/freebsd-13-stable/crypto/openssh/regress/unittests/authopt/testdata/ |
H A D | mktestdata.sh | 7 rm -f *.cert 18 mv user_key-cert.pub "$output" 21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \ 23 sign no_permit.cert -Oclear 25 sign no_agentfwd.cert -Ono-agent-forwarding 26 sign no_portfwd.cert -Ono-port-forwarding 27 sign no_pty.cert -Ono-pty 28 sign no_user_rc.cert -Ono-user-rc 29 sign no_x11fwd.cert -Ono-X11-forwarding 31 sign only_agentfwd.cert [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert [all...] |
H A D | test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1 68 echo "verify n0ll cert (fail)" 71 cert:FILE:$srcdir/data/n0ll.pem \ 74 echo "verify n0ll cert (fai [all...] |
H A D | test_chain.in | 50 echo "cert -> root" 52 cert:FILE:$srcdir/data/test.crt \ 57 echo "cert -> root" 59 cert:FILE:$srcdir/data/test.crt \ 63 echo "cert -> root" 65 cert:FILE:$srcdir/data/test.crt \ 68 echo "sub-cert -> root" 70 cert:FILE:$srcdir/data/sub-cert.crt \ 74 echo "sub-cert [all...] |
H A D | test_pkcs11.in | 44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key 54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
|
H A D | peer.c | 96 if (peer->cert) 97 hx509_cert_free(peer->cert); 107 * @param cert cerificate of the remote peer. 116 hx509_cert cert) 118 if (peer->cert) 119 hx509_cert_free(peer->cert); 120 peer->cert = hx509_cert_ref(cert); 115 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
|
H A D | cert.c | 191 _hx509_get_cert(hx509_cert cert) argument 193 return cert->data; 212 * @param cert 220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument 224 *cert = malloc(sizeof(**cert)); 225 if (*cert == NULL) 227 (*cert)->ref = 1; 228 (*cert)->friendlyname = NULL; 229 (*cert) 271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument 298 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument 310 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument 328 hx509_cert_free(hx509_cert cert) argument 373 hx509_cert_ref(hx509_cert cert) argument 587 find_extension(const Certificate *cert, const heim_oid *oid, size_t *idx) argument 659 find_extension_subject_alt_name(const Certificate *cert, size_t *i, GeneralNames *sa) argument 677 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument 749 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument 794 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument 844 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument 853 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, size_t depth) argument 998 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument 1021 certificate_is_self_signed(hx509_context context, const Certificate *cert, int *self_signed) argument 1143 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument 1189 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument 1235 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument 1973 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument 2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument 2545 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument 2591 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument 2612 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument 2634 hx509_cert_get_friendly_name(hx509_cert cert) argument 2945 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument 3266 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument 3303 Certificate *cert; local 3327 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument 3417 _hx509_cert_to_env(hx509_context context, hx509_cert cert, hx509_env *env) argument 3564 hx509_print_cert(hx509_context context, hx509_cert cert, FILE *out) argument [all...] |
H A D | ks_null.c | 63 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 65 *cert = NULL; 62 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | test_nist.in | 63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do 97 args="$args cert:FILE:$nistdir/certs/$cert" 101 echo "verify passed on fail: $id $cert" 106 echo "verify failed on pass: $id $cert"
|
H A D | test_crypto.in | 52 echo "Bleichenbacher good cert (from eay)" 55 cert:FILE:$srcdir/data/bleichenbacher-good.pem \ 58 echo "Bleichenbacher bad cert (from eay)" 61 cert:FILE:$srcdir/data/bleichenbacher-bad.pem \ 64 echo "Bleichenbacher good cert (from yutaka)" 67 cert:FILE:$srcdir/data/yutaka-pad-ok-cert.pem \ 70 echo "Bleichenbacher bad cert (from yutaka)" 73 cert:FILE:$srcdir/data/yutaka-pad-broken-cert [all...] |
