 66 cert: cert, [all...] |
H A D | test-tls-client-auth.js | 15 function checkServerIdentity(hostname, cert) { 17 assert.strictEqual(cert.subject.CN, 'agent10.example.com'); 20 // Split out the single end-entity cert and the subordinate CA for later use. 21 split(client.cert, client); 22 split(server.cert, server); 31 // Typical setup, nothing special, complete cert chains sent to peer. 35 cert: client.cert, 41 cert: server.cert, [all...] |
H A D | test-tls-client-verify.js | 32 { ca: ['ca1-cert'], 34 cert: 'agent2-cert', 36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, 37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, 38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' }, 43 cert [all...] |
H A D | test-tls-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 tls.createServer({ key, cert }); 70 // Format ['key', 'cert', 'expected message'] 83 ].forEach(([key, cert, index]) => { 86 tls.createServer({ key, cert }); [all...] |
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 25 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 27 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 35 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 39 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 47 cert->unsupported_sig = true; in x509_get_sig_params() 67 if (strcmp(cert->pub->pkey_algo, "sm2") == 0) { in x509_get_sig_params() 70 sm2_compute_z_digest(desc, cert->pub->key, in x509_get_sig_params() 71 cert->pub->keylen, sig->digest) ?: in x509_get_sig_params() 75 crypto_shash_finup(desc, cert in x509_get_sig_params() 106 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 165 struct x509_certificate *cert; x509_key_preparse() local [all...] |
H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 26 enum OID key_algo; /* Algorithm used by the cert's key */ 28 enum OID sig_algo; /* Algorithm used to sign the cert */ 44 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 46 if (cert) { in x509_free_certificate() 47 public_key_free(cert->pub); in x509_free_certificate() 48 public_key_signature_free(cert->sig); in x509_free_certificate() 49 kfree(cert->issuer); in x509_free_certificate() 50 kfree(cert->subject); in x509_free_certificate() 51 kfree(cert in x509_free_certificate() 63 struct x509_certificate *cert; x509_cert_parse() local [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | tests.rs | 46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading() 47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading() 48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading() 58 let cert = include_bytes!("../../test/cert.pem"); in test_debug() 59 let cert = X509::from_pem(cert).unwrap(); in test_debug() 60 let debugged = format!("{:#?}", cert); in test_debug() [all...] |
/third_party/openssl/test/certs/ |
H A D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
H A D | ssl_cert.c | 28 CERT *cert; in __ssl_cert_new() local 33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 34 if (!cert) { in __ssl_cert_new() 35 SSL_DEBUG(SSL_CERT_ERROR_LEVEL, "no enough memory > (cert)"); in __ssl_cert_new() 47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new() 48 if (!cert->pkey) { in __ssl_cert_new() 53 cert->x509 = __X509_new(ix); in __ssl_cert_new() 54 if (!cert->x509) { in __ssl_cert_new() 59 return cert; in __ssl_cert_new() 62 EVP_PKEY_free(cert in __ssl_cert_new() 80 ssl_cert_free(CERT *cert) ssl_cert_free() argument [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_x509.cc | 33 ManagedX509::ManagedX509(X509Pointer&& cert) : cert_(std::move(cert)) {} in ManagedX509() argument 51 tracker->TrackFieldWithSize("cert", size); in MemoryInfo() 58 X509Certificate* cert; in Fingerprint() local 59 ASSIGN_OR_RETURN_UNWRAP(&cert, args.Holder()); in Fingerprint() 61 if (GetFingerprintDigest(env, algo(), cert->get()).ToLocal(&ret)) in Fingerprint() 111 X509Pointer cert, in New() 113 std::shared_ptr<ManagedX509> mcert(new ManagedX509(std::move(cert))); in New() 119 std::shared_ptr<ManagedX509> cert, in New() 130 new X509Certificate(env, obj, std::move(cert), issuer_chai in New() 109 New( Environment* env, X509Pointer cert, STACK_OF(X509)* issuer_chain) New() argument 117 New( Environment* env, std::shared_ptr<ManagedX509> cert, STACK_OF(X509)* issuer_chain) New() argument 138 X509* cert = SSL_get_certificate(ssl.get()); GetCert() local 211 X509Certificate* cert; ReturnPropertyThroughBIO() local 247 X509Certificate* cert; ReturnProperty() local 267 X509Certificate* cert; PublicKey() local 286 X509Certificate* cert; Pem() local 295 X509Certificate* cert; CheckCA() local 303 X509Certificate* cert; CheckHost() local 338 X509Certificate* cert; CheckEmail() local 365 X509Certificate* cert; CheckIP() local 388 X509Certificate* cert; CheckIssued() local 404 X509Certificate* cert; CheckPrivateKey() local 421 X509Certificate* cert; Verify() local 439 X509Certificate* cert; ToLegacy() local 448 X509Certificate* cert; GetIssuerCert() local 454 X509Certificate( Environment* env, Local<Object> object, std::shared_ptr<ManagedX509> cert, STACK_OF(X509)* issuer_chain) X509Certificate() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert in x509_certificate_free() 67 x509_certificate_chain_free(struct x509_certificate *cert) x509_certificate_chain_free() argument 216 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_public_key() argument 686 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_validity() argument 765 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_key_usage() argument 798 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_basic_constraints() argument 1049 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_subject_alt_name() argument 1073 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_issuer_alt_name() argument 1146 x509_parse_ext_certificate_policies(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_certificate_policies() argument 1270 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_ext_key_usage() argument 1324 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) x509_parse_extension_data() argument 1355 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) x509_parse_extension() argument 1429 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_extensions() argument 1455 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_tbs_certificate() argument 1731 struct x509_certificate *cert; x509_certificate_parse() local 1828 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) x509_certificate_check_signature() argument 2105 x509_valid_issuer(const struct x509_certificate *cert) x509_valid_issuer() argument 2146 struct x509_certificate *cert, *trust; x509_certificate_chain_validate() local 2275 struct x509_certificate *cert; x509_certificate_get_subject() local 2290 x509_certificate_self_signed(struct x509_certificate *cert) x509_certificate_self_signed() argument [all...] |
/kernel/linux/common_modules/code_sign/ |
