Searched refs:cert (Results 126 - 150 of 165) sorted by relevance

1234567

/freebsd-10.0-release/crypto/openssl/apps/
H A Dpkcs12.c82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
524 /* If chaining get chain from user cert */
834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument
843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
881 X509 *cert; local
884 CRYPTO_push_info("cert_load(): reading one cert");
886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
891 sk_X509_push(sk, cert);
893 CRYPTO_push_info("cert_load(): reading one cert");
H A Dapps.c745 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
781 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
792 BIO *cert; local
794 if ((cert=BIO_new(BIO_s_file())) == NULL)
807 BIO_set_fp(cert,stdin,BIO_NOCLOSE);
811 if (BIO_read_filename(cert,file) <= 0)
821 x=d2i_X509_bio(cert,NULL);
825 nx=ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509),cert,NULL);
836 x=nx->cert;
837 nx->cert
743 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dcms.c117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
593 BIO_printf (bio_err, "Usage cms [options] cert.pem ...\n");
654 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
725 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
728 sk_X509_push(encerts, cert);
729 cert = NULL;
1214 X509_free(cert);
H A Dcrl2p7.c233 p7s->cert=cert_stack;
H A Dx509.c131 " -checkend arg - check whether the cert expires in the next arg seconds\n",
133 " -signkey arg - self sign cert with arg\n",
164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
1068 nx.cert=x;
1295 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument
1303 idret = X509_check_purpose(cert, id, i);
H A Ds_client.c188 /*#define TEST_CERT "client.pem" */ /* no default cert. */
294 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
296 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
297 BIO_printf(bio_err," not specified but cert file is.\n");
581 X509 *cert = NULL; local
693 else if (strcmp(*argv,"-cert") == 0)
1074 cert = load_cert(bio_err,cert_file,cert_format,
1077 if (!cert)
1184 if (!set_cert_key_stuff(ctx,cert,key))
1932 if (cert)
[all...]
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dd1_clnt.c479 /* EAY EAY EAY need to check for DH fix cert
481 /* For TLS, cert_req is set to 2, so a cert chain
1194 /* we get them from the cert */
1261 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL))
1268 * For example, the cert have an ECC
1277 * if ((s->cert->key->privatekey != NULL) &&
1278 * (s->cert->key->privatekey->type ==
1333 tkey = s->cert->key->privatekey->pkey.ec;
1571 pkey=s->cert->key->privatekey;
1660 if ((s->cert
[all...]
H A Ds2_clnt.c759 /* We have a cert associated with the SSL, so attach it to
781 if ((s->cert == NULL) ||
782 (s->cert->key->x509 == NULL) ||
783 (s->cert->key->privatekey == NULL))
803 * can get a cert or not */
877 n=i2d_X509(s->cert->key->x509,&d);
880 if (!EVP_SignFinal(&ctx,d,&n,s->cert->key->privatekey))
1059 /* server's cert for this session */
H A Dssltest.c356 fprintf(stderr," -cert arg - Server certificate file\n");
357 fprintf(stderr," -key arg - Server key file (default: same as -cert)\n");
379 X509 *cert; local
387 cert=SSL_get_peer_certificate(c_ssl);
388 if (cert != NULL)
390 EVP_PKEY *pkey = X509_get_pubkey(cert);
413 X509_free(cert);
699 else if (strcmp(*argv,"-cert") == 0)
2284 fprintf(stderr, "In app_verify_callback, allowing cert. ");
2286 fprintf(stderr, "Finished printing do we have a context? 0x%p a cert
[all...]
H A Ds3_clnt.c408 /* EAY EAY EAY need to check for DH fix cert
410 /* For TLS, cert_req is set to 2, so a cert chain
1079 int need_cert = 1; /* VRS: 0=> will allow null cert if auth == KRB5 */
1182 /* VRS: allow null cert if auth == KRB5 */
2035 /* TLS does not like anon-DH with client cert */
2586 /* we get them from the cert */
2656 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL))
2663 * For example, the cert have an ECC
2672 * if ((s->cert->key->privatekey != NULL) &&
2673 * (s->cert
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dprint.c793 { "Netscape cert comment", &asn1_oid_id_netscape_cert_comment,
878 * @param cert the cerificate to validate/print.
888 hx509_cert cert)
890 Certificate *c = _hx509_get_cert(cert);
