Searched refs:cert (Results 76 - 100 of 211) sorted by relevance

123456789

/openbsd-current/regress/lib/libcrypto/ct/
H A Dcttest.c162 cert_from_file(const char *filename, X509 **cert) argument
174 *cert = x;
275 X509 *cert = NULL; local
281 cert_from_file(test_cert_file, &cert);
283 if ((idx = X509_get_ext_by_NID(cert, NID_ct_precert_scts, -1)) == -1) {
287 if ((ext = X509_get_ext(cert, idx)) == NULL) {
304 X509_free(cert);
406 X509 *cert = NULL, *issuer = NULL; local
411 cert_from_file(test_cert_file, &cert);
425 if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert))
[all...]
/openbsd-current/usr.sbin/unbound/dnscrypt/
H A Ddnscrypt.c19 #include "dnscrypt/cert.h"
67 /** the client_magic used by the client, this is associated to 1 cert only */
237 * \param[in] cert the cert that matches this encrypted query.
245 const dnsccert *cert,
270 cert->magic_query,
277 cert->magic_query,
291 cert->magic_query,
298 cert->es_version[1],
300 cert
244 dnscrypt_server_uncurve(struct dnsc_env* env, const dnsccert *cert, uint8_t client_nonce[crypto_box_HALF_NONCEBYTES], uint8_t nmkey[crypto_box_BEFORENMBYTES], struct sldns_buffer* buffer) argument
461 dnscrypt_server_curve(const dnsccert *cert, uint8_t client_nonce[crypto_box_HALF_NONCEBYTES], uint8_t nmkey[crypto_box_BEFORENMBYTES], struct sldns_buffer* buffer, uint8_t udp, size_t max_udp_size) argument
703 struct SignedCert *cert = dnscenv->signed_certs + i; local
[all...]
/openbsd-current/usr.sbin/rpki-client/
H A Dmain.c492 queue_add_from_cert(const struct cert *cert) argument
501 if (strncmp(cert->repo, RSYNC_PROTO, RSYNC_PROTO_LEN) != 0)
503 host = cert->repo + 8;
507 warnx("skipping %s (listed in skiplist)", cert->repo);
520 warnx("skipping %s (not shortlisted)", cert->repo);
524 repo = repo_lookup(cert->talid, cert->repo,
525 rrdpon ? cert->notify : NULL);
530 * Figure out the cert filenam
570 struct cert *cert; local
[all...]
H A Dspl.c251 struct cert *cert = NULL; local
287 warnx("%s: inherit elements not allowed in EE cert", fn);
291 if ((cert = cert_parse_ee_cert(fn, talid, *x509)) == NULL)
294 if (cert->asz == 0) {
299 if (cert->ipsz > 0) {
308 spl->valid = valid_spl(fn, cert, spl);
318 cert_free(cert);
H A Droa.c244 struct cert *cert = NULL; local
280 warnx("%s: inherit elements not allowed in EE cert", fn);
284 if ((cert = cert_parse_ee_cert(fn, talid, *x509)) == NULL)
287 if (cert->asz > 0) {
296 roa->valid = valid_roa(fn, cert, roa);
306 cert_free(cert);
/openbsd-current/regress/sbin/isakmpd/x509/
H A DMakefile41 cert.c
/openbsd-current/lib/libcrypto/
H A Dformat-pem.pl18 # To update cert.pem based on the certificates included in Mozilla NSS,
20 # - perl format-pem.pl < cert.pem > /dev/null 2> calist.old
31 print STDERR "Date::Parse not available - install p5-Time-TimeDate to check cert dates.\n";
98 my $cert = qx/openssl x509 -in $t/;
108 $ca{$o}{$subj}{'cert'} = $cert;
124 print $ca{$o}{$subj}{'cert'};
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/t/
H A Dnntp_ssl.t54 my ($cert) = IO::Socket::SSL::Utils::CERT_create(
106 SSL_cert => $cert,
H A Dpop3_ssl.t53 my ($cert) = IO::Socket::SSL::Utils::CERT_create(
100 SSL_cert => $cert,
H A Dsmtp_ssl.t53 my ($cert) = IO::Socket::SSL::Utils::CERT_create(
100 SSL_cert => $cert,
/openbsd-current/usr.bin/openssl/
H A Dsess_id.c73 int cert; member in struct:__anon196
