Searched refs:cert (Results 101 - 125 of 205) sorted by relevance

123456789

/freebsd-13-stable/crypto/openssh/regress/
H A Dprincipals-command.sh26 CERT_BODY=`cat $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
28 CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'`
37 test "x\$2" != "xssh-rsa-cert-v01@openssh.com" && exit 1
84 fail "ssh cert connect succeeded unexpectedly"
93 fail "ssh cert connect succeeded unexpectedly"
102 fail "ssh cert connect failed"
111 fail "ssh cert connect succeeded unexpectedly"
121 fail "ssh cert connect succeeded unexpectedly"
131 fail "ssh cert connect failed"
144 printf 'cert
[all...]
H A Dkrl.sh66 # Sign cert
78 RCERTS="$RCERTS ${f}-cert.pub"
85 UCERTS="$UCERTS ${f}-cert.pub"
103 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $RCERTS \
136 ## XXX dump with trace and grep for set cert serials
177 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG"
186 # keys all hash sr# ID cert CA srl ID
197 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
H A DMakefile71 cert-hostkey \
72 cert-userkey \
84 cert-file \
109 known_hosts known_hosts-cert known_hosts.* krl-* ls.copy \
/freebsd-13-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_asn1.c75 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0),
131 X509_free(ri->cert);
158 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Dpkcs12.h196 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
199 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert,
202 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
H A Docsp.h185 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
249 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
256 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert);
257 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert);
258 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
H A Dpkcs7.h56 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
64 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
90 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
298 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data,
/freebsd-13-stable/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c21 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
276 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument
298 iname = X509_get_subject_name(cert);
303 X509_pubkey_digest(cert, dgst, md, NULL);
315 ret = ocsp_match_issuerid(cert, tmpid, NULL);
/freebsd-13-stable/usr.sbin/pkg/
H A Dpkg.c64 unsigned char *cert; member in struct:sig_cert
502 load_public_key_buf(const unsigned char *cert, int certlen) argument
508 bp = BIO_new_mem_buf(__DECONST(void *, cert), certlen);
634 char *sig, *cert; local
641 sig = cert = NULL;
665 certfp = open_memstream(&cert, &certsz);
692 sc->cert = cert;
784 sha256_buf(sc->cert, sc->certlen, hash);
814 if (rsa_verify_cert(fd_pkg, NULL, sc->cert, s
[all...]
/freebsd-13-stable/contrib/wpa/hs20/client/
H A Dosu_client.c218 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, argument
229 fingerprint = xml_node_get_text(ctx->xml, cert);
270 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn);
272 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s",
302 #define TMP_CERT_DL_FILE "tmp-cert-download"
309 char *cert; local
350 cert = os_readfile(TMP_CERT_DL_FILE, &len);
352 if (cert == NULL)
355 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) {
356 os_free(cert);
557 xml_node_t *tnds, *mo, *cert; local
702 xml_node_t *cert; local
2907 osu_cert_cb(void *_ctx, struct http_cert *cert) argument
[all...]
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dks_p11.c706 p11_cert_release(hx509_cert cert, void *ctx) argument
721 hx509_cert cert; local
731 query[1].ulValueLen, &cert);
741 _hx509_cert_set_release(cert, p11_cert_release, p);
750 cert,
761 hx509_cert_set_friendly_name(cert, str);
766 ret = _hx509_collector_certs_add(context, collector, cert);
767 hx509_cert_free(cert);
1082 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
1085 return hx509_certs_next_cert(context, c->certs, c->cursor, cert);
1081 p11_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
[all...]
H A Dks_file.c55 hx509_cert cert; local
58 ret = hx509_cert_init_data(context, data, len, &cert);
62 ret = _hx509_collector_certs_add(context, c, cert);
63 hx509_cert_free(cert);
606 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
609 return hx509_certs_next_cert(context, ksf->certs, iter, cert);
605 file_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
H A Dtest_query.in85 --friendlyname=friendlyname-cert \
88 echo "check for ca cert (friendlyname)"
98 PKCS12:$srcdir/data/sub-cert.p12 >/dev/null 2>/dev/null && exit 1
114 echo "make sure entry is found (cert ds)"
