/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, cons 152 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 189 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 216 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
H A D | tlsv1_client_write.c | 27 struct x509_certificate *cert; local 32 cert = conn->cred->cert; 33 while (cert) { 34 len += 3 + cert->cert_len; 35 if (x509_certificate_self_signed(cert)) 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 38 &cert->issuer); 134 struct x509_certificate *cert; local 155 cert [all...] |
H A D | tlsv1_server_write.c | 27 struct x509_certificate *cert; local 29 cert = conn->cred->cert; 30 while (cert) { 31 len += 3 + cert->cert_len; 32 if (x509_certificate_self_signed(cert)) 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 35 &cert->issuer); 161 struct x509_certificate *cert; local 190 cert [all...] |
H A D | tlsv1_common.c | 153 struct x509_certificate *cert; local 162 cert = x509_certificate_parse(buf, len); 163 if (cert == NULL) { 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 182 x509_certificate_free(cert);
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | test_nist2.in | 85 while read result cert other ; do 87 name=${cert} 97 args="$args cert:FILE:$nistdir/certs/$cert"
|
H A D | cms.c | 172 fill_CMSIdentifier(const hx509_cert cert, argument 181 ret = _hx509_find_extension_subject_key_id(_hx509_get_cert(cert), 190 ret = hx509_cert_get_issuer(cert, &name); 198 ret = hx509_cert_get_serialnumber(cert, &id->u.issuerAndSerialNumber.serialNumber); 267 hx509_cert cert; local 300 ret = hx509_certs_find(context, certs, &q, &cert); 315 "Failed to find CMS id in cert store"); 319 *signer_cert = cert; 359 hx509_cert cert; local 408 cert 551 hx509_cms_envelope_1(hx509_context context, int flags, hx509_cert cert, const void *data, size_t length, const heim_oid *encryption_type, const heim_oid *contentType, heim_octet_string *content) argument 791 hx509_cert cert = NULL; local 1144 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1191 sig_process(hx509_context context, void *ctx, hx509_cert cert) argument 1409 cert_process(hx509_context context, void *ctx, hx509_cert cert) argument [all...] |
H A D | ks_dir.c | 40 * state except for the directory iteration and cert iteration of 126 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 131 *cert = NULL; 138 ret = hx509_certs_next_cert(context, d->certs, d->iter, cert); 145 if (*cert) { 125 dir_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | keyset.c | 228 _hx509_abort("cert refcount == 0 on free"); 281 * @param cert return certificate next in store, NULL if the store 293 hx509_cert *cert) 295 *cert = NULL; 296 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert); 387 certs_iter(hx509_context context, void *ctx, hx509_cert cert) argument 390 return func(cert); 434 Certificate *cert; local 438 cert = _hx509_get_cert(c); 440 _hx509_name_from_Name(&cert 290 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument 469 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument [all...] |
H A D | ks_keychain.c | 255 hx509_cert cert) 306 _hx509_cert_assign_key(cert, key); 416 hx509_cert cert; local 423 ret = hx509_cert_init_data(context, cssm.Data, cssm.Length, &cert); 427 ret = hx509_certs_add(context, iter->certs, cert); 428 hx509_cert_free(cert); 466 hx509_certs certs, void *data, void *cursor, hx509_cert *cert) 479 return hx509_certs_next_cert(context, iter->certs, iter->cursor, cert); 481 *cert = NULL; 504 ret = hx509_cert_init_data(context, ptr, len, cert); 253 set_private_key(hx509_context context, SecKeychainItemRef itemRef, hx509_cert cert) argument 465 keychain_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument [all...] |
H A D | test_java_pkcs11.in | 60 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
|
H A D | collector.c | 68 ret = hx509_certs_init(context, "MEMORY:collector-unenvelop-cert", 98 hx509_cert cert) 100 return hx509_certs_add(context, c->certs, cert); 178 hx509_cert cert; local 193 ret = hx509_certs_find(context, certs, &q, &cert); 197 _hx509_cert_assign_key(cert, value->private_key); 198 hx509_cert_free(cert); 96 _hx509_collector_certs_add(hx509_context context, struct hx509_collector *c, hx509_cert cert) argument
|
H A D | ks_mem.c | 129 hx509_cert *cert) 135 *cert = NULL; 139 *cert = hx509_cert_ref(mem->certs.val[*iter]); 125 mem_iter(hx509_context contexst, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
|
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 106 * issuer: use the issuers cert issuer and serial number. The default is 123 X509 *cert; local 157 cert = ctx->issuer_cert; 161 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1); 162 if((i >= 0) && (ext = X509_get_ext(cert, i))) 173 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 174 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
|
/freebsd-10.0-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/freebsd-10.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/freebsd-10.0-release/crypto/openssl/engines/ |
