Home
last modified time | relevance | path

Searched refs:cert (Results 1 - 25 of 1020) sorted by relevance

12345678910>>...41

/third_party/node/test/parallel/
H A Dtest-tls-passphrase.js33 const cert = fixtures.readKey('rsa_cert.crt');
36 assert(Buffer.isBuffer(cert));
38 assert.strictEqual(typeof cert.toString(), 'string');
47 cert: cert,
48 ca: [cert],
59 cert: cert,
66 cert: cert,
[all...]
H A Dtest-tls-client-auth.js15 function checkServerIdentity(hostname, cert) {
17 assert.strictEqual(cert.subject.CN, 'agent10.example.com');
20 // Split out the single end-entity cert and the subordinate CA for later use.
21 split(client.cert, client);
22 split(server.cert, server);
31 // Typical setup, nothing special, complete cert chains sent to peer.
35 cert: client.cert,
41 cert: server.cert,
[all...]
H A Dtest-tls-client-verify.js32 { ca: ['ca1-cert'],
34 cert: 'agent2-cert',
36 { ok: true, key: 'agent1-key', cert: 'agent1-cert' },
37 { ok: false, key: 'agent2-key', cert: 'agent2-cert' },
38 { ok: false, key: 'agent3-key', cert: 'agent3-cert' },
43 cert
[all...]
H A Dtest-tls-options-boolean-check.js25 const certBuff = fixtures.readKey('agent1-cert.pem');
27 const certBuff2 = fixtures.readKey('ec-cert.pem');
28 const caCert = fixtures.readKey('ca1-cert.pem');
29 const caCert2 = fixtures.readKey('ca2-cert.pem');
44 // Format ['key', 'cert']
65 ].forEach(([key, cert]) => {
66 tls.createServer({ key, cert });
70 // Format ['key', 'cert', 'expected message']
83 ].forEach(([key, cert, index]) => {
86 tls.createServer({ key, cert });
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dtests.rs46 let cert = include_bytes!("../../test/cert.pem"); in test_cert_loading()
47 let cert = X509::from_pem(cert).unwrap(); in test_cert_loading()
48 let fingerprint = cert.digest(MessageDigest::sha1()).unwrap(); in test_cert_loading()
58 let cert = include_bytes!("../../test/cert.pem"); in test_debug()
59 let cert = X509::from_pem(cert).unwrap(); in test_debug()
60 let debugged = format!("{:#?}", cert); in test_debug()
[all...]
/third_party/openssl/test/certs/
H A Dmkcert.sh90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
135 local cert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
163 local cert
[all...]
/third_party/node/src/crypto/
H A Dcrypto_x509.cc33 ManagedX509::ManagedX509(X509Pointer&& cert) : cert_(std::move(cert)) {} in ManagedX509() argument
51 tracker->TrackFieldWithSize("cert", size); in MemoryInfo()
58 X509Certificate* cert; in Fingerprint() local
59 ASSIGN_OR_RETURN_UNWRAP(&cert, args.Holder()); in Fingerprint()
61 if (GetFingerprintDigest(env, algo(), cert->get()).ToLocal(&ret)) in Fingerprint()
111 X509Pointer cert, in New()
113 std::shared_ptr<ManagedX509> mcert(new ManagedX509(std::move(cert))); in New()
119 std::shared_ptr<ManagedX509> cert, in New()
130 new X509Certificate(env, obj, std::move(cert), issuer_chai in New()
109 New( Environment* env, X509Pointer cert, STACK_OF(X509)* issuer_chain) New() argument
117 New( Environment* env, std::shared_ptr<ManagedX509> cert, STACK_OF(X509)* issuer_chain) New() argument
138 X509* cert = SSL_get_certificate(ssl.get()); GetCert() local
211 X509Certificate* cert; ReturnPropertyThroughBIO() local
247 X509Certificate* cert; ReturnProperty() local
267 X509Certificate* cert; PublicKey() local
286 X509Certificate* cert; Pem() local
295 X509Certificate* cert; CheckCA() local
303 X509Certificate* cert; CheckHost() local
338 X509Certificate* cert; CheckEmail() local
365 X509Certificate* cert; CheckIP() local
388 X509Certificate* cert; CheckIssued() local
404 X509Certificate* cert; CheckPrivateKey() local
421 X509Certificate* cert; Verify() local
439 X509Certificate* cert; ToLegacy() local
448 X509Certificate* cert; GetIssuerCert() local
454 X509Certificate( Environment* env, Local<Object> object, std::shared_ptr<ManagedX509> cert, STACK_OF(X509)* issuer_chain) X509Certificate() argument
[all...]
H A Dcrypto_common.h28 X509Pointer SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert);
96 X509* cert);
100 X509* cert,
105 X509* cert,
111 X509* cert);
113 v8::MaybeLocal<v8::Value> GetKeyUsage(Environment* env, X509* cert);
119 v8::MaybeLocal<v8::Value> GetSerialNumber(Environment* env, X509* cert);
121 v8::MaybeLocal<v8::Value> GetRawDERCertificate(Environment* env, X509* cert);
127 X509* cert,
131 X509* cert,
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert in x509_certificate_free()
67 x509_certificate_chain_free(struct x509_certificate *cert) x509_certificate_chain_free() argument
216 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_public_key() argument
686 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_validity() argument
765 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_key_usage() argument
798 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_basic_constraints() argument
1049 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_subject_alt_name() argument
1073 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_issuer_alt_name() argument
1146 x509_parse_ext_certificate_policies(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_certificate_policies() argument
1270 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_ext_key_usage() argument
1324 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) x509_parse_extension_data() argument
1355 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) x509_parse_extension() argument
1429 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_extensions() argument
1455 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_tbs_certificate() argument
1731 struct x509_certificate *cert; x509_certificate_parse() local
1828 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) x509_certificate_check_signature() argument
2105 x509_valid_issuer(const struct x509_certificate *cert) x509_valid_issuer() argument
2146 struct x509_certificate *cert, *trust; x509_certificate_chain_validate() local
2275 struct x509_certificate *cert; x509_certificate_get_subject() local
