/freebsd-9.3-release/contrib/ntp/include/ |
H A D | ntp_crypto.h | 168 struct value cert; /* certificate/value */ member in struct:cert_info
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 111 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 120 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 146 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 347 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data,
|
H A D | pk7_lib.c | 297 sk = &(p7->d.sign->cert); 300 sk = &(p7->d.signed_and_enveloped->cert); 536 p7i->cert = x509; 544 return (X509_find_by_issuer_and_serial(p7->d.sign->cert,
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | ocsp.c | 73 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer, 114 X509 *issuer = NULL, *cert = NULL; local 338 } else if (!strcmp(*args, "-cert")) { 341 X509_free(cert); 342 cert = load_cert(bio_err, *args, FORMAT_PEM, 344 if (!cert) 346 if (!add_ocsp_cert(&req, cert, issuer, ids)) 439 BIO_printf(bio_err, "-cert file certificate to check\n"); 781 X509_free(cert); 806 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X50 argument [all...] |
H A D | pkcs7.c | 233 certs = p7->d.sign->cert; 237 certs = p7->d.signed_and_enveloped->cert;
|
H A D | smime.c | 98 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 341 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n"); 422 "cert.pem recipient certificate(s) for encryption\n"); 469 if (!(cert = load_cert(bio_err, *args, FORMAT_PEM, 478 sk_X509_push(encerts, cert); 479 cert = NULL; 661 X509_free(cert);
|
H A D | apps.c | 704 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 736 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 749 BIO *cert; local 751 if ((cert = BIO_new(BIO_s_file())) == NULL) { 758 BIO_set_fp(cert, stdin, BIO_NOCLOSE); 760 if (BIO_read_filename(cert, file) <= 0) { 768 x = d2i_X509_bio(cert, NULL); 782 i = BIO_read(cert, &(buf->data[size]), 1024 * 10); 811 x = PEM_read_bio_X509_AUX(cert, NULL, 814 if (!load_pkcs12(err, cert, cert_descri 702 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | pcy_tree.c | 189 level->cert = x; 507 cache = policy_cache_set(curr->cert); 541 if (curr->cert) 542 X509_free(curr->cert);
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 186 if (s->cert == NULL) { 366 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 368 && EVP_PKEY_size(s->cert->pkeys 387 if ( /* don't request cert unless asked for it: */ 390 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert 396 * never request cert in anonymous ciphersuites (see 408 * never request cert in Kerberos ciphersuites 411 /* no cert request */ 498 * We need to get hashes here so if there is a client cert, 1315 CERT *cert; local [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 303 X509 *cert; local 310 cert = SSL_get_peer_certificate(ssl); 311 if (cert == NULL) 314 if (X509_digest(cert, EVP_sha256(), md, &mdsize) != 1) 318 X509_free(cert); 653 const char *cert, int debuglevel) 687 if (SSL_use_certificate_file(ssl, cert, SSL_FILETYPE_PEM) != 1) { 690 cert); 652 tls_exec_server(const char *user, int startfd, const char *privkey, const char *cert, int debuglevel) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 219 * @param cert template certificate. 230 hx509_cert cert) 237 ret = hx509_cert_get_subject(cert, &tbs->subject); 246 ret = hx509_cert_get_serialnumber(cert, &tbs->serial); 255 tbs->notBefore = hx509_cert_get_notBefore(cert); 257 tbs->notAfter = hx509_cert_get_notAfter(cert); 260 ret = hx509_cert_get_SPKI(context, cert, &tbs->spki); 267 ret = _hx509_cert_get_keyusage(context, cert, &ku); 275 ret = _hx509_cert_get_eku(context, cert, &eku); 1103 /* Add the text BMP string Domaincontroller to the cert */ 227 hx509_ca_tbs_set_template(hx509_context context, hx509_ca_tbs tbs, int flags, hx509_cert cert) argument [all...] |
H A D | revoke.c | 488 * cert for the certificate, otherwise, search for a certificate. 517 * If signer is not CA cert, need to check revoke status of this 518 * CRL signing cert too, this include all parent CRL signer cert 662 * @param cert 676 hx509_cert cert, 679 const Certificate *c = _hx509_get_cert(cert); 690 /* check this ocsp apply to this cert */ 767 /* check if cert.issuer == crls.val[i].crl.issuer */ 812 /* check if cert i 672 hx509_revoke_verify(hx509_context context, hx509_revoke_ctx ctx, hx509_certs certs, time_t now, hx509_cert cert, hx509_cert parent_cert) argument 857 add_to_req(hx509_context context, void *ptr, hx509_cert cert) argument 1175 hx509_ocsp_verify(hx509_context context, time_t now, hx509_cert cert, int flags, const void *data, size_t length, time_t *expiration) argument 1364 add_revoked(hx509_context context, void *ctx, hx509_cert cert) argument [all...] |
H A D | hx_locl.h | 87 hx509_cert cert; member in struct:hx509_peer_info
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_lcl.h | 194 /* Recipient Key and cert */ 401 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, 407 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_nss.c | 297 CERTCertificate *cert; local 307 cert = SSL_PeerCertificate(fd); 308 subject = CERT_NameToAscii(&cert->subject); 309 issuer = CERT_NameToAscii(&cert->issuer); 312 CERT_DestroyCertificate(cert);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | rcode.c | 34 #include <dns/cert.h> 307 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target) { argument 308 return (dns_mnemonic_totext(cert, target, certs));
|
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/ |
H A D | regress_ssl.c | 291 X509 *cert = getcert(); local 299 tt_assert(cert); 317 SSL_use_certificate(ssl2, cert);
|
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | resolve.h | 252 struct cert_record *cert; member in union:resource_record::__anon4665
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | key.h | 90 struct KeyCert *cert; member in struct:Key
|
/freebsd-9.3-release/kerberos5/lib/libhx509/ |
H A D | Makefile | 15 cert.c \
|
/freebsd-9.3-release/crypto/openssl/test/ |
H A D | testss | 78 echo first generated cert is invalid
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 530 const u8 *cert, size_t cert_len) 534 if (cert == NULL) { 547 cert_encoding = cert[0]; 548 cert++; 552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 564 const u8 *cert, size_t cert_len) 568 if (cert == NULL) { 581 cert_encoding = cert[0]; 582 cert++; 586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 346 cert = x509_certificate_parse(pos, cert_len); 347 if (cert == NULL) { 357 chain = cert; 359 last->next = cert; 360 last = cert;
|
H A D | tlsv1_server_read.c | 273 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 406 cert = x509_certificate_parse(pos, cert_len); 407 if (cert == NULL) { 417 chain = cert; 419 last->next = cert; 420 last = cert;
|