Searched refs:cert (Results 101 - 125 of 157) sorted by relevance

1234567

/freebsd-9.3-release/contrib/ntp/include/
H A Dntp_crypto.h168 struct value cert; /* certificate/value */ member in struct:cert_info
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/
H A Dpkcs7.h111 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
120 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
146 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
347 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data,
H A Dpk7_lib.c297 sk = &(p7->d.sign->cert);
300 sk = &(p7->d.signed_and_enveloped->cert);
536 p7i->cert = x509;
544 return (X509_find_by_issuer_and_serial(p7->d.sign->cert,
/freebsd-9.3-release/crypto/openssl/apps/
H A Docsp.c73 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
114 X509 *issuer = NULL, *cert = NULL; local
338 } else if (!strcmp(*args, "-cert")) {
341 X509_free(cert);
342 cert = load_cert(bio_err, *args, FORMAT_PEM,
344 if (!cert)
346 if (!add_ocsp_cert(&req, cert, issuer, ids))
439 BIO_printf(bio_err, "-cert file certificate to check\n");
781 X509_free(cert);
806 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X50 argument
[all...]
H A Dpkcs7.c233 certs = p7->d.sign->cert;
237 certs = p7->d.signed_and_enveloped->cert;
H A Dsmime.c98 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
341 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n");
422 "cert.pem recipient certificate(s) for encryption\n");
469 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM,
478 sk_X509_push(encerts, cert);
479 cert = NULL;
661 X509_free(cert);
H A Dapps.c704 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
736 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
749 BIO *cert; local
751 if ((cert = BIO_new(BIO_s_file())) == NULL) {
758 BIO_set_fp(cert, stdin, BIO_NOCLOSE);
760 if (BIO_read_filename(cert, file) <= 0) {
768 x = d2i_X509_bio(cert, NULL);
782 i = BIO_read(cert, &(buf->data[size]), 1024 * 10);
811 x = PEM_read_bio_X509_AUX(cert, NULL,
814 if (!load_pkcs12(err, cert, cert_descri
702 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dpcy_tree.c189 level->cert = x;
507 cache = policy_cache_set(curr->cert);
541 if (curr->cert)
542 X509_free(curr->cert);
/freebsd-9.3-release/crypto/openssl/ssl/
H A Ds3_srvr.c186 if (s->cert == NULL) {
366 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
368 && EVP_PKEY_size(s->cert->pkeys
387 if ( /* don't request cert unless asked for it: */
390 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert
396 * never request cert in anonymous ciphersuites (see
408 * never request cert in Kerberos ciphersuites
411 /* no cert request */
498 * We need to get hashes here so if there is a client cert,
1315 CERT *cert; local
[all...]
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c303 X509 *cert; local
310 cert = SSL_get_peer_certificate(ssl);
311 if (cert == NULL)
314 if (X509_digest(cert, EVP_sha256(), md, &mdsize) != 1)
318 X509_free(cert);
653 const char *cert, int debuglevel)
687 if (SSL_use_certificate_file(ssl, cert, SSL_FILETYPE_PEM) != 1) {
690 cert);
652 tls_exec_server(const char *user, int startfd, const char *privkey, const char *cert, int debuglevel) argument
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dca.c219 * @param cert template certificate.
230 hx509_cert cert)
237 ret = hx509_cert_get_subject(cert, &tbs->subject);
246 ret = hx509_cert_get_serialnumber(cert, &tbs->serial);
255 tbs->notBefore = hx509_cert_get_notBefore(cert);
257 tbs->notAfter = hx509_cert_get_notAfter(cert);
260 ret = hx509_cert_get_SPKI(context, cert, &tbs->spki);
267 ret = _hx509_cert_get_keyusage(context, cert, &ku);
275 ret = _hx509_cert_get_eku(context, cert, &eku);
1103 /* Add the text BMP string Domaincontroller to the cert */
227 hx509_ca_tbs_set_template(hx509_context context, hx509_ca_tbs tbs, int flags, hx509_cert cert) argument
[all...]
H A Drevoke.c488 * cert for the certificate, otherwise, search for a certificate.
517 * If signer is not CA cert, need to check revoke status of this
518 * CRL signing cert too, this include all parent CRL signer cert
662 * @param cert
676 hx509_cert cert,
679 const Certificate *c = _hx509_get_cert(cert);
690 /* check this ocsp apply to this cert */
767 /* check if cert.issuer == crls.val[i].crl.issuer */
812 /* check if cert i
672 hx509_revoke_verify(hx509_context context, hx509_revoke_ctx ctx, hx509_certs certs, time_t now, hx509_cert cert, hx509_cert parent_cert) argument
857 add_to_req(hx509_context context, void *ptr, hx509_cert cert) argument
1175 hx509_ocsp_verify(hx509_context context, time_t now, hx509_cert cert, int flags, const void *data, size_t length, time_t *expiration) argument
1364 add_revoked(hx509_context context, void *ctx, hx509_cert cert) argument
[all...]
H A Dhx_locl.h87 hx509_cert cert; member in struct:hx509_peer_info
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_lcl.h194 /* Recipient Key and cert */
401 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert,
407 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls_nss.c297 CERTCertificate *cert; local
307 cert = SSL_PeerCertificate(fd);
308 subject = CERT_NameToAscii(&cert->subject);
309 issuer = CERT_NameToAscii(&cert->issuer);
312 CERT_DestroyCertificate(cert);
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Drcode.c34 #include <dns/cert.h>
307 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target) { argument
308 return (dns_mnemonic_totext(cert, target, certs));
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/
H A Dregress_ssl.c291 X509 *cert = getcert(); local
299 tt_assert(cert);
317 SSL_use_certificate(ssl2, cert);
/freebsd-9.3-release/crypto/heimdal/lib/roken/
H A Dresolve.h252 struct cert_record *cert; member in union:resource_record::__anon4665
/freebsd-9.3-release/crypto/openssh/
H A Dkey.h90 struct KeyCert *cert; member in struct:Key
/freebsd-9.3-release/kerberos5/lib/libhx509/
H A DMakefile15 cert.c \
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestss78 echo first generated cert is invalid
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Dikev2.c530 const u8 *cert, size_t cert_len)
534 if (cert == NULL) {
547 cert_encoding = cert[0];
548 cert++;
552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Dikev2.c564 const u8 *cert, size_t cert_len)
568 if (cert == NULL) {
581 cert_encoding = cert[0];
582 cert++;
586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client_read.c219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
346 cert = x509_certificate_parse(pos, cert_len);
347 if (cert == NULL) {
357 chain = cert;
359 last->next = cert;
360 last = cert;
H A Dtlsv1_server_read.c273 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
406 cert = x509_certificate_parse(pos, cert_len);
407 if (cert == NULL) {
417 chain = cert;
419 last->next = cert;
420 last = cert;

Completed in 304 milliseconds

1234567