/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 524 /* If chaining get chain from user cert */ 834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument 843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 881 X509 *cert; local 884 CRYPTO_push_info("cert_load(): reading one cert"); 886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 891 sk_X509_push(sk, cert); 893 CRYPTO_push_info("cert_load(): reading one cert");
|
H A D | apps.c | 745 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 781 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 792 BIO *cert; local 794 if ((cert=BIO_new(BIO_s_file())) == NULL) 807 BIO_set_fp(cert,stdin,BIO_NOCLOSE); 811 if (BIO_read_filename(cert,file) <= 0) 821 x=d2i_X509_bio(cert,NULL); 825 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL); 836 x=nx->cert; 837 nx->cert 743 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n"); 654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 728 sk_X509_push(encerts, cert); 729 cert = NULL; 1214 X509_free(cert);
|
H A D | crl2p7.c | 233 p7s->cert=cert_stack;
|
H A D | x509.c | 131 " -checkend arg - check whether the cert expires in the next arg seconds\n", 133 " -signkey arg - self sign cert with arg\n", 164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 1068 nx.cert=x; 1295 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument 1303 idret = X509_check_purpose(cert, id, i);
|
H A D | s_client.c | 188 /*#define TEST_CERT "client.pem" */ /* no default cert. */ 294 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n"); 296 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n"); 297 BIO_printf(bio_err," not specified but cert file is.\n"); 581 X509 *cert = NULL; local 693 else if (strcmp(*argv,"-cert") == 0) 1074 cert = load_cert(bio_err,cert_file,cert_format, 1077 if (!cert) 1184 if (!set_cert_key_stuff(ctx,cert,key)) 1932 if (cert) [all...] |
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | d1_clnt.c | 479 /* EAY EAY EAY need to check for DH fix cert 481 /* For TLS, cert_req is set to 2, so a cert chain 1194 /* we get them from the cert */ 1261 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL)) 1268 * For example, the cert have an ECC 1277 * if ((s->cert->key->privatekey != NULL) && 1278 * (s->cert->key->privatekey->type == 1333 tkey = s->cert->key->privatekey->pkey.ec; 1571 pkey=s->cert->key->privatekey; 1660 if ((s->cert [all...] |
H A D | s2_clnt.c | 759 /* We have a cert associated with the SSL, so attach it to 781 if ((s->cert == NULL) || 782 (s->cert->key->x509 == NULL) || 783 (s->cert->key->privatekey == NULL)) 803 * can get a cert or not */ 877 n=i2d_X509(s->cert->key->x509,&d); 880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey)) 1059 /* server's cert for this session */
|
H A D | ssltest.c | 356 fprintf(stderr," -cert arg - Server certificate file\n"); 357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n"); 379 X509 *cert; local 387 cert=SSL_get_peer_certificate(c_ssl); 388 if (cert != NULL) 390 EVP_PKEY *pkey = X509_get_pubkey(cert); 413 X509_free(cert); 699 else if (strcmp(*argv,"-cert") == 0) 2284 fprintf(stderr, "In app_verify_callback, allowing cert. "); 2286 fprintf(stderr, "Finished printing do we have a context? 0x%p a cert [all...] |
H A D | s3_clnt.c | 408 /* EAY EAY EAY need to check for DH fix cert 410 /* For TLS, cert_req is set to 2, so a cert chain 1079 int need_cert = 1; /* VRS: 0=> will allow null cert if auth == KRB5 */ 1182 /* VRS: allow null cert if auth == KRB5 */ 2035 /* TLS does not like anon-DH with client cert */ 2586 /* we get them from the cert */ 2656 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL)) 2663 * For example, the cert have an ECC 2672 * if ((s->cert->key->privatekey != NULL) && 2673 * (s->cert [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | print.c | 793 { "Netscape cert comment", &asn1_oid_id_netscape_cert_comment, 878 * @param cert the cerificate to validate/print. 888 hx509_cert cert) 890 Certificate *c = _hx509_get_cert(cert); 911 ret = hx509_cert_get_subject(cert, &subject); 918 ret = hx509_cert_get_issuer(cert, &issuer); 1023 cert, 886 hx509_validate_cert(hx509_context context, hx509_validate_ctx ctx, hx509_cert cert) argument
