Searched refs:cert (Results 1 - 25 of 196) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssl/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dtest_ca.in62 --certificate="FILE:cert-ee.pem" || exit 1
66 cert:FILE:cert-ee.pem \
69 echo "issue crl (no cert)"
76 cert:FILE:cert-ee.pem \
80 echo "issue crl (with cert)"
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert
[all...]
H A Dtest_cert.in61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
68 echo "verify n0ll cert (fail)"
71 cert:FILE:$srcdir/data/n0ll.pem \
74 echo "verify n0ll cert (fai
[all...]
H A Dtest_chain.in50 echo "cert -> root"
52 cert:FILE:$srcdir/data/test.crt \
57 echo "cert -> root"
59 cert:FILE:$srcdir/data/test.crt \
63 echo "cert -> root"
65 cert:FILE:$srcdir/data/test.crt \
68 echo "sub-cert -> root"
70 cert:FILE:$srcdir/data/sub-cert.crt \
74 echo "sub-cert
[all...]
H A Dtest_pkcs11.in44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
H A Dpeer.c96 if (peer->cert)
97 hx509_cert_free(peer->cert);
107 * @param cert cerificate of the remote peer.
116 hx509_cert cert)
118 if (peer->cert)
119 hx509_cert_free(peer->cert);
120 peer->cert = hx509_cert_ref(cert);
115 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
H A Dcert.c191 _hx509_get_cert(hx509_cert cert) argument
193 return cert->data;
212 * @param cert
220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument
224 *cert = malloc(sizeof(**cert));
225 if (*cert == NULL)
227 (*cert)->ref = 1;
228 (*cert)->friendlyname = NULL;
229 (*cert)
271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument
298 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument
310 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument
328 hx509_cert_free(hx509_cert cert) argument
373 hx509_cert_ref(hx509_cert cert) argument
587 find_extension(const Certificate *cert, const heim_oid *oid, size_t *idx) argument
659 find_extension_subject_alt_name(const Certificate *cert, size_t *i, GeneralNames *sa) argument
677 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument
749 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument
794 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument
844 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument
853 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, size_t depth) argument
998 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument
1021 certificate_is_self_signed(hx509_context context, const Certificate *cert, int *self_signed) argument
1143 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument
1189 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument
1235 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument
1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument
1973 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument
2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument
2545 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument
2591 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument
2612 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument
2634 hx509_cert_get_friendly_name(hx509_cert cert) argument
2945 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument
3266 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument
3303 Certificate *cert; local
3327 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument
3417 _hx509_cert_to_env(hx509_context context, hx509_cert cert, hx509_env *env) argument
3564 hx509_print_cert(hx509_context context, hx509_cert cert, FILE *out) argument
[all...]
H A Dks_null.c63 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
65 *cert = NULL;
62 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
H A Dtest_nist.in63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do
97 args="$args cert:FILE:$nistdir/certs/$cert"
101 echo "verify passed on fail: $id $cert"
106 echo "verify failed on pass: $id $cert"
H A Dtest_crypto.in52 echo "Bleichenbacher good cert (from eay)"
55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \
58 echo "Bleichenbacher bad cert (from eay)"
61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \
64 echo "Bleichenbacher good cert (from yutaka)"
67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \
70 echo "Bleichenbacher bad cert (from yutaka)"
73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert
[all...]
/freebsd-11-stable/crypto/openssl/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
99 cert = PEM_read_X509(inf, NULL, NULL);
100 if (!cert) {
106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
107 cert->cert_info->extensions = NULL;
109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
115 count = X509_get_ext_count(cert);
118 ext = X509_get_ext(cert, i);
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/freebsd-11-stable/crypto/openssh/regress/
H A Dcert-hostkey.sh1 # $OpenBSD: cert-hostkey.sh,v 1.14 2016/05/02 09:52:00 djm Exp $
6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_*
17 *cert*) types="$i,$types";;
35 printf "@cert-authority $HOSTS "
53 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
54 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
78 verbose "$tid: sign host ${ktype} cert"
95 $OBJ/cert_host_key_${ktype}-cert.pub || \
97 cat $OBJ/cert_host_key_${ktype}-cert
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls_openssl.h16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dx509v3.c43 * @cert: Certificate to be freed
45 void x509_certificate_free(struct x509_certificate *cert) argument
47 if (cert == NULL)
49 if (cert->next) {
52 cert, cert->next);
54 x509_free_name(&cert->issuer);
55 x509_free_name(&cert->subject);
56 os_free(cert->public_key);
57 os_free(cert
67 x509_certificate_chain_free(struct x509_certificate *cert) argument
219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
692 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
775 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
812 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1069 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1096 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1172 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1229 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1259 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1336 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1366 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1657 struct x509_certificate *cert; local
1758 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
2022 x509_valid_issuer(const struct x509_certificate *cert) argument
2063 struct x509_certificate *cert, *trust; local
2192 struct x509_certificate *cert; local
2207 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
H A Dtlsv1_cred.h14 struct x509_certificate *cert; member in struct:tlsv1_credentials
35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
/freebsd-11-stable/contrib/ldns/ldns/
H A Ddane.h124 * \param[in] cert The certificate from which the data is selected
130 ldns_status ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
136 * Selects the certificate from cert, extra_certs or the pkix_validation_store
139 * \param[out] selected_cert The selected cert.
