Searched refs:cert (Results 26 - 50 of 157) sorted by relevance

1234567

/freebsd-9.3-release/crypto/openssh/
H A Dssh-add.c102 Key *public = NULL, *cert = NULL; local
123 xasprintf(&certpath, "%s-cert.pub", filename);
124 if ((cert = key_load_public(certpath, &comment)) == NULL)
126 if (!key_equal_public(cert, public))
130 if (ssh_remove_identity(ac, cert)) {
138 if (cert != NULL)
139 key_free(cert);
170 Key *private, *cert; local
248 /* Skip trying to load the cert if requested */
253 xasprintf(&certpath, "%s-cert
[all...]
H A Dauth2-pubkey.c215 fp = key_fingerprint(key->cert->signature_key,
218 key_type(key), key->cert->key_id,
219 (unsigned long long)key->cert->serial,
220 key_type(key->cert->signature_key), fp,
233 match_principals_option(const char *principal_list, struct KeyCert *cert) argument
240 for (i = 0; i < cert->nprincipals; i++) {
241 if ((result = match_list(cert->principals[i],
253 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument
291 for (i = 0; i < cert->nprincipals; i++) {
292 if (strcmp(cp, cert
[all...]
/freebsd-9.3-release/crypto/openssl/demos/pkcs12/
H A Dpkwrite.c15 X509 *cert; local
27 cert = PEM_read_X509(fp, NULL, NULL, NULL);
31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c83 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
115 if (!pkey && !cert && !ca) {
120 if (pkey && cert) {
121 if (!X509_check_private_key(cert, pkey))
123 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
126 if (cert) {
127 bag = PKCS12_add_cert(&bags, cert);
196 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
205 if (!(bag = PKCS12_x5092certbag(cert)))
212 name = (char *)X509_alias_get0(cert,
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dtest_crypto.in52 echo "Bleichenbacher good cert (from eay)"
55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \
58 echo "Bleichenbacher bad cert (from eay)"
61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \
64 echo "Bleichenbacher good cert (from yutaka)"
67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \
70 echo "Bleichenbacher bad cert (from yutaka)"
73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert
[all...]
H A Dtest_nist2.in68 while read result cert other ; do
70 name=${cert}
80 args="$args cert:FILE:$nistdir/certs/$cert"
H A Dcms.c173 fill_CMSIdentifier(const hx509_cert cert, argument
182 ret = _hx509_find_extension_subject_key_id(_hx509_get_cert(cert),
191 ret = hx509_cert_get_issuer(cert, &name);
199 ret = hx509_cert_get_serialnumber(cert, &id->u.issuerAndSerialNumber.serialNumber);
267 hx509_cert cert; local
297 ret = hx509_certs_find(context, certs, &q, &cert);
312 "Failed to find CMS id in cert store");
316 *signer_cert = cert;
354 hx509_cert cert; local
402 cert
538 hx509_cms_envelope_1(hx509_context context, int flags, hx509_cert cert, const void *data, size_t length, const heim_oid *encryption_type, const heim_oid *contentType, heim_octet_string *content) argument
760 hx509_cert cert = NULL; local
1081 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument
[all...]
H A Dkeyset.c280 * @param cert return certificate next in store, NULL if the store
292 hx509_cert *cert)
294 *cert = NULL;
295 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert);
385 Certificate *cert; local
389 cert = _hx509_get_cert(c);
391 _hx509_name_from_Name(&cert->tbsCertificate.subject, &n);
394 _hx509_name_from_Name(&cert->tbsCertificate.issuer, &n);
407 * of the cert or make a deep copy, either way, the caller needs to
408 * free the cert itsel
289 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument
420 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument
[all...]
H A Dks_dir.c41 * state except for the directory iteration and cert iteration of
128 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
133 *cert = NULL;
140 ret = hx509_certs_next_cert(context, d->certs, d->iter, cert);
147 if (*cert) {
127 dir_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
H A Dks_keychain.c198 hx509_cert cert)
249 _hx509_cert_assign_key(cert, key);
359 hx509_cert cert; local
366 ret = hx509_cert_init_data(context, cssm.Data, cssm.Length, &cert);
370 ret = hx509_certs_add(context, iter->certs, cert);
371 hx509_cert_free(cert);
409 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
422 return hx509_certs_next_cert(context, iter->certs, iter->cursor, cert);
424 *cert = NULL;
447 ret = hx509_cert_init_data(context, ptr, len, cert);
196 set_private_key(hx509_context context, SecKeychainItemRef itemRef, hx509_cert cert) argument
408 keychain_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
[all...]
H A Dtest_java_pkcs11.in60 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
H A Dcollector.c69 ret = hx509_certs_init(context, "MEMORY:collector-unenvelop-cert",
99 hx509_cert cert)
101 return hx509_certs_add(context, c->certs, cert);
178 hx509_cert cert; local
193 ret = hx509_certs_find(context, certs, &q, &cert);
197 _hx509_cert_assign_key(cert, value->private_key);
198 hx509_cert_free(cert);
97 _hx509_collector_certs_add(hx509_context context, struct hx509_collector *c, hx509_cert cert) argument
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestfipsssl9 cert=../apps/server.pem
11 cert="$2"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