85 .name = "cert",
88 .opt.flag = &cfg.cert,
145 "usage: sess_id [-cert] [-context id] [-in file] [-inform fmt] "
211 if (cfg.cert) {
218 if (!cfg.noout && !cfg.cert) {
H A Ds_apps.h129 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
/openbsd-current/lib/libcrypto/pkcs7/
H A Dpk7_smime.c310 signer, p7->d.sign->cert)) {
459 if (!signer && !(flags & PKCS7_NOINTERN) && p7->d.sign->cert)
461 X509_find_by_issuer_and_serial(p7->d.sign->cert,
523 PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) argument
539 if (cert && !X509_check_private_key(cert, pkey)) {
544 if (!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
/openbsd-current/usr.sbin/ocspcheck/
H A Docspcheck.c219 warnx("Unable to load CA cert file");
230 warnx("Unable to load CA cert directory");
301 const X509 *cert; local
304 cert = cert_from_chain(fullchain);
305 if ((issuer_name = X509_get_issuer_name(cert)) == NULL)
314 X509 *cert; local
337 warnx("Unable to read cert chain from file %s", file);
341 warnx("File %s does not contain a cert chain", file);
344 if ((cert = cert_from_chain(request->fullchain)) == NULL) {
349 warnx("Unable to find issuer for cert i
414 const X509 *cert, *issuer; local
[all...]
/openbsd-current/usr.sbin/acme-client/
H A Dmain.c106 * The parser enforces that at least cert or fullchain is set.
107 * XXX Test if cert, chain and fullchain have the same dirname?
109 tmps = domain->cert ? domain->cert : domain->fullchain;
161 warnx("%s: cert directory must exist", certdir);
324 c = fileproc(file_fds[1], certdir, domain->cert, domain->chain,
356 c = revokeproc(rvk_fds[0], domain->cert != NULL ? domain->cert :
/openbsd-current/lib/libcrypto/ocsp/
H A Docsp_vfy.c72 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid,
321 ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument
343 iname = X509_get_subject_name(cert);
348 X509_pubkey_digest(cert, dgst, md, NULL);
360 ret = ocsp_match_issuerid(cert, tmpid, NULL);
/openbsd-current/usr.bin/ssh/
H A Dssh-add.c167 struct sshkey *public, *cert = NULL; local
191 xasprintf(&certpath, "%s-cert.pub", filename);
192 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) {
198 if (!sshkey_equal_public(cert, public))
202 if (delete_one(agent_fd, cert, comment, certpath, qflag) == 0)
206 sshkey_free(cert);
244 struct sshkey *private, *cert; local
392 /* Skip trying to load the cert if requested */
397 xasprintf(&certpath, "%s-cert.pub", filename);
398 if ((r = sshkey_load_public(certpath, &cert, NUL
[all...]
/openbsd-current/sbin/iked/
H A Deap.c92 struct ikev2_cert *cert; local
132 if ((cert = ibuf_reserve(e, sizeof(*cert))) == NULL)
134 cert->cert_type = certid->id_type;
137 len = ibuf_size(certid->id_buf) + sizeof(*cert);
147 if ((cert = ibuf_reserve(e, sizeof(*cert))) == NULL)
149 cert->cert_type = sa->sa_scert[i].id_type;
152 len = ibuf_size(sa->sa_scert[i].id_buf) + sizeof(*cert);
/openbsd-current/lib/libssl/
H A Dtls13_server.c608 cpk = &s->cert->pkeys[SSL_PKEY_ECC];
614 cpk = &s->cert->pkeys[SSL_PKEY_RSA];
639 X509 *cert; local
680 cert = sk_X509_value(chain, i);
687 if (i == 0 && cert == cpk->x509)
695 if (!tls13_cert_add(ctx, &cert_list, cert, NULL))
874 X509 *cert = NULL; local
902 if ((cert = d2i_X509(NULL, &p, CBS_len(&cert_data))) == NULL)
907 if (!sk_X509_push(certs, cert))
910 cert
950 X509 *cert; local
[all...]