140 * \param[in] cert The certificate to validate (or not)
164 X509* cert, STACK_OF(X509)* extra_certs,
177 * \param[in] cert The certificate which data will be represented
185 X509* cert);
198 * \param[in] cert The certificate to match (and validate)
211 X509* cert, STACK_O
[all...]
/freebsd-11-stable/contrib/ldns/
H A Ddane.c77 ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, argument
90 assert(cert != NULL);
95 len = (size_t)i2d_X509(cert, &buf);
101 xpubkey = X509_get_X509_PUBKEY(cert);
162 /* Ordinary PKIX validation of cert (with extra_certs to help)
166 ldns_dane_pkix_validate(X509* cert, STACK_OF(X509)* extra_certs, argument
181 cert, extra_certs) != 1) {
196 /* Orinary PKIX validation of cert (with extra_certs to help)
200 ldns_dane_pkix_validate_and_get_chain(STACK_OF(X509)** chain, X509* cert,
219 cert, extra_cert
287 ldns_dane_get_nth_cert_from_validation_chain( X509** cert, STACK_OF(X509)* chain, int n, bool ca) argument
309 ldns_dane_pkix_get_last_self_signed(X509** out_cert, X509* cert, STACK_OF(X509)* extra_certs) argument
348 ldns_dane_select_certificate(X509** selected_cert, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store, ldns_tlsa_certificate_usage cert_usage, int offset) argument
454 ldns_dane_create_tlsa_rr(ldns_rr** tlsa, ldns_tlsa_certificate_usage certificate_usage, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, X509* cert) argument
541 ldns_dane_match_cert_with_data(X509* cert, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, ldns_rdf* data) argument
570 X509* cert; local
597 ldns_dane_verify_rr(const ldns_rr* tlsa_rr, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument
702 ldns_dane_verify(ldns_rr_list* tlsas, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dx_nx509.c69 ASN1_OPT(NETSCAPE_X509, cert, X509)
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_cert.c185 void ssl_cert_set_default_md(CERT *cert) argument
189 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
192 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
196 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
217 CERT *ssl_cert_dup(CERT *cert) argument
231 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
233 * or ret->key = ret->pkeys + (cert->key - cert
[all...]
/freebsd-11-stable/contrib/apr-util/ldap/
H A Dapr_ldap_init.c77 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(pool, sizeof(apr_ldap_opt_tls_cert_t)); local
78 cert->type = cert_file_type;
79 cert->path = cert_auth_file;
80 return apr_ldap_set_option(pool, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, result_err);
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_lib.c449 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument
460 if (!X509_cmp(cch->d.certificate, cert)) {
471 cch->d.certificate = cert;
475 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument
478 r = CMS_add0_cert(cms, cert);
480 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
601 int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) argument
604 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert));
607 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert));
610 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument
618 cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) argument
639 cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if (!pkey && !cert && !ca) {
117 if (pkey && cert) {
118 if (!X509_check_private_key(cert, pkey))
120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
123 if (cert) {
124 bag = PKCS12_add_cert(&bags, cert);
193 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
202 if (!(bag = PKCS12_x5092certbag(cert)))
209 name = (char *)X509_alias_get0(cert,
[all...]
/freebsd-11-stable/contrib/apr-util/test/
H A Dtestldap.c112 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(p, sizeof(apr_ldap_opt_tls_cert_t)); local
124 cert->type = APR_LDAP_CA_TYPE_DER;
125 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL);
126 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);
130 cert->type = APR_LDAP_CA_TYPE_BASE64;
131 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL);
132 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);
/freebsd-11-stable/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c432 ASSERT_PTR_NE(k1->cert, NULL);
433 k1->cert->type = SSH2_CERT_TYPE_USER;
434 k1->cert->serial = 1234;
435 k1->cert->key_id = strdup("estragon");
436 ASSERT_PTR_NE(k1->cert->key_id, NULL);
437 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals));
438 ASSERT_PTR_NE(k1->cert->principals, NULL);
439 k1->cert->principals[0] = strdup("estragon");
440 k1->cert
[all...]

Completed in 147 milliseconds

12345678