911 ret = hx509_cert_get_subject(cert, &subject);
918 ret = hx509_cert_get_issuer(cert, &issuer);
1023 cert,
886 hx509_validate_cert(hx509_context context, hx509_validate_ctx ctx, hx509_cert cert) argument
H A Dcrypto.c1585 const hx509_cert cert,
1593 if (cert)
1594 signer = _hx509_get_cert(cert);
1671 const Certificate *cert,
1686 spi = &cert->tbsCertificate.subjectPublicKeyInfo;
2948 const Certificate *cert; local
2962 cert = _hx509_get_cert(c);
2963 spi = &cert->tbsCertificate.subjectPublicKeyInfo;
1584 _hx509_verify_signature(hx509_context context, const hx509_cert cert, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
1669 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_serf/
H A Dutil.c213 const serf_ssl_certificate_t *cert,
228 if (serf_ssl_cert_depth(cert) > 0)
236 subject = serf_ssl_cert_subject(cert, scratch_pool);
237 issuer = serf_ssl_cert_issuer(cert, scratch_pool);
238 serf_cert = serf_ssl_cert_certificate(cert, scratch_pool);
252 cert_info.ascii_cert = serf_ssl_cert_export(cert, scratch_pool);
314 const serf_ssl_certificate_t *cert)
322 err = svn_error_trace(ssl_server_cert(baton, failures, cert, subpool));
210 ssl_server_cert(void *baton, int failures, const serf_ssl_certificate_t *cert, apr_pool_t *scratch_pool) argument
311 ssl_server_cert_cb(void *baton, int failures, const serf_ssl_certificate_t *cert) argument
/freebsd-10.0-release/contrib/unbound/smallapp/
H A Dunbound-anchor.c54 * * fail if clock before sign date of the root, if cert expired.
109 * root cert is valid to 2028 and the intermediate to 2014, today).
180 printf(" The anchor and cert have default builtin content\n");
185 printf("-c file cert file, default %s\n", ROOT_CERT_FILE);
186 printf("-l list builtin key and cert on stdout\n");
199 printf("-F debug, force update with cert\n");
436 /** read update cert file or use builtin */
1628 get_usage_of_ex(X509* cert) argument
1632 if((s=X509_get_ext_d2i(cert, NID_key_usage, NULL, NULL))) {
1666 if(verb) printf("signer %d: cert ha
1858 verify_and_update_anchor(const char* root_anchor_file, BIO* xml, BIO* p7s, STACK_OF(X509)* cert, const char* p7signer) argument
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dhostfile.c355 key_equal_public(k->cert->signature_key,
369 * 1. If the key is a cert and a matching CA is found, return HOST_OK
370 * 2. If the key is not a cert and a matching key is found, return HOST_OK
407 if (key_equal_public(k->cert->signature_key,
/freebsd-10.0-release/contrib/tcpdump/
H A Disakmp.h261 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert
H A Dprint-isakmp.c147 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */
1044 struct ikev1_pl_cert cert; local
1055 safememcpy(&cert, ext, sizeof(cert));
1057 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
1076 struct ikev1_pl_cert cert; local
1087 safememcpy(&cert, ext, sizeof(cert));
1089 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Dikev2_common.h308 const u8 *cert; member in struct:ikev2_payloads
/freebsd-10.0-release/contrib/wpa/src/eapol_supp/
H A Deapol_supp_sm.h224 * @cert: Peer certificate
227 const char *cert_hash, const struct wpabuf *cert);
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dkrb5_locl.h344 hx509_cert cert; member in struct:krb5_pk_identity
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dwpas_glue.c709 const struct wpabuf *cert)
713 wpas_notify_certification(wpa_s, depth, subject, cert_hash, cert);
707 wpa_supplicant_cert_cb(void *ctx, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms_env.c277 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument
285 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/
H A Docsp.h428 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
/freebsd-10.0-release/kerberos5/lib/libhx509/
H A DMakefile178 cert.c \
/freebsd-10.0-release/lib/libfetch/
H A Dcommon.c639 fetch_ssl_verify_hname(X509 *cert, const char *host) argument
648 altnames = X509_get_ext_d2i(cert, NID_subject_alt_name,
654 subject = X509_get_subject_name(cert);
699 getenv("SSL_CA_CERT_FILE") : "/etc/ssl/cert.pem";
704 fetch_info("Using CA cert file: %s",
707 fetch_info("Using CA cert path: %s",
748 fetch_info("Using client cert file: %s",
773 * cert verification. It takes no decision, but informs the user in case

Completed in 319 milliseconds

1234567