H A Dtls13_client.c555 X509 *cert = NULL; local
581 if ((cert = d2i_X509(NULL, &p, CBS_len(&cert_data))) == NULL)
586 if (!sk_X509_push(certs, cert))
589 cert = NULL;
626 X509_free(cert);
641 X509 *cert; local
669 if ((cert = ctx->ssl->session->peer_cert) == NULL)
671 if ((pkey = X509_get0_pubkey(cert)) == NULL)
837 cpk = &s->cert->pkeys[SSL_PKEY_ECC];
843 cpk = &s->cert
867 X509 *cert; local
[all...]
/openbsd-current/lib/libtls/
H A Dtls_config.c388 tls_config_add_keypair_mem_internal(struct tls_config *config, const uint8_t *cert, argument
396 if (tls_keypair_set_cert_mem(keypair, &config->error, cert, cert_len) != 0)
416 tls_config_add_keypair_mem(struct tls_config *config, const uint8_t *cert, argument
419 return tls_config_add_keypair_mem_internal(config, cert, cert_len, key,
432 tls_config_add_keypair_ocsp_mem(struct tls_config *config, const uint8_t *cert, argument
436 return tls_config_add_keypair_mem_internal(config, cert, cert_len, key,
475 tls_config_set_cert_mem(struct tls_config *config, const uint8_t *cert, argument
479 cert, len);
664 tls_config_set_keypair_mem_internal(struct tls_config *config, const uint8_t *cert, argument
668 if (tls_config_set_cert_mem(config, cert, cert_le
688 tls_config_set_keypair_mem(struct tls_config *config, const uint8_t *cert, size_t cert_len, const uint8_t *key, size_t key_len) argument
704 tls_config_set_keypair_ocsp_mem(struct tls_config *config, const uint8_t *cert, size_t cert_len, const uint8_t *key, size_t key_len, const uint8_t *staple, size_t staple_len) argument
[all...]
H A Dtls_signer.c90 tls_signer_add_keypair_mem(struct tls_signer *signer, const uint8_t *cert, argument
102 if ((bio = BIO_new_mem_buf(cert, cert_len)) == NULL) {
173 char *cert = NULL, *key = NULL; local
178 &cert, &cert_len) == -1)
185 rv = tls_signer_add_keypair_mem(signer, cert, cert_len, key, key_len);
188 free(cert);
/openbsd-current/lib/libcrypto/cms/
H A Dcms_kari.c142 CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) argument
152 return cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert);
154 return cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert);
197 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) argument
202 return cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert);
204 return cms_keyid_cert_cmp(rid->d.rKeyId->subjectKeyIdentifier, cert);
/openbsd-current/lib/libcrypto/x509/
H A Dx509_addr.c1848 verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) argument
1853 ctx->current_cert = cert;
1875 X509 *cert = NULL; local
1898 cert = sk_X509_value(chain, depth);
1899 if ((X509_get_extension_flags(cert) & EXFLAG_INVALID) != 0) {
1900 if ((ret = verify_error(ctx, cert,
1904 if ((ext = cert->rfc3779_addr) == NULL)
1907 if ((ret = verify_error(ctx, cert,
1922 * Now walk up the chain. No cert may list resources that its parent
1926 cert
[all...]
/openbsd-current/usr.sbin/unbound/testcode/
H A Dpetal.c236 setup_ctx(char* key, char* cert) argument
247 if(!SSL_CTX_use_certificate_chain_file(ctx, cert)) {
250 print_exit("cannot read cert");
272 if(!SSL_CTX_load_verify_locations(ctx, cert, NULL))
273 print_exit("cannot load cert verify locations");
581 do_service(char* addr, int port, char* key, char* cert) argument
583 SSL_CTX* sslctx = setup_ctx(key, cert);
623 char* addr = "127.0.0.1", *key = "petal.key", *cert = "petal.pem"; local
638 cert = optarg;
684 do_service(addr, port, key, cert);
[all...]

Completed in 246 milliseconds

123456789