/freebsd-13-stable/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 1 # $OpenBSD: cert-hostkey.sh,v 1.16 2018/07/03 11:43:49 djm Exp $ 6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_* 18 *rsa*cert*) 19 types="rsa-sha2-256-cert-v01@openssh.com,$i,$types" 20 types="rsa-sha2-512-cert-v01@openssh.com,$types";; 24 *cert*) types="$i,$types";; 42 printf "@cert-authority $HOSTS " 60 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig 61 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
/freebsd-13-stable/crypto/openssl/crypto/ct/ |
H A D | ct_policy.c | 48 X509_free(ctx->cert); 53 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) argument 55 if (!X509_up_ref(cert)) 57 ctx->cert = cert; 82 return ctx->cert;
|
H A D | ct_sct_ctx.c | 46 * Finds the index of the first extension with the given NID in cert. 50 static int ct_x509_get_ext(X509 *cert, int nid, int *is_duplicated) argument 52 int ret = X509_get_ext_by_NID(cert, nid, -1); 55 *is_duplicated = ret >= 0 && X509_get_ext_by_NID(cert, nid, ret) >= 0; 65 __owur static int ct_x509_cert_fixup(X509 *cert, X509 *presigner) argument 75 certidx = ct_x509_get_ext(cert, NID_authority_key_identifier, 90 if (!X509_set_issuer_name(cert, X509_get_issuer_name(presigner))) 95 X509_EXTENSION *certext = X509_get_ext(cert, certidx); 109 int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner) argument 116 int poison_idx = ct_x509_get_ext(cert, NID_ct_precert_poiso [all...] |
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) argument 47 if (cert == NULL) 49 if (cert->next) { 52 cert, cert->next); 54 x509_free_name(&cert->issuer); 55 x509_free_name(&cert->subject); 56 os_free(cert->public_key); 57 os_free(cert 67 x509_certificate_chain_free(struct x509_certificate *cert) argument 219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 692 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 775 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 812 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1069 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1096 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1172 x509_parse_ext_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1229 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument 1259 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument 1336 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1366 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 1657 struct x509_certificate *cert; local 1758 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument 2022 x509_valid_issuer(const struct x509_certificate *cert) argument 2063 struct x509_certificate *cert, *trust; local 2192 struct x509_certificate *cert; local 2207 x509_certificate_self_signed(struct x509_certificate *cert) argument [all...] |
H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member in struct:tlsv1_credentials 35 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 38 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | dane.h | 140 * \param[in] cert The certificate from which the data is selected 146 ldns_status ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, 152 * Selects the certificate from cert, extra_certs or the pkix_validation_store 155 * \param[out] selected_cert The selected cert. 156 * \param[in] cert The certificate to validate (or not) 180 X509* cert, STACK_OF(X509)* extra_certs, 193 * \param[in] cert The certificate which data will be represented 201 X509* cert); 228 * \param[in] cert The certificate to match (and validate) 243 X509* cert, STACK_O [all...] |
/freebsd-13-stable/contrib/ldns/ |
