Searched refs:cert (Results 51 - 75 of 99) sorted by relevance

1234

/opensolaris-onvv-gate/usr/src/common/openssl/ssl/
H A Ds3_srvr.c186 if (s->cert == NULL)
348 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
350 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
368 if (/* don't request cert unless asked for it: */
371 * don't request cert during re-negotiation: */
374 /* never request cert in anonymous ciphersuites
381 /* never request cert in Kerberos ciphersuites */
384 /* no cert request */
467 * a client cert, it can be verified
1155 CERT *cert; local
[all...]
H A Dd1_clnt.c343 /* EAY EAY EAY need to check for DH fix cert
345 /* For TLS, cert_req is set to 2, so a cert chain
918 /* we get them from the cert */
1013 pkey=s->cert->key->privatekey;
1083 if ((s->cert == NULL) ||
1084 (s->cert->key->x509 == NULL) ||
1085 (s->cert->key->privatekey == NULL))
1091 /* We need to get a client cert */
1135 /* Ok, we have a cert */
1143 (s->s3->tmp.cert_req == 2)?NULL:s->cert
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/x509v3/
H A Dv3_conf.c346 X509 *cert)
349 if (cert)
350 sk = &cert->cert_info->extensions;
499 X509 *cert)
503 return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert);
345 X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
498 X509V3_EXT_add_conf(LHASH *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
H A Dpcy_tree.c189 level->cert = x;
530 cache = policy_cache_set(curr->cert);
566 if (curr->cert)
567 X509_free(curr->cert);
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/
H A Dpk7_doit.c240 if (ri->cert == NULL)
245 pkey=X509_get_pubkey(ri->cert);
258 pkey=X509_get_pubkey(ri->cert);
799 STACK_OF(X509) *cert;
804 cert=p7->d.sign->cert;
808 cert=p7->d.signed_and_enveloped->cert;
818 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
820 /* were we able to find the cert i
[all...]
H A Dpk7_lib.c296 sk= &(p7->d.sign->cert);
299 sk= &(p7->d.signed_and_enveloped->cert);
515 p7i->cert=x509;
523 return(X509_find_by_issuer_and_serial(p7->d.sign->cert,
H A Dpkcs7.h115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st
125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st
153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st
363 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4v/cpumem-diagnosis/
H A Dcmd_hc_sun4v.c256 uint_t cert, char *loc)
273 flt = cmd_nvl_create_fault(hdl, fltnm, cert, nvlfru, nvlfru, NULL);
595 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument
612 fllist = fmd_nvl_create_fault(hdl, class, cert, asru,
639 fllist = fmd_nvl_create_fault(hdl, class, cert, asru,
645 fllist = fmd_nvl_create_fault(hdl, class, cert, asru,
255 cmd_boardfru_create_fault(fmd_hdl_t *hdl, nvlist_t *asru, const char *fltnm, uint_t cert, char *loc) argument
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/
H A Dpkcs12.h247 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
249 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
253 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4/cpumem-diagnosis/
H A Dcmd_dimm.c80 uint_t cert)
92 flt = cmd_nvl_create_fault(hdl, fltnm, cert,
96 flt = cmd_nvl_create_fault(hdl, fltnm, cert,
103 return (cmd_nvl_create_fault(hdl, fltnm, cert, dimm->dimm_asru_nvl,
79 cmd_dimm_create_fault(fmd_hdl_t *hdl, cmd_dimm_t *dimm, const char *fltnm, uint_t cert) argument
H A Dcmd_bank.c113 uint_t cert)
115 return (cmd_nvl_create_fault(hdl, fltnm, cert, bank->bank_asru_nvl,
112 cmd_bank_create_fault(fmd_hdl_t *hdl, cmd_bank_t *bank, const char *fltnm, uint_t cert) argument
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeystore.h102 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert);
H A DsoftKeystore.c510 * cert: TRUE for certificate (use cert_dest)
525 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert)
540 if (cert) {
1327 certificate_obj_t *cert; local
1748 cert = calloc(1, sizeof (certificate_obj_t));
1749 if (cert == NULL) {
1752 (void) memset((void *)cert, 0, sizeof (certificate_obj_t));
1754 cert->certificate_type = certtype;
1755 objp->object_class_u.certificate = cert;
1761 &cert
524 soft_unpack_obj_attribute(uchar_t *buf, biginteger_t *key_dest, cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) argument
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/apps/
H A Docsp.c72 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
109 X509 *issuer = NULL, *cert = NULL; local
377 else if (!strcmp (*args, "-cert"))
382 X509_free(cert);
383 cert = load_cert(bio_err, *args, FORMAT_PEM,
385 if(!cert) goto end;
386 if(!add_ocsp_cert(&req, cert, issuer, ids))
