/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_lib.c | 505 || s->cert->ecdh_tmp_auto 856 * Check cert parameters compatible with extensions: currently just checks EC 890 CERT *c = s->cert; 920 EC_KEY *ec = s->cert->ecdh_tmp; 923 if (s->cert->cert_flags & SSL_CERT_FLAG_BROKEN_PROTOCOL) 943 if (s->cert->ecdh_tmp_auto || s->cert->ecdh_tmp_cb) 958 if (s->cert->ecdh_tmp_auto) { 966 if (s->cert->ecdh_tmp_cb) 1064 if (s->server == sent && s->cert [all...] |
H A D | s2_srvr.c | 168 if (s->cert == NULL) { 457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) { 533 i = ssl_rsa_private_decrypt(s->cert, s->s2->tmp.enc, 662 if (s->cert == NULL) { 773 if (!hit) { /* else add cert to session */ 774 CRYPTO_add(&s->cert->references, 1, CRYPTO_LOCK_SSL_CERT); 777 s->session->sess_cert = s->cert; 780 * against * the 'cert' structure, grab the 784 CRYPTO_add(&s->cert->references, 1, CRYPTO_LOCK_SSL_CERT); 785 s->session->sess_cert = s->cert; [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 319 p7->d.sign->cert)) { 460 && p7->d.sign->cert) 462 X509_find_by_issuer_and_serial(p7->d.sign->cert, 522 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) argument 538 if (cert && !X509_check_private_key(cert, pkey)) { 544 if (!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
|
H A D | pk7_asn1.c | 124 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 180 X509_free(ri->cert); 207 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
/freebsd-11-stable/contrib/wpa/hs20/client/ |
H A D | est.c | 66 certs = p7->d.sign->cert; 69 certs = p7->d.signed_and_enveloped->cert; 98 X509 *cert = sk_X509_value(certs, i); local 99 X509_print(out, cert); 100 PEM_write_bio_X509(out, cert); 444 X509 *cert; local 450 cert = PEM_read_X509(f, NULL, NULL, NULL); 453 if (cert == NULL) 456 X509_get_subject_name(cert)); 457 X509_free(cert); [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 72 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 310 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument 331 iname = X509_get_subject_name(cert); 336 X509_pubkey_digest(cert, dgst, md, NULL); 348 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
H A D | ocsp_srv.c | 207 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument 212 if (!sk_X509_push(resp->certs, cert)) 214 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | softp11.c | 61 hx509_cert cert; member in struct:st_object 364 CK_KEY_TYPE key_type, hx509_cert cert) 375 if (_hx509_cert_private_key(cert) == NULL) 379 _hx509_cert_private_key(cert), 397 _hx509_cert_private_key(cert), 422 add_cert(hx509_context hxctx, void *ctx, hx509_cert cert) argument 443 hret = hx509_cert_binary(hxctx, cert, &cert_data); 450 hret = hx509_cert_get_issuer(cert, &name); 458 hret = hx509_cert_get_subject(cert, &name); 470 hret = hx509_cert_get_SPKI_AlgorithmIdentifier(context, cert, 363 add_pubkey_info(hx509_context hxctx, struct st_object *o, CK_KEY_TYPE key_type, hx509_cert cert) argument 732 char *cert, *id, *label; local [all...] |
H A D | test_cms.in | 63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \ 118 echo "verify signed data (EE cert as anchor)" 282 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 302 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 317 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 331 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert [all...] |
H A D | ks_p12.c | 134 hx509_cert cert; local 155 ret = hx509_cert_init_data(context, os.data, os.length, &cert); 160 ret = _hx509_collector_certs_add(context, c, cert); 162 hx509_cert_free(cert); 177 _hx509_set_cert_attribute(context, cert, oid, 182 hx509_cert_free(cert); 674 hx509_cert *cert) 677 return hx509_certs_next_cert(context, p12->certs, cursor, cert); 670 p12_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
|
H A D | lock.c | 133 hx509_lock_add_cert(hx509_context context, hx509_lock lock, hx509_cert cert) argument 135 return hx509_certs_add(context, lock->certs, cert);
|
/freebsd-11-stable/contrib/ntp/util/ |
H A D | ntp-keygen.c | 172 char *hostname = NULL; /* host, used in cert filenames */ 305 X509 *cert = NULL; /* X509 certificate */ local 515 cert = PEM_read_X509(fstr, NULL, NULL, NULL); 518 if (cert != NULL) { 523 X509_NAME_oneline(X509_get_subject_name(cert), groupbuf, 530 nid = X509_get_signature_nid(cert); 540 cnt = X509_get_ext_count(cert); 545 ext = X509_get_ext(cert, i); 1958 const char *exten, /* private cert extension */ 1962 X509 *cert; /* X50 local [all...] |
