/freebsd-11-stable/crypto/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert [all...] |
H A D | test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1 68 echo "verify n0ll cert (fail)" 71 cert:FILE:$srcdir/data/n0ll.pem \ 74 echo "verify n0ll cert (fai [all...] |
H A D | test_chain.in | 50 echo "cert -> root" 52 cert:FILE:$srcdir/data/test.crt \ 57 echo "cert -> root" 59 cert:FILE:$srcdir/data/test.crt \ 63 echo "cert -> root" 65 cert:FILE:$srcdir/data/test.crt \ 68 echo "sub-cert -> root" 70 cert:FILE:$srcdir/data/sub-cert.crt \ 74 echo "sub-cert [all...] |
H A D | test_pkcs11.in | 44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key 54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
|
H A D | peer.c | 96 if (peer->cert) 97 hx509_cert_free(peer->cert); 107 * @param cert cerificate of the remote peer. 116 hx509_cert cert) 118 if (peer->cert) 119 hx509_cert_free(peer->cert); 120 peer->cert = hx509_cert_ref(cert); 115 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
|
H A D | cert.c | 191 _hx509_get_cert(hx509_cert cert) argument 193 return cert->data; 212 * @param cert 220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument 224 *cert = malloc(sizeof(**cert)); 225 if (*cert == NULL) 227 (*cert)->ref = 1; 228 (*cert)->friendlyname = NULL; 229 (*cert) 271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument 298 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument 310 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument 328 hx509_cert_free(hx509_cert cert) argument 373 hx509_cert_ref(hx509_cert cert) argument 587 find_extension(const Certificate *cert, const heim_oid *oid, size_t *idx) argument 659 find_extension_subject_alt_name(const Certificate *cert, size_t *i, GeneralNames *sa) argument 677 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument 749 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument 794 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument 844 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument 853 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, size_t depth) argument 998 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument 1021 certificate_is_self_signed(hx509_context context, const Certificate *cert, int *self_signed) argument 1143 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument 1189 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument 1235 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument 1973 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument 2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument 2545 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument 2591 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument 2612 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument 2634 hx509_cert_get_friendly_name(hx509_cert cert) argument 2945 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument 3266 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument 3303 Certificate *cert; local 3327 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument 3417 _hx509_cert_to_env(hx509_context context, hx509_cert cert, hx509_env *env) argument 3564 hx509_print_cert(hx509_context context, hx509_cert cert, FILE *out) argument [all...] |
H A D | ks_null.c | 63 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 65 *cert = NULL; 62 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | test_nist.in | 63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do 97 args="$args cert:FILE:$nistdir/certs/$cert" 101 echo "verify passed on fail: $id $cert" 106 echo "verify failed on pass: $id $cert"
|
H A D | test_crypto.in | 52 echo "Bleichenbacher good cert (from eay)" 55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \ 58 echo "Bleichenbacher bad cert (from eay)" 61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \ 64 echo "Bleichenbacher good cert (from yutaka)" 67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \ 70 echo "Bleichenbacher bad cert (from yutaka)" 73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert [all...] |
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 99 cert = PEM_read_X509(inf, NULL, NULL); 100 if (!cert) { 106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 107 cert->cert_info->extensions = NULL; 109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 115 count = X509_get_ext_count(cert); 118 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 68 X509 *cert; local 75 fprintf(stderr, "Usage v3prin cert.pem\n"); 82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) { 88 count = X509_get_ext_count(cert); 91 ext = X509_get_ext(cert, i);
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 1 # $OpenBSD: cert-hostkey.sh,v 1.14 2016/05/02 09:52:00 djm Exp $ 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 17 *cert*) types="$i,$types";; 35 printf "@cert-authority $HOSTS " 53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert 78 verbose "$tid: sign host ${ktype} cert" 95 $OBJ/cert_host_key_${ktype}-cert.pub || \ 97 cat $OBJ/cert_host_key_${ktype}-cert [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) argument 47 if (cert == NULL) 49 if (cert->next) { 52 cert, cert->next); 54 x509_free_name(&cert->issuer); 55 x509_free_name(&cert->subject); 56 os_free(cert->public_key); 57 os_free(cert 67 x509_certificate_chain_free(struct x509_certificate *cert) argument 219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 692 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 775 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 812 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1069 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1096 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1172 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1229 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument 1259 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument 1336 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1366 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 1657 struct x509_certificate *cert; local 1758 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument 2022 x509_valid_issuer(const struct x509_certificate *cert) argument 2063 struct x509_certificate *cert, *trust; local 2192 struct x509_certificate *cert; local 2207 x509_certificate_self_signed(struct x509_certificate *cert) argument [all...] |