514 BIO_printf (bio_err, "-cert file certificate to check\n");
874 X509_free(cert);
900 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X50 argument
[all...]
H A Dpkcs7.c250 certs=p7->d.sign->cert;
254 certs=p7->d.signed_and_enveloped->cert;
H A Dsmime.c97 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
407 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
459 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
515 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
523 sk_X509_push(encerts, cert);
524 cert = NULL;
745 X509_free(cert);
H A Dapps.c702 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca)
738 ret = PKCS12_parse(p12, pass, pkey, cert, ca);
751 BIO *cert; local
753 if ((cert=BIO_new(BIO_s_file())) == NULL)
762 BIO_set_fp(cert,stdin,BIO_NOCLOSE);
766 if (BIO_read_filename(cert,file) <= 0)
776 x=d2i_X509_bio(cert,NULL);
790 i=BIO_read(cert,&(buf->data[size]),1024*10);
821 x=PEM_read_bio_X509_AUX(cert,NULL,
825 if (!load_pkcs12(err, cert,cert_descri
700 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dpkcs12.c82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
505 /* If chaining get chain from user cert */
800 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument
809 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
841 X509 *cert; local
844 CRYPTO_push_info("cert_load(): reading one cert");
846 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
851 sk_X509_push(sk, cert);
853 CRYPTO_push_info("cert_load(): reading one cert");
H A Ds_client.c161 /*#define TEST_CERT "client.pem" */ /* no default cert. */
192 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
194 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
195 BIO_printf(bio_err," not specified but cert file is.\n");
255 X509 *cert = NULL; local
349 else if (strcmp(*argv,"-cert") == 0)
536 cert = load_cert(bio_err,cert_file,cert_format,
539 if (!cert)
597 if (!set_cert_key_stuff(ctx,cert,key))
1069 if (cert)
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c581 X509 *cert = NULL; local
601 cert = (X509 *) PEM_read_bio_X509(tmp, NULL, NULL, NULL);
602 if (cert == NULL) {
607 *retcert = cert;
872 X509 *cert = NULL; local
893 /* create a cert chain that has at least the signer's certificate */
897 cert = sk_X509_value(id_cryptoctx->my_certs, id_cryptoctx->cert_index);
900 sk_X509_push(cert_stack, X509_dup(cert));
902 /* create a cert chain */
913 X509_STORE_CTX_init(&certctx, certstore, cert,
1810 crypto_retrieve_X509_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, X509 *cert, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument
3743 CK_BYTE_PTR cert = NULL, cert_id = NULL; local
4429 X509 *cert; local
4752 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument
6342 X509 *cert = req_cryptoctx->received_cert; local
6502 X509 *cert = sk_X509_value(id_cryptoctx->my_certs, local
[all...]
H A Dpkinit_crypto_openssl.h58 X509 *cert; member in struct:_pkinit_cred_info
70 int cert_index; /* cert to use out of available certs*/
187 EVP_PKEY *pkey, X509 *cert);
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c577 KMF_X509_DER_CERT cert; local
648 &cert, sizeof (cert));
656 * Find the associated private key for this cert by
659 rv = kmf_get_cert_id_str(&cert.certificate, &idstr);
728 rv = kmf_get_cert_id_data(&cert.certificate, &iddata);
735 rv = kmf_get_cert_id_data(&cert.certificate, &iddata);
741 1, &cert, bufsize, (char *)token_label, &iddata, &creds);
744 kmf_free_kmf_cert(kmfh, &cert);
801 /* add new attribute for the cert lis
[all...]
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4u/cpumem-diagnosis/
H A Dcmd_cpu_arch.c256 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument
261 return (fmd_nvl_create_fault(hdl, class, cert, asru, fru, rsrc));
H A Dcmd_oplerr.c147 uint8_t cert; local
220 cert = opl_avg(100, nsusp);
234 opl_cpu->oc_cmd_cpu, fltname, cpu_rsrc, cert);
/opensolaris-onvv-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c412 ssl_cert2KMFDATA(KMF_HANDLE *kmfh, X509 *x509cert, KMF_DATA *cert) argument
445 cert->Data = buf;
446 cert->Length = len;
452 cert->Data = NULL;
453 cert->Length = 0;
724 /* Remove this cert from the list by clearing it. */
757 KMF_DATA *cert)
763 if (rv == KMF_OK && x509cert != NULL && cert != NULL) {
764 rv = ssl_cert2KMFDATA(kmfh, x509cert, cert);
769 rv = kmf_check_cert_date(kmfh, cert);
753 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1214 KMF_DATA *cert = NULL; local
2349 X509 *cert = NULL; local
4154 KMF_X509_DER_CERT cert; local
4327 X509 *cert = sk_X509_value(sslcert, i); local
[all...]

Completed in 274 milliseconds

1234