/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_srvr.c | 170 if (s->cert == NULL) { 381 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 383 && EVP_PKEY_size(s->cert->pkeys 403 if ( /* don't request cert unless asked for it: */ 406 * if SSL_VERIFY_CLIENT_ONCE is set, don't request cert 412 * never request cert in anonymous ciphersuites (see 424 * never request cert in Kerberos ciphersuites 427 /* no cert request */ 497 * We need to get hashes here so if there is a client cert, it 881 CERT *cert; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls.h | 58 const struct wpabuf *cert; member in struct:tls_event_data::__anon4328 64 const struct wpabuf *cert; member in struct:tls_event_data::__anon4329
|
H A D | tls_gnutls.c | 451 static int tls_match_altsubject(X509 *cert, const char *match) 459 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); 580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 587 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 620 "cert/key in DER format: %s", 711 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 718 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 745 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 752 "cert/ke 875 gnutls_x509_crt_t cert; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_p12.c | 135 hx509_cert cert; local 156 ret = hx509_cert_init_data(context, os.data, os.length, &cert); 161 ret = _hx509_collector_certs_add(context, c, cert); 163 hx509_cert_free(cert); 178 _hx509_set_cert_attribute(context, cert, oid, 183 hx509_cert_free(cert); 671 hx509_cert *cert) 674 return hx509_certs_next_cert(context, p12->certs, cursor, cert); 667 p12_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
|
H A D | lock.c | 134 hx509_lock_add_cert(hx509_context context, hx509_lock lock, hx509_cert cert) argument 136 return hx509_certs_add(context, lock->certs, cert);
|
H A D | test_cms.in | 78 echo "verify signed data (EE cert as anchor)" 200 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 220 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 235 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 249 --certificate=FILE:$srcdir/data/sub-cert.crt,$srcdir/data/sub-cert.key \ 259 echo "create signed data (sd cert)" [all...] |
H A D | ks_p11.c | 669 p11_cert_release(hx509_cert cert, void *ctx) argument 684 hx509_cert cert; local 694 query[1].ulValueLen, &cert); 702 _hx509_cert_set_release(cert, p11_cert_release, p); 711 cert, 722 hx509_cert_set_friendly_name(cert, str); 727 ret = _hx509_collector_certs_add(context, collector, cert); 728 hx509_cert_free(cert); 1045 hx509_certs certs, void *data, void *cursor, hx509_cert *cert) 1048 return hx509_certs_next_cert(context, c->certs, c->cursor, cert); 1044 p11_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument [all...] |
H A D | ks_file.c | 55 hx509_cert cert; local 58 ret = hx509_cert_init_data(context, data, len, &cert); 62 ret = _hx509_collector_certs_add(context, c, cert); 63 hx509_cert_free(cert); 552 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 555 return hx509_certs_next_cert(context, f->certs, iter, cert); 551 file_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | resolve.c | 327 rr->u.cert = malloc (sizeof(*rr->u.cert) + cert_len - 1); 328 if (rr->u.cert == NULL) { 333 rr->u.cert->type = (p[0] << 8) | p[1]; 334 rr->u.cert->tag = (p[2] << 8) | p[3]; 335 rr->u.cert->algorithm = p[4]; 336 rr->u.cert->cert_len = cert_len; 337 memcpy (rr->u.cert->cert_data, p + 5, cert_len);
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_smime.c | 577 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) argument 592 * If we have a cert try matching RecipientInfo otherwise try them 595 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0)) { 599 if (cert) { 614 * If no cert and not debugging don't leave loop after first 622 /* If no cert and not debugging always return success */ 623 if (ri_match && !cert && !debug) { 669 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, argument 684 if (!pk && !cert [all...] |
