Searched refs:cert (Results 176 - 200 of 205) sorted by relevance

123456789

/freebsd-13-stable/contrib/tcpdump/
H A Dprint-isakmp.c228 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert
667 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */
1504 struct ikev1_pl_cert cert; local
1515 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert));
1517 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
1537 struct ikev1_pl_cert cert; local
1548 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert));
1550 ND_PRINT((ndo," type=%s", STR_OR_ID((cert
[all...]
/freebsd-13-stable/crypto/openssl/ssl/statem/
H A Dstatem_lib.c242 if (lu == NULL || s->s3->tmp.cert == NULL) {
247 pkey = s->s3->tmp.cert->privatekey;
934 else if (s->cert->chain_store)
935 chain_store = s->cert->chain_store;
955 * don't include the root cert in the chain). Therefore we deliberately
957 * the cert - we're just building as much of the chain as we can
1534 if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL)
1556 * EC cert. See section 4.2.3 of RFC8446.
1558 eckey = EVP_PKEY_get0_EC_KEY(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
H A Dstatem_clnt.c44 /* TLS does not like anon-DH with client cert */
582 * For TLS, cert_req is set to 2, so a cert chain of nothing is
3441 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client
3453 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT &&
3466 /* Let cert callback update client certificates if required */
3467 if (s->cert->cert_cb) {
3468 i = s->cert->cert_cb(s, s->cert->cert_cb_arg);
3492 /* We need to get a client cert */
3560 : s->cert
[all...]
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c1613 const hx509_cert cert,
1621 if (cert)
1622 signer = _hx509_get_cert(cert);
1699 const Certificate *cert,
1714 spi = &cert->tbsCertificate.subjectPublicKeyInfo;
2980 const Certificate *cert; local
2999 cert = _hx509_get_cert(c);
3000 spi = &cert->tbsCertificate.subjectPublicKeyInfo;
1612 _hx509_verify_signature(hx509_context context, const hx509_cert cert, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_local.h163 /* tmp DH key no DH cert */
540 /* This is the cert and type for the other end. */
815 /* get client cert callback */
849 * (ClientHello and CertificateRequest) or just client cert requests for
851 * for client cert requests, and in preference to ca_names.
867 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st
1168 /* client cert? */
1170 struct cert_st /* CERT */ *cert; member in struct:ssl_st
1232 * (ClientHello and CertificateRequest) or just client cert requests for
1234 * for client cert request
1618 CERT_PKEY *cert; member in struct:ssl3_state_st::__anon7298
[all...]
/freebsd-13-stable/kerberos5/lib/libhx509/
H A DMakefile177 cert.c \
/freebsd-13-stable/crypto/openssl/crypto/ct/
H A Dct_sct.c360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1)
/freebsd-13-stable/crypto/openssl/apps/
H A Dx509.c45 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
108 "Check whether the cert expires in the next arg seconds"},
110 {"signkey", OPT_SIGNKEY, 's', "Self sign cert with arg"},
1089 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument
1096 idret = X509_check_purpose(cert, id, i);
H A Ds_client.c621 {"cert", OPT_CERT, '<', "Certificate file to use, PEM format assumed"},
625 {"key", OPT_KEY, 's', "Private key file to use, if not in -cert file"},
889 X509 *cert = NULL; local
1671 cert = load_cert(cert_file, cert_format, "client certificate file");
1672 if (cert == NULL) {
1933 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain))
3144 X509_free(cert);
/freebsd-13-stable/lib/libfetch/
H A Dcommon.c1022 fetch_ssl_verify_hname(X509 *cert, const char *host) argument
1031 altnames = X509_get_ext_d2i(cert, NID_subject_alt_name,
1037 subject = X509_get_subject_name(cert);
1073 #define LOCAL_CERT_FILE _PATH_LOCALBASE "/etc/ssl/cert.pem"
1074 #define BASE_CERT_FILE "/etc/ssl/cert.pem"
1094 fetch_info("Using CA cert file: %s",
1097 fetch_info("Using CA cert path: %s",
1101 "CA cert file and path");
1144 fetch_info("Using client cert file: %s",
1169 * cert verificatio
[all...]
/freebsd-13-stable/sys/dev/pms/RefTisa/tisa/api/
H A Dtiapi.h238 void *cert
H A Dtitypes.h577 bit8 cert[40]; /* Operator Certificate (CERT) [40 bytes] */ member in struct:tiOperatorCommandSet_s
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dwpas_glue.c1020 static void wpa_supplicant_cert_cb(void *ctx, struct tls_cert_data *cert, argument
1025 wpas_notify_certification(wpa_s, cert, cert_hash);
/freebsd-13-stable/crypto/heimdal/lib/asn1/
H A Dcheck-gen.c558 const char *cert; member in struct:__anon6714
655 ret = decode_Certificate((unsigned char *)certs[i].cert,
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Dx509v3.h367 # define EXFLAG_SS 0x2000 /* cert is apparently self-signed */
570 X509 *cert);
582 const char *section, X509 *cert); variable
H A Dts.h533 const char *cert, TS_RESP_CTX *ctx);
/freebsd-13-stable/contrib/ntp/scripts/update-leap/
H A Dupdate-leap.in460 The -C or -D options are available to pass in a location if no CA cert
/freebsd-13-stable/crypto/openssh/
H A Dhostfile.c319 sshkey_equal_public(k->cert->signature_key,
333 * 1. If the key is a cert and a matching CA is found, return HOST_OK
334 * 2. If the key is not a cert and a matching key is found, return HOST_OK
366 if (sshkey_equal_public(k->cert->signature_key,
H A Dsshconnect2.c1166 const char *suffixes[] = { ".pub", "-cert.pub", NULL };
1462 if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com",
1465 if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com",
1501 if (key && key->cert && key->cert->type != SSH2_CERT_TYPE_USER)
1514 if (!sshkey_is_cert(key) || key->cert == NULL ||
1515 key->cert->type != SSH2_CERT_TYPE_USER)
/freebsd-13-stable/crypto/openssl/crypto/cms/
H A Dcms_env.c269 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument
276 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Dikev2_common.c306 payloads->cert = pdata;
/freebsd-13-stable/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new.c941 const struct wpabuf *cert)
969 (cert &&
970 !wpa_dbus_dict_append_byte_array(&dict_iter, "cert",
971 wpabuf_head(cert),
972 wpabuf_len(cert))) ||
936 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) argument
/freebsd-13-stable/sys/dev/pms/RefTisa/sallsdk/api/
H A Dsaapi.h565 void *cert);
/freebsd-13-stable/contrib/unbound/util/
H A Dnet_help.c867 log_cert(unsigned level, const char* str, void* cert) argument
876 X509_print_ex(bio, (X509*)cert, 0, (unsigned long)-1
1023 log_err("error for cert file: %s", pem);
1100 /* iterate over the windows cert store and add to openssl store */
1107 /* return error if a cert fails */
1114 /* return error if a cert add to store fails */
/freebsd-13-stable/contrib/wpa/src/eapol_supp/
H A Deapol_supp_sm.c2001 static void eapol_sm_notify_cert(void *ctx, struct tls_cert_data *cert, argument
2006 sm->ctx->cert_cb(sm->ctx->ctx, cert, cert_hash);

Completed in 181 milliseconds

123456789