|
H A D | crypto.c | 1585 const hx509_cert cert, 1593 if (cert) 1594 signer = _hx509_get_cert(cert); 1671 const Certificate *cert, 1686 spi = &cert->tbsCertificate.subjectPublicKeyInfo; 2948 const Certificate *cert; local 2962 cert = _hx509_get_cert(c); 2963 spi = &cert->tbsCertificate.subjectPublicKeyInfo; 1584 _hx509_verify_signature(hx509_context context, const hx509_cert cert, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1669 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | util.c | 213 const serf_ssl_certificate_t *cert, 228 if (serf_ssl_cert_depth(cert) > 0) 236 subject = serf_ssl_cert_subject(cert, scratch_pool); 237 issuer = serf_ssl_cert_issuer(cert, scratch_pool); 238 serf_cert = serf_ssl_cert_certificate(cert, scratch_pool); 252 cert_info.ascii_cert = serf_ssl_cert_export(cert, scratch_pool); 314 const serf_ssl_certificate_t *cert) 322 err = svn_error_trace(ssl_server_cert(baton, failures, cert, subpool)); 210 ssl_server_cert(void *baton, int failures, const serf_ssl_certificate_t *cert, apr_pool_t *scratch_pool) argument 311 ssl_server_cert_cb(void *baton, int failures, const serf_ssl_certificate_t *cert) argument
|
/freebsd-10.0-release/contrib/unbound/smallapp/ |
H A D | unbound-anchor.c | 54 * * fail if clock before sign date of the root, if cert expired. 109 * root cert is valid to 2028 and the intermediate to 2014, today). 180 printf(" The anchor and cert have default builtin content\n"); 185 printf("-c file cert file, default %s\n", ROOT_CERT_FILE); 186 printf("-l list builtin key and cert on stdout\n"); 199 printf("-F debug, force update with cert\n"); 436 /** read update cert file or use builtin */ 1628 get_usage_of_ex(X509* cert) argument 1632 if((s=X509_get_ext_d2i(cert, NID_key_usage, NULL, NULL))) { 1666 if(verb) printf("signer %d: cert ha 1858 verify_and_update_anchor(const char* root_anchor_file, BIO* xml, BIO* p7s, STACK_OF(X509)* cert, const char* p7signer) argument [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | hostfile.c | 355 key_equal_public(k->cert->signature_key, 369 * 1. If the key is a cert and a matching CA is found, return HOST_OK 370 * 2. If the key is not a cert and a matching key is found, return HOST_OK 407 if (key_equal_public(k->cert->signature_key,
|
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | isakmp.h | 261 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert
|
H A D | print-isakmp.c | 147 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */ 1044 struct ikev1_pl_cert cert; local 1055 safememcpy(&cert, ext, sizeof(cert)); 1057 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1076 struct ikev1_pl_cert cert; local 1087 safememcpy(&cert, ext, sizeof(cert)); 1089 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 308 const u8 *cert; member in struct:ikev2_payloads
|
/freebsd-10.0-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 224 * @cert: Peer certificate 227 const char *cert_hash, const struct wpabuf *cert);
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | krb5_locl.h | 344 hx509_cert cert; member in struct:krb5_pk_identity
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 709 const struct wpabuf *cert) 713 wpas_notify_certification(wpa_s, depth, subject, cert_hash, cert); 707 wpa_supplicant_cert_cb(void *ctx, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 277 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 285 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
|
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp.h | 428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
/freebsd-10.0-release/kerberos5/lib/libhx509/ |
H A D | Makefile | 178 cert.c \
|
/freebsd-10.0-release/lib/libfetch/ |
H A D | common.c | 639 fetch_ssl_verify_hname(X509 *cert, const char *host) argument 648 altnames = X509_get_ext_d2i(cert, NID_subject_alt_name, 654 subject = X509_get_subject_name(cert); 699 getenv("SSL_CA_CERT_FILE") : "/etc/ssl/cert.pem"; 704 fetch_info("Using CA cert file: %s", 707 fetch_info("Using CA cert path: %s", 748 fetch_info("Using client cert file: %s", 773 * cert verification. It takes no decision, but informs the user in case
|