H A D | dane.c | 77 ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, argument 90 assert(cert != NULL); 95 len = (size_t)i2d_X509(cert, &buf); 101 xpubkey = X509_get_X509_PUBKEY(cert); 162 /* Ordinary PKIX validation of cert (with extra_certs to help) 166 ldns_dane_pkix_validate(X509* cert, STACK_OF(X509)* extra_certs, argument 181 cert, extra_certs) != 1) { 196 /* Orinary PKIX validation of cert (with extra_certs to help) 200 ldns_dane_pkix_validate_and_get_chain(STACK_OF(X509)** chain, X509* cert, 219 cert, extra_cert 287 ldns_dane_get_nth_cert_from_validation_chain( X509** cert, STACK_OF(X509)* chain, int n, bool ca) argument 309 ldns_dane_pkix_get_last_self_signed(X509** out_cert, X509* cert, STACK_OF(X509)* extra_certs) argument 348 ldns_dane_select_certificate(X509** selected_cert, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store, ldns_tlsa_certificate_usage cert_usage, int offset) argument 454 ldns_dane_create_tlsa_rr(ldns_rr** tlsa, ldns_tlsa_certificate_usage certificate_usage, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, X509* cert) argument 543 ldns_dane_match_cert_with_data(X509* cert, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, ldns_rdf* data) argument 572 X509* cert; local 601 ldns_dane_verify_rr(const ldns_rr* tlsa_rr, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument 784 ldns_dane_verify(const ldns_rr_list* tlsas, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store) argument [all...] |
/freebsd-13-stable/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlscommon.h | 35 int rpctls_checkhost(struct sockaddr *sad, X509 *cert, 55 X509 *cert; member in struct:ssl_entry
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_cert.c | 74 CERT *ssl_cert_dup(CERT *cert) argument 85 ret->key = &ret->pkeys[cert->key - cert->pkeys]; 93 if (cert->dh_tmp != NULL) { 94 ret->dh_tmp = cert->dh_tmp; 97 ret->dh_tmp_cb = cert->dh_tmp_cb; 98 ret->dh_tmp_auto = cert->dh_tmp_auto; 102 CERT_PKEY *cpk = cert->pkeys + i; 121 if (cert->pkeys[i].serverinfo != NULL) { 124 OPENSSL_malloc(cert [all...] |
/freebsd-13-stable/contrib/apr-util/ldap/ |
H A D | apr_ldap_init.c | 77 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(pool, sizeof(apr_ldap_opt_tls_cert_t)); local 78 cert->type = cert_file_type; 79 cert->path = cert_auth_file; 80 return apr_ldap_set_option(pool, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, result_err);
|
/freebsd-13-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 397 ASSERT_PTR_NE(k1->cert, NULL); 398 k1->cert->type = SSH2_CERT_TYPE_USER; 399 k1->cert->serial = 1234; 400 k1->cert->key_id = strdup("estragon"); 401 ASSERT_PTR_NE(k1->cert->key_id, NULL); 402 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); 403 ASSERT_PTR_NE(k1->cert->principals, NULL); 404 k1->cert->principals[0] = strdup("estragon"); 405 k1->cert [all...] |
/freebsd-13-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 31 PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, argument 57 if (!pkey && !cert && !ca) { 62 if (pkey && cert) { 63 if (!X509_check_private_key(cert, pkey)) 65 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) 69 if (cert) { 70 bag = PKCS12_add_cert(&bags, cert); 135 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 144 if ((bag = PKCS12_SAFEBAG_create_cert(cert)) == NULL) 151 name = (char *)X509_alias_get0(cert, [all...] |
/freebsd-13-stable/contrib/apr-util/test/ |
H A D | testldap.c | 112 apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_pcalloc(p, sizeof(apr_ldap_opt_tls_cert_t)); local 124 cert->type = APR_LDAP_CA_TYPE_DER; 125 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL); 126 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result); 130 cert->type = APR_LDAP_CA_TYPE_BASE64; 131 cert->path = apr_pstrcat (p, DIRNAME, "/", dirent.name, NULL); 132 apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT, (void *)cert, &result);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | sshkey.c | 92 int cert; member in struct:keytype 97 { "ssh-ed25519-cert-v01@openssh.com", "ED25519-CERT", NULL, 101 { "ssh-xmss-cert-v01@openssh.com", "XMSS-CERT", NULL, 119 { "ssh-rsa-cert-v01@openssh.com", "RSA-CERT", NULL, 121 { "rsa-sha2-256-cert-v01@openssh.com", "RSA-CERT", 123 { "rsa-sha2-512-cert-v01@openssh.com", "RSA-CERT", 125 { "ssh-dss-cert-v01@openssh.com", "DSA-CERT", NULL, 128 { "ecdsa-sha2-nistp256-cert-v01@openssh.com", "ECDSA-CERT", NULL, 130 { "ecdsa-sha2-nistp384-cert-v01@openssh.com", "ECDSA-CERT", NULL, 133 { "ecdsa-sha2-nistp521-cert 447 cert_free(struct sshkey_cert *cert) argument 468 struct sshkey_cert *cert; local 2517 struct sshbuf *cert = NULL; local 2731 sshkey_format_cert_validity(const struct sshkey_cert *cert, char *s, size_t l) argument [all...] |