/freebsd-9.3-release/crypto/openssl/demos/easy_tls/ |
H A D | Makefile | 56 DOCSandEXAMPLESetc=Makefile cert.pem cacerts.pem
|
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | pcy_int.h | 166 X509 *cert; member in struct:X509_POLICY_LEVEL_st
|
H A D | v3_conf.c | 353 X509 *cert) 356 if (cert) 357 sk = &cert->cert_info->extensions; 507 X509 *cert) 511 return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); 352 X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument 506 X509V3_EXT_add_conf(LHASH *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | s_apps.h | 162 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
H A D | s_cb.c | 223 * Now we know that a key and cert have been set against the SSL 235 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key) argument 237 if (cert == NULL) 239 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { 251 * Now we know that a key and cert have been set against the SSL context
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | krl.sh | 60 # Sign cert 72 REVOKED_CERTS="$REVOKED_CERTS ${f}-cert.pub" 78 NOTREVOKED_CERTS="$NOTREVOKED_CERTS ${f}-cert.pub" 87 $SSHKEYGEN $OPTS -kf $OBJ/krl-cert $REVOKED_CERTS \ 104 ## XXX dump with trace and grep for set cert serials 139 check_krl $f $OBJ/krl-cert $CERTS_RESULT "$TAG" 151 for f in $OBJ/krl-keys $OBJ/krl-cert $OBJ/krl-all \
|
H A D | Makefile | 61 cert-hostkey \ 62 cert-userkey \ 85 known_hosts-cert host_ca_key* cert_host_key* cert_user_key* \
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 94 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 148 X509_free(ri->cert); 175 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
H A D | pk7_doit.c | 252 if (ri->cert == NULL) { 257 if ((pkey = X509_get_pubkey(ri->cert)) == NULL) 270 if ((pkey = X509_get_pubkey(ri->cert)) == NULL) 864 STACK_OF(X509) *cert; 878 cert = p7->d.sign->cert; 880 cert = p7->d.signed_and_enveloped->cert; 888 x509 = X509_find_by_issuer_and_serial(cert, ias->issuer, ias->serial); 890 /* were we able to find the cert i [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 207 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument 212 if (!sk_X509_push(resp->certs, cert)) 214 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | ssh-keygen.c | 1626 public->cert->type = cert_key_type; 1627 public->cert->serial = (u_int64_t)cert_serial; 1628 public->cert->key_id = xstrdup(cert_key_id); 1629 public->cert->nprincipals = n; 1630 public->cert->principals = plist; 1631 public->cert->valid_after = cert_valid_from; 1632 public->cert->valid_before = cert_valid_to; 1634 prepare_options_buf(&public->cert->critical, 1637 prepare_options_buf(&public->cert->critical, 1639 prepare_options_buf(&public->cert [all...] |
H A D | krl.c | 420 if (key_cert_is_legacy(key) || key->cert->serial == 0) { 422 key->cert->signature_key, 423 key->cert->key_id); 426 key->cert->signature_key, 427 key->cert->serial); 1108 /* Checks whether a given key/cert is revoked. Does not check its CA */ 1142 /* Check cert revocation */ 1143 if (revoked_certs_for_ca_key(krl, key->cert->signature_key, 1149 /* Check revocation by cert key ID */ 1151 rki.key_id = key->cert [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 261 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 263 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 267 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kx509.c | 148 hx509_cert cert = NULL; local 259 ret = hx509_ca_sign(hxctx, tbs, signer, &cert); 266 ret = hx509_cert_binary(hxctx, cert, certificate); 267 hx509_cert_free(cert); 283 krb5_set_error_string(context, "cert creation failed");
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | pkinit.c | 76 hx509_cert cert; member in struct:krb5_pk_cert 106 _krb5_pk_cert_free(struct krb5_pk_cert *cert) argument 108 if (cert->cert) { 109 hx509_cert_free(cert->cert); 111 free(cert); 151 hx509_cert cert; local 165 ret = hx509_certs_find(id->hx509ctx, id->certs, q, &cert); 179 cert, [all...] |