/opensolaris-onvv-gate/usr/src/common/openssl/ssl/ |
H A D | s3_srvr.c | 186 if (s->cert == NULL) 348 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL 350 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher) 368 if (/* don't request cert unless asked for it: */ 371 * don't request cert during re-negotiation: */ 374 /* never request cert in anonymous ciphersuites 381 /* never request cert in Kerberos ciphersuites */ 384 /* no cert request */ 467 * a client cert, it can be verified 1155 CERT *cert; local [all...] |
H A D | d1_clnt.c | 343 /* EAY EAY EAY need to check for DH fix cert 345 /* For TLS, cert_req is set to 2, so a cert chain 918 /* we get them from the cert */ 1013 pkey=s->cert->key->privatekey; 1083 if ((s->cert == NULL) || 1084 (s->cert->key->x509 == NULL) || 1085 (s->cert->key->privatekey == NULL)) 1091 /* We need to get a client cert */ 1135 /* Ok, we have a cert */ 1143 (s->s3->tmp.cert_req == 2)?NULL:s->cert [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/x509v3/ |
H A D | v3_conf.c | 346 X509 *cert) 349 if (cert) 350 sk = &cert->cert_info->extensions; 499 X509 *cert) 503 return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); 345 X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument 498 X509V3_EXT_add_conf(LHASH *conf, X509V3_CTX *ctx, char *section, X509 *cert) argument
|
H A D | pcy_tree.c | 189 level->cert = x; 530 cache = policy_cache_set(curr->cert); 566 if (curr->cert) 567 X509_free(curr->cert);
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 240 if (ri->cert == NULL) 245 pkey=X509_get_pubkey(ri->cert); 258 pkey=X509_get_pubkey(ri->cert); 799 STACK_OF(X509) *cert; 804 cert=p7->d.sign->cert; 808 cert=p7->d.signed_and_enveloped->cert; 818 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial); 820 /* were we able to find the cert i [all...] |
H A D | pk7_lib.c | 296 sk= &(p7->d.sign->cert); 299 sk= &(p7->d.signed_and_enveloped->cert); 515 p7i->cert=x509; 523 return(X509_find_by_issuer_and_serial(p7->d.sign->cert,
|
H A D | pkcs7.h | 115 X509 *cert; /* get the pub-key from this */ member in struct:pkcs7_recip_info_st 125 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signed_st 153 STACK_OF(X509) *cert; /* [ 0 ] */ member in struct:pkcs7_signedandenveloped_st 363 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4v/cpumem-diagnosis/ |
H A D | cmd_hc_sun4v.c | 256 uint_t cert, char *loc) 273 flt = cmd_nvl_create_fault(hdl, fltnm, cert, nvlfru, nvlfru, NULL); 595 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument 612 fllist = fmd_nvl_create_fault(hdl, class, cert, asru, 639 fllist = fmd_nvl_create_fault(hdl, class, cert, asru, 645 fllist = fmd_nvl_create_fault(hdl, class, cert, asru, 255 cmd_boardfru_create_fault(fmd_hdl_t *hdl, nvlist_t *asru, const char *fltnm, uint_t cert, char *loc) argument
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 247 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 249 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 253 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4/cpumem-diagnosis/ |
H A D | cmd_dimm.c | 80 uint_t cert) 92 flt = cmd_nvl_create_fault(hdl, fltnm, cert, 96 flt = cmd_nvl_create_fault(hdl, fltnm, cert, 103 return (cmd_nvl_create_fault(hdl, fltnm, cert, dimm->dimm_asru_nvl, 79 cmd_dimm_create_fault(fmd_hdl_t *hdl, cmd_dimm_t *dimm, const char *fltnm, uint_t cert) argument
|
H A D | cmd_bank.c | 113 uint_t cert) 115 return (cmd_nvl_create_fault(hdl, fltnm, cert, bank->bank_asru_nvl, 112 cmd_bank_create_fault(fmd_hdl_t *hdl, cmd_bank_t *bank, const char *fltnm, uint_t cert) argument
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.h | 102 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert);
|
H A D | softKeystore.c | 510 * cert: TRUE for certificate (use cert_dest) 525 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) 540 if (cert) { 1327 certificate_obj_t *cert; local 1748 cert = calloc(1, sizeof (certificate_obj_t)); 1749 if (cert == NULL) { 1752 (void) memset((void *)cert, 0, sizeof (certificate_obj_t)); 1754 cert->certificate_type = certtype; 1755 objp->object_class_u.certificate = cert; 1761 &cert 524 soft_unpack_obj_attribute(uchar_t *buf, biginteger_t *key_dest, cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) argument [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/apps/ |
H A D | ocsp.c | 72 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer, 109 X509 *issuer = NULL, *cert = NULL; local 377 else if (!strcmp (*args, "-cert")) 382 X509_free(cert); 383 cert = load_cert(bio_err, *args, FORMAT_PEM, 385 if(!cert) goto end; 386 if(!add_ocsp_cert(&req, cert, issuer, ids)) 514 BIO_printf (bio_err, "-cert file certificate to check\n"); 874 X509_free(cert); 900 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X50 argument [all...] |
