Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 25 of 494) sorted by relevance

12345678910>>...20

/external/boringssl/src/ssl/
Dssl_cert.cc151 CERT *ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument
159 ret->chain = sk_CRYPTO_BUFFER_deep_copy(cert->chain, buffer_up_ref, in ssl_cert_dup()
162 if (cert->privatekey != NULL) { in ssl_cert_dup()
163 EVP_PKEY_up_ref(cert->privatekey); in ssl_cert_dup()
164 ret->privatekey = cert->privatekey; in ssl_cert_dup()
167 ret->key_method = cert->key_method; in ssl_cert_dup()
168 ret->x509_method = cert->x509_method; in ssl_cert_dup()
170 if (cert->sigalgs != NULL) { in ssl_cert_dup()
172 cert->sigalgs, cert->num_sigalgs * sizeof(cert->sigalgs[0])); in ssl_cert_dup()
177 ret->num_sigalgs = cert->num_sigalgs; in ssl_cert_dup()
[all …]
Dssl_privkey.cc77 static int ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { in ssl_set_pkey() argument
83 if (cert->chain != NULL && in ssl_set_pkey()
84 sk_CRYPTO_BUFFER_value(cert->chain, 0) != NULL && in ssl_set_pkey()
86 !ssl_cert_check_private_key(cert, pkey)) { in ssl_set_pkey()
90 EVP_PKEY_free(cert->privatekey); in ssl_set_pkey()
92 cert->privatekey = pkey; in ssl_set_pkey()
115 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_RSAPrivateKey()
137 return ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey()
178 ret = ssl_set_pkey(ctx->cert, pkey); in SSL_CTX_use_RSAPrivateKey()
202 return ssl_set_pkey(ctx->cert, pkey); in SSL_CTX_use_PrivateKey()
[all …]
Dssl_x509.cc208 X509 *cert = sk_X509_value(session->x509_chain, i); in STACK_OF() local
209 if (!sk_X509_push(session->x509_chain_without_leaf, cert)) { in STACK_OF()
214 X509_up_ref(cert); in STACK_OF()
404 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument
407 if (cert->chain != NULL) { in ssl_cert_set_chain()
413 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain, 0); in ssl_cert_set_chain()
439 sk_CRYPTO_BUFFER_pop_free(cert->chain, CRYPTO_BUFFER_free); in ssl_cert_set_chain()
440 cert->chain = new_chain; in ssl_cert_set_chain()
449 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument
450 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf()
[all …]
/external/wpa_supplicant_8/src/tls/
Dx509v3.c45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
59 os_free(cert); in x509_certificate_free()
[all …]
/external/openssh/regress/
Dcert-hostkey.sh6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_*
17 *cert*) types="$i,$types";;
53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
95 $OBJ/cert_host_key_${ktype}-cert.pub || \
97 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert
106 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
107 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
108 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \
129 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub
[all …]
/external/ipsec-tools/src/racoon/
Ddnssec.c62 cert_t *cert = NULL; local
119 cert = oakley_newcert();
120 if (cert == NULL) {
125 cert->pl = vmalloc(res->ci_certlen + 1);
126 if (cert->pl == NULL) {
131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen);
132 cert->pl->v[0] = type;
133 cert->cert.v = cert->pl->v + 1;
134 cert->cert.l = cert->pl->l - 1;
137 plogdump(LLV_DEBUG, cert->pl->v, cert->pl->l);
[all …]
/external/conscrypt/platform/src/main/java/org/conscrypt/
DChainStrengthAnalyzer.java19 import java.security.cert.CertificateException;
20 import java.security.cert.X509Certificate;
48 for (X509Certificate cert : chain) { in check()
50 checkCert(cert); in check()
53 + cert.getSubjectX500Principal(), e); in check()
59 for (X509Certificate cert : chain) { in check()
61 checkCert(cert); in check()
64 + cert.getSubjectX500Principal(), e); in check()
69 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument
70 checkKeyLength(cert); in checkCert()
[all …]
DTrustedCertificateStore.java26 import java.security.cert.Certificate;
27 import java.security.cert.CertificateException;
28 import java.security.cert.CertificateFactory;
29 import java.security.cert.X509Certificate;
150 X509Certificate cert = readCertificate(file); in getCertificate() local
151 if (cert == null || (isSystem(alias) in getCertificate()
153 && isDeletedSystemCertificate(cert))) { in getCertificate()
157 return cert; in getCertificate()
202 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument
211 os.write(cert.getEncoded()); in writeCertificate()
[all …]
DTrustedCertificateIndex.java20 import java.security.cert.TrustAnchor;
21 import java.security.cert.X509Certificate;
57 public TrustAnchor index(X509Certificate cert) { in index() argument
