/freebsd-11-stable/etc/rc.d/ |
H A D | sendmail | 82 x509_extensions = usr_cert # The extensions to add to the cert 103 x509_extensions = v3_ca # The extensions to add to the self signed cert 143 -out newcert.pem -keyfile cakey.pem -cert cacert.pem \ 150 cp -p newcert.pem "$CERTDIR"/host.cert && 191 -f "$CERTDIR/host.cert" -o -f "$CERTDIR/host.key" -o \
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls.h | 54 const struct wpabuf *cert; member in struct:tls_cert_data 69 const struct wpabuf *cert; member in struct:tls_event_data::__anon3671
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | smime.c | 102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 376 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n"); 459 "cert.pem recipient certificate(s) for encryption\n"); 508 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM, 517 sk_X509_push(encerts, cert); 518 cert = NULL; 730 X509_free(cert);
|
H A D | cms.c | 128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 402 cert = load_cert(bio_err, *++args, FORMAT_PEM, 404 if (!cert) 406 sk_X509_push(encerts, cert); 407 cert = NULL; 577 BIO_printf(bio_err, "Usage cms [options] cert.pem ...\n"); 663 "cert.pem recipient certificate(s) for encryption\n"); 719 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM, 722 sk_X509_push(encerts, cert); 723 cert [all...] |
H A D | ocsp.c | 100 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, 147 X509 *issuer = NULL, *cert = NULL; local 388 } else if (!strcmp(*args, "-cert")) { 391 X509_free(cert); 392 cert = load_cert(bio_err, *args, FORMAT_PEM, 394 if (!cert) 398 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 502 BIO_printf(bio_err, "-cert file certificate to check\n"); 872 X509_free(cert); 898 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, argument [all...] |
H A D | s_apps.h | 162 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
|
H A D | pkcs12.c | 82 static int get_cert_chain(X509 *cert, X509_STORE *store, 579 /* If chaining get chain from user cert */ 908 static int get_cert_chain(X509 *cert, X509_STORE *store, argument 915 if (!X509_STORE_CTX_init(&store_ctx, store, cert, NULL)) { 1004 X509 *cert; local 1007 CRYPTO_push_info("cert_load(): reading one cert"); 1009 while ((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 1014 sk_X509_push(sk, cert); 1016 CRYPTO_push_info("cert_load(): reading one cert");
|
H A D | apps.c | 755 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 787 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 853 BIO *cert; local 860 if ((cert = BIO_new(BIO_s_file())) == NULL) { 871 BIO_set_fp(cert, stdin, BIO_NOCLOSE); 873 if (BIO_read_filename(cert, file) <= 0) { 881 x = d2i_X509_bio(cert, NULL); 884 nx = ASN1_item_d2i_bio(ASN1_ITEM_rptr(NETSCAPE_X509), cert, NULL); 894 x = nx->cert; 895 nx->cert 753 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 234 if (s->cert == NULL) { 491 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 493 && EVP_PKEY_size(s->cert->pkeys 512 if ( /* don't request cert unless asked for it: */ 515 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert 521 * never request cert in anonymous ciphersuites (see 533 * never request cert in Kerberos ciphersuites 543 /* no cert request */ 658 * We need to get hashes here so if there is a client cert, 1408 /* Let cert callbac 1631 CERT *cert; local [all...] |
H A D | s3_clnt.c | 439 * EAY EAY EAY need to check for DH fix cert sent back 442 * For TLS, cert_req is set to 2, so a cert chain of nothing is 902 CERT *ct = s->cert; 1187 int need_cert = 1; /* VRS: 0=> will allow null cert if auth == 1295 /* VRS: allow null cert if auth == KRB5 */ 2122 /* TLS does not like anon-DH with client cert */ 2141 if (s->cert->ctypes) { 2142 OPENSSL_free(s->cert->ctypes); 2143 s->cert->ctypes = NULL; 2146 /* If we exceed static buffer copy all to cert structur [all...] |
H A D | s2_clnt.c | 737 * We have a cert associated with the SSL, so attach it to the session if 761 if ((s->cert == NULL) || 762 (s->cert->key->x509 == NULL) || 763 (s->cert->key->privatekey == NULL)) { 779 * can get a cert or not 853 n = i2d_X509(s->cert->key->x509, &d); 856 if (!EVP_SignFinal(&ctx, d, &n, s->cert->key->privatekey)) { 1029 /* server's cert for this session */