2290 x509_certificate_self_signed(struct x509_certificate *cert) x509_certificate_self_signed() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert in x509_certificate_free()
67 x509_certificate_chain_free(struct x509_certificate *cert) x509_certificate_chain_free() argument
219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_public_key() argument
692 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_validity() argument
775 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_key_usage() argument
812 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_basic_constraints() argument
1069 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_subject_alt_name() argument
1096 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_issuer_alt_name() argument
1172 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_ext_ext_key_usage() argument
1229 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) x509_parse_extension_data() argument
1259 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) x509_parse_extension() argument
1336 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) x509_parse_extensions() argument
1366 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) x509_parse_tbs_certificate() argument
1657 struct x509_certificate *cert; x509_certificate_parse() local
1758 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) x509_certificate_check_signature() argument
2043 x509_valid_issuer(const struct x509_certificate *cert) x509_valid_issuer() argument
2084 struct x509_certificate *cert, *trust; x509_certificate_chain_validate() local
2213 struct x509_certificate *cert; x509_certificate_get_subject() local
2228 x509_certificate_self_signed(struct x509_certificate *cert) x509_certificate_self_signed() argument
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/
H A Dssl_cert.c28 CERT *cert; in __ssl_cert_new() local
33 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new()
34 if (!cert) { in __ssl_cert_new()
35 SSL_DEBUG(SSL_CERT_ERROR_LEVEL, "no enough memory > (cert)"); in __ssl_cert_new()
47 cert->pkey = __EVP_PKEY_new(ipk, rngctx); in __ssl_cert_new()
48 if (!cert->pkey) { in __ssl_cert_new()
53 cert->x509 = __X509_new(ix); in __ssl_cert_new()
54 if (!cert->x509) { in __ssl_cert_new()
59 return cert; in __ssl_cert_new()
62 EVP_PKEY_free(cert in __ssl_cert_new()
80 ssl_cert_free(CERT *cert) ssl_cert_free() argument
[all...]
/third_party/python/Lib/test/
H A Dmake_ssl_certs.py121 print("creating cert for " + hostname)
164 cert = f.read()
167 return cert, key
228 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple')
230 f.write(cert)
239 f.write(cert)
242 f.write(cert)
246 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple')
249 f.write(cert)
251 cert, ke
[all...]
/third_party/nghttp2/src/
H A Dshrpx_tls_test.cc199 auto cert = PEM_read_X509(f, nullptr, nullptr, nullptr); in load_cert() local
203 return cert; in load_cert()
232 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local
235 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname()
239 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname()
245 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local
248 tls::verify_numeric_hostname(cert, StringRef::from_lit(ipaddr), &addr); in test_shrpx_tls_verify_numeric_hostname()
252 X509_free(cert); in test_shrpx_tls_verify_numeric_hostname()
258 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); in test_shrpx_tls_verify_numeric_hostname() local
261 tls::verify_numeric_hostname(cert, StringRe in test_shrpx_tls_verify_numeric_hostname()
271 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/ipaddr.crt"); test_shrpx_tls_verify_numeric_hostname() local
284 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/nosan_ip.crt"); test_shrpx_tls_verify_numeric_hostname() local
298 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local
309 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local
320 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/verify_hostname.crt"); test_shrpx_tls_verify_dns_hostname() local
330 auto cert = load_cert(NGHTTP2_SRC_DIR "/testdata/nosan.crt"); test_shrpx_tls_verify_dns_hostname() local
[all...]
/third_party/curl/lib/vtls/
H A Dx509asn1.c737 int Curl_parseX509(struct Curl_X509certificate *cert, in Curl_parseX509() argument
745 cert->certificate.header = NULL; in Curl_parseX509()
746 cert->certificate.beg = beg; in Curl_parseX509()
747 cert->certificate.end = end; in Curl_parseX509()
760 beg = getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509()
764 if(!getASN1Element(&cert->signature, beg, end)) in Curl_parseX509()
771 cert->version.header = NULL; in Curl_parseX509()
772 cert->version.beg = &defaultVersion; in Curl_parseX509()
773 cert->version.end = &defaultVersion + sizeof(defaultVersion); in Curl_parseX509()
778 if(!getASN1Element(&cert in Curl_parseX509()
1050 struct Curl_X509certificate cert; Curl_extract_certinfo() local
[all...]
/third_party/python/Modules/_ssl/
H A Dcert.c15 #include "clinic/cert.c.h"
18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument
23 assert(cert != NULL); in newCertificate()
30 X509_up_ref(cert); in newCertificate()
32 self->cert = cert; in newCertificate()
39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument
41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509()
56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local
57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upre in _PySSL_CertificateFromX509Stack()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ess/
H A Dess_lib.c18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert,
21 const X509 *cert,
42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local
44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init()
57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument
66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init()
81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init()
88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init()