58 TrustAnchor anchor = new TrustAnchor(cert, null); in index()
65 X509Certificate cert = anchor.getTrustedCert(); in index() local
66 if (cert != null) { in index()
67 subject = cert.getSubjectX500Principal(); in index()
79 if (cert != null) { in index()
81 if (cert.equals(entry.getTrustedCert())) { in index()
104 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { in findByIssuerAndSignature() argument
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
DPrincipalUtils.java3 import java.security.cert.TrustAnchor;
4 import java.security.cert.X509CRL;
5 import java.security.cert.X509CRLEntry;
6 import java.security.cert.X509Certificate;
15 static X500Name getSubjectPrincipal(X509Certificate cert) in getSubjectPrincipal() argument
17 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); in getSubjectPrincipal()
25 static X500Name getIssuerPrincipal(X509Certificate cert) in getIssuerPrincipal() argument
27 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); in getIssuerPrincipal()
42 Object cert) in getEncodedIssuerPrincipal() argument
44 if (cert instanceof X509Certificate) in getEncodedIssuerPrincipal()
[all …]
DRFC3280CertPathUtilities.java7 import java.security.cert.CertPath;
8 import java.security.cert.CertPathBuilderException;
9 import java.security.cert.CertPathValidatorException;
10 import java.security.cert.CertificateExpiredException;
11 import java.security.cert.CertificateNotYetValidException;
12 import java.security.cert.PKIXCertPathChecker;
13 import java.security.cert.X509CRL;
14 import java.security.cert.X509CRLSelector;
15 import java.security.cert.X509CertSelector;
16 import java.security.cert.X509Certificate;
[all …]
DCertPathValidatorUtilities.java9 import java.security.cert.CRLException;
10 import java.security.cert.CertPath;
11 import java.security.cert.CertPathValidatorException;
12 import java.security.cert.CertStore;
13 import java.security.cert.CertStoreException;
14 import java.security.cert.Certificate;
15 import java.security.cert.CertificateParsingException;
16 import java.security.cert.PolicyQualifierInfo;
17 import java.security.cert.TrustAnchor;
18 import java.security.cert.X509CRL;
[all …]
DPKIXCertPathValidatorSpi.java8 import java.security.cert.CertPath;
9 import java.security.cert.CertPathParameters;
10 import java.security.cert.CertPathValidatorException;
11 import java.security.cert.CertPathValidatorResult;
12 import java.security.cert.CertPathValidatorSpi;
13 import java.security.cert.PKIXCertPathChecker;
14 import java.security.cert.PKIXCertPathValidatorResult;
15 import java.security.cert.PKIXParameters;
16 import java.security.cert.TrustAnchor;
17 import java.security.cert.X509Certificate;
[all …]
DPKIXCertPathBuilderSpi.java4 import java.security.cert.CertPath;
5 import java.security.cert.CertPathBuilderException;
6 import java.security.cert.CertPathBuilderResult;
7 import java.security.cert.CertPathBuilderSpi;
8 import java.security.cert.CertPathParameters;
9 import java.security.cert.CertificateParsingException;
10 import java.security.cert.PKIXBuilderParameters;
11 import java.security.cert.PKIXCertPathBuilderResult;
12 import java.security.cert.PKIXCertPathValidatorResult;
13 import java.security.cert.X509Certificate;
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DX509V2AttributeCertificate.java13 import java.security.cert.CertificateException;
14 import java.security.cert.CertificateExpiredException;
15 import java.security.cert.CertificateNotYetValidException;
42 private AttributeCertificate cert; field in X509V2AttributeCertificate
78 AttributeCertificate cert) in X509V2AttributeCertificate() argument
81 this.cert = cert; in X509V2AttributeCertificate()
85 … this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); in X509V2AttributeCertificate()
86 … this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate(); in X509V2AttributeCertificate()
96 return cert.getAcinfo().getVersion().getValue().intValue() + 1; in getVersion()
101 return cert.getAcinfo().getSerialNumber().getValue(); in getSerialNumber()
[all …]
/external/curl/lib/
Dx509asn1.c679 int Curl_parseX509(curl_X509certificate *cert, in Curl_parseX509() argument
691 cert->certificate.header = NULL; in Curl_parseX509()
692 cert->certificate.beg = beg; in Curl_parseX509()
693 cert->certificate.end = end; in Curl_parseX509()
704 beg = Curl_getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509()
706 Curl_getASN1Element(&cert->signature, beg, end); in Curl_parseX509()
712 cert->version.header = NULL; in Curl_parseX509()
713 cert->version.beg = &defaultVersion; in Curl_parseX509()
