/freebsd-13-stable/crypto/openssh/regress/ |
H A D | principals-command.sh | 26 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 28 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` 37 test "x\$2" != "xssh-rsa-cert-v01@openssh.com" && exit 1 84 fail "ssh cert connect succeeded unexpectedly" 93 fail "ssh cert connect succeeded unexpectedly" 102 fail "ssh cert connect failed" 111 fail "ssh cert connect succeeded unexpectedly" 121 fail "ssh cert connect succeeded unexpectedly" 131 fail "ssh cert connect failed" 144 printf 'cert [all...] |
H A D | krl.sh | 66 # Sign cert 78 RCERTS="$RCERTS ${f}-cert.pub" 85 UCERTS="$UCERTS ${f}-cert.pub" 103 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \ 136 ## XXX dump with trace and grep for set cert serials 177 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG" 186 # keys all hash sr# ID cert CA srl ID 197 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
|
H A D | Makefile | 71 cert-hostkey \ 72 cert-userkey \ 84 cert-file \ 109 known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
|
/freebsd-13-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 75 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 131 X509_free(ri->cert); 158 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | pkcs12.h | 196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 199 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 202 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
H A D | ocsp.h | 185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert); 256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert); 257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert); 258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
|
H A D | pkcs7.h | 56 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 64 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 90 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 298 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data,
|
/freebsd-13-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 21 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 276 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument 298 iname = X509_get_subject_name(cert); 303 X509_pubkey_digest(cert, dgst, md, NULL); 315 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
/freebsd-13-stable/usr.sbin/pkg/ |
H A D | pkg.c | 64 unsigned char *cert; member in struct:sig_cert 502 load_public_key_buf(const unsigned char *cert, int certlen) argument 508 bp = BIO_new_mem_buf(__DECONST(void *, cert), certlen); 634 char *sig, *cert; local 641 sig = cert = NULL; 665 certfp = open_memstream(&cert, &certsz); 692 sc->cert = cert; 784 sha256_buf(sc->cert, sc->certlen, hash); 814 if (rsa_verify_cert(fd_pkg, NULL, sc->cert, s [all...] |
/freebsd-13-stable/contrib/wpa/hs20/client/ |
H A D | osu_client.c | 218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, argument 229 fingerprint = xml_node_get_text(ctx->xml, cert); 270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); 272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", 302 #define TMP_CERT_DL_FILE "tmp-cert-download" 309 char *cert; local 350 cert = os_readfile(TMP_CERT_DL_FILE, &len); 352 if (cert == NULL) 355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { 356 os_free(cert); 557 xml_node_t *tnds, *mo, *cert; local 702 xml_node_t *cert; local 2907 osu_cert_cb(void *_ctx, struct http_cert *cert) argument [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_p11.c | 706 p11_cert_release(hx509_cert cert, void *ctx) argument 721 hx509_cert cert; local 731 query[1].ulValueLen, &cert); 741 _hx509_cert_set_release(cert, p11_cert_release, p); 750 cert, 761 hx509_cert_set_friendly_name(cert, str); 766 ret = _hx509_collector_certs_add(context, collector, cert); 767 hx509_cert_free(cert); 1082 hx509_certs certs, void *data, void *cursor, hx509_cert *cert) 1085 return hx509_certs_next_cert(context, c->certs, c->cursor, cert); 1081 p11_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument [all...] |