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | tls.c | 41 # define X509_STORE_CTX_get0_cert(ctx) (ctx)->cert 514 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */ 515 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */ 518 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */ 519 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */ 520 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */ 521 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */ 525 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */ 526 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */ 530 # define TLS_S_DH_OK 0x00200000 /* DH cert i 1766 X509 *cert; local 2206 X509 *cert; local 2312 X509 *cert; local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | pkinit.c | 58 hx509_cert cert; member in struct:krb5_pk_cert 95 _krb5_pk_cert_free(struct krb5_pk_cert *cert) argument 97 if (cert->cert) { 98 hx509_cert_free(cert->cert); 100 free(cert); 183 hx509_query *q, hx509_cert *cert) 213 ret = hx509_certs_find(context->hx509ctx, id->certs, q, cert); 233 if (id->cert 182 find_cert(krb5_context context, struct krb5_pk_identity *id, hx509_query *q, hx509_cert *cert) argument 2437 hx509_cert cert = opt->opt_private->pk_init_ctx->id->cert; local 2503 get_ms_san(hx509_context context, hx509_cert cert, char **upn) argument 2528 find_ms_san(hx509_context context, hx509_cert cert, void *ctx) argument 2557 hx509_cert cert = NULL; local [all...] |
/freebsd-11-stable/usr.sbin/pkg/ |
H A D | pkg.c | 65 unsigned char *cert; member in struct:sig_cert 499 load_public_key_buf(const unsigned char *cert, int certlen) argument 505 bp = BIO_new_mem_buf(__DECONST(void *, cert), certlen); 624 struct sbuf *buf, *sig, *cert; local 653 cert = sbuf_new_auto(); 660 buf = cert; 675 sbuf_finish(cert); 682 sc->certlen = sbuf_len(cert); 683 sc->cert = strdup(sbuf_data(cert)); [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | authfile.c | 431 if (asprintf(&file, "%s-cert.pub", filename) == -1) 456 struct sshkey *key = NULL, *cert = NULL; local 477 (r = sshkey_load_cert(filename, &cert)) != 0) 481 if (sshkey_equal_public(key, cert) == 0) { 487 (r = sshkey_cert_copy(cert, key)) != 0) 496 sshkey_free(cert); 548 sshkey_compare(key->cert->signature_key, pub))) {
|
H A D | auth2-hostbased.c | 227 if ((fp = sshkey_fingerprint(key->cert->signature_key, 231 "%s CA %s from %s@%s", key->cert->key_id, 232 key_type(key->cert->signature_key), fp,
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | cert-file.sh | 1 # $OpenBSD: cert-file.sh,v 1.5 2017/03/11 23:44:16 djm Exp $ 32 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_1.pub 36 mv $OBJ/user_key1-cert.pub $OBJ/cert_user_key1_2.pub 49 echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER 58 # Key with no .pub should work - finding the equivalent *-cert.pub. 59 verbose "protocol $p: identity cert with no plain public file" 67 -oCertificateFile=$OBJ/user_key3-cert.pub \ 79 # Keys with untrusted cert should fail. 80 verbose "protocol $p: untrusted cert" 85 fail "ssh succeeded with bad cert i [all...] |
H A D | principals-command.sh | 26 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 28 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 37 test "x\$2" != "xssh-rsa-cert-v01@openssh.com" && exit 1 84 fail "ssh cert connect succeeded unexpectedly" 93 fail "ssh cert connect succeeded unexpectedly" 102 fail "ssh cert connect failed" 111 fail "ssh cert connect succeeded unexpectedly" 121 fail "ssh cert connect succeeded unexpectedly" 131 fail "ssh cert connect failed" 144 printf 'cert [all...] |
H A D | krl.sh | 66 # Sign cert 78 RCERTS="$RCERTS ${f}-cert.pub" 85 UCERTS="$UCERTS ${f}-cert.pub" 94 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \ 121 ## XXX dump with trace and grep for set cert serials 158 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG" 167 # keys all sr# k.ID cert CA sr.# k.ID 178 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 144 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 154 return cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); 156 return cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); 195 X509 *cert) 199 return cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); 201 return cms_keyid_cert_cmp(rid->d.rKeyId->subjectKeyIdentifier, cert); 194 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) argument
|
H A D | cms.h | 185 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 188 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 202 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 253 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 254 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 274 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); 358 int CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert); 366 X509 *cert);
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 165 struct x509_certificate *cert; local 174 cert = x509_certificate_parse(buf, len); 175 if (cert == NULL) { 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 194 x509_certificate_free(cert);
|
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | pcy_int.h | 151 X509 *cert; member in struct:X509_POLICY_LEVEL_st
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_cb.c | 152 BIO_puts(bio_err, "<no cert>\n"); 242 * Now we know that a key and cert have been set against the SSL 254 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, argument 258 if (cert == NULL) 260 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { 273 * Now we know that a key and cert have been set against the SSL context 939 extname = "cert type"; 1172 X509 *cert; member in struct:ssl_excert_st 1245 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); 1246 BIO_printf(bio_err, "Checking cert chai [all...] |