714 cert->version.end = &defaultVersion + sizeof defaultVersion;; in Curl_parseX509()
717 Curl_getASN1Element(&cert->version, elem.beg, elem.end); in Curl_parseX509()
[all …]
/external/python/cpython2/Lib/test/
Dmake_ssl_certs.py122 cert = f.read()
125 return cert, key
163 cert, key = make_cert_key('localhost') variable
165 f.write(cert)
174 f.write(cert)
177 f.write(cert)
181 cert, key = make_cert_key('fakehostname') variable
184 f.write(cert)
186 cert, key = make_cert_key('localhost', True) variable
189 f.write(cert)
[all …]
/external/conscrypt/openjdk/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key
8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate
14 cert.pem signed by the test CT log
20 for cert.pem, but signed by a different log
22 - ocsp-response.der: OCSP response for cert.pem, containing an SCT for cert.pem signed by the test
/external/boringssl/src/ssl/test/runner/
Dtls.go177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) {
191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) {
199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
203 if len(cert.Certificate) == 0 {
220 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes)
227 x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
255 priv, ok := cert.PrivateKey.(ed25519.PrivateKey)
274 func isEd25519Certificate(cert *x509.Certificate) bool {
[all …]
Dkey_agreement.go40 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello…
66 …sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureA…
72 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams)
97 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientK…
117 key := cert.PrivateKey.(*rsa.PrivateKey)
135 …config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, …
139 …t) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) …
161 …encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), sentPreMaste…
305 …signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloM…
306 …verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x…
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/
DPrincipalUtil.java4 import java.security.cert.CRLException;
5 import java.security.cert.CertificateEncodingException;
6 import java.security.cert.X509CRL;
7 import java.security.cert.X509Certificate;
27 X509Certificate cert) in getIssuerX509Principal() argument
33 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); in getIssuerX509Principal()
47 X509Certificate cert) in getSubjectX509Principal() argument
53 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); in getSubjectX509Principal()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/
DPKIXCertPath.java10 import java.security.cert.CertPath;
11 import java.security.cert.Certificate;
12 import java.security.cert.CertificateEncodingException;
13 import java.security.cert.CertificateException;
14 import java.security.cert.CertificateFactory;
15 import java.security.cert.X509Certificate;
84 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() local
86 if (issuer.equals(cert.getSubjectX500Principal())) in sortCerts()
108 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() local
111 X500Principal subject = cert.getSubjectX500Principal(); in sortCerts()
[all …]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/
DJcaX509CertificateHolder.java1 package org.bouncycastle.cert.jcajce;
3 import java.security.cert.CertificateEncodingException;
4 import java.security.cert.X509Certificate;
7 import org.bouncycastle.cert.X509CertificateHolder;
21 public JcaX509CertificateHolder(X509Certificate cert) in JcaX509CertificateHolder() argument
24 super(Certificate.getInstance(cert.getEncoded())); in JcaX509CertificateHolder()
/external/openssh/
Dsshkey.c84 int cert; member
153 return kt->cert; in sshkey_type_is_cert()
179 (!kt->cert && strcasecmp(kt->shortname, name) == 0)) in sshkey_type_from_name()
211 if ((certs_only && !kt->cert) || (plain_only && kt->cert)) in sshkey_alg_list()
420 cert_free(struct sshkey_cert *cert) in cert_free() argument
424 if (cert == NULL) in cert_free()
426 sshbuf_free(cert->certblob); in cert_free()
427 sshbuf_free(cert->critical); in cert_free()
428 sshbuf_free(cert->extensions); in cert_free()
429 free(cert->key_id); in cert_free()
[all …]
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/
DJcaCertificateID.java1 package org.bouncycastle.cert.ocsp.jcajce;
4 import java.security.cert.CertificateEncodingException;
5 import java.security.cert.X509Certificate;
7 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
8 import org.bouncycastle.cert.ocsp.CertificateID;
9 import org.bouncycastle.cert.ocsp.OCSPException;

12345678910>>...20