/freebsd-13-stable/contrib/tcpdump/ |
H A D | print-isakmp.c | 228 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert 667 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */ 1504 struct ikev1_pl_cert cert; local 1515 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1517 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1537 struct ikev1_pl_cert cert; local 1548 UNALIGNED_MEMCPY(&cert, ext, sizeof(cert)); 1550 ND_PRINT((ndo," type=%s", STR_OR_ID((cert [all...] |
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 242 if (lu == NULL || s->s3->tmp.cert == NULL) { 247 pkey = s->s3->tmp.cert->privatekey; 934 else if (s->cert->chain_store) 935 chain_store = s->cert->chain_store; 955 * don't include the root cert in the chain). Therefore we deliberately 957 * the cert - we're just building as much of the chain as we can 1534 if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL) 1556 * EC cert. See section 4.2.3 of RFC8446. 1558 eckey = EVP_PKEY_get0_EC_KEY(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
|
H A D | statem_clnt.c | 44 /* TLS does not like anon-DH with client cert */ 582 * For TLS, cert_req is set to 2, so a cert chain of nothing is 3441 * cert exists, if we have a suitable digest for TLS 1.2 if static DH client 3453 if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && 3466 /* Let cert callback update client certificates if required */ 3467 if (s->cert->cert_cb) { 3468 i = s->cert->cert_cb(s, s->cert->cert_cb_arg); 3492 /* We need to get a client cert */ 3560 : s->cert [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 1613 const hx509_cert cert, 1621 if (cert) 1622 signer = _hx509_get_cert(cert); 1699 const Certificate *cert, 1714 spi = &cert->tbsCertificate.subjectPublicKeyInfo; 2980 const Certificate *cert; local 2999 cert = _hx509_get_cert(c); 3000 spi = &cert->tbsCertificate.subjectPublicKeyInfo; 1612 _hx509_verify_signature(hx509_context context, const hx509_cert cert, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1697 _hx509_public_encrypt(hx509_context context, const heim_octet_string *cleartext, const Certificate *cert, heim_oid *encryption_oid, heim_octet_string *ciphertext) argument
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_local.h | 163 /* tmp DH key no DH cert */ 540 /* This is the cert and type for the other end. */ 815 /* get client cert callback */ 849 * (ClientHello and CertificateRequest) or just client cert requests for 851 * for client cert requests, and in preference to ca_names. 867 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st 1168 /* client cert? */ 1170 struct cert_st /* CERT */ *cert; member in struct:ssl_st 1232 * (ClientHello and CertificateRequest) or just client cert requests for 1234 * for client cert request 1618 CERT_PKEY *cert; member in struct:ssl3_state_st::__anon7298 [all...] |
/freebsd-13-stable/kerberos5/lib/libhx509/ |
H A D | Makefile | 177 cert.c \
|
/freebsd-13-stable/crypto/openssl/crypto/ct/ |
H A D | ct_sct.c | 360 if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1)
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | x509.c | 45 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 108 "Check whether the cert expires in the next arg seconds"}, 110 {"signkey", OPT_SIGNKEY, 's', "Self sign cert with arg"}, 1089 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument 1096 idret = X509_check_purpose(cert, id, i);
|
H A D | s_client.c | 621 {"cert", OPT_CERT, '<', "Certificate file to use, PEM format assumed"}, 625 {"key", OPT_KEY, 's', "Private key file to use, if not in -cert file"}, 889 X509 *cert = NULL; local 1671 cert = load_cert(cert_file, cert_format, "client certificate file"); 1672 if (cert == NULL) { 1933 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) 3144 X509_free(cert);
|
/freebsd-13-stable/lib/libfetch/ |
H A D | common.c | 1022 fetch_ssl_verify_hname(X509 *cert, const char *host) argument 1031 altnames = X509_get_ext_d2i(cert, NID_subject_alt_name, 1037 subject = X509_get_subject_name(cert); 1073 #define LOCAL_CERT_FILE _PATH_LOCALBASE "/etc/ssl/cert.pem" 1074 #define BASE_CERT_FILE "/etc/ssl/cert.pem" 1094 fetch_info("Using CA cert file: %s", 1097 fetch_info("Using CA cert path: %s", 1101 "CA cert file and path"); 1144 fetch_info("Using client cert file: %s", 1169 * cert verificatio [all...] |
/freebsd-13-stable/sys/dev/pms/RefTisa/tisa/api/ |
H A D | tiapi.h | 238 void *cert
|
H A D | titypes.h | 577 bit8 cert[40]; /* Operator Certificate (CERT) [40 bytes] */ member in struct:tiOperatorCommandSet_s
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 1020 static void wpa_supplicant_cert_cb(void *ctx, struct tls_cert_data *cert, argument 1025 wpas_notify_certification(wpa_s, cert, cert_hash);
|
/freebsd-13-stable/crypto/heimdal/lib/asn1/ |
H A D | check-gen.c | 558 const char *cert; member in struct:__anon6714 655 ret = decode_Certificate((unsigned char *)certs[i].cert,
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | x509v3.h | 367 # define EXFLAG_SS 0x2000 /* cert is apparently self-signed */ 570 X509 *cert); 582 const char *section, X509 *cert); variable
|
H A D | ts.h | 533 const char *cert, TS_RESP_CTX *ctx);
|
/freebsd-13-stable/contrib/ntp/scripts/update-leap/ |
H A D | update-leap.in | 460 The -C or -D options are available to pass in a location if no CA cert
|
/freebsd-13-stable/crypto/openssh/ |
H A D | hostfile.c | 319 sshkey_equal_public(k->cert->signature_key, 333 * 1. If the key is a cert and a matching CA is found, return HOST_OK 334 * 2. If the key is not a cert and a matching key is found, return HOST_OK 366 if (sshkey_equal_public(k->cert->signature_key,
|
H A D | sshconnect2.c | 1166 const char *suffixes[] = { ".pub", "-cert.pub", NULL }; 1462 if (match_pattern_list("rsa-sha2-512-cert-v01@openssh.com", 1465 if (match_pattern_list("rsa-sha2-256-cert-v01@openssh.com", 1501 if (key && key->cert && key->cert->type != SSH2_CERT_TYPE_USER) 1514 if (!sshkey_is_cert(key) || key->cert == NULL || 1515 key->cert->type != SSH2_CERT_TYPE_USER)
|
/freebsd-13-stable/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 269 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 276 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
|
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 306 payloads->cert = pdata;
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new.c | 941 const struct wpabuf *cert) 969 (cert && 970 !wpa_dbus_dict_append_byte_array(&dict_iter, "cert", 971 wpabuf_head(cert), 972 wpabuf_len(cert))) || 936 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) argument
|
/freebsd-13-stable/sys/dev/pms/RefTisa/sallsdk/api/ |
H A D | saapi.h | 565 void *cert);
|
/freebsd-13-stable/contrib/unbound/util/ |
H A D | net_help.c | 867 log_cert(unsigned level, const char* str, void* cert) argument 876 X509_print_ex(bio, (X509*)cert, 0, (unsigned long)-1 1023 log_err("error for cert file: %s", pem); 1100 /* iterate over the windows cert store and add to openssl store */ 1107 /* return error if a cert fails */ 1114 /* return error if a cert add to store fails */
|
/freebsd-13-stable/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 2001 static void eapol_sm_notify_cert(void *ctx, struct tls_cert_data *cert, argument 2006 sm->ctx->cert_cb(sm->ctx->ctx, cert, cert_hash);
|