/freebsd-9.3-release/crypto/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert [all...] |
H A D | test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
|
H A D | peer.c | 95 if (peer->cert) 96 hx509_cert_free(peer->cert); 106 * @param cert cerificate of the remote peer. 115 hx509_cert cert) 117 if (peer->cert) 118 hx509_cert_free(peer->cert); 119 peer->cert = hx509_cert_ref(cert); 114 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
|
H A D | test_chain.in | 50 echo "cert -> root" 52 cert:FILE:$srcdir/data/test.crt \ 57 echo "cert -> root" 59 cert:FILE:$srcdir/data/test.crt \ 63 echo "cert -> root" 65 cert:FILE:$srcdir/data/test.crt \ 68 echo "sub-cert -> root" 70 cert:FILE:$srcdir/data/sub-cert.crt \ 74 echo "sub-cert [all...] |
H A D | test_pkcs11.in | 44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key 54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
|
H A D | cert.c | 35 RCSID("$Id: cert.c 22450 2008-01-15 19:39:14Z lha $"); 191 _hx509_get_cert(hx509_cert cert) argument 193 return cert->data; 212 * @param cert 220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument 224 *cert = malloc(sizeof(**cert)); 225 if (*cert == NULL) 227 (*cert)->ref = 1; 228 (*cert) 271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument 297 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument 309 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument 327 hx509_cert_free(hx509_cert cert) argument 372 hx509_cert_ref(hx509_cert cert) argument 567 find_extension(const Certificate *cert, const heim_oid *oid, int *idx) argument 639 find_extension_subject_alt_name(const Certificate *cert, int *i, GeneralNames *sa) argument 657 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument 729 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument 775 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument 824 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument 833 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, int depth) argument 971 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument 994 certificate_is_self_signed(const Certificate *cert) argument 1105 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument 1150 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument 1196 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 1863 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument 2273 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument 2349 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument 2395 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument 2416 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument 2438 hx509_cert_get_friendly_name(hx509_cert cert) argument 2669 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument 2966 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument 3002 Certificate *cert; local 3025 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument [all...] |
H A D | ks_null.c | 64 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 66 *cert = NULL; 63 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
|
H A D | test_nist.in | 63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do 97 args="$args cert:FILE:$nistdir/certs/$cert" 101 echo "verify passed on fail: $id $cert" 106 echo "verify failed on pass: $id $cert"
|
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 99 cert = PEM_read_X509(inf, NULL, NULL); 100 if (!cert) { 106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 107 cert->cert_info->extensions = NULL; 109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 115 count = X509_get_ext_count(cert); 118 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 68 X509 *cert; local 75 fprintf(stderr, "Usage v3prin cert.pem\n"); 82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) { 88 count = X509_get_ext_count(cert); 91 ext = X509_get_ext(cert, i);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | cert_37.c | 33 dns_cert_t cert; local 48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 49 RETERR(uint16_tobuffer(cert, target)); 172 dns_rdata_cert_t *cert = source; local 176 REQUIRE(cert->common.rdtype == type); 177 REQUIRE(cert->common.rdclass == rdclass); 182 RETERR(uint16_tobuffer(cert->type, target)); 183 RETERR(uint16_tobuffer(cert->key_tag, target)); 184 RETERR(uint8_tobuffer(cert->algorithm, target)); 186 return (mem_tobuffer(target, cert 191 dns_rdata_cert_t *cert = target; local 222 dns_rdata_cert_t *cert = source; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_cred.h | 20 struct x509_certificate *cert; member in struct:tlsv1_credentials 33 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 36 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
