/external/wpa_supplicant_8/src/tls/ |
D | x509v3.c | 45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument 47 if (cert == NULL) in x509_certificate_free() 49 if (cert->next) { in x509_certificate_free() 52 cert, cert->next); in x509_certificate_free() 54 x509_free_name(&cert->issuer); in x509_certificate_free() 55 x509_free_name(&cert->subject); in x509_certificate_free() 56 os_free(cert->public_key); in x509_certificate_free() 57 os_free(cert->sign_value); in x509_certificate_free() 58 os_free(cert->subject_dn); in x509_certificate_free() 59 os_free(cert); in x509_certificate_free() [all …]
|
/external/openssh/regress/ |
D | cert-hostkey.sh | 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 17 *cert*) types="$i,$types";; 53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 95 $OBJ/cert_host_key_${ktype}-cert.pub || \ 97 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert 106 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 107 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \ 108 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \ 129 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_cert.cc | 151 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() argument 152 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 157 if (cert->chain) { in ssl_cert_dup() 159 cert->chain.get(), buffer_up_ref, CRYPTO_BUFFER_free)); in ssl_cert_dup() 165 ret->privatekey = UpRef(cert->privatekey); in ssl_cert_dup() 166 ret->key_method = cert->key_method; in ssl_cert_dup() 168 if (!ret->sigalgs.CopyFrom(cert->sigalgs)) { in ssl_cert_dup() 172 ret->cert_cb = cert->cert_cb; in ssl_cert_dup() 173 ret->cert_cb_arg = cert->cert_cb_arg; in ssl_cert_dup() 175 ret->x509_method->cert_dup(ret.get(), cert); in ssl_cert_dup() [all …]
|
D | ssl_x509.cc | 203 static int ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() argument 206 if (cert->chain != nullptr) { in ssl_cert_set_chain() 213 CRYPTO_BUFFER *leaf = sk_CRYPTO_BUFFER_value(cert->chain.get(), 0); in ssl_cert_set_chain() 234 cert->chain = std::move(new_chain); in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() argument 239 X509_free(cert->x509_leaf); in ssl_crypto_x509_cert_flush_cached_leaf() 240 cert->x509_leaf = NULL; in ssl_crypto_x509_cert_flush_cached_leaf() 243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() argument 244 sk_X509_pop_free(cert->x509_chain, X509_free); in ssl_crypto_x509_cert_flush_cached_chain() 245 cert->x509_chain = NULL; in ssl_crypto_x509_cert_flush_cached_chain() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | dnssec.c | 62 cert_t *cert = NULL; local 119 cert = oakley_newcert(); 120 if (cert == NULL) { 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 132 cert->pl->v[0] = type; 133 cert->cert.v = cert->pl->v + 1; 134 cert->cert.l = cert->pl->l - 1; 137 plogdump(LLV_DEBUG, cert->pl->v, cert->pl->l); [all …]
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
D | TrustedCertificateStore.java | 26 import java.security.cert.Certificate; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate; 148 X509Certificate cert = readCertificate(file); in getCertificate() local 149 if (cert == null || (isSystem(alias) in getCertificate() 151 && isDeletedSystemCertificate(cert))) { in getCertificate() 155 return cert; in getCertificate() 200 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument 209 os.write(cert.getEncoded()); in writeCertificate() [all …]
|
/external/conscrypt/repackaged/platform/src/main/java/com/android/org/conscrypt/ |
D | TrustedCertificateStore.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 157 X509Certificate cert = readCertificate(file); in getCertificate() local 158 if (cert == null || (isSystem(alias) in getCertificate() 160 && isDeletedSystemCertificate(cert))) { in getCertificate() 164 return cert; in getCertificate() 209 private void writeCertificate(File file, X509Certificate cert) in writeCertificate() argument 218 os.write(cert.getEncoded()); in writeCertificate() [all …]
