/external/boringssl/src/ssl/ |
D | ssl_cert.cc | 151 CERT *ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument 159 ret->chain = sk_CRYPTO_BUFFER_deep_copy(cert->chain, buffer_up_ref, in ssl_cert_dup() 162 if (cert->privatekey != NULL) { in ssl_cert_dup() 163 EVP_PKEY_up_ref(cert->privatekey); in ssl_cert_dup() 164 ret->privatekey = cert->privatekey; in ssl_cert_dup() 167 ret->key_method = cert->key_method; in ssl_cert_dup() 168 ret->x509_method = cert->x509_method; in ssl_cert_dup() 170 if (cert->sigalgs != NULL) { in ssl_cert_dup() 172 cert->sigalgs, cert->num_sigalgs * sizeof(cert->sigalgs[0])); in ssl_cert_dup() 177 ret->num_sigalgs = cert->num_sigalgs; in ssl_cert_dup() [all …]
|
D | ssl_privkey.cc | 77 static int ssl_set_pkey(CERT *cert, EVP_PKEY *pkey) { in ssl_set_pkey() argument 83 if (cert->chain != NULL && in ssl_set_pkey() 84 sk_CRYPTO_BUFFER_value(cert->chain, 0) != NULL && in ssl_set_pkey() 86 !ssl_cert_check_private_key(cert, pkey)) { in ssl_set_pkey() 90 EVP_PKEY_free(cert->privatekey); in ssl_set_pkey() 92 cert->privatekey = pkey; in ssl_set_pkey() 115 ret = ssl_set_pkey(ssl->cert, pkey); in SSL_use_RSAPrivateKey() 137 return ssl_set_pkey(ssl->cert, pkey); in SSL_use_PrivateKey() 178 ret = ssl_set_pkey(ctx->cert, pkey); in SSL_CTX_use_RSAPrivateKey() 202 return ssl_set_pkey(ctx->cert, pkey); in SSL_CTX_use_PrivateKey() [all …]
|
D | ssl_x509.cc | 208 X509 *cert = sk_X509_value(session->x509_chain, i); in STACK_OF() local 209 if (!sk_X509_push(session->x509_chain_without_leaf, cert)) { in STACK_OF() 214 X509_up_ref(cert); in STACK_OF() 404 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument 407 if (cert->chain != NULL) { in ssl_cert_set_chain() 413 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain, 0); in ssl_cert_set_chain() 439 sk_CRYPTO_BUFFER_pop_free(cert->chain, CRYPTO_BUFFER_free); in ssl_cert_set_chain() 440 cert->chain = new_chain; in ssl_cert_set_chain() 449 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument 450 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/external/openssh/regress/ |
D | cert-hostkey.sh | 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 17 *cert*) types="$i,$types";; 53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 95 $OBJ/cert_host_key_${ktype}-cert.pub || \ 97 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert 106 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 107 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \ 108 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \ 129 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub [all …]
|
/external/ipsec-tools/src/racoon/ |
D | dnssec.c | 62 cert_t *cert = NULL; local 119 cert = oakley_newcert(); 120 if (cert == NULL) { 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 132 cert->pl->v[0] = type; 133 cert->cert.v = cert->pl->v + 1; 134 cert->cert.l = cert->pl->l - 1; 137 plogdump(LLV_DEBUG, cert->pl->v, cert->pl->l); [all …]
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate; 48 for (X509Certificate cert : chain) { in check() 50 checkCert(cert); in check() 53 + cert.getSubjectX500Principal(), e); in check() 59 for (X509Certificate cert : chain) { in check() 61 checkCert(cert); in check() 64 + cert.getSubjectX500Principal(), e); in check() 69 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument 70 checkKeyLength(cert); in checkCert() [all …]
|
D | TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 150 X509Certificate cert = readCertificate(file); in getCertificate() local 151 if (cert == null || (isSystem(alias) in getCertificate() 153 && isDeletedSystemCertificate(cert))) { in getCertificate() 157 return cert; in getCertificate() 202 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument 211 os.write(cert.getEncoded()); in writeCertificate() [all …]
|
D | TrustedCertificateIndex.java | 20 import java.security.cert.TrustAnchor; 21 import java.security.cert.X509Certificate; 57 public TrustAnchor index(X509Certificate cert) { in index() argument 58 TrustAnchor anchor = new TrustAnchor(cert, null); in index() 65 X509Certificate cert = anchor.getTrustedCert(); in index() local 66 if (cert != null) { in index() 67 subject = cert.getSubjectX500Principal(); in index() 79 if (cert != null) { in index() 81 if (cert.equals(entry.getTrustedCert())) { in index() 104 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { in findByIssuerAndSignature() argument [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
