Searched refs:cert (Results 126 - 150 of 196) sorted by relevance

12345678

/freebsd-11-stable/etc/rc.d/
H A Dsendmail82 x509_extensions = usr_cert # The extensions to add to the cert
103 x509_extensions = v3_ca # The extensions to add to the self signed cert
143 -out newcert.pem -keyfile cakey.pem -cert cacert.pem \
150 cp -p newcert.pem "$CERTDIR"/host.cert &&
191 -f "$CERTDIR/host.cert" -o -f "$CERTDIR/host.key" -o \
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls.h54 const struct wpabuf *cert; member in struct:tls_cert_data
69 const struct wpabuf *cert; member in struct:tls_event_data::__anon3671
/freebsd-11-stable/crypto/openssl/apps/
H A Dsmime.c102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
376 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n");
459 "cert.pem recipient certificate(s) for encryption\n");
508 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM,
517 sk_X509_push(encerts, cert);
518 cert = NULL;
730 X509_free(cert);
H A Dcms.c128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
402 cert = load_cert(bio_err, *++args, FORMAT_PEM,
404 if (!cert)
406 sk_X509_push(encerts, cert);
407 cert = NULL;
577 BIO_printf(bio_err, "Usage cms [options] cert.pem ...\n");
663 "cert.pem recipient certificate(s) for encryption\n");
719 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM,
722 sk_X509_push(encerts, cert);
723 cert
[all...]
H A Docsp.c100 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
147 X509 *issuer = NULL, *cert = NULL; local
388 } else if (!strcmp(*args, "-cert")) {
391 X509_free(cert);
392 cert = load_cert(bio_err, *args, FORMAT_PEM,
394 if (!cert)
398 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
502 BIO_printf(bio_err, "-cert file certificate to check\n");
872 X509_free(cert);
898 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, argument
[all...]
H A Ds_apps.h162 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
H A Dpkcs12.c82 static int get_cert_chain(X509 *cert, X509_STORE *store,
579 /* If chaining get chain from user cert */
908 static int get_cert_chain(X509 *cert, X509_STORE *store, argument
915 if (!X509_STORE_CTX_init(&store_ctx, store, cert, NULL)) {
1004 X509 *cert; local
1007 CRYPTO_push_info("cert_load(): reading one cert");
1009 while ((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
1014 sk_X509_push(sk, cert);
1016 CRYPTO_push_info("cert_load(): reading one cert");
H A Dapps.c755 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
787 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
853 BIO *cert; local
860 if ((cert = BIO_new(BIO_s_file())) == NULL) {
871 BIO_set_fp(cert, stdin, BIO_NOCLOSE);
873 if (BIO_read_filename(cert, file) <= 0) {
881 x = d2i_X509_bio(cert, NULL);
884 nx = ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509), cert, NULL);
894 x = nx->cert;
895 nx->cert
753 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_srvr.c234 if (s->cert == NULL) {
491 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
493 && EVP_PKEY_size(s->cert->pkeys
512 if ( /* don't request cert unless asked for it: */
515 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert
521 * never request cert in anonymous ciphersuites (see
533 * never request cert in Kerberos ciphersuites
543 /* no cert request */
658 * We need to get hashes here so if there is a client cert,
1408 /* Let cert callbac
1631 CERT *cert; local
[all...]
H A Ds3_clnt.c439 * EAY EAY EAY need to check for DH fix cert sent back
442 * For TLS, cert_req is set to 2, so a cert chain of nothing is
902 CERT *ct = s->cert;
1187 int need_cert = 1; /* VRS: 0=> will allow null cert if auth ==
1295 /* VRS: allow null cert if auth == KRB5 */
2122 /* TLS does not like anon-DH with client cert */
2141 if (s->cert->ctypes) {
2142 OPENSSL_free(s->cert->ctypes);
2143 s->cert->ctypes = NULL;
2146 /* If we exceed static buffer copy all to cert structur
[all...]
H A Ds2_clnt.c737 * We have a cert associated with the SSL, so attach it to the session if
761 if ((s->cert == NULL) ||
762 (s->cert->key->x509 == NULL) ||
763 (s->cert->key->privatekey == NULL)) {
779 * can get a cert or not
853 n = i2d_X509(s->cert->key->x509, &d);
856 if (!EVP_SignFinal(&ctx, d, &n, s->cert->key->privatekey)) {
1029 /* server's cert for this session */
