Home
last modified time | relevance | path

Searched refs:certificate (Results 1 - 25 of 48) sorted by relevance

12

/third_party/node/test/parallel/
H A Dtest-crypto-certificate.js42 function checkMethods(certificate) {
44 assert.strictEqual(certificate.verifySpkac(spkacValid), true);
45 assert.strictEqual(certificate.verifySpkac(spkacFail), false);
48 stripLineEndings(certificate.exportPublicKey(spkacValid).toString('utf8')),
51 assert.strictEqual(certificate.exportPublicKey(spkacFail), '');
54 certificate.exportChallenge(spkacValid).toString('utf8'),
57 assert.strictEqual(certificate.exportChallenge(spkacFail), '');
60 assert.strictEqual(certificate.verifySpkac(ab), true);
61 assert.strictEqual(certificate.verifySpkac(new Uint8Array(ab)), true);
62 assert.strictEqual(certificate
[all...]
H A Dtest-tls-key-mismatch.js33 /^Error: error:05800074:x509 certificate routines::key values mismatch$/ :
34 /^Error: error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch$/;
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/
H A Dcertificate.js8 // leaf certificate.
27 // If we failed to verify the certificate chain for all of the trusted
31 message: 'Failed to verify certificate chain',
46 // Construct certificate path from leaf to root
48 // Perform validation checks on each certificate in the path
50 // Return verified certificate path
57 // Filter for paths which contain a trusted certificate
62 message: 'no trusted certificate path found',
69 // Removes the last certificate in the path, which will be a second copy
70 // of the root certificate give
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/
H A Dwpa_evp_key.c189 struct Credential certificate = { 0 }; in get_pubkey() local
190 certificate.credData.data = (uint8_t *)malloc(MAX_LEN_CERTIFICATE_CHAIN); in get_pubkey()
191 if (certificate.credData.data == NULL) { in get_pubkey()
192 wpa_printf(MSG_ERROR, "%s malloc certificate.credData.data fail", __func__); in get_pubkey()
196 BIO* bio = BIO_from_cm(key_id, certificate); in get_pubkey()
199 if (certificate.credData.data != NULL) { in get_pubkey()
200 free(certificate.credData.data); in get_pubkey()
207 if (certificate.credData.data != NULL) { in get_pubkey()
208 free(certificate.credData.data); in get_pubkey()
262 BIO *BIO_from_cm(const char *key_id, struct Credential certificate) in BIO_from_cm() argument
[all...]
H A Dwpa_evp_key.h21 BIO *BIO_from_cm(const char *key_id, struct Credential certificate);
/third_party/node/deps/npm/node_modules/@sigstore/core/dist/
H A Dpem.js21 function toDER(certificate) {
23 certificate.split('\n').forEach((line) => {
33 // encoding dictates that each certificate should have a trailing newline after
35 function fromDER(certificate, type = 'CERTIFICATE') {
36 // Base64-encode the certificate.
37 const der = certificate.toString('base64');
38 // Split the certificate into lines of 64 characters.
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/
H A Dsigstore_bundle.js43 : isSet(object.certificate)
44 ? { $case: "certificate", certificate: sigstore_common_1.X509Certificate.fromJSON(object.certificate) }
62 message.content?.$case === "certificate" &&
63 (obj.certificate = message.content?.certificate
64 ? sigstore_common_1.X509Certificate.toJSON(message.content?.certificate)
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/bundler/
H A Dbundle.js51 certificate: signature.key.$case === 'x509Certificate'
52 ? util_1.pem.toDER(signature.key.certificate)
64 certificate: signature.key.$case === 'x509Certificate'
65 ? util_1.pem.toDER(signature.key.certificate)
H A Dbase.js42 // or the certificate, depending on the type of key material.
48 return key.certificate;
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/bundle/
H A Dindex.js48 $case: 'certificate',
49 certificate: core_1.X509Certificate.parse(bundle.verificationMaterial.content.x509CertificateChain
52 case 'certificate':
54 $case: 'certificate',
55 certificate: core_1.X509Certificate.parse(bundle.verificationMaterial.content.certificate.rawBytes),
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/src/
H A Dcert_manager_api.c24 struct Credential *certificate) in CmGetAppCert()
26 CM_LOG_D("enter get app certificate"); in CmGetAppCert()
27 if (keyUri == NULL || certificate == NULL || (store != CM_CREDENTIAL_STORE && in CmGetAppCert()
32 int32_t ret = CmClientGetAppCert(keyUri, store, certificate); in CmGetAppCert()
33 CM_LOG_D("leave get app certificate, result = %d", ret); in CmGetAppCert()
23 CmGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate) CmGetAppCert() argument