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 19 import java.security.cert.CertificateException; 20 import java.security.cert.X509Certificate; 49 for (X509Certificate cert : chain) { in check() 51 checkCert(cert); in check() 54 + cert.getSubjectX500Principal(), e); in check() 60 for (X509Certificate cert : chain) { in check() 62 checkCert(cert); in check() 65 + cert.getSubjectX500Principal(), e); in check() 70 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument 71 checkKeyLength(cert); in checkCert() [all …]
|
D | TrustedCertificateIndex.java | 20 import java.security.cert.TrustAnchor; 21 import java.security.cert.X509Certificate; 55 public TrustAnchor index(X509Certificate cert) { in index() argument 56 TrustAnchor anchor = new TrustAnchor(cert, null); in index() 63 X509Certificate cert = anchor.getTrustedCert(); in index() local 64 if (cert != null) { in index() 65 subject = cert.getSubjectX500Principal(); in index() 77 if (cert != null) { in index() 79 if (cert.equals(entry.getTrustedCert())) { in index() 102 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { in findByIssuerAndSignature() argument [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate; 51 for (X509Certificate cert : chain) { in check() 53 checkCert(cert); in check() 56 + cert.getSubjectX500Principal(), e); in check() 62 for (X509Certificate cert : chain) { in check() 64 checkCert(cert); in check() 67 + cert.getSubjectX500Principal(), e); in check() 72 public static final void checkCert(X509Certificate cert) throws CertificateException { in checkCert() argument 73 checkKeyLength(cert); in checkCert() [all …]
|
D | TrustedCertificateIndex.java | 21 import java.security.cert.TrustAnchor; 22 import java.security.cert.X509Certificate; 60 public TrustAnchor index(X509Certificate cert) { in index() argument 61 TrustAnchor anchor = new TrustAnchor(cert, null); in index() 68 X509Certificate cert = anchor.getTrustedCert(); in index() local 69 if (cert != null) { in index() 70 subject = cert.getSubjectX500Principal(); in index() 82 if (cert != null) { in index() 84 if (cert.equals(entry.getTrustedCert())) { in index() 108 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { in findByIssuerAndSignature() argument [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | X509V2AttributeCertificate.java | 13 import java.security.cert.CertificateException; 14 import java.security.cert.CertificateExpiredException; 15 import java.security.cert.CertificateNotYetValidException; 42 private AttributeCertificate cert; field in X509V2AttributeCertificate 78 AttributeCertificate cert) in X509V2AttributeCertificate() argument 81 this.cert = cert; in X509V2AttributeCertificate() 85 … this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); in X509V2AttributeCertificate() 86 … this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate(); in X509V2AttributeCertificate() 96 return cert.getAcinfo().getVersion().getValue().intValue() + 1; in getVersion() 101 return cert.getAcinfo().getSerialNumber().getValue(); in getSerialNumber() [all …]
|
/external/epid-sdk/epid/common/src/ |
D | file_parser.c | 54 EpidStatus EpidVerifyCaCertificate(EpidCaCertificate const* cert) { in EpidVerifyCaCertificate() argument 93 if (!cert) return kEpidBadArgErr; in EpidVerifyCaCertificate() 97 memcmp(&cert->header.epid_version, &kEpidVersion, sizeof(kEpidVersion))) { in EpidVerifyCaCertificate() 100 if (0 != memcmp(&cert->header.file_type, in EpidVerifyCaCertificate() 102 sizeof(cert->header.file_type))) { in EpidVerifyCaCertificate() 107 if (0 != memcmp(&cert->prime, secp256r1_p, sizeof(secp256r1_p))) { in EpidVerifyCaCertificate() 110 if (0 != memcmp(&cert->a, secp256r1_a, sizeof(secp256r1_a))) { in EpidVerifyCaCertificate() 113 if (0 != memcmp(&cert->b, secp256r1_b, sizeof(secp256r1_b))) { in EpidVerifyCaCertificate() 116 if (0 != memcmp(&cert->x, secp256r1_gx, sizeof(secp256r1_gx))) { in EpidVerifyCaCertificate() 119 if (0 != memcmp(&cert->y, secp256r1_gy, sizeof(secp256r1_gy))) { in EpidVerifyCaCertificate() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/provider/ |
