/barrelfish-master/lib/openssl-1.0.0d/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 69 X509 *cert; local 76 fprintf(stderr, "Usage v3prin cert.pem\n"); 83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) { 89 count = X509_get_ext_count(cert); 92 ext = X509_get_ext(cert, i);
|
H A D | v3_akey.c | 106 * issuer: use the issuers cert issuer and serial number. The default is 123 X509 *cert; local 157 cert = ctx->issuer_cert; 161 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1); 162 if((i >= 0) && (ext = X509_get_ext(cert, i))) 173 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 174 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
|
/barrelfish-master/lib/openssl-1.0.0d/demos/ssltest-ecc/ |
H A D | ssltest.sh | 61 # but ssltest expects a cert file and complains if it can't 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 99 -cert $SERVER_PEM -server_auth \ 104 -cert $SERVER_PEM -server_auth \ 116 -cert $SERVER_PEM -server_auth \ 121 -cert $SERVER_PEM -server_auth \ 131 -cert $SERVER_PEM -server_auth \ 149 -cert [all...] |
H A D | ECCcertgen.sh | 42 # 4. [Optional] One can combine the cert and private key into a single 66 # The certificate is written into $TEST_CA_FILE.cert.pem 72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 82 # Remove the cert request file (no longer needed) 102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in 106 # $TEST_SERVER_FILE.cert.pem 109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert [all...] |
H A D | RSAcertgen.sh | 39 # 4. [Optional] One can combine the cert and private key into a single 59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 69 # Remove the cert request file (no longer needed) 82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 94 # Remove the cert reques [all...] |
H A D | ECC-RSAcertgen.sh | 40 # 4. [Optional] One can combine the cert and private key into a single 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 60 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 63 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 70 # Remove the cert request file (no longer needed) 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 86 -out $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -CAcreateserial 89 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -text 92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_nx509.c | 68 ASN1_OPT(NETSCAPE_X509, cert, X509)
|
/barrelfish-master/lib/openssl-1.0.0d/demos/pkcs12/ |
H A D | pkread.c | 15 X509 *cert; local 36 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 50 if (cert) { 52 PEM_write_X509_AUX(fp, cert);
|
H A D | pkwrite.c | 15 X509 *cert; local 27 cert = PEM_read_X509(fp, NULL, NULL, NULL); 31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0,0,0,0,0);
|
/barrelfish-master/lib/openssl-1.0.0d/ms/ |
H A D | testce.bat | 90 copy ..\certs\*.pem cert.tmp >nul 91 cecopy cert.tmp CE:\OpenSSL 94 cecopy ..\certs\ca-cert.pem CE:\OpenSSL\certs 102 cecopy ..\certs\pca-cert.pem CE:\OpenSSL\certs 116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem 131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp 135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp 139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp 151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 101 if(!pkey && !cert && !ca) 107 if (pkey && cert) 109 if(!X509_check_private_key(cert, pkey)) 111 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 114 if (cert) 116 bag = PKCS12_add_cert(&bags, cert); 187 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 196 if(!(bag = PKCS12_x5092certbag(cert))) 203 name = (char *)X509_alias_get0(cert, [all...] |
H A D | p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | ssl_cert.c | 181 CERT *ssl_cert_dup(CERT *cert) argument 195 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 196 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 199 ret->valid = cert->valid; 200 ret->mask_k = cert->mask_k; 201 ret->mask_a = cert->mask_a; 202 ret->export_mask_k = cert->export_mask_k; 203 ret->export_mask_a = cert [all...] |
H A D | s3_lib.c | 2251 if (!ssl_cert_inst(&s->cert)) 2281 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) && 2282 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 2283 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) 2299 if (s->cert->rsa_tmp != NULL) 2300 RSA_free(s->cert->rsa_tmp); 2301 s->cert->rsa_tmp = rsa; 2335 if (s->cert->dh_tmp != NULL) 2336 DH_free(s->cert 2546 CERT *cert; local 2732 CERT *cert; local 2830 CERT *cert; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_capi.c | 1208 CRYPT_KEY_PROV_INFO *capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1213 if(!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, NULL, &len)) 1221 if(!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, pinfo, &len)) 1254 char * capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1260 if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, NULL, &dlen)) 1263 if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, wfname, &dlen)) 1277 void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) argument 1285 fname = capi_cert_get_fname(ctx, cert); 1295 p = cert->pbCertEncoded; 1296 x = d2i_X509(NULL, &p, cert 1350 PCCERT_CONTEXT cert = NULL; local 1390 PCCERT_CONTEXT cert = NULL; local 1450 capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) argument 1477 PCCERT_CONTEXT cert; local 1617 PCCERT_CONTEXT cert = NULL, excert = NULL; local 1746 PCCERT_CONTEXT cert; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/x509/ |
H A D | mkcert.c | 17 int add_ext(X509 *cert, int nid, char *value); 153 int add_ext(X509 *cert, int nid, char *value) argument 163 X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0); 168 X509_add_ext(cert,ex,-1);
|
/barrelfish-master/lib/openssl-1.0.0d/demos/tunala/ |
H A D | test.sh | 11 -cacert CA.pem -cert A-client.pem -server 0 \ 15 -cacert CA.pem -cert A-server.pem -server 1 \ 84 echo "---- skipping $i (no DSA cert/keys) ----"
|
/barrelfish-master/lib/openssl-1.0.0d/tools/ |
H A D | c_rehash | 80 my ($cert, $crl) = check_file($fname); 81 if(!$cert && !$crl) { 85 link_hash_cert($fname) if($cert); 128 # Hash matches: if fingerprint matches its a duplicate cert 163 # Hash matches: if fingerprint matches its a duplicate cert
|
H A D | c_rehash.bak | 80 my ($cert, $crl) = check_file($fname); 81 if(!$cert && !$crl) { 85 link_hash_cert($fname) if($cert); 128 # Hash matches: if fingerprint matches its a duplicate cert 163 # Hash matches: if fingerprint matches its a duplicate cert
|
H A D | c_rehash.in | 80 my ($cert, $crl) = check_file($fname); 81 if(!$cert && !$crl) { 85 link_hash_cert($fname) if($cert); 128 # Hash matches: if fingerprint matches its a duplicate cert 163 # Hash matches: if fingerprint matches its a duplicate cert
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | testssl.com | 18 $ cert="[-.apps]server.pem" 20 $ cert=p2 22 $ ssltest := mcr 'texe_dir'ssltest -key 'key' -cert 'cert' -c_key 'key' -c_cert 'cert' 27 $ mcr 'exe_dir'openssl x509 -in 'cert' -text -noout 184 $ mcr 'texe_dir'ssltest -v -bio_pair -tls1 -cert [-.apps]server2.pem -no_dhe -num 10 -f -time 192 $ mcr 'texe_dir'ssltest -v -bio_pair -tls1 -cert [-.apps]server2.pem -dhe1024dsa -num 10 -f -time
|
H A D | testssl | 9 cert=../apps/server.pem 11 cert="$2" 13 ssltest="../util/shlib_wrap.sh ./ssltest -key $key -cert $cert -c_key $key -c_cert $cert" 15 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then 135 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1 141 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
|