/openbsd-current/regress/lib/libcrypto/ct/ |
H A D | cttest.c | 162 cert_from_file(const char *filename, X509 **cert) argument 174 *cert = x; 275 X509 *cert = NULL; local 281 cert_from_file(test_cert_file, &cert); 283 if ((idx = X509_get_ext_by_NID(cert, NID_ct_precert_scts, -1)) == -1) { 287 if ((ext = X509_get_ext(cert, idx)) == NULL) { 304 X509_free(cert); 406 X509 *cert = NULL, *issuer = NULL; local 411 cert_from_file(test_cert_file, &cert); 425 if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert)) [all...] |
/openbsd-current/usr.sbin/unbound/dnscrypt/ |
H A D | dnscrypt.c | 19 #include "dnscrypt/cert.h" 67 /** the client_magic used by the client, this is associated to 1 cert only */ 237 * \param[in] cert the cert that matches this encrypted query. 245 const dnsccert *cert, 270 cert->magic_query, 277 cert->magic_query, 291 cert->magic_query, 298 cert->es_version[1], 300 cert 244 dnscrypt_server_uncurve(struct dnsc_env* env, const dnsccert *cert, uint8_t client_nonce[crypto_box_HALF_NONCEBYTES], uint8_t nmkey[crypto_box_BEFORENMBYTES], struct sldns_buffer* buffer) argument 461 dnscrypt_server_curve(const dnsccert *cert, uint8_t client_nonce[crypto_box_HALF_NONCEBYTES], uint8_t nmkey[crypto_box_BEFORENMBYTES], struct sldns_buffer* buffer, uint8_t udp, size_t max_udp_size) argument 703 struct SignedCert *cert = dnscenv->signed_certs + i; local [all...] |
/openbsd-current/usr.sbin/rpki-client/ |
H A D | main.c | 492 queue_add_from_cert(const struct cert *cert) argument 501 if (strncmp(cert->repo, RSYNC_PROTO, RSYNC_PROTO_LEN) != 0) 503 host = cert->repo + 8; 507 warnx("skipping %s (listed in skiplist)", cert->repo); 520 warnx("skipping %s (not shortlisted)", cert->repo); 524 repo = repo_lookup(cert->talid, cert->repo, 525 rrdpon ? cert->notify : NULL); 530 * Figure out the cert filenam 570 struct cert *cert; local [all...] |
H A D | spl.c | 251 struct cert *cert = NULL; local 287 warnx("%s: inherit elements not allowed in EE cert", fn); 291 if ((cert = cert_parse_ee_cert(fn, talid, *x509)) == NULL) 294 if (cert->asz == 0) { 299 if (cert->ipsz > 0) { 308 spl->valid = valid_spl(fn, cert, spl); 318 cert_free(cert);
|
H A D | roa.c | 244 struct cert *cert = NULL; local 280 warnx("%s: inherit elements not allowed in EE cert", fn); 284 if ((cert = cert_parse_ee_cert(fn, talid, *x509)) == NULL) 287 if (cert->asz > 0) { 296 roa->valid = valid_roa(fn, cert, roa); 306 cert_free(cert);
|
/openbsd-current/regress/sbin/isakmpd/x509/ |
H A D | Makefile | 41 cert.c
|
/openbsd-current/lib/libcrypto/ |
H A D | format-pem.pl | 18 # To update cert.pem based on the certificates included in Mozilla NSS, 20 # - perl format-pem.pl < cert.pem > /dev/null 2> calist.old 31 print STDERR "Date::Parse not available - install p5-Time-TimeDate to check cert dates.\n"; 98 my $cert = qx/openssl x509 -in $t/; 108 $ca{$o}{$subj}{'cert'} = $cert; 124 print $ca{$o}{$subj}{'cert'};
|
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/t/ |
H A D | nntp_ssl.t | 54 my ($cert) = IO::Socket::SSL::Utils::CERT_create( 106 SSL_cert => $cert,
|
H A D | pop3_ssl.t | 53 my ($cert) = IO::Socket::SSL::Utils::CERT_create( 100 SSL_cert => $cert,
|
H A D | smtp_ssl.t | 53 my ($cert) = IO::Socket::SSL::Utils::CERT_create( 100 SSL_cert => $cert,
|
/openbsd-current/usr.bin/openssl/ |