H A D | verify_cert_chain.c | 31 struct x509_certificate *cert; in pkcs7_find_key() local 37 cert = pkcs7->certs; in pkcs7_find_key() 38 while (cert) { in pkcs7_find_key() 39 if (asymmetric_key_id_same(cert->id, sinfo->sig->auth_ids[0])) { in pkcs7_find_key() 40 if (strcmp(cert->pub->pkey_algo, sinfo->sig->pkey_algo) != 0 in pkcs7_find_key() 41 && (strncmp(cert->pub->pkey_algo, "ecdsa-", 6) != 0 in pkcs7_find_key() 42 || strcmp(cert->sig->pkey_algo, "ecdsa") != 0)) { in pkcs7_find_key() 44 cert = cert->next; in pkcs7_find_key() 50 sinfo->index, cert in pkcs7_find_key() 189 struct x509_certificate* cert = pkcs7->certs; code_sign_verify_certchain() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert in x509_certificate_free() 67 x509_certificate_chain_free(struct x509_certificate *cert) x509_certificate_chain_free() argument 219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_public_key() argument 692 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_validity() argument 775 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_key_usage() argument 812 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_basic_constraints() argument 1069 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_subject_alt_name() argument 1096 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_issuer_alt_name() argument 1172 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_ext_key_usage() argument 1229 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) x509_parse_extension_data() argument 1259 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) x509_parse_extension() argument 1336 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_extensions() argument 1366 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_tbs_certificate() argument 1657 struct x509_certificate *cert; x509_certificate_parse() local 1758 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) x509_certificate_check_signature() argument 2043 x509_valid_issuer(const struct x509_certificate *cert) x509_valid_issuer() argument 2084 struct x509_certificate *cert, *trust; x509_certificate_chain_validate() local 2213 struct x509_certificate *cert; x509_certificate_get_subject() local 2228 x509_certificate_self_signed(struct x509_certificate *cert) x509_certificate_self_signed() argument [all...] |
/third_party/python/Lib/test/ |
H A D | make_ssl_certs.py | 121 print("creating cert for " + hostname) 164 cert = f.read() 167 return cert, key 228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') 230 f.write(cert) 239 f.write(cert) 242 f.write(cert) 246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') 249 f.write(cert) 251 cert, ke [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_tls_test.cc | 199 auto cert = PEM_read_X509(f, nullptr, nullptr, nullptr); in load_cert() local 203 return cert; in load_cert() 232 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 235 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() 239 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname() 245 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 248 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname() 252 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname() 258 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local 261 tls::verify_numeric_hostname(cert, StringRe in test_shrpx_tls_verify_numeric_hostname() 271 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/ipaddr.crt"); test_shrpx_tls_verify_numeric_hostname() local 284 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/nosan_ip.crt"); test_shrpx_tls_verify_numeric_hostname() local 298 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local 309 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local 320 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local 330 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/nosan.crt"); test_shrpx_tls_verify_dns_hostname() local [all...] |
/kernel/linux/linux-6.6/arch/s390/boot/ |
H A D | ipl_report.c | 31 struct ipl_rb_certificate_entry *cert; in get_cert_comp_list_size() local 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 43 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in get_cert_comp_list_size() 50 struct ipl_rb_certificate_entry *cert; in ipl_report_certs_intersects() local 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 56 if (intersects(addr, size, cert->addr, cert->len)) { in ipl_report_certs_intersects() 57 *intersection_start = cert->addr; in ipl_report_certs_intersects() 75 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 79 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
/third_party/curl/lib/vtls/ |
H A D | x509asn1.c | 737 int Curl_parseX509(struct Curl_X509certificate *cert, in Curl_parseX509() argument 745 cert->certificate.header = NULL; in Curl_parseX509() 746 cert->certificate.beg = beg; in Curl_parseX509() 747 cert->certificate.end = end; in Curl_parseX509() 760 beg = getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509() 764 if(!getASN1Element(&cert->signature, beg, end)) in Curl_parseX509() 771 cert->version.header = NULL; in Curl_parseX509() 772 cert->version.beg = &defaultVersion; in Curl_parseX509() 773 cert->version.end = &defaultVersion + sizeof(defaultVersion); in Curl_parseX509() 778 if(!getASN1Element(&cert in Curl_parseX509() 1050 struct Curl_X509certificate cert; Curl_extract_certinfo() local [all...] |
/third_party/python/Modules/_ssl/ |
H A D | cert.c | 15 #include "clinic/cert.c.h" 18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument 23 assert(cert != NULL); in newCertificate() 30 X509_up_ref(cert); in newCertificate() 32 self->cert = cert; in newCertificate() 39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument 41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509() 56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local 57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upre in _PySSL_CertificateFromX509Stack() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ess/ |
H A D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init() 136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument 197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument 220 const X509 *cert; find() local [all...] |
/third_party/openssl/crypto/ess/ |
H A D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init() 136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument 197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument 220 const X509 *cert; find() local [all...] |
/kernel/linux/linux-5.10/arch/s390/boot/ |
H A D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 73 for_each_rb_entry(cert, certs) in find_bootdata_space() 74 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 75 safe_addr = cert->addr + cert->len; in find_bootdata_space() 95 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 99 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |
/third_party/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |