Searched refs:cert (Results 76 - 100 of 196) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssl/ssl/
H A Dt1_lib.c505 || s->cert->ecdh_tmp_auto
856 * Check cert parameters compatible with extensions: currently just checks EC
890 CERT *c = s->cert;
920 EC_KEY *ec = s->cert->ecdh_tmp;
923 if (s->cert->cert_flags & SSL_CERT_FLAG_BROKEN_PROTOCOL)
943 if (s->cert->ecdh_tmp_auto || s->cert->ecdh_tmp_cb)
958 if (s->cert->ecdh_tmp_auto) {
966 if (s->cert->ecdh_tmp_cb)
1064 if (s->server == sent && s->cert
[all...]
H A Ds2_srvr.c168 if (s->cert == NULL) {
457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) {
533 i = ssl_rsa_private_decrypt(s->cert, s->s2->tmp.enc,
662 if (s->cert == NULL) {
773 if (!hit) { /* else add cert to session */
774 CRYPTO_add(&s->cert->references, 1, CRYPTO_LOCK_SSL_CERT);
777 s->session->sess_cert = s->cert;
780 * against * the 'cert' structure, grab the
784 CRYPTO_add(&s->cert->references, 1, CRYPTO_LOCK_SSL_CERT);
785 s->session->sess_cert = s->cert;
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_smime.c319 p7->d.sign->cert)) {
460 && p7->d.sign->cert)
462 X509_find_by_issuer_and_serial(p7->d.sign->cert,
522 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) argument
538 if (cert && !X509_check_private_key(cert, pkey)) {
544 if (!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
H A Dpk7_asn1.c124 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0),
180 X509_free(ri->cert);
207 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
/freebsd-11-stable/contrib/wpa/hs20/client/
H A Dest.c66 certs = p7->d.sign->cert;
69 certs = p7->d.signed_and_enveloped->cert;
98 X509 *cert = sk_X509_value(certs, i); local
99 X509_print(out, cert);
100 PEM_write_bio_X509(out, cert);
444 X509 *cert; local
450 cert = PEM_read_X509(f, NULL, NULL, NULL);
453 if (cert == NULL)
456 X509_get_subject_name(cert));
457 X509_free(cert);
[all...]
/freebsd-11-stable/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c72 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
310 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument
331 iname = X509_get_subject_name(cert);
336 X509_pubkey_digest(cert, dgst, md, NULL);
348 ret = ocsp_match_issuerid(cert, tmpid, NULL);
H A Docsp_srv.c207 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument
212 if (!sk_X509_push(resp->certs, cert))
214 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dsoftp11.c61 hx509_cert cert; member in struct:st_object
364 CK_KEY_TYPE key_type, hx509_cert cert)
375 if (_hx509_cert_private_key(cert) == NULL)
379 _hx509_cert_private_key(cert),
397 _hx509_cert_private_key(cert),
422 add_cert(hx509_context hxctx, void *ctx, hx509_cert cert) argument
443 hret = hx509_cert_binary(hxctx, cert, &cert_data);
450 hret = hx509_cert_get_issuer(cert, &name);
458 hret = hx509_cert_get_subject(cert, &name);
470 hret = hx509_cert_get_SPKI_AlgorithmIdentifier(context, cert,
363 add_pubkey_info(hx509_context hxctx, struct st_object *o, CK_KEY_TYPE key_type, hx509_cert cert) argument
732 char *cert, *id, *label; local
[all...]
H A Dtest_cms.in63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \
118 echo "verify signed data (EE cert as anchor)"
282 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
302 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
317 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
331 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert
[all...]
H A Dks_p12.c134 hx509_cert cert; local
155 ret = hx509_cert_init_data(context, os.data, os.length, &cert);
160 ret = _hx509_collector_certs_add(context, c, cert);
162 hx509_cert_free(cert);
177 _hx509_set_cert_attribute(context, cert, oid,
182 hx509_cert_free(cert);
674 hx509_cert *cert)
677 return hx509_certs_next_cert(context, p12->certs, cursor, cert);
670 p12_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
H A Dlock.c133 hx509_lock_add_cert(hx509_context context, hx509_lock lock, hx509_cert cert) argument
135 return hx509_certs_add(context, lock->certs, cert);
/freebsd-11-stable/contrib/ntp/util/
H A Dntp-keygen.c172 char *hostname = NULL; /* host, used in cert filenames */
305 X509 *cert = NULL; /* X509 certificate */ local
515 cert = PEM_read_X509(fstr, NULL, NULL, NULL);
518 if (cert != NULL) {
523 X509_NAME_oneline(X509_get_subject_name(cert), groupbuf,
530 nid = X509_get_signature_nid(cert);
540 cnt = X509_get_ext_count(cert);
545 ext = X509_get_ext(cert, i);
1958 const char *exten, /* private cert extension */
1962 X509 *cert; /* X50 local
[all...]