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Drevoke.c491 * cert for the certificate, otherwise, search for a certificate.
520 * If signer is not CA cert, need to check revoke status of this
521 * CRL signing cert too, this include all parent CRL signer cert
669 * @param cert
683 hx509_cert cert,
686 const Certificate *c = _hx509_get_cert(cert);
697 /* check this ocsp apply to this cert */
774 /* check if cert.issuer == crls.val[i].crl.issuer */
819 /* check if cert i
679 hx509_revoke_verify(hx509_context context, hx509_revoke_ctx ctx, hx509_certs certs, time_t now, hx509_cert cert, hx509_cert parent_cert) argument
864 add_to_req(hx509_context context, void *ptr, hx509_cert cert) argument
1187 hx509_ocsp_verify(hx509_context context, time_t now, hx509_cert cert, int flags, const void *data, size_t length, time_t *expiration) argument
1377 add_revoked(hx509_context context, void *ctx, hx509_cert cert) argument
[all...]
H A Dhx_locl.h92 hx509_cert cert; member in struct:hx509_peer_info
H A DMakefile.in129 dist_libhx509_la_OBJECTS = libhx509_la-ca.lo libhx509_la-cert.lo \
518 cert.c \
591 cert-null.pem cert-sub-ca2.pem \
592 cert-ee.pem cert-ca.pem \
593 cert-sub-ee.pem cert-sub-ca.pem \
594 cert-proxy.der cert
[all...]
H A Dprint.c793 { "Netscape cert comment", &asn1_oid_id_netscape_cert_comment,
878 * @param cert the cerificate to validate/print.
888 hx509_cert cert)
890 Certificate *c = _hx509_get_cert(cert);
911 ret = hx509_cert_get_subject(cert, &subject);
918 ret = hx509_cert_get_issuer(cert, &issuer);
1023 cert,
886 hx509_validate_cert(hx509_context context, hx509_validate_ctx ctx, hx509_cert cert) argument
/freebsd-11-stable/contrib/ntp/sntp/libevent/test/
H A Dregress_ssl.c305 X509 *cert = getcert(); local
313 tt_assert(cert);
331 SSL_use_certificate(ssl2, cert);
/freebsd-11-stable/crypto/openssh/regress/
H A Dlimit-keytype.sh28 # Copy the private key alongside the cert to allow better control of when
30 mv $OBJ/user_key3-cert.pub $OBJ/cert_user_key3.pub
57 ${SSH} $certopts proxy true || fatal "cert failed"
64 ${SSH} $certopts proxy true && fatal "cert succeeded"
71 ${SSH} $certopts proxy true && fatal "cert succeeded"
76 verbose "allow cert only"
77 prepare_config "PubkeyAcceptedKeyTypes ssh-*-cert-v01@openssh.com"
78 ${SSH} $certopts proxy true || fatal "cert failed"
86 ${SSH} $certopts proxy true && fatal "cert succeeded"
94 ${SSH} $certopts proxy true || fatal "cert faile
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_lib.c297 sk = &(p7->d.sign->cert);
300 sk = &(p7->d.signed_and_enveloped->cert);
553 p7i->cert = x509;
566 return (X509_find_by_issuer_and_serial(p7->d.sign->cert,
H A Dpk7_doit.c146 pkey = X509_get_pubkey(ri->cert);
983 STACK_OF(X509) *cert;
997 cert = p7->d.sign->cert;
999 cert = p7->d.signed_and_enveloped->cert;
1007 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial);
1009 /* were we able to find the cert in passed to us */
1017 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) {
/freebsd-11-stable/crypto/openssl/crypto/x509v3/
H A Dpcy_tree.c258 level->cert = x;
670 cache = policy_cache_set(curr->cert);
705 if (curr->cert)
706 X509_free(curr->cert);
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap.h230 * @cert: Certificate information
233 void (*notify_cert)(void *ctx, struct tls_cert_data *cert,
H A Dikev2.c490 const u8 *cert, size_t cert_len)
494 if (cert == NULL) {
507 cert_encoding = cert[0];
508 cert++;
512 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
637 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
489 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-11-stable/contrib/unbound/util/
H A Dnet_help.h389 * Log certificate details verbosity, string, of X509 cert
392 * @param cert: X509* structure.
394 void log_cert(unsigned level, const char* str, void* cert);
412 * @param pem: public key cert.
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.c558 const u8 *cert, size_t cert_len)
562 if (cert == NULL) {
575 cert_encoding = cert[0];
576 cert++;
580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_server_read.c402 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
527 cert = x509_certificate_parse(pos, cert_len);
528 if (cert == NULL) {
537 chain = cert;
539 last->next = cert;
540 last = cert;

Completed in 417 milliseconds

12345678