H A D | sess_id.c | 73 int cert; member in struct:__anon196 85 .name = "cert", 88 .opt.flag = &cfg.cert, 145 "usage: sess_id [-cert] [-context id] [-in file] [-inform fmt] " 211 if (cfg.cert) { 218 if (!cfg.noout && !cfg.cert) {
|
H A D | s_apps.h | 129 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
/openbsd-current/lib/libcrypto/pkcs7/ |
H A D | pk7_smime.c | 310 signer, p7->d.sign->cert)) { 459 if (!signer && !(flags & PKCS7_NOINTERN) && p7->d.sign->cert) 461 X509_find_by_issuer_and_serial(p7->d.sign->cert, 523 PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) argument 539 if (cert && !X509_check_private_key(cert, pkey)) { 544 if (!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
|
/openbsd-current/usr.sbin/ocspcheck/ |
H A D | ocspcheck.c | 219 warnx("Unable to load CA cert file"); 230 warnx("Unable to load CA cert directory"); 301 const X509 *cert; local 304 cert = cert_from_chain(fullchain); 305 if ((issuer_name = X509_get_issuer_name(cert)) == NULL) 314 X509 *cert; local 337 warnx("Unable to read cert chain from file %s", file); 341 warnx("File %s does not contain a cert chain", file); 344 if ((cert = cert_from_chain(request->fullchain)) == NULL) { 349 warnx("Unable to find issuer for cert i 414 const X509 *cert, *issuer; local [all...] |
/openbsd-current/usr.sbin/acme-client/ |
H A D | main.c | 106 * The parser enforces that at least cert or fullchain is set. 107 * XXX Test if cert, chain and fullchain have the same dirname? 109 tmps = domain->cert ? domain->cert : domain->fullchain; 161 warnx("%s: cert directory must exist", certdir); 324 c = fileproc(file_fds[1], certdir, domain->cert, domain->chain, 356 c = revokeproc(rvk_fds[0], domain->cert != NULL ? domain->cert :
|
/openbsd-current/lib/libcrypto/ocsp/ |
H A D | ocsp_vfy.c | 72 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, 321 ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument 343 iname = X509_get_subject_name(cert); 348 X509_pubkey_digest(cert, dgst, md, NULL); 360 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
/openbsd-current/usr.bin/ssh/ |
H A D | ssh-add.c | 167 struct sshkey *public, *cert = NULL; local 191 xasprintf(&certpath, "%s-cert.pub", filename); 192 if ((r = sshkey_load_public(certpath, &cert, &comment)) != 0) { 198 if (!sshkey_equal_public(cert, public)) 202 if (delete_one(agent_fd, cert, comment, certpath, qflag) == 0) 206 sshkey_free(cert); 244 struct sshkey *private, *cert; local 392 /* Skip trying to load the cert if requested */ 397 xasprintf(&certpath, "%s-cert.pub", filename); 398 if ((r = sshkey_load_public(certpath, &cert, NUL [all...] |
/openbsd-current/sbin/iked/ |
H A D | eap.c | 92 struct ikev2_cert *cert; local 132 if ((cert = ibuf_reserve(e, sizeof(*cert))) == NULL) 134 cert->cert_type = certid->id_type; 137 len = ibuf_size(certid->id_buf) + sizeof(*cert); 147 if ((cert = ibuf_reserve(e, sizeof(*cert))) == NULL) 149 cert->cert_type = sa->sa_scert[i].id_type; 152 len = ibuf_size(sa->sa_scert[i].id_buf) + sizeof(*cert);
|
/openbsd-current/lib/libssl/ |
H A D | tls13_server.c | 608 cpk = &s->cert->pkeys[SSL_PKEY_ECC]; 614 cpk = &s->cert->pkeys[SSL_PKEY_RSA]; 639 X509 *cert; local 680 cert = sk_X509_value(chain, i); 687 if (i == 0 && cert == cpk->x509) 695 if (!tls13_cert_add(ctx, &cert_list, cert, NULL)) 874 X509 *cert = NULL; local 902 if ((cert = d2i_X509(NULL, &p, CBS_len(&cert_data))) == NULL) 907 if (!sk_X509_push(certs, cert)) 910 cert 950 X509 *cert; local [all...] |