119 echo "make sure entry is found (cert ke)"
124 echo "make sure entry is found (cert ke + ds)"
130 echo "make sure entry is found (cert-ds ds)"
135 echo "make sure entry is not found (cert-ds ke)"
140 echo "make sure entry is not found (cert-ds ke + ds)"
146 echo "make sure entry is not found (cert
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dssh-keygen.c1760 public->cert->type = cert_key_type;
1761 public->cert->serial = (u_int64_t)cert_serial;
1762 public->cert->key_id = xstrdup(cert_key_id);
1763 public->cert->nprincipals = n;
1764 public->cert->principals = plist;
1765 public->cert->valid_after = cert_valid_from;
1766 public->cert->valid_before = cert_valid_to;
1767 prepare_options_buf(public->cert->critical, OPTIONS_CRITICAL);
1768 prepare_options_buf(public->cert->extensions,
1771 &public->cert
[all...]
H A Dkrl.c460 if (key->cert->serial == 0) {
462 key->cert->signature_key,
463 key->cert->key_id);
466 key->cert->signature_key,
467 key->cert->serial);
1225 /* Check revocation by cert key ID */
1227 rki.key_id = key->cert->key_id;
1238 if (key->cert->serial == 0)
1242 rs.lo = rs.hi = key->cert->serial;
1246 key->cert
[all...]
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dtls_openssl_ocsp.c395 static int issuer_match(X509 *cert, X509 *issuer, CertID *certid) argument
412 iname = X509_get_issuer_name(cert);
486 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert, argument
512 txt = integer_str(X509_get_serialNumber(cert));
577 "OpenSSL: BasicOCSPResponse cert %s", buf);
792 X509_get_serialNumber(cert)) == 0 &&
793 issuer_match(cert, issuer, sresp->certID) == 0) {
/freebsd-13-stable/crypto/openssl/apps/
H A Dsmime.c51 {OPT_HELP_STR, 1, '-', "Usage: %s [options] cert.pem...\n"},
53 " cert.pem... recipient certs for encryption\n"},
119 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
400 cert = load_cert(*argv, FORMAT_PEM,
402 if (cert == NULL)
404 sk_X509_push(encerts, cert);
405 cert = NULL;
603 X509_free(cert);
H A Ds_apps.h25 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
H A Dts.c41 int cert, const char *in, const char *out, int text);
43 const char *policy, int no_nonce, int cert);
97 {"cert", OPT_CERT, '-', "Put cert request into query"},
129 " [-digest hexstring] [-tspolicy oid] [-no_nonce] [-cert]",
163 int ret = 1, no_nonce = 0, cert = 0, text = 0; local
218 cert = 1;
293 ret = !query_command(data, digest, md, policy, no_nonce, cert,
369 int cert, const char *in, const char *out, int text)
386 query = create_query(data_bio, digest, md, policy, no_nonce, cert);
367 query_command(const char *data, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert, const char *in, const char *out, int text) argument
414 create_query(BIO *data_bio, const char *digest, const EVP_MD *md, const char *policy, int no_nonce, int cert) argument
[all...]
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dkx509.c158 hx509_cert cert = NULL; local
261 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert);
268 ret = hx509_cert_binary(context->hx509ctx, cert, certificate);
269 hx509_cert_free(cert);
281 krb5_set_error_message(context, ret, "cert creation failed");
/freebsd-13-stable/crypto/openssl/ssl/statem/
H A Dextensions_cust.c118 custom_ext_methods *exts = &s->cert->custext;
176 custom_ext_methods *exts = &s->cert->custext;
338 return custom_ext_find(&ctx->cert->custext, ENDPOINT_CLIENT, ext_type,
351 custom_ext_methods *exts = &ctx->cert->custext;
/freebsd-13-stable/contrib/ntp/include/
H A Dntp_crypto.h169 struct value cert; /* certificate/value */ member in struct:cert_info
/freebsd-13-stable/crypto/heimdal/lib/roken/
H A Dresolve.h197 struct rk_cert_record *cert; member in union:rk_resource_record::__anon6820
/freebsd-13-stable/crypto/openssl/crypto/store/
H A Dloader_file.c219 X509 *cert = NULL; local
242 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) {
250 && (osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL
274 X509_free(cert);
637 X509 *cert = NULL; local
641 * cert (X509 + X509_AUX) and fall back to reading it as a normal cert
643 * cert, then no fallback should be engaged. |ignore_trusted| tells if
658 if ((cert = d2i_X509_AUX(NULL, &blob, len)) != NULL
659 || (ignore_trusted && (cert
[all...]
/freebsd-13-stable/crypto/openssl/ssl/
H A Ds3_lib.c3430 EVP_PKEY_free(s->cert->dh_tmp);
3431 s->cert->dh_tmp = pkdh;
3441 s->cert->dh_tmp_auto = larg;
3569 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3574 return ssl_cert_select_current(s->cert, (X509 *)parg);
3590 if (s->s3->tmp.cert == NULL)
3592 s->cert->key = s->s3->tmp.cert;
3595 return ssl_cert_set_current(s->cert, larg);
3644 return tls1_set_sigalgs(s->cert, par
[all...]

Completed in 296 milliseconds

123456789