D | PrincipalUtils.java | 3 import java.security.cert.TrustAnchor; 4 import java.security.cert.X509CRL; 5 import java.security.cert.X509CRLEntry; 6 import java.security.cert.X509Certificate; 15 static X500Name getSubjectPrincipal(X509Certificate cert) in getSubjectPrincipal() argument 17 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); in getSubjectPrincipal() 25 static X500Name getIssuerPrincipal(X509Certificate cert) in getIssuerPrincipal() argument 27 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); in getIssuerPrincipal() 42 Object cert) in getEncodedIssuerPrincipal() argument 44 if (cert instanceof X509Certificate) in getEncodedIssuerPrincipal() [all …]
|
D | RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilderException; 9 import java.security.cert.CertPathValidatorException; 10 import java.security.cert.CertificateExpiredException; 11 import java.security.cert.CertificateNotYetValidException; 12 import java.security.cert.PKIXCertPathChecker; 13 import java.security.cert.X509CRL; 14 import java.security.cert.X509CRLSelector; 15 import java.security.cert.X509CertSelector; 16 import java.security.cert.X509Certificate; [all …]
|
D | CertPathValidatorUtilities.java | 9 import java.security.cert.CRLException; 10 import java.security.cert.CertPath; 11 import java.security.cert.CertPathValidatorException; 12 import java.security.cert.CertStore; 13 import java.security.cert.CertStoreException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateParsingException; 16 import java.security.cert.PolicyQualifierInfo; 17 import java.security.cert.TrustAnchor; 18 import java.security.cert.X509CRL; [all …]
|
D | PKIXCertPathValidatorSpi.java | 8 import java.security.cert.CertPath; 9 import java.security.cert.CertPathParameters; 10 import java.security.cert.CertPathValidatorException; 11 import java.security.cert.CertPathValidatorResult; 12 import java.security.cert.CertPathValidatorSpi; 13 import java.security.cert.PKIXCertPathChecker; 14 import java.security.cert.PKIXCertPathValidatorResult; 15 import java.security.cert.PKIXParameters; 16 import java.security.cert.TrustAnchor; 17 import java.security.cert.X509Certificate; [all …]
|
D | PKIXCertPathBuilderSpi.java | 4 import java.security.cert.CertPath; 5 import java.security.cert.CertPathBuilderException; 6 import java.security.cert.CertPathBuilderResult; 7 import java.security.cert.CertPathBuilderSpi; 8 import java.security.cert.CertPathParameters; 9 import java.security.cert.CertificateParsingException; 10 import java.security.cert.PKIXBuilderParameters; 11 import java.security.cert.PKIXCertPathBuilderResult; 12 import java.security.cert.PKIXCertPathValidatorResult; 13 import java.security.cert.X509Certificate; [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | X509V2AttributeCertificate.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateExpiredException; 15 import java.security.cert.CertificateNotYetValidException; 42 private AttributeCertificate cert; field in X509V2AttributeCertificate 78 AttributeCertificate cert) in X509V2AttributeCertificate() argument 81 this.cert = cert; in X509V2AttributeCertificate() 85 … this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); in X509V2AttributeCertificate() 86 … this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate(); in X509V2AttributeCertificate() 96 return cert.getAcinfo().getVersion().getValue().intValue() + 1; in getVersion() 101 return cert.getAcinfo().getSerialNumber().getValue(); in getSerialNumber() [all …]
|
/external/curl/lib/ |
D | x509asn1.c | 679 int Curl_parseX509(curl_X509certificate *cert, in Curl_parseX509() argument 691 cert->certificate.header = NULL; in Curl_parseX509() 692 cert->certificate.beg = beg; in Curl_parseX509() 693 cert->certificate.end = end; in Curl_parseX509() 704 beg = Curl_getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509() 706 Curl_getASN1Element(&cert->signature, beg, end); in Curl_parseX509() 712 cert->version.header = NULL; in Curl_parseX509() 713 cert->version.beg = &defaultVersion; in Curl_parseX509() 714 cert->version.end = &defaultVersion + sizeof defaultVersion;; in Curl_parseX509() 717 Curl_getASN1Element(&cert->version, elem.beg, elem.end); in Curl_parseX509() [all …]
|
/external/python/cpython2/Lib/test/ |
D | make_ssl_certs.py | 122 cert = f.read() 125 return cert, key 163 cert, key = make_cert_key('localhost') variable 165 f.write(cert) 174 f.write(cert) 177 f.write(cert) 181 cert, key = make_cert_key('fakehostname') variable 184 f.write(cert) 186 cert, key = make_cert_key('localhost', True) variable 189 f.write(cert) [all …]