H A D | tls13_client.c | 555 X509 *cert = NULL; local 581 if ((cert = d2i_X509(NULL, &p, CBS_len(&cert_data))) == NULL) 586 if (!sk_X509_push(certs, cert)) 589 cert = NULL; 626 X509_free(cert); 641 X509 *cert; local 669 if ((cert = ctx->ssl->session->peer_cert) == NULL) 671 if ((pkey = X509_get0_pubkey(cert)) == NULL) 837 cpk = &s->cert->pkeys[SSL_PKEY_ECC]; 843 cpk = &s->cert 867 X509 *cert; local [all...] |
/openbsd-current/lib/libtls/ |
H A D | tls_config.c | 388 tls_config_add_keypair_mem_internal(struct tls_config *config, const uint8_t *cert, argument 396 if (tls_keypair_set_cert_mem(keypair, &config->error, cert, cert_len) != 0) 416 tls_config_add_keypair_mem(struct tls_config *config, const uint8_t *cert, argument 419 return tls_config_add_keypair_mem_internal(config, cert, cert_len, key, 432 tls_config_add_keypair_ocsp_mem(struct tls_config *config, const uint8_t *cert, argument 436 return tls_config_add_keypair_mem_internal(config, cert, cert_len, key, 475 tls_config_set_cert_mem(struct tls_config *config, const uint8_t *cert, argument 479 cert, len); 664 tls_config_set_keypair_mem_internal(struct tls_config *config, const uint8_t *cert, argument 668 if (tls_config_set_cert_mem(config, cert, cert_le 688 tls_config_set_keypair_mem(struct tls_config *config, const uint8_t *cert, size_t cert_len, const uint8_t *key, size_t key_len) argument 704 tls_config_set_keypair_ocsp_mem(struct tls_config *config, const uint8_t *cert, size_t cert_len, const uint8_t *key, size_t key_len, const uint8_t *staple, size_t staple_len) argument [all...] |
H A D | tls_signer.c | 90 tls_signer_add_keypair_mem(struct tls_signer *signer, const uint8_t *cert, argument 102 if ((bio = BIO_new_mem_buf(cert, cert_len)) == NULL) { 173 char *cert = NULL, *key = NULL; local 178 &cert, &cert_len) == -1) 185 rv = tls_signer_add_keypair_mem(signer, cert, cert_len, key, key_len); 188 free(cert);
|
/openbsd-current/lib/libcrypto/cms/ |
H A D | cms_kari.c | 142 CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 152 return cms_ias_cert_cmp(oik->d.issuerAndSerialNumber, cert); 154 return cms_keyid_cert_cmp(oik->d.subjectKeyIdentifier, cert); 197 CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) argument 202 return cms_ias_cert_cmp(rid->d.issuerAndSerialNumber, cert); 204 return cms_keyid_cert_cmp(rid->d.rKeyId->subjectKeyIdentifier, cert);
|
/openbsd-current/lib/libcrypto/x509/ |
H A D | x509_addr.c | 1848 verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) argument 1853 ctx->current_cert = cert; 1875 X509 *cert = NULL; local 1898 cert = sk_X509_value(chain, depth); 1899 if ((X509_get_extension_flags(cert) & EXFLAG_INVALID) != 0) { 1900 if ((ret = verify_error(ctx, cert, 1904 if ((ext = cert->rfc3779_addr) == NULL) 1907 if ((ret = verify_error(ctx, cert, 1922 * Now walk up the chain. No cert may list resources that its parent 1926 cert [all...] |
/openbsd-current/usr.sbin/unbound/testcode/ |
H A D | petal.c | 236 setup_ctx(char* key, char* cert) argument 247 if(!SSL_CTX_use_certificate_chain_file(ctx, cert)) { 250 print_exit("cannot read cert"); 272 if(!SSL_CTX_load_verify_locations(ctx, cert, NULL)) 273 print_exit("cannot load cert verify locations"); 581 do_service(char* addr, int port, char* key, char* cert) argument 583 SSL_CTX* sslctx = setup_ctx(key, cert); 623 char* addr = "127.0.0.1", *key = "petal.key", *cert = "petal.pem"; local 638 cert = optarg; 684 do_service(addr, port, key, cert); [all...] |