18 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then
103 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1
109 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client_write.c31 struct x509_certificate *cert; local
36 cert = conn->cred->cert;
37 while (cert) {
38 len += 3 + cert->cert_len;
39 if (x509_certificate_self_signed(cert))
41 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
42 &cert->issuer);
137 struct x509_certificate *cert; local
158 cert
[all...]
H A Dtlsv1_server_write.c31 struct x509_certificate *cert; local
33 cert = conn->cred->cert;
34 while (cert) {
35 len += 3 + cert->cert_len;
36 if (x509_certificate_self_signed(cert))
38 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
39 &cert->issuer);
164 struct x509_certificate *cert; local
193 cert
[all...]
H A Dtlsv1_cred.c38 x509_certificate_chain_free(cred->cert);
49 struct x509_certificate *cert; local
52 cert = x509_certificate_parse(buf, len);
53 if (cert == NULL) {
59 cert->next = *chain;
60 *chain = cert;
62 x509_name_string(&cert->subject, name, sizeof(name));
147 const char *cert, const u8 *cert_blob,
153 if (cert) {
158 buf = (u8 *) os_readfile(cert,
146 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument
183 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument
210 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument
[all...]
H A Dtlsv1_common.c149 struct x509_certificate *cert; local
158 cert = x509_certificate_parse(buf, len);
159 if (cert == NULL) {
177 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
178 x509_certificate_free(cert);
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dssl_cert.c181 CERT *ssl_cert_dup(CERT *cert) argument
194 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
196 * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that
200 ret->valid = cert->valid;
201 ret->mask = cert->mask;
202 ret->export_mask = cert->export_mask;
205 if (cert->rsa_tmp != NULL) {
206 RSA_up_ref(cert
[all...]
H A Ds3_lib.c1766 if (!ssl_cert_inst(&s->cert)) {
1794 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
1795 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1796 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) >
1811 if (s->cert->rsa_tmp != NULL)
1812 RSA_free(s->cert->rsa_tmp);
1813 s->cert->rsa_tmp = rsa;
1843 if (s->cert->dh_tmp != NULL)
1844 DH_free(s->cert
2044 CERT *cert; local
2208 CERT *cert; local
2300 CERT *cert; local
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dv3_akey.c111 * issuer: use the issuers cert issuer and serial number. The default is
129 X509 *cert; local
157 cert = ctx->issuer_cert;
160 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
161 if ((i >= 0) && (ext = X509_get_ext(cert, i)))
171 isname = X509_NAME_dup(X509_get_issuer_name(cert));
172 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_enc.c70 PKCS7_add_signer(PKCS7 *p7, X509 *cert, EVP_PKEY *key);
/freebsd-9.3-release/crypto/openssl/engines/
H A De_capi.c1147 CRYPT_KEY_PROV_INFO *capi_get_prov_info(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument
1153 (cert, CERT_KEY_PROV_INFO_PROP_ID, NULL, &len))
1161 (cert, CERT_KEY_PROV_INFO_PROP_ID, pinfo, &len)) {
1196 char *capi_cert_get_fname(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument
1203 (cert, CERT_FRIENDLY_NAME_PROP_ID, NULL, &dlen))
1207 (cert, CERT_FRIENDLY_NAME_PROP_ID, wfname, &dlen)) {
1219 void capi_dump_cert(CAPI_CTX * ctx, BIO *out, PCCERT_CONTEXT cert) argument
1226 fname = capi_cert_get_fname(ctx, cert);
1234 p = cert->pbCertEncoded;
1235 x = d2i_X509(NULL, &p, cert
1286 PCCERT_CONTEXT cert = NULL; local
1322 PCCERT_CONTEXT cert = NULL; local
1382 capi_get_cert_key(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument
1409 PCCERT_CONTEXT cert; local
1547 PCCERT_CONTEXT cert = NULL, excert = NULL; local
1670 PCCERT_CONTEXT cert; local
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
258 if (priv->cert)
259 CertFreeCertificateContext(priv->cert);
286 if (strncmp(name, "cert://", 7) == 0) {
321 X509 *cert = NULL; local
327 (strncmp(name, "cert://", 7) != 0 &&
341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
342 if (priv->cert == NULL) {
343 priv->cert = cryptoapi_find_cert(
346 if (priv->cert
423 X509 *cert; local
980 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument
1002 tls_match_altsubject(X509 *cert, const char *match) argument
1083 get_x509_cert(X509 *cert) argument
1108 struct wpabuf *cert = NULL; local
1130 struct wpabuf *cert = NULL; local
1193 struct wpabuf *cert; local
1353 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1620 X509 *cert; local
1745 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument
1752 X509 *cert; member in struct:__anon4334
1779 X509 *cert; local
1806 X509 *cert; local
[all...]
/freebsd-9.3-release/crypto/openssl/demos/x509/
H A Dmkcert.c16 int add_ext(X509 *cert, int nid, char *value);
150 int add_ext(X509 *cert, int nid, char *value) argument
161 X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0);
166 X509_add_ext(cert, ex, -1);
/freebsd-9.3-release/crypto/openssl/demos/tunala/
H A Dtest.sh11 -cacert CA.pem -cert A-client.pem -server 0 \
15 -cacert CA.pem -cert A-server.pem -server 1 \
84 echo "---- skipping $i (no DSA cert/keys) ----"

Completed in 133 milliseconds

1234567