119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local
121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init()
136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument
197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument
220 const X509 *cert; find() local
[all...]
/third_party/openssl/crypto/ess/
H A Dess_lib.c18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert,
21 const X509 *cert,
42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local
44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init()
57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument
66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init()
81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init()
88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init()
119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local
121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init()
136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument
197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument
220 const X509 *cert; find() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature()
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
45 pubkey = X509_get_pubkey(cert); in verify_signature()
63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
100 * certs (possibly including CRLs and a cert verification callback function)
106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path()
112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */
25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument
105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument
206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument
225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument
344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument
374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local
[all...]
/third_party/openssl/crypto/cmp/
H A Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature()
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
45 pubkey = X509_get_pubkey(cert); in verify_signature()
63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
100 * certs (possibly including CRLs and a cert verification callback function)
106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path()
112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */
25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument
105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument
206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument
225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument
344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument
374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dpkcs12.rs43 cert: parsed.cert.unwrap(), in parse()
55 let mut cert = ptr::null_mut(); in parse2() variables
62 &mut cert, in parse2()
67 let cert = X509::from_ptr_opt(cert); in parse2()
70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2()
99 cert: None, in builder()
114 pub cert: X509,
120 pub cert
157 pub fn cert(&mut self, cert: &X509Ref) -> &mut Self { cert() functions
[all...]
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_cert.c85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument
96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
104 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup()
132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup()
135 OPENSSL_malloc(cert in ssl_cert_dup()
[all...]
/third_party/openssl/ssl/
H A Dssl_cert.c85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument
96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
104 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup()
132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup()
135 OPENSSL_malloc(cert in ssl_cert_dup()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ocsp/
H A Docsp_srv.c157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument
159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert()
236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument
238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name()
246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument
258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex()
279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument
281 if (cert == NULL) in OCSP_RESPID_set_by_key()
283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key()
286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument
322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument
[all...]
/third_party/openssl/crypto/ocsp/
H A Docsp_srv.c157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument
159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert()
236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument
238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name()
246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument
258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex()
279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument
281 if (cert == NULL) in OCSP_RESPID_set_by_key()
283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key()
286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument
322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/pkcs12/
H A Dp12_crt.c18 X509 *cert,
38 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex()
63 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex()
68 if (pkey && cert) { in PKCS12_create_ex()
69 if (!X509_check_private_key(cert, pkey)) in PKCS12_create_ex()
71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex()
75 if (cert) { in PKCS12_create_ex()
77 name = (char *)X509_alias_get0(cert, &namelen); in PKCS12_create_ex()
82 pkeyid = X509_keyid_get0(cert, &pkeyidlen); in PKCS12_create_ex()
85 bag = pkcs12_add_cert_bag(&bags, cert, nam in PKCS12_create_ex()
37 PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_create_ex() argument
148 PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) PKCS12_create() argument
[all...]

Completed in 12 milliseconds

12345678910>>...41