Searched refs:cert (Results 1 - 25 of 165) sorted by relevance

1234567

/freebsd-10.0-release/crypto/openssl/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dtest_ca.in62 --certificate="FILE:cert-ee.pem" || exit 1
66 cert:FILE:cert-ee.pem \
69 echo "issue crl (no cert)"
76 cert:FILE:cert-ee.pem \
80 echo "issue crl (with cert)"
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert
[all...]
H A Dtest_cert.in61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
68 echo "verify n0ll cert (fail)"
71 cert:FILE:$srcdir/data/n0ll.pem \
74 echo "verify n0ll cert (fai
[all...]
H A Dtest_chain.in50 echo "cert -> root"
52 cert:FILE:$srcdir/data/test.crt \
57 echo "cert -> root"
59 cert:FILE:$srcdir/data/test.crt \
63 echo "cert -> root"
65 cert:FILE:$srcdir/data/test.crt \
68 echo "sub-cert -> root"
70 cert:FILE:$srcdir/data/sub-cert.crt \
74 echo "sub-cert
[all...]
H A Dtest_pkcs11.in44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
H A Dpeer.c96 if (peer->cert)
97 hx509_cert_free(peer->cert);
107 * @param cert cerificate of the remote peer.
116 hx509_cert cert)
118 if (peer->cert)
119 hx509_cert_free(peer->cert);
120 peer->cert = hx509_cert_ref(cert);
115 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
H A Dcert.c191 _hx509_get_cert(hx509_cert cert) argument
193 return cert->data;
212 * @param cert
220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument
224 *cert = malloc(sizeof(**cert));
225 if (*cert == NULL)
227 (*cert)->ref = 1;
228 (*cert)->friendlyname = NULL;
229 (*cert)
271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument
298 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument
310 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument
328 hx509_cert_free(hx509_cert cert) argument
373 hx509_cert_ref(hx509_cert cert) argument
587 find_extension(const Certificate *cert, const heim_oid *oid, size_t *idx) argument
659 find_extension_subject_alt_name(const Certificate *cert, size_t *i, GeneralNames *sa) argument
677 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument
749 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument
794 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument
844 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument
853 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, size_t depth) argument
998 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument
1021 certificate_is_self_signed(hx509_context context, const Certificate *cert, int *self_signed) argument
1143 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument
1189 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument
1235 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument
1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument
1973 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument
2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument
2545 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument
2591 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument
2612 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument
2634 hx509_cert_get_friendly_name(hx509_cert cert) argument
2945 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument
3266 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument
3303 Certificate *cert; local
3327 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument
3417 _hx509_cert_to_env(hx509_context context, hx509_cert cert, hx509_env *env) argument
3564 hx509_print_cert(hx509_context context, hx509_cert cert, FILE *out) argument
[all...]
H A Dks_null.c63 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
65 *cert = NULL;
62 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
H A Dtest_nist.in63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do
97 args="$args cert:FILE:$nistdir/certs/$cert"
101 echo "verify passed on fail: $id $cert"
106 echo "verify failed on pass: $id $cert"
H A Dtest_crypto.in52 echo "Bleichenbacher good cert (from eay)"
55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \
58 echo "Bleichenbacher bad cert (from eay)"
61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \
64 echo "Bleichenbacher good cert (from yutaka)"
67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \
70 echo "Bleichenbacher bad cert (from yutaka)"
73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
98 cert = PEM_read_X509(inf, NULL, NULL);
99 if(!cert) {
105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
106 cert->cert_info->extensions = NULL;
108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
114 count = X509_get_ext_count(cert);
117 ext = X509_get_ext(cert, i);
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member in struct:tlsv1_credentials
27 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
30 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
H A Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) argument
47 if (cert == NULL)
49 if (cert->next) {
52 cert, cert->next);
54 x509_free_name(&cert->issuer);
55 x509_free_name(&cert->subject);
56 os_free(cert->public_key);
57 os_free(cert
66 x509_certificate_chain_free(struct x509_certificate *cert) argument
219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
651 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
725 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
762 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1024 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1051 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1078 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1107 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1189 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1219 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1479 struct x509_certificate *cert; local