H A D | x509v3.c | 49 * @cert: Certificate to be freed 51 void x509_certificate_free(struct x509_certificate *cert) argument 53 if (cert == NULL) 55 if (cert->next) { 58 cert, cert->next); 60 x509_free_name(&cert->issuer); 61 x509_free_name(&cert->subject); 62 os_free(cert->public_key); 63 os_free(cert 72 x509_certificate_chain_free(struct x509_certificate *cert) argument 225 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 657 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 731 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 768 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1030 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1057 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1084 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument 1113 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument 1195 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1225 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 1485 struct x509_certificate *cert; local 1587 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument 1800 x509_valid_issuer(const struct x509_certificate *cert) argument 1841 struct x509_certificate *cert, *trust; local 1967 struct x509_certificate *cert; local 1982 x509_certificate_self_signed(struct x509_certificate *cert) argument [all...] |
H A D | x509v3.h | 114 void x509_certificate_free(struct x509_certificate *cert); 118 void x509_certificate_chain_free(struct x509_certificate *cert); 120 struct x509_certificate *cert); 127 int x509_certificate_self_signed(struct x509_certificate *cert);
|
/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/ |
H A D | ssltest.sh | 61 # but ssltest expects a cert file and complains if it can't 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 99 -cert $SERVER_PEM -server_auth \ 104 -cert $SERVER_PEM -server_auth \ 116 -cert $SERVER_PEM -server_auth \ 121 -cert $SERVER_PEM -server_auth \ 131 -cert $SERVER_PEM -server_auth \ 149 -cert [all...] |
H A D | ECCcertgen.sh | 42 # 4. [Optional] One can combine the cert and private key into a single 66 # The certificate is written into $TEST_CA_FILE.cert.pem 72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 82 # Remove the cert request file (no longer needed) 102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in 106 # $TEST_SERVER_FILE.cert.pem 109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert [all...] |
H A D | RSAcertgen.sh | 39 # 4. [Optional] One can combine the cert and private key into a single 59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 69 # Remove the cert request file (no longer needed) 82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 94 # Remove the cert reques [all...] |
H A D | ECC-RSAcertgen.sh | 40 # 4. [Optional] One can combine the cert and private key into a single 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 60 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 63 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 70 # Remove the cert request file (no longer needed) 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 86 -out $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -CAcreateserial 89 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -text 92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert [all...] |
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | cert-hostkey.sh | 1 # $OpenBSD: cert-hostkey.sh,v 1.9 2014/01/26 10:22:10 djm Exp $ 6 rm -f $OBJ/known_hosts-cert $OBJ/host_ca_key* $OBJ/cert_host_key* 15 printf '@cert-authority ' 18 ) > $OBJ/known_hosts-cert 31 verbose "$tid: sign host ${ktype} cert" 43 verbose "$tid: sign host ${ktype}_v00 cert" 53 verbose "$tid: host ${ktype} cert connect privsep $privsep" 57 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub 61 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \ 62 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \ [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 67 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca); 70 int passlen, EVP_PKEY **pkey, X509 **cert, 75 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, 79 * Parse and decrypt a PKCS#12 structure returning user key, user cert and 81 * should point to a valid STACK structure. pkey and cert can be passed 85 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 107 if (cert) 108 *cert = NULL; 133 if (!parse_pk12(p12, pass, -1, pkey, cert, ca)) { 144 if (cert 154 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 211 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | cert.h | 18 /* $Id: cert.h,v 1.19 2007/06/19 23:47:16 tbox Exp $ */ 23 /*! \file dns/cert.h */ 49 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target); 51 * Put a textual representation of certificate type 'cert' into 'target'. 54 *\li 'cert' is a valid cert.
|
/freebsd-9.3-release/crypto/openssl/demos/pkcs12/ |
H A D | pkread.c | 15 X509 *cert; local 36 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { 50 if (cert) { 52 PEM_write_X509_AUX(fp, cert);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | key.c | 67 struct KeyCert *cert; local 69 cert = xcalloc(1, sizeof(*cert)); 70 buffer_init(&cert->certblob); 71 buffer_init(&cert->critical); 72 buffer_init(&cert->extensions); 73 cert->key_id = NULL; 74 cert->principals = NULL; 75 cert->signature_key = NULL; 76 return cert; 197 cert_free(struct KeyCert *cert) argument 956 int cert; member in struct:keytype 2472 u_char *cert; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/data/ |
H A D | gen-req.sh | 20 -out cert.req > /dev/null 2>/dev/null 26 -in cert.req \ 30 -out cert.crt 32 ln -s ca.crt `${openssl} x509 -hash -noout -in cert.crt`.0 40 -in cert.req \ 42 -out cert.crt \ 55 -cert $2.crt \ 57 -in cert.req \ 58 -out cert.crt \ 66 mv cert [all...] |