/freebsd-9.3-release/crypto/openssh/ |
H A D | ssh-add.c | 102 Key *public = NULL, *cert = NULL; local 123 xasprintf(&certpath, "%s-cert.pub", filename); 124 if ((cert = key_load_public(certpath, &comment)) == NULL) 126 if (!key_equal_public(cert, public)) 130 if (ssh_remove_identity(ac, cert)) { 138 if (cert != NULL) 139 key_free(cert); 170 Key *private, *cert; local 248 /* Skip trying to load the cert if requested */ 253 xasprintf(&certpath, "%s-cert [all...] |
H A D | auth2-pubkey.c | 215 fp = key_fingerprint(key->cert->signature_key, 218 key_type(key), key->cert->key_id, 219 (unsigned long long)key->cert->serial, 220 key_type(key->cert->signature_key), fp, 233 match_principals_option(const char *principal_list, struct KeyCert *cert) argument 240 for (i = 0; i < cert->nprincipals; i++) { 241 if ((result = match_list(cert->principals[i], 253 match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) argument 291 for (i = 0; i < cert->nprincipals; i++) { 292 if (strcmp(cp, cert [all...] |
/freebsd-9.3-release/crypto/openssl/demos/pkcs12/ |
H A D | pkwrite.c | 15 X509 *cert; local 27 cert = PEM_read_X509(fp, NULL, NULL, NULL); 31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 83 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 115 if (!pkey && !cert && !ca) { 120 if (pkey && cert) { 121 if (!X509_check_private_key(cert, pkey)) 123 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 126 if (cert) { 127 bag = PKCS12_add_cert(&bags, cert); 196 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 205 if (!(bag = PKCS12_x5092certbag(cert))) 212 name = (char *)X509_alias_get0(cert, [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | test_crypto.in | 52 echo "Bleichenbacher good cert (from eay)" 55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \ 58 echo "Bleichenbacher bad cert (from eay)" 61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \ 64 echo "Bleichenbacher good cert (from yutaka)" 67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \ 70 echo "Bleichenbacher bad cert (from yutaka)" 73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert [all...] |
H A D | test_nist2.in | 68 while read result cert other ; do 70 name=${cert} 80 args="$args cert:FILE:$nistdir/certs/$cert"
|
H A D | cms.c | 173 fill_CMSIdentifier(const hx509_cert cert, argument 182 ret = _hx509_find_extension_subject_key_id(_hx509_get_cert(cert), 191 ret = hx509_cert_get_issuer(cert, &name); 199 ret = hx509_cert_get_serialnumber(cert, &id->u.issuerAndSerialNumber.serialNumber); 267 hx509_cert cert; local 297 ret = hx509_certs_find(context, certs, &q, &cert); 312 "Failed to find CMS id in cert store"); 316 *signer_cert = cert; 354 hx509_cert cert; local 402 cert 538 hx509_cms_envelope_1(hx509_context context, int flags, hx509_cert cert, const void *data, size_t length, const heim_oid *encryption_type, const heim_oid *contentType, heim_octet_string *content) argument 760 hx509_cert cert = NULL; local 1081 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
H A D | keyset.c | 280 * @param cert return certificate next in store, NULL if the store 292 hx509_cert *cert) 294 *cert = NULL; 295 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert); 385 Certificate *cert; local 389 cert = _hx509_get_cert(c); 391 _hx509_name_from_Name(&cert->tbsCertificate.subject, &n); 394 _hx509_name_from_Name(&cert->tbsCertificate.issuer, &n); 407 * of the cert or make a deep copy, either way, the caller needs to 408 * free the cert itsel 289 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument 420 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument [all...] |
H A D | ks_dir.c | 41 * state except for the directory iteration and cert iteration of 128 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 133 *cert = NULL; 140 ret = hx509_certs_next_cert(context, d->certs, d->iter, cert); 147 if (*cert) { 127 dir_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | ks_keychain.c | 198 hx509_cert cert) 249 _hx509_cert_assign_key(cert, key); 359 hx509_cert cert; local 366 ret = hx509_cert_init_data(context, cssm.Data, cssm.Length, &cert); 370 ret = hx509_certs_add(context, iter->certs, cert); 371 hx509_cert_free(cert); 409 hx509_certs certs, void *data, void *cursor, hx509_cert *cert) 422 return hx509_certs_next_cert(context, iter->certs, iter->cursor, cert); 424 *cert = NULL; 447 ret = hx509_cert_init_data(context, ptr, len, cert); 196 set_private_key(hx509_context context, SecKeychainItemRef itemRef, hx509_cert cert) argument 408 keychain_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument [all...] |
H A D | test_java_pkcs11.in | 60 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
|
H A D | collector.c | 69 ret = hx509_certs_init(context, "MEMORY:collector-unenvelop-cert", 99 hx509_cert cert) 101 return hx509_certs_add(context, c->certs, cert); 178 hx509_cert cert; local 193 ret = hx509_certs_find(context, certs, &q, &cert); 197 _hx509_cert_assign_key(cert, value->private_key); 198 hx509_cert_free(cert); 97 _hx509_collector_certs_add(hx509_context context, struct hx509_collector *c, hx509_cert cert) argument
|
/freebsd-9.3-release/crypto/openssl/test/ |