H A D | pkcs7.c | 250 certs=p7->d.sign->cert; 254 certs=p7->d.signed_and_enveloped->cert;
|
H A D | smime.c | 97 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 407 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n"); 459 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 515 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 523 sk_X509_push(encerts, cert); 524 cert = NULL; 745 X509_free(cert);
|
H A D | apps.c | 702 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 738 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 751 BIO *cert; local 753 if ((cert=BIO_new(BIO_s_file())) == NULL) 762 BIO_set_fp(cert,stdin,BIO_NOCLOSE); 766 if (BIO_read_filename(cert,file) <= 0) 776 x=d2i_X509_bio(cert,NULL); 790 i=BIO_read(cert,&(buf->data[size]),1024*10); 821 x=PEM_read_bio_X509_AUX(cert,NULL, 825 if (!load_pkcs12(err, cert,cert_descri 700 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 505 /* If chaining get chain from user cert */ 800 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument 809 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 841 X509 *cert; local 844 CRYPTO_push_info("cert_load(): reading one cert"); 846 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 851 sk_X509_push(sk, cert); 853 CRYPTO_push_info("cert_load(): reading one cert");
|
H A D | s_client.c | 161 /*#define TEST_CERT "client.pem" */ /* no default cert. */ 192 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n"); 194 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n"); 195 BIO_printf(bio_err," not specified but cert file is.\n"); 255 X509 *cert = NULL; local 349 else if (strcmp(*argv,"-cert") == 0) 536 cert = load_cert(bio_err,cert_file,cert_format, 539 if (!cert) 597 if (!set_cert_key_stuff(ctx,cert,key)) 1069 if (cert) [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 581 X509 *cert = NULL; local 601 cert = (X509 *) PEM_read_bio_X509(tmp, NULL, NULL, NULL); 602 if (cert == NULL) { 607 *retcert = cert; 872 X509 *cert = NULL; local 893 /* create a cert chain that has at least the signer's certificate */ 897 cert = sk_X509_value(id_cryptoctx->my_certs, id_cryptoctx->cert_index); 900 sk_X509_push(cert_stack, X509_dup(cert)); 902 /* create a cert chain */ 913 X509_STORE_CTX_init(&certctx, certstore, cert, 1810 crypto_retrieve_X509_sans(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, X509 *cert, krb5_principal **princs_ret, krb5_principal **upn_ret, unsigned char ***dns_ret) argument 3743 CK_BYTE_PTR cert = NULL, cert_id = NULL; local 4429 X509 *cert; local 4752 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument 6342 X509 *cert = req_cryptoctx->received_cert; local 6502 X509 *cert = sk_X509_value(id_cryptoctx->my_certs, local [all...] |
H A D | pkinit_crypto_openssl.h | 58 X509 *cert; member in struct:_pkinit_cred_info 70 int cert_index; /* cert to use out of available certs*/ 187 EVP_PKEY *pkey, X509 *cert);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 577 KMF_X509_DER_CERT cert; local 648 &cert, sizeof (cert)); 656 * Find the associated private key for this cert by 659 rv = kmf_get_cert_id_str(&cert.certificate, &idstr); 728 rv = kmf_get_cert_id_data(&cert.certificate, &iddata); 735 rv = kmf_get_cert_id_data(&cert.certificate, &iddata); 741 1, &cert, bufsize, (char *)token_label, &iddata, &creds); 744 kmf_free_kmf_cert(kmfh, &cert); 801 /* add new attribute for the cert lis [all...] |
/opensolaris-onvv-gate/usr/src/cmd/fm/modules/sun4u/cpumem-diagnosis/ |
H A D | cmd_cpu_arch.c | 256 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument 261 return (fmd_nvl_create_fault(hdl, class, cert, asru, fru, rsrc));
|
H A D | cmd_oplerr.c | 147 uint8_t cert; local 220 cert = opl_avg(100, nsusp); 234 opl_cpu->oc_cmd_cpu, fltname, cpu_rsrc, cert);
|
/opensolaris-onvv-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 412 ssl_cert2KMFDATA(KMF_HANDLE *kmfh, X509 *x509cert, KMF_DATA *cert) argument 445 cert->Data = buf; 446 cert->Length = len; 452 cert->Data = NULL; 453 cert->Length = 0; 724 /* Remove this cert from the list by clearing it. */ 757 KMF_DATA *cert) 763 if (rv == KMF_OK && x509cert != NULL && cert != NULL) { 764 rv = ssl_cert2KMFDATA(kmfh, x509cert, cert); 769 rv = kmf_check_cert_date(kmfh, cert); 753 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1214 KMF_DATA *cert = NULL; local 2349 X509 *cert = NULL; local 4154 KMF_X509_DER_CERT cert; local 4327 X509 *cert = sk_X509_value(sslcert, i); local [all...] |