/freebsd-11-stable/contrib/sendmail/src/
H A Dtls.c41 # define X509_STORE_CTX_get0_cert(ctx) (ctx)->cert
514 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */
515 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */
518 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */
519 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */
520 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */
521 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */
525 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */
526 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */
530 # define TLS_S_DH_OK 0x00200000 /* DH cert i
1766 X509 *cert; local
2206 X509 *cert; local
2312 X509 *cert; local
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dpkinit.c58 hx509_cert cert; member in struct:krb5_pk_cert
95 _krb5_pk_cert_free(struct krb5_pk_cert *cert) argument
97 if (cert->cert) {
98 hx509_cert_free(cert->cert);
100 free(cert);
183 hx509_query *q, hx509_cert *cert)
213 ret = hx509_certs_find(context->hx509ctx, id->certs, q, cert);
233 if (id->cert
182 find_cert(krb5_context context, struct krb5_pk_identity *id, hx509_query *q, hx509_cert *cert) argument
2437 hx509_cert cert = opt->opt_private->pk_init_ctx->id->cert; local
2503 get_ms_san(hx509_context context, hx509_cert cert, char **upn) argument
2528 find_ms_san(hx509_context context, hx509_cert cert, void *ctx) argument
2557 hx509_cert cert = NULL; local
[all...]
/freebsd-11-stable/usr.sbin/pkg/
H A Dpkg.c65 unsigned char *cert; member in struct:sig_cert
499 load_public_key_buf(const unsigned char *cert, int certlen) argument
505 bp = BIO_new_mem_buf(__DECONST(void *, cert), certlen);
624 struct sbuf *buf, *sig, *cert; local
653 cert = sbuf_new_auto();
660 buf = cert;
675 sbuf_finish(cert);
682 sc->certlen = sbuf_len(cert);
683 sc->cert = strdup(sbuf_data(cert));
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dauthfile.c431 if (asprintf(&file, "%s-cert.pub", filename) == -1)
456 struct sshkey *key = NULL, *cert = NULL; local
477 (r = sshkey_load_cert(filename, &cert)) != 0)
481 if (sshkey_equal_public(key, cert) == 0) {
487 (r = sshkey_cert_copy(cert, key)) != 0)
496 sshkey_free(cert);
548 sshkey_compare(key->cert->signature_key, pub))) {
H A Dauth2-hostbased.c227 if ((fp = sshkey_fingerprint(key->cert->signature_key,
231 "%s CA %s from %s@%s", key->cert->key_id,
232 key_type(key->cert->signature_key), fp,
/freebsd-11-stable/crypto/openssh/regress/
H A Dcert-file.sh1 # $OpenBSD: cert-file.sh,v 1.5 2017/03/11 23:44:16 djm Exp $
32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub
36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub
49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
58 # Key with no .pub should work - finding the equivalent *-cert.pub.
59 verbose "protocol $p: identity cert with no plain public file"
67 -oCertificateFile=$OBJ/user_key3-cert.pub \
79 # Keys with untrusted cert should fail.
80 verbose "protocol $p: untrusted cert"
85 fail "ssh succeeded with bad cert i
[all...]
H A Dprincipals-command.sh26 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
28 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
37 test "x\$2" != "xssh-rsa-cert-v01@openssh.com" && exit 1
84 fail "ssh cert connect succeeded unexpectedly"
93 fail "ssh cert connect succeeded unexpectedly"
102 fail "ssh cert connect failed"
111 fail "ssh cert connect succeeded unexpectedly"
121 fail "ssh cert connect succeeded unexpectedly"
131 fail "ssh cert connect failed"
144 printf 'cert
[all...]
H A Dkrl.sh66 # Sign cert
78 RCERTS="$RCERTS ${f}-cert.pub"
85 UCERTS="$UCERTS ${f}-cert.pub"
94 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \
121 ## XXX dump with trace and grep for set cert serials
158 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG"
167 # keys all sr# k.ID cert CA sr.# k.ID
178 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c144 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) argument
154 return cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert);
156 return cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert);
195 X509 *cert)
199 return cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert);
201 return cms_keyid_cert_cmp(rid->d.rKeyId->subjectKeyIdentifier, cert);
194 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) argument
H A Dcms.h185 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert,
188 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert);
202 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert);
253 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert);
254 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert);
274 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
358 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert);
366 X509 *cert);
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.c165 struct x509_certificate *cert; local
174 cert = x509_certificate_parse(buf, len);
175 if (cert == NULL) {
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
194 x509_certificate_free(cert);
/freebsd-11-stable/crypto/openssl/crypto/x509v3/
H A Dpcy_int.h151 X509 *cert; member in struct:X509_POLICY_LEVEL_st
/freebsd-11-stable/crypto/openssl/apps/
H A Ds_cb.c152 BIO_puts(bio_err, "<no cert>\n");
242 * Now we know that a key and cert have been set against the SSL
254 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, argument
258 if (cert == NULL)
260 if (SSL_CTX_use_certificate(ctx, cert) <= 0) {
273 * Now we know that a key and cert have been set against the SSL context
939 extname = "cert type";
1172 X509 *cert; member in struct:ssl_excert_st
1245 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain);
1246 BIO_printf(bio_err, "Checking cert chai
[all...]

Completed in 160 milliseconds

12345678