H A D | testfipsssl | 9 cert=../apps/server.pem 11 cert="$2" 16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers" 18 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then 103 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1 109 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client_write.c | 31 struct x509_certificate *cert; local 36 cert = conn->cred->cert; 37 while (cert) { 38 len += 3 + cert->cert_len; 39 if (x509_certificate_self_signed(cert)) 41 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 42 &cert->issuer); 137 struct x509_certificate *cert; local 158 cert [all...] |
H A D | tlsv1_server_write.c | 31 struct x509_certificate *cert; local 33 cert = conn->cred->cert; 34 while (cert) { 35 len += 3 + cert->cert_len; 36 if (x509_certificate_self_signed(cert)) 38 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 39 &cert->issuer); 164 struct x509_certificate *cert; local 193 cert [all...] |
H A D | tlsv1_cred.c | 38 x509_certificate_chain_free(cred->cert); 49 struct x509_certificate *cert; local 52 cert = x509_certificate_parse(buf, len); 53 if (cert == NULL) { 59 cert->next = *chain; 60 *chain = cert; 62 x509_name_string(&cert->subject, name, sizeof(name)); 147 const char *cert, const u8 *cert_blob, 153 if (cert) { 158 buf = (u8 *) os_readfile(cert, 146 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 183 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 210 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
H A D | tlsv1_common.c | 149 struct x509_certificate *cert; local 158 cert = x509_certificate_parse(buf, len); 159 if (cert == NULL) { 177 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 178 x509_certificate_free(cert);
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl_cert.c | 181 CERT *ssl_cert_dup(CERT *cert) argument 194 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 196 * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that 200 ret->valid = cert->valid; 201 ret->mask = cert->mask; 202 ret->export_mask = cert->export_mask; 205 if (cert->rsa_tmp != NULL) { 206 RSA_up_ref(cert [all...] |
H A D | s3_lib.c | 1766 if (!ssl_cert_inst(&s->cert)) { 1794 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) && 1795 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1796 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > 1811 if (s->cert->rsa_tmp != NULL) 1812 RSA_free(s->cert->rsa_tmp); 1813 s->cert->rsa_tmp = rsa; 1843 if (s->cert->dh_tmp != NULL) 1844 DH_free(s->cert 2044 CERT *cert; local 2208 CERT *cert; local 2300 CERT *cert; local [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 111 * issuer: use the issuers cert issuer and serial number. The default is 129 X509 *cert; local 157 cert = ctx->issuer_cert; 160 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1); 161 if ((i >= 0) && (ext = X509_get_ext(cert, i))) 171 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 172 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7, X509 *cert, EVP_PKEY *key);
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_capi.c | 1147 CRYPT_KEY_PROV_INFO *capi_get_prov_info(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument 1153 (cert, CERT_KEY_PROV_INFO_PROP_ID, NULL, &len)) 1161 (cert, CERT_KEY_PROV_INFO_PROP_ID, pinfo, &len)) { 1196 char *capi_cert_get_fname(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument 1203 (cert, CERT_FRIENDLY_NAME_PROP_ID, NULL, &dlen)) 1207 (cert, CERT_FRIENDLY_NAME_PROP_ID, wfname, &dlen)) { 1219 void capi_dump_cert(CAPI_CTX * ctx, BIO *out, PCCERT_CONTEXT cert) argument 1226 fname = capi_cert_get_fname(ctx, cert); 1234 p = cert->pbCertEncoded; 1235 x = d2i_X509(NULL, &p, cert 1286 PCCERT_CONTEXT cert = NULL; local 1322 PCCERT_CONTEXT cert = NULL; local 1382 capi_get_cert_key(CAPI_CTX * ctx, PCCERT_CONTEXT cert) argument 1409 PCCERT_CONTEXT cert; local 1547 PCCERT_CONTEXT cert = NULL, excert = NULL; local 1670 PCCERT_CONTEXT cert; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 258 if (priv->cert) 259 CertFreeCertificateContext(priv->cert); 286 if (strncmp(name, "cert://", 7) == 0) { 321 X509 *cert = NULL; local 327 (strncmp(name, "cert://", 7) != 0 && 341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 342 if (priv->cert == NULL) { 343 priv->cert = cryptoapi_find_cert( 346 if (priv->cert 423 X509 *cert; local 980 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1002 tls_match_altsubject(X509 *cert, const char *match) argument 1083 get_x509_cert(X509 *cert) argument 1108 struct wpabuf *cert = NULL; local 1130 struct wpabuf *cert = NULL; local 1193 struct wpabuf *cert; local 1353 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1620 X509 *cert; local 1745 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1752 X509 *cert; member in struct:__anon4334 1779 X509 *cert; local 1806 X509 *cert; local [all...] |
/freebsd-9.3-release/crypto/openssl/demos/x509/ |
H A D | mkcert.c | 16 int add_ext(X509 *cert, int nid, char *value); 150 int add_ext(X509 *cert, int nid, char *value) argument 161 X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0); 166 X509_add_ext(cert, ex, -1);
|
/freebsd-9.3-release/crypto/openssl/demos/tunala/ |
H A D | test.sh | 11 -cacert CA.pem -cert A-client.pem -server 0 \ 15 -cacert CA.pem -cert A-server.pem -server 1 \ 84 echo "---- skipping $i (no DSA cert/keys) ----"
|