D | PrincipalUtils.java | 4 import java.security.cert.TrustAnchor; 5 import java.security.cert.X509CRL; 6 import java.security.cert.X509CRLEntry; 7 import java.security.cert.X509Certificate; 16 static X500Name getSubjectPrincipal(X509Certificate cert) in getSubjectPrincipal() argument 18 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); in getSubjectPrincipal() 26 static X500Name getIssuerPrincipal(X509Certificate cert) in getIssuerPrincipal() argument 28 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); in getIssuerPrincipal() 43 Object cert) in getEncodedIssuerPrincipal() argument 45 if (cert instanceof X509Certificate) in getEncodedIssuerPrincipal() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
D | PrincipalUtils.java | 3 import java.security.cert.TrustAnchor; 4 import java.security.cert.X509CRL; 5 import java.security.cert.X509CRLEntry; 6 import java.security.cert.X509Certificate; 15 static X500Name getSubjectPrincipal(X509Certificate cert) in getSubjectPrincipal() argument 17 return X500Name.getInstance(cert.getSubjectX500Principal().getEncoded()); in getSubjectPrincipal() 25 static X500Name getIssuerPrincipal(X509Certificate cert) in getIssuerPrincipal() argument 27 return X500Name.getInstance(cert.getIssuerX500Principal().getEncoded()); in getIssuerPrincipal() 42 Object cert) in getEncodedIssuerPrincipal() argument 44 if (cert instanceof X509Certificate) in getEncodedIssuerPrincipal() [all …]
|
D | RFC3280CertPathUtilities.java | 7 import java.security.cert.CertPath; 8 import java.security.cert.CertPathBuilderException; 9 import java.security.cert.CertPathValidatorException; 10 import java.security.cert.CertificateExpiredException; 11 import java.security.cert.CertificateNotYetValidException; 12 import java.security.cert.PKIXCertPathChecker; 13 import java.security.cert.X509CRL; 14 import java.security.cert.X509CRLSelector; 15 import java.security.cert.X509CertSelector; 16 import java.security.cert.X509Certificate; [all …]
|
/external/python/cpython3/Lib/test/ |
D | make_ssl_certs.py | 150 cert = f.read() 153 return cert, key 203 cert, key = make_cert_key('localhost', ext='req_x509_extensions_simple') variable 205 f.write(cert) 214 f.write(cert) 217 f.write(cert) 221 cert, key = make_cert_key('fakehostname', ext='req_x509_extensions_simple') variable 224 f.write(cert) 226 cert, key = make_cert_key('localhost', True) variable 229 f.write(cert) [all …]
|
/external/honggfuzz/examples/openssl/ |
D | client.c | 454 X509* cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER)); in LLVMFuzzerInitialize() local 455 assert(cert != NULL); in LLVMFuzzerInitialize() 456 ret = SSL_CTX_use_certificate(ctx, cert); in LLVMFuzzerInitialize() 458 X509_free(cert); in LLVMFuzzerInitialize() 470 cert = d2i_X509(NULL, &bufp, sizeof(kRSACACertDER)); in LLVMFuzzerInitialize() 471 assert(cert != NULL); in LLVMFuzzerInitialize() 472 ret = SSL_CTX_add_client_CA(ctx, cert); in LLVMFuzzerInitialize() 474 ret = X509_STORE_add_cert(store, cert); in LLVMFuzzerInitialize() 476 X509_free(cert); in LLVMFuzzerInitialize() 479 cert = d2i_X509(NULL, &bufp, sizeof(kECCACertDER)); in LLVMFuzzerInitialize() [all …]
|
D | server.c | 492 X509* cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER)); in LLVMFuzzerInitialize() local 493 assert(cert != NULL); in LLVMFuzzerInitialize() 494 ret = SSL_CTX_use_certificate(ctx, cert); in LLVMFuzzerInitialize() 496 X509_free(cert); in LLVMFuzzerInitialize() 508 cert = d2i_X509(NULL, &bufp, sizeof(kRSACACertDER)); in LLVMFuzzerInitialize() 509 assert(cert != NULL); in LLVMFuzzerInitialize() 510 ret = SSL_CTX_add_client_CA(ctx, cert); in LLVMFuzzerInitialize() 512 ret = X509_STORE_add_cert(store, cert); in LLVMFuzzerInitialize() 514 X509_free(cert); in LLVMFuzzerInitialize() 517 cert = d2i_X509(NULL, &bufp, sizeof(kECCACertDER)); in LLVMFuzzerInitialize() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/x509/ |