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 491 * cert for the certificate, otherwise, search for a certificate. 520 * If signer is not CA cert, need to check revoke status of this 521 * CRL signing cert too, this include all parent CRL signer cert 669 * @param cert 683 hx509_cert cert, 686 const Certificate *c = _hx509_get_cert(cert); 697 /* check this ocsp apply to this cert */ 774 /* check if cert.issuer == crls.val[i].crl.issuer */ 819 /* check if cert i 679 hx509_revoke_verify(hx509_context context, hx509_revoke_ctx ctx, hx509_certs certs, time_t now, hx509_cert cert, hx509_cert parent_cert) argument 864 add_to_req(hx509_context context, void *ptr, hx509_cert cert) argument 1187 hx509_ocsp_verify(hx509_context context, time_t now, hx509_cert cert, int flags, const void *data, size_t length, time_t *expiration) argument 1377 add_revoked(hx509_context context, void *ctx, hx509_cert cert) argument [all...] |
H A D | hx_locl.h | 92 hx509_cert cert; member in struct:hx509_peer_info
|
H A D | Makefile.in | 129 dist_libhx509_la_OBJECTS = libhx509_la-ca.lo libhx509_la-cert.lo \ 518 cert.c \ 591 cert-null.pem cert-sub-ca2.pem \ 592 cert-ee.pem cert-ca.pem \ 593 cert-sub-ee.pem cert-sub-ca.pem \ 594 cert-proxy.der cert [all...] |
H A D | print.c | 793 { "Netscape cert comment", &asn1_oid_id_netscape_cert_comment, 878 * @param cert the cerificate to validate/print. 888 hx509_cert cert) 890 Certificate *c = _hx509_get_cert(cert); 911 ret = hx509_cert_get_subject(cert, &subject); 918 ret = hx509_cert_get_issuer(cert, &issuer); 1023 cert, 886 hx509_validate_cert(hx509_context context, hx509_validate_ctx ctx, hx509_cert cert) argument
|
/freebsd-11-stable/contrib/ntp/sntp/libevent/test/ |
H A D | regress_ssl.c | 305 X509 *cert = getcert(); local 313 tt_assert(cert); 331 SSL_use_certificate(ssl2, cert);
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | limit-keytype.sh | 28 # Copy the private key alongside the cert to allow better control of when 30 mv $OBJ/user_key3-cert.pub $OBJ/cert_user_key3.pub 57 ${SSH} $certopts proxy true || fatal "cert failed" 64 ${SSH} $certopts proxy true && fatal "cert succeeded" 71 ${SSH} $certopts proxy true && fatal "cert succeeded" 76 verbose "allow cert only" 77 prepare_config "PubkeyAcceptedKeyTypes ssh-*-cert-v01@openssh.com" 78 ${SSH} $certopts proxy true || fatal "cert failed" 86 ${SSH} $certopts proxy true && fatal "cert succeeded" 94 ${SSH} $certopts proxy true || fatal "cert faile [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 297 sk = &(p7->d.sign->cert); 300 sk = &(p7->d.signed_and_enveloped->cert); 553 p7i->cert = x509; 566 return (X509_find_by_issuer_and_serial(p7->d.sign->cert,
|
H A D | pk7_doit.c | 146 pkey = X509_get_pubkey(ri->cert); 983 STACK_OF(X509) *cert; 997 cert = p7->d.sign->cert; 999 cert = p7->d.signed_and_enveloped->cert; 1007 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); 1009 /* were we able to find the cert in passed to us */ 1017 if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) {
|
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 258 level->cert = x; 670 cache = policy_cache_set(curr->cert); 705 if (curr->cert) 706 X509_free(curr->cert);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap.h | 230 * @cert: Certificate information 233 void (*notify_cert)(void *ctx, struct tls_cert_data *cert,
|
H A D | ikev2.c | 490 const u8 *cert, size_t cert_len) 494 if (cert == NULL) { 507 cert_encoding = cert[0]; 508 cert++; 512 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 637 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 489 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | net_help.h | 389 * Log certificate details verbosity, string, of X509 cert 392 * @param cert: X509* structure. 394 void log_cert(unsigned level, const char* str, void* cert); 412 * @param pem: public key cert.
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) 562 if (cert == NULL) { 575 cert_encoding = cert[0]; 576 cert++; 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 527 cert = x509_certificate_parse(pos, cert_len); 528 if (cert == NULL) { 537 chain = cert; 539 last->next = cert; 540 last = cert;
|