Searched refs:cert (Results 76 - 100 of 157) sorted by relevance

1234567

/freebsd-9.3-release/crypto/openssl/ssl/
H A Dd1_srvr.c170 if (s->cert == NULL) {
381 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
383 && EVP_PKEY_size(s->cert->pkeys
403 if ( /* don't request cert unless asked for it: */
406 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert
412 * never request cert in anonymous ciphersuites (see
424 * never request cert in Kerberos ciphersuites
427 /* no cert request */
497 * We need to get hashes here so if there is a client cert, it
881 CERT *cert; local
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls.h58 const struct wpabuf *cert; member in struct:tls_event_data::__anon4328
64 const struct wpabuf *cert; member in struct:tls_event_data::__anon4329
H A Dtls_gnutls.c451 static int tls_match_altsubject(X509 *cert, const char *match)
459 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
587 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key "
620 "cert/key in DER format: %s",
711 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
718 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
745 wpa_printf(MSG_DEBUG, "Failed to read client cert/key "
752 "cert/ke
875 gnutls_x509_crt_t cert; local
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dks_p12.c135 hx509_cert cert; local
156 ret = hx509_cert_init_data(context, os.data, os.length, &cert);
161 ret = _hx509_collector_certs_add(context, c, cert);
163 hx509_cert_free(cert);
178 _hx509_set_cert_attribute(context, cert, oid,
183 hx509_cert_free(cert);
671 hx509_cert *cert)
674 return hx509_certs_next_cert(context, p12->certs, cursor, cert);
667 p12_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
H A Dlock.c134 hx509_lock_add_cert(hx509_context context, hx509_lock lock, hx509_cert cert) argument
136 return hx509_certs_add(context, lock->certs, cert);
H A Dtest_cms.in78 echo "verify signed data (EE cert as anchor)"
200 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
220 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
235 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
249 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \
259 echo "create signed data (sd cert)"
[all...]
H A Dks_p11.c669 p11_cert_release(hx509_cert cert, void *ctx) argument
684 hx509_cert cert; local
694 query[1].ulValueLen, &cert);
702 _hx509_cert_set_release(cert, p11_cert_release, p);
711 cert,
722 hx509_cert_set_friendly_name(cert, str);
727 ret = _hx509_collector_certs_add(context, collector, cert);
728 hx509_cert_free(cert);
1045 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
1048 return hx509_certs_next_cert(context, c->certs, c->cursor, cert);
1044 p11_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
[all...]
H A Dks_file.c55 hx509_cert cert; local
58 ret = hx509_cert_init_data(context, data, len, &cert);
62 ret = _hx509_collector_certs_add(context, c, cert);
63 hx509_cert_free(cert);
552 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
555 return hx509_certs_next_cert(context, f->certs, iter, cert);
551 file_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
/freebsd-9.3-release/crypto/heimdal/lib/roken/
H A Dresolve.c327 rr->u.cert = malloc (sizeof(*rr->u.cert) + cert_len - 1);
328 if (rr->u.cert == NULL) {
333 rr->u.cert->type = (p[0] << 8) | p[1];
334 rr->u.cert->tag = (p[2] << 8) | p[3];
335 rr->u.cert->algorithm = p[4];
336 rr->u.cert->cert_len = cert_len;
337 memcpy (rr->u.cert->cert_data, p + 5, cert_len);
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_smime.c577 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) argument
592 * If we have a cert try matching RecipientInfo otherwise try them
595 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0)) {
599 if (cert) {
614 * If no cert and not debugging don't leave loop after first
622 /* If no cert and not debugging always return success */
623 if (ri_match && !cert && !debug) {
669 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, argument
684 if (!pk && !cert
[all...]
/freebsd-9.3-release/crypto/openssl/demos/easy_tls/
H A DMakefile56 DOCSandEXAMPLESetc=Makefile cert.pem cacerts.pem
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dpcy_int.h166 X509 *cert; member in struct:X509_POLICY_LEVEL_st
H A Dv3_conf.c353 X509 *cert)
356 if (cert)
357 sk = &cert->cert_info->extensions;
507 X509 *cert)
511 return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert);
352 X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
506 X509V3_EXT_add_conf(LHASH *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
/freebsd-9.3-release/crypto/openssl/apps/
H A Ds_apps.h162 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
H A Ds_cb.c223 * Now we know that a key and cert have been set against the SSL
235 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key) argument
237 if (cert == NULL)
239 if (SSL_CTX_use_certificate(ctx, cert) <= 0) {
251 * Now we know that a key and cert have been set against the SSL context
/freebsd-9.3-release/crypto/openssh/regress/
H A Dkrl.sh60 # Sign cert
72 REVOKED_CERTS="$REVOKED_CERTS ${f}-cert.pub"
78 NOTREVOKED_CERTS="$NOTREVOKED_CERTS ${f}-cert.pub"
87 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $REVOKED_CERTS \
104 ## XXX dump with trace and grep for set cert serials
139 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG"
151 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
H A DMakefile61 cert-hostkey \
62 cert-userkey \
85 known_hosts-cert host_ca_key* cert_host_key* cert_user_key* \
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_asn1.c94 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0),
148 X509_free(ri->cert);
175 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
H A Dpk7_doit.c252 if (ri->cert == NULL) {
257 if ((pkey = X509_get_pubkey(ri->cert)) == NULL)
270 if ((pkey = X509_get_pubkey(ri->cert)) == NULL)
864 STACK_OF(X509) *cert;
878 cert = p7->d.sign->cert;
880 cert = p7->d.signed_and_enveloped->cert;
888 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial);
890 /* were we able to find the cert i
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/
H A Docsp_srv.c207 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument
212 if (!sk_X509_push(resp->certs, cert))
214 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
/freebsd-9.3-release/crypto/openssh/
H A Dssh-keygen.c1626 public->cert->type = cert_key_type;
1627 public->cert->serial = (u_int64_t)cert_serial;
1628 public->cert->key_id = xstrdup(cert_key_id);
1629 public->cert->nprincipals = n;
1630 public->cert->principals = plist;
1631 public->cert->valid_after = cert_valid_from;
1632 public->cert->valid_before = cert_valid_to;
1634 prepare_options_buf(&public->cert->critical,
1637 prepare_options_buf(&public->cert->critical,
1639 prepare_options_buf(&public->cert
[all...]
H A Dkrl.c420 if (key_cert_is_legacy(key) || key->cert->serial == 0) {
422 key->cert->signature_key,
423 key->cert->key_id);
426 key->cert->signature_key,
427 key->cert->serial);
1108 /* Checks whether a given key/cert is revoked. Does not check its CA */
1142 /* Check cert revocation */
1143 if (revoked_certs_for_ca_key(krl, key->cert->signature_key,
1149 /* Check revocation by cert key ID */
1151 rki.key_id = key->cert
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dpkcs12.h261 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
263 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
267 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dkx509.c148 hx509_cert cert = NULL; local
259 ret = hx509_ca_sign(hxctx, tbs, signer, &cert);
266 ret = hx509_cert_binary(hxctx, cert, certificate);
267 hx509_cert_free(cert);
283 krb5_set_error_string(context, "cert creation failed");
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dpkinit.c76 hx509_cert cert; member in struct:krb5_pk_cert
106 _krb5_pk_cert_free(struct krb5_pk_cert *cert) argument
108 if (cert->cert) {
109 hx509_cert_free(cert->cert);
111 free(cert);
151 hx509_cert cert; local
165 ret = hx509_certs_find(id->hx509ctx, id->certs, q, &cert);
179 cert,
[all...]

Completed in 419 milliseconds

1234567