H A Dcm_ipc_client.c126 struct Credential *certificate) in GetAppCert()
162 ret = CmAppCertInfoUnpackFromService(&outBlob, certificate); in GetAppCert()
173 int32_t CmClientGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate) in CmClientGetAppCert() argument
175 return GetAppCert(CM_MSG_GET_APP_CERTIFICATE, keyUri, store, certificate); in CmClientGetAppCert()
125 GetAppCert(enum CertManagerInterfaceCode type, const struct CmBlob *certUri, const uint32_t store, struct Credential *certificate) GetAppCert() argument
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/
H A Dpolicy.js9 message: `certificate identity error - expected ${policyIdentity}, got ${signerIdentity}`,
20 message: `invalid certificate extension - expected ${key}=${policyExtensions[key]}, got ${key}=${signerExtensions[key]}`,
H A Dverifier.js86 case 'certificate': {
87 const result = (0, key_1.verifyCertificate)(key.certificate, timestamps, this.trustMaterial);
/third_party/node/deps/npm/node_modules/@sigstore/bundle/dist/
H A Dbuild.js73 if (options.certificate) {
77 certificates: [{ rawBytes: options.certificate }],
/third_party/python/PCbuild/
H A Dprepare_ssl.bat16 echo. --certificate (-c) The signing certificate to use for binaries.
30 if "%~1"=="--certificate" (set SigningCertificate=%~2) && shift && shift & goto CheckOpts
H A Dprepare_tcltk.bat16 echo. --certificate (-c) The signing certificate to use for binaries.
32 if "%~1"=="--certificate" (set SigningCertificate=%~2) && shift && shift & goto CheckOpts
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/cert_mgr_deps/include/
H A Dcm_ipc_client.h27 int32_t CmClientGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate);
H A Dcert_manager_api.h25 CM_API_EXPORT int32_t CmGetAppCert(const struct CmBlob *keyUri, const uint32_t store, struct Credential *certificate);
/third_party/curl/lib/vtls/
H A Dx509asn1.c171 * It is intended to support certificate information gathering for SSL backends
173 * entry points to get particular certificate sub-fields.
733 * ASN.1 parse an X509 certificate into structure subfields.
745 cert->certificate.header = NULL; in Curl_parseX509()
746 cert->certificate.beg = beg; in Curl_parseX509()
747 cert->certificate.end = end; in Curl_parseX509()
923 /* Generate a certificate information record for the public key. */ in do_pubkey_field()
1065 /* Prepare the certificate information for curl_easy_getinfo(). */ in Curl_extract_certinfo()
1067 /* Extract the certificate ASN.1 elements. */ in Curl_extract_certinfo()
1184 /* Generate PEM certificate in Curl_extract_certinfo()
[all...]
H A Dx509asn1.h50 /* X509 certificate: RFC 5280. */
52 struct Curl_asn1Element certificate; member
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_lib.c117 ossl_x509_set0_libctx(cch->d.certificate, libctx, propq); in ossl_cms_resolve_libctx()
536 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
546 cch->d.certificate = cert; in CMS_add0_cert()
640 if (!ossl_x509_add_cert_new(&certs, cch->d.certificate, in STACK_OF()
/third_party/openssl/crypto/cms/
H A Dcms_lib.c104 ossl_x509_set0_libctx(cch->d.certificate, libctx, propq); in ossl_cms_resolve_libctx()
523 if (!X509_cmp(cch->d.certificate, cert)) { in CMS_add0_cert()
533 cch->d.certificate = cert; in CMS_add0_cert()
627 if (!ossl_x509_add_cert_new(&certs, cch->d.certificate, in STACK_OF()
/third_party/python/Modules/
H A D_ssl.c5 certificate decoding. Chris Stawarz contributed some non-blocking
398 "A certificate could not be verified.");
491 "Hostname mismatch, certificate is not valid for '%S'.", in fill_and_set_sslerror()
497 "IP address mismatch, certificate is not valid for '%S'.", in fill_and_set_sslerror()
729 * matched by a certificate valid for any sub-domain of name. in _ssl_configure_hostname()
1186 _get_peer_alt_names (_sslmodulestate *state, X509 *certificate) { in _get_peer_alt_names() argument
1204 if (certificate == NULL) in _get_peer_alt_names()
1215 certificate, NID_subject_alt_name, NULL, NULL); in _get_peer_alt_names()
1450 _get_aia_uri(X509 *certificate, int nid) { in _get_aia_uri() argument
1455 info = X509_get_ext_d2i(certificate, NID_info_acces in _get_aia_uri()
1507 _get_crl_dp(X509 *certificate) _get_crl_dp() argument
1565 _decode_certificate(_sslmodulestate *state, X509 *certificate) _decode_certificate() argument
1736 _certificate_to_der(_sslmodulestate *state, X509 *certificate) _certificate_to_der() argument
[all...]
/third_party/node/lib/internal/main/
H A Dprint_help.js65 'certificate validation' }],
81 ['SSL_CERT_FILE', { helpText: 'sets OpenSSL\'s trusted certificate file ' +

Completed in 13 milliseconds

12