1581 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1794 x509_valid_issuer(const struct x509_certificate *cert) argument
1835 struct x509_certificate *cert, *trust; local
1962 struct x509_certificate *cert; local
1977 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
H A Dx509v3.h108 void x509_certificate_free(struct x509_certificate *cert);
112 void x509_certificate_chain_free(struct x509_certificate *cert);
114 struct x509_certificate *cert);
121 int x509_certificate_self_signed(struct x509_certificate *cert);
/freebsd-10.0-release/crypto/openssh/regress/
H A Dcert-hostkey.sh1 # $OpenBSD: cert-hostkey.sh,v 1.7 2013/05/17 00:37:40 dtucker Exp $
12 rm -f $OBJ/known_hosts-cert $OBJ/host_ca_key* $OBJ/cert_host_key*
21 printf '@cert-authority '
24 ) > $OBJ/known_hosts-cert
28 verbose "$tid: sign host ${ktype} cert"
50 verbose "$tid: host ${ktype} cert connect privsep $privsep"
54 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub
58 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
59 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \
62 fail "ssh cert connec
[all...]
/freebsd-10.0-release/contrib/ldns/ldns/
H A Ddane.h123 * \param[in] cert The certificate from which the data is selected
129 ldns_status ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
135 * Selects the certificate from cert, extra_certs or the pkix_validation_store
138 * \param[out] selected_cert The selected cert.
139 * \param[in] cert The certificate to validate (or not)
163 X509* cert, STACK_OF(X509)* extra_certs,
176 * \param[in] cert The certificate which data will be represented
184 X509* cert);
197 * \param[in] cert The certificate to match (and validate)
210 X509* cert, STACK_O
[all...]
/freebsd-10.0-release/contrib/ldns/
H A Ddane.c72 ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, argument
85 assert(cert != NULL);
90 len = (size_t)i2d_X509(cert, &buf);
96 xpubkey = X509_get_X509_PUBKEY(cert);
157 /* Ordinary PKIX validation of cert (with extra_certs to help)
161 ldns_dane_pkix_validate(X509* cert, STACK_OF(X509)* extra_certs, argument
176 cert, extra_certs) != 1) {
191 /* Orinary PKIX validation of cert (with extra_certs to help)
195 ldns_dane_pkix_validate_and_get_chain(STACK_OF(X509)** chain, X509* cert,
214 cert, extra_cert
282 ldns_dane_get_nth_cert_from_validation_chain( X509** cert, STACK_OF(X509)* chain, int n, bool ca) argument
304 ldns_dane_pkix_get_last_self_signed(X509** out_cert, X509* cert, STACK_OF(X509)* extra_certs) argument
343 ldns_dane_select_certificate(X509** selected_cert, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store, ldns_tlsa_certificate_usage cert_usage, int offset) argument
449 ldns_dane_create_tlsa_rr(ldns_rr** tlsa, ldns_tlsa_certificate_usage certificate_usage, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, X509* cert) argument
536 ldns_dane_match_cert_with_data(X509* cert, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, ldns_rdf* data) argument
565 X509* cert; local
592 ldns_dane_verify_rr(const ldns_rr* tlsa_rr, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument
697 ldns_dane_verify(ldns_rr_list* tlsas, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/asn1/
H A Dx_nx509.c68 ASN1_OPT(NETSCAPE_X509, cert, X509)
/freebsd-10.0-release/contrib/apr-util/ldap/
H A Dapr_ldap_init.c77 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(pool, sizeof(apr_ldap_opt_tls_cert_t)); local
78 cert->type = cert_file_type;
79 cert->path = cert_auth_file;
80 return apr_ldap_set_option(pool, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, result_err);
/freebsd-10.0-release/crypto/openssh/
H A Dssh-add.c101 Key *public = NULL, *cert = NULL; local
122 xasprintf(&certpath, "%s-cert.pub", filename);
123 if ((cert = key_load_public(certpath, &comment)) == NULL)
125 if (!key_equal_public(cert, public))
129 if (ssh_remove_identity(ac, cert)) {
137 if (cert != NULL)
138 key_free(cert);
169 Key *private, *cert; local
247 /* Skip trying to load the cert if requested */
252 xasprintf(&certpath, "%s-cert
[all...]
H A Dkey.c63 struct KeyCert *cert; local
65 cert = xcalloc(1, sizeof(*cert));
66 buffer_init(&cert->certblob);
67 buffer_init(&cert->critical);
68 buffer_init(&cert->extensions);
69 cert->key_id = NULL;
70 cert->principals = NULL;
71 cert->signature_key = NULL;
72 return cert;
183 cert_free(struct KeyCert *cert) argument
911 int cert; member in struct:keytype
[all...]
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dssl_cert.c163 static void ssl_cert_set_default_md(CERT *cert) argument
167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
196 CERT *ssl_cert_dup(CERT *cert) argument
210 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
211 /* or ret->key = ret->pkeys + (cert->key - cert
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if(!pkey && !cert && !ca)
118 if (pkey && cert)
120 if(!X509_check_private_key(cert, pkey))
122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
125 if (cert)
127 bag = PKCS12_add_cert(&bags, cert);
198 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
207 if(!(bag = PKCS12_x5092certbag(cert)))
214 name = (char *)X509_alias_get0(cert,
[all...]
/freebsd-10.0-release/contrib/apr-util/test/
H A Dtestldap.c112 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(p, sizeof(apr_ldap_opt_tls_cert_t)); local
124 cert->type = APR_LDAP_CA_TYPE_DER;
125 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL);
126 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);
130 cert->type = APR_LDAP_CA_TYPE_BASE64;
131 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL);
132 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);

Completed in 114 milliseconds

1234567