H A D | ks_file.c | 55 hx509_cert cert; local 58 ret = hx509_cert_init_data(context, data, len, &cert); 62 ret = _hx509_collector_certs_add(context, c, cert); 63 hx509_cert_free(cert); 606 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 609 return hx509_certs_next_cert(context, ksf->certs, iter, cert); 605 file_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | test_query.in | 85 --friendlyname=friendlyname-cert \ 88 echo "check for ca cert (friendlyname)" 98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1 114 echo "make sure entry is found (cert ds)" 119 echo "make sure entry is found (cert ke)" 124 echo "make sure entry is found (cert ke + ds)" 130 echo "make sure entry is found (cert-ds ds)" 135 echo "make sure entry is not found (cert-ds ke)" 140 echo "make sure entry is not found (cert-ds ke + ds)" 146 echo "make sure entry is not found (cert [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-keygen.c | 1760 public->cert->type = cert_key_type; 1761 public->cert->serial = (u_int64_t)cert_serial; 1762 public->cert->key_id = xstrdup(cert_key_id); 1763 public->cert->nprincipals = n; 1764 public->cert->principals = plist; 1765 public->cert->valid_after = cert_valid_from; 1766 public->cert->valid_before = cert_valid_to; 1767 prepare_options_buf(public->cert->critical, OPTIONS_CRITICAL); 1768 prepare_options_buf(public->cert->extensions, 1771 &public->cert [all...] |
H A D | krl.c | 460 if (key->cert->serial == 0) { 462 key->cert->signature_key, 463 key->cert->key_id); 466 key->cert->signature_key, 467 key->cert->serial); 1225 /* Check revocation by cert key ID */ 1227 rki.key_id = key->cert->key_id; 1238 if (key->cert->serial == 0) 1242 rs.lo = rs.hi = key->cert->serial; 1246 key->cert [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) argument 412 iname = X509_get_issuer_name(cert); 486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, argument 512 txt = integer_str(X509_get_serialNumber(cert)); 577 "OpenSSL: BasicOCSPResponse cert %s", buf); 792 X509_get_serialNumber(cert)) == 0 && 793 issuer_match(cert, issuer, sresp->certID) == 0) {
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | smime.c | 51 {OPT_HELP_STR, 1, '-', "Usage: %s [options] cert.pem...\n"}, 53 " cert.pem... recipient certs for encryption\n"}, 119 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 400 cert = load_cert(*argv, FORMAT_PEM, 402 if (cert == NULL) 404 sk_X509_push(encerts, cert); 405 cert = NULL; 603 X509_free(cert);
|
H A D | s_apps.h | 25 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
|
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 97 {"cert", OPT_CERT, '-', "Put cert request into query"}, 129 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]", 163 int ret = 1, no_nonce = 0, cert = 0, text = 0; local 218 cert = 1; 293 ret = !query_command(data, digest, md, policy, no_nonce, cert, 369 int cert, const char *in, const char *out, int text) 386 query = create_query(data_bio, digest, md, policy, no_nonce, cert); 367 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) argument 414 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) argument [all...] |
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | kx509.c | 158 hx509_cert cert = NULL; local 261 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert); 268 ret = hx509_cert_binary(context->hx509ctx, cert, certificate); 269 hx509_cert_free(cert); 281 krb5_set_error_message(context, ret, "cert creation failed");
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | extensions_cust.c | 118 custom_ext_methods *exts = &s->cert->custext; 176 custom_ext_methods *exts = &s->cert->custext; 338 return custom_ext_find(&ctx->cert->custext, ENDPOINT_CLIENT, ext_type, 351 custom_ext_methods *exts = &ctx->cert->custext;
|
/freebsd-13-stable/contrib/ntp/include/ |
H A D | ntp_crypto.h | 169 struct value cert; /* certificate/value */ member in struct:cert_info
|
/freebsd-13-stable/crypto/heimdal/lib/roken/ |
H A D | resolve.h | 197 struct rk_cert_record *cert; member in union:rk_resource_record::__anon6820
|
/freebsd-13-stable/crypto/openssl/crypto/store/ |
H A D | loader_file.c | 219 X509 *cert = NULL; local 242 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { 250 && (osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL 274 X509_free(cert); 637 X509 *cert = NULL; local 641 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert 643 * cert, then no fallback should be engaged. |ignore_trusted| tells if 658 if ((cert = d2i_X509_AUX(NULL, &blob, len)) != NULL 659 || (ignore_trusted && (cert [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | s3_lib.c | 3430 EVP_PKEY_free(s->cert->dh_tmp); 3431 s->cert->dh_tmp = pkdh; 3441 s->cert->dh_tmp_auto = larg; 3569 *(STACK_OF(X509) **)parg = s->cert->key->chain; 3574 return ssl_cert_select_current(s->cert, (X509 *)parg); 3590 if (s->s3->tmp.cert == NULL) 3592 s->cert->key = s->s3->tmp.cert; 3595 return ssl_cert_set_current(s->cert, larg); 3644 return tls1_set_sigalgs(s->cert, par [all...] |