D | X509V2AttributeCertificate.java | 14 import java.security.cert.CertificateException; 15 import java.security.cert.CertificateExpiredException; 16 import java.security.cert.CertificateNotYetValidException; 44 private AttributeCertificate cert; field in X509V2AttributeCertificate 80 AttributeCertificate cert) in X509V2AttributeCertificate() argument 83 this.cert = cert; in X509V2AttributeCertificate() 87 … this.notAfter = cert.getAcinfo().getAttrCertValidityPeriod().getNotAfterTime().getDate(); in X509V2AttributeCertificate() 88 … this.notBefore = cert.getAcinfo().getAttrCertValidityPeriod().getNotBeforeTime().getDate(); in X509V2AttributeCertificate() 98 return cert.getAcinfo().getVersion().getValue().intValue() + 1; in getVersion() 103 return cert.getAcinfo().getSerialNumber().getValue(); in getSerialNumber() [all …]
|
/external/curl/lib/ |
D | x509asn1.c | 705 int Curl_parseX509(curl_X509certificate *cert, in Curl_parseX509() argument 713 cert->certificate.header = NULL; in Curl_parseX509() 714 cert->certificate.beg = beg; in Curl_parseX509() 715 cert->certificate.end = end; in Curl_parseX509() 728 beg = getASN1Element(&cert->signatureAlgorithm, beg, end); in Curl_parseX509() 732 if(!getASN1Element(&cert->signature, beg, end)) in Curl_parseX509() 739 cert->version.header = NULL; in Curl_parseX509() 740 cert->version.beg = &defaultVersion; in Curl_parseX509() 741 cert->version.end = &defaultVersion + sizeof(defaultVersion); in Curl_parseX509() 746 if(!getASN1Element(&cert->version, elem.beg, elem.end)) in Curl_parseX509() [all …]
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/pkix/jcajce/ |
D | RevocationUtilities.java | 8 import java.security.cert.CRLException; 9 import java.security.cert.CertPath; 10 import java.security.cert.CertPathValidatorException; 11 import java.security.cert.CertStore; 12 import java.security.cert.CertStoreException; 13 import java.security.cert.Certificate; 14 import java.security.cert.CertificateParsingException; 15 import java.security.cert.TrustAnchor; 16 import java.security.cert.X509CRL; 17 import java.security.cert.X509CRLEntry; [all …]
|
/external/python/cpython2/Lib/test/ |
D | make_ssl_certs.py | 122 cert = f.read() 125 return cert, key 163 cert, key = make_cert_key('localhost') variable 165 f.write(cert) 174 f.write(cert) 177 f.write(cert) 181 cert, key = make_cert_key('fakehostname') variable 184 f.write(cert) 186 cert, key = make_cert_key('localhost', True) variable 189 f.write(cert) [all …]
|
/external/conscrypt/openjdk/src/test/resources/ |
D | README | 2 - ca-cert.pem: Root CA certificate 6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension 10 - cert-ct-embedded.pem: Same certificate as cert.pem, but with an embedded signed certificate 14 cert.pem signed by the test CT log 20 for cert.pem, but signed by a different log 22 - ocsp-response.der: OCSP response for cert.pem, containing an SCT for cert.pem signed by the test
|
/external/boringssl/src/ssl/test/runner/ |
D | tls.go | 177 func LoadX509KeyPair(certFile, keyFile string) (cert Certificate, err error) { 191 func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (cert Certificate, err error) { 199 cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) 203 if len(cert.Certificate) == 0 { 220 cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes) 227 x509Cert, err := x509.ParseCertificate(cert.Certificate[0]) 234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 255 priv, ok := cert.PrivateKey.(ed25519.PrivateKey) 274 func isEd25519Certificate(cert *x509.Certificate) bool { [all …]
|