|
/external/conscrypt/openjdk/src/test/resources/ |
D | README | 2 - ca-cert.pem: Root CA certificate 6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension 10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate 14 cert.pem signed by the test CT log 20 for cert.pem, but signed by a different log 22 - ocsp-response.der: OCSP response for cert.pem, containing an SCT for cert.pem signed by the test
|
/external/boringssl/src/ssl/test/runner/ |
D | tls.go | 177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) { 191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) { 199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 203 if len(cert.Certificate) == 0 { 220 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 227 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 255 priv, ok := cert.PrivateKey.(ed25519.PrivateKey) 274 func isEd25519Certificate(cert *x509.Certificate) bool { [all …]
|
D | key_agreement.go | 40 func (ka *rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello… 66 …sigAlg, err = selectSignatureAlgorithm(ka.version, cert.PrivateKey, config, clientHello.signatureA… 72 sig, err := signMessage(ka.version, cert.PrivateKey, config, sigAlg, serverRSAParams) 97 func (ka *rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientK… 117 key := cert.PrivateKey.(*rsa.PrivateKey) 135 …config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, … 139 …t) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) … 161 …encrypted, err := rsa.EncryptPKCS1v15(config.rand(), cert.PublicKey.(*rsa.PublicKey), sentPreMaste… 305 …signParameters(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloM… 306 …verifyParameters(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x… [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
D | PrincipalUtil.java | 4 import java.security.cert.CRLException; 5 import java.security.cert.CertificateEncodingException; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509Certificate; 27 X509Certificate cert) in getIssuerX509Principal() argument 33 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); in getIssuerX509Principal() 47 X509Certificate cert) in getSubjectX509Principal() argument 53 ASN1Primitive.fromByteArray(cert.getTBSCertificate())); in getSubjectX509Principal()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
D | PKIXCertPath.java | 10 import java.security.cert.CertPath; 11 import java.security.cert.Certificate; 12 import java.security.cert.CertificateEncodingException; 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateFactory; 15 import java.security.cert.X509Certificate; 84 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() local 86 if (issuer.equals(cert.getSubjectX500Principal())) in sortCerts() 108 X509Certificate cert = (X509Certificate)certs.get(i); in sortCerts() local 111 X500Principal subject = cert.getSubjectX500Principal(); in sortCerts() [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/jcajce/ |
D | JcaX509CertificateHolder.java | 1 package org.bouncycastle.cert.jcajce; 3 import java.security.cert.CertificateEncodingException; 4 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.X509CertificateHolder; 21 public JcaX509CertificateHolder(X509Certificate cert) in JcaX509CertificateHolder() argument 24 super(Certificate.getInstance(cert.getEncoded())); in JcaX509CertificateHolder()
|
/external/openssh/ |
D | sshkey.c | 84 int cert; member 153 return kt->cert; in sshkey_type_is_cert() 179 (!kt->cert && strcasecmp(kt->shortname, name) == 0)) in sshkey_type_from_name() 211 if ((certs_only && !kt->cert) || (plain_only && kt->cert)) in sshkey_alg_list() 420 cert_free(struct sshkey_cert *cert) in cert_free() argument 424 if (cert == NULL) in cert_free() 426 sshbuf_free(cert->certblob); in cert_free() 427 sshbuf_free(cert->critical); in cert_free() 428 sshbuf_free(cert->extensions); in cert_free() 429 free(cert->key_id); in cert_free() [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/jcajce/ |
D | JcaCertificateID.java | 1 package org.bouncycastle.cert.ocsp.jcajce; 4 import java.security.cert.CertificateEncodingException; 5 import java.security.cert.X509Certificate; 7 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder; 8 import org.bouncycastle.cert.ocsp.CertificateID; 9 import org.bouncycastle.cert.ocsp.OCSPException;
|