H A D | e_capi.c | 1218 CRYPT_KEY_PROV_INFO *capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1223 if(!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, NULL, &len)) 1231 if(!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, pinfo, &len)) 1264 char * capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1270 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, NULL, &dlen)) 1273 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, wfname, &dlen)) 1287 void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) argument 1295 fname = capi_cert_get_fname(ctx, cert); 1305 p = cert->pbCertEncoded; 1306 x = d2i_X509(NULL, &p, cert 1360 PCCERT_CONTEXT cert = NULL; local 1400 PCCERT_CONTEXT cert = NULL; local 1463 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1490 PCCERT_CONTEXT cert; local 1635 PCCERT_CONTEXT cert = NULL, excert = NULL; local 1764 PCCERT_CONTEXT cert; local [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 137 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 260 if (priv->cert) 261 CertFreeCertificateContext(priv->cert); 288 if (strncmp(name, "cert://", 7) == 0) { 323 X509 *cert = NULL; local 329 (strncmp(name, "cert://", 7) != 0 && 343 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 344 if (priv->cert == NULL) { 345 priv->cert = cryptoapi_find_cert( 348 if (priv->cert 425 X509 *cert; local 996 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1018 tls_match_altsubject(X509 *cert, const char *match) argument 1099 get_x509_cert(X509 *cert) argument 1124 struct wpabuf *cert = NULL; local 1146 struct wpabuf *cert = NULL; local 1218 struct wpabuf *cert; local 1395 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1709 X509 *cert; local 1834 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1841 X509 *cert; member in struct:__anon4512 1868 X509 *cert; local 1895 X509 *cert; local [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-pubkey.c | 209 fp = key_fingerprint(key->cert->signature_key, 212 key_type(key), key->cert->key_id, 213 (unsigned long long)key->cert->serial, 214 key_type(key->cert->signature_key), fp, 227 match_principals_option(const char *principal_list, struct KeyCert *cert) argument 234 for (i = 0; i < cert->nprincipals; i++) { 235 if ((result = match_list(cert->principals[i], 247 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument 285 for (i = 0; i < cert->nprincipals; i++) { 286 if (strcmp(cp, cert [all...] |
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_old.h | 82 const struct wpabuf *cert); 119 const struct wpabuf *cert) 116 wpa_supplicant_dbus_notify_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
|
/freebsd-10.0-release/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 159 /* Client cert callbacks */ 165 /* Client cert PW callbacks */ 171 /* Server cert callbacks */ 488 serf_ssl_certificate_t *cert; local 493 cert = apr_palloc(subpool, sizeof(serf_ssl_certificate_t)); 494 cert->ssl_cert = server_cert; 495 cert->depth = depth; 499 failures, cert); 529 serf_ssl_certificate_t *cert = apr_palloc(subpool, sizeof(*cert)); local 547 serf_ssl_certificate_t *cert; local 1021 ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument 1333 serf_ssl_load_cert_file( serf_ssl_certificate_t **cert, const char *file_path, apr_pool_t *pool) argument 1356 serf_ssl_trust_cert( serf_ssl_context_t *ssl_ctx, serf_ssl_certificate_t *cert) argument 1501 serf_ssl_cert_depth(const serf_ssl_certificate_t *cert) argument 1507 serf_ssl_cert_issuer( const serf_ssl_certificate_t *cert, apr_pool_t *pool) argument 1520 serf_ssl_cert_subject( const serf_ssl_certificate_t *cert, apr_pool_t *pool) argument 1533 serf_ssl_cert_certificate( const serf_ssl_certificate_t *cert, apr_pool_t *pool) argument 1617 serf_ssl_cert_export( const serf_ssl_certificate_t *cert, apr_pool_t *pool) argument [all...] |
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | s3_lib.c | 3107 if (!ssl_cert_inst(&s->cert)) 3137 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) && 3138 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 3139 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) 3155 if (s->cert->rsa_tmp != NULL) 3156 RSA_free(s->cert->rsa_tmp); 3157 s->cert->rsa_tmp = rsa; 3191 if (s->cert->dh_tmp != NULL) 3192 DH_free(s->cert 3450 CERT *cert; local 3680 CERT *cert; local 3796 CERT *cert; local [all...] |
/freebsd-10.0-release/contrib/serf/ |
H A D | serf_bucket_types.h | 516 const serf_ssl_certificate_t *cert); 572 const serf_ssl_certificate_t *cert); 579 const serf_ssl_certificate_t *cert, 587 const serf_ssl_certificate_t *cert, 595 const serf_ssl_certificate_t *cert, 603 const serf_ssl_certificate_t *cert, 608 * and parsed correctly, a certificate @a cert will be created and returned. 612 serf_ssl_certificate_t **cert, 617 * Adds the certificate @a cert to the list of trusted certificates in 623 serf_ssl_certificate_t *cert); [all...] |
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | pkinit.c | 63 hx509_cert cert; member in struct:pk_client_params 174 if (cp->cert) 175 hx509_cert_free(cp->cert); 539 hx509_cert cert; local 544 pc->val[i].cert.data, 545 pc->val[i].cert.length, 546 &cert); 549 hx509_certs_add(context->hx509ctx, trust_anchors, cert); 550 hx509_cert_free(cert); 642 hx509_cert cert; local 1017 hx509_cert cert; local 1102 hx509_cert cert; local 1740 hx509_cert cert; local 1985 hx509_cert cert; local [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 71 static int TS_find_cert(STACK_OF(ESS_CERT_ID) *cert_ids, X509 *cert); 266 X509 *cert; local 273 cert = sk_X509_value(chain, 0); 274 if (TS_find_cert(cert_ids, cert) != 0) goto err; 283 cert = sk_X509_value(chain, i); 284 if (TS_find_cert(cert_ids, cert) < 0) goto err; 308 static int TS_find_cert(STACK_OF(ESS_CERT_ID) *cert_ids, X509 *cert) 312 if (!cert_ids || !cert) return -1; 315 X509_check_purpose(cert, -1, 0); 317 /* Look for cert i [all...] |
H A D | ts_conf.c | 96 BIO *cert = NULL; local 99 if ((cert = BIO_new_file(file, "r")) == NULL) goto end; 100 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); 104 BIO_free(cert); 240 const char *cert, TS_RESP_CTX *ctx) 244 if (!cert) 245 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT); 246 if (!cert) 251 if (!(cert_obj = TS_CONF_load_cert(cert))) 239 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
|