H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member in struct:tlsv1_credentials 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | dane.h | 124 * \param[in] cert The certificate from which the data is selected 130 ldns_status ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, 136 * Selects the certificate from cert, extra_certs or the pkix_validation_store 139 * \param[out] selected_cert The selected cert. 140 * \param[in] cert The certificate to validate (or not) 164 X509* cert, STACK_OF(X509)* extra_certs, 177 * \param[in] cert The certificate which data will be represented 185 X509* cert); 198 * \param[in] cert The certificate to match (and validate) 211 X509* cert, STACK_O [all...] |
/freebsd-11-stable/contrib/ldns/ |
H A D | dane.c | 77 ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, argument 90 assert(cert != NULL); 95 len = (size_t)i2d_X509(cert, &buf); 101 xpubkey = X509_get_X509_PUBKEY(cert); 162 /* Ordinary PKIX validation of cert (with extra_certs to help) 166 ldns_dane_pkix_validate(X509* cert, STACK_OF(X509)* extra_certs, argument 181 cert, extra_certs) != 1) { 196 /* Orinary PKIX validation of cert (with extra_certs to help) 200 ldns_dane_pkix_validate_and_get_chain(STACK_OF(X509)** chain, X509* cert, 219 cert, extra_cert 287 ldns_dane_get_nth_cert_from_validation_chain( X509** cert, STACK_OF(X509)* chain, int n, bool ca) argument 309 ldns_dane_pkix_get_last_self_signed(X509** out_cert, X509* cert, STACK_OF(X509)* extra_certs) argument 348 ldns_dane_select_certificate(X509** selected_cert, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store, ldns_tlsa_certificate_usage cert_usage, int offset) argument 454 ldns_dane_create_tlsa_rr(ldns_rr** tlsa, ldns_tlsa_certificate_usage certificate_usage, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, X509* cert) argument 541 ldns_dane_match_cert_with_data(X509* cert, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, ldns_rdf* data) argument 570 X509* cert; local 597 ldns_dane_verify_rr(const ldns_rr* tlsa_rr, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument 702 ldns_dane_verify(ldns_rr_list* tlsas, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_nx509.c | 69 ASN1_OPT(NETSCAPE_X509, cert, X509)
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_cert.c | 185 void ssl_cert_set_default_md(CERT *cert) argument 189 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1(); 192 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 196 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1(); 217 CERT *ssl_cert_dup(CERT *cert) argument 231 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 233 * or ret->key = ret->pkeys + (cert->key - cert [all...] |
/freebsd-11-stable/contrib/apr-util/ldap/ |
H A D | apr_ldap_init.c | 77 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(pool, sizeof(apr_ldap_opt_tls_cert_t)); local 78 cert->type = cert_file_type; 79 cert->path = cert_auth_file; 80 return apr_ldap_set_option(pool, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, result_err);
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_lib.c | 449 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument 460 if (!X509_cmp(cch->d.certificate, cert)) { 471 cch->d.certificate = cert; 475 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument 478 r = CMS_add0_cert(cms, cert); 480 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509); 601 int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) argument 604 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); 607 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert)); 610 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument 618 cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) argument 639 cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 112 if (!pkey && !cert && !ca) { 117 if (pkey && cert) { 118 if (!X509_check_private_key(cert, pkey)) 120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 123 if (cert) { 124 bag = PKCS12_add_cert(&bags, cert); 193 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 202 if (!(bag = PKCS12_x5092certbag(cert))) 209 name = (char *)X509_alias_get0(cert, [all...] |
/freebsd-11-stable/contrib/apr-util/test/ |
H A D | testldap.c | 112 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(p, sizeof(apr_ldap_opt_tls_cert_t)); local 124 cert->type = APR_LDAP_CA_TYPE_DER; 125 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL); 126 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result); 130 cert->type = APR_LDAP_CA_TYPE_BASE64; 131 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL); 132 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);
|
/freebsd-11-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 432 ASSERT_PTR_NE(k1->cert, NULL); 433 k1->cert->type = SSH2_CERT_TYPE_USER; 434 k1->cert->serial = 1234; 435 k1->cert->key_id = strdup("estragon"); 436 ASSERT_PTR_NE(k1->cert->key_id, NULL); 437 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); 438 ASSERT_PTR_NE(k1->cert->principals, NULL); 439 k1->cert->principals[0] = strdup("estragon"); 440 k1->cert [all...] |