Searched refs:cert (Results 1 - 25 of 157) sorted by relevance

1234567

/freebsd-9.3-release/crypto/openssl/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dtest_ca.in62 --certificate="FILE:cert-ee.pem" || exit 1
66 cert:FILE:cert-ee.pem \
69 echo "issue crl (no cert)"
76 cert:FILE:cert-ee.pem \
80 echo "issue crl (with cert)"
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert
[all...]
H A Dtest_cert.in61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
H A Dpeer.c95 if (peer->cert)
96 hx509_cert_free(peer->cert);
106 * @param cert cerificate of the remote peer.
115 hx509_cert cert)
117 if (peer->cert)
118 hx509_cert_free(peer->cert);
119 peer->cert = hx509_cert_ref(cert);
114 hx509_peer_info_set_cert(hx509_peer_info peer, hx509_cert cert) argument
H A Dtest_chain.in50 echo "cert -> root"
52 cert:FILE:$srcdir/data/test.crt \
57 echo "cert -> root"
59 cert:FILE:$srcdir/data/test.crt \
63 echo "cert -> root"
65 cert:FILE:$srcdir/data/test.crt \
68 echo "sub-cert -> root"
70 cert:FILE:$srcdir/data/sub-cert.crt \
74 echo "sub-cert
[all...]
H A Dtest_pkcs11.in44 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test.key
54 certificate cert User certificate FILE:$srcdir/data/test.crt,$srcdir/data/test-pw.key
H A Dcert.c35 RCSID("$Id: cert.c 22450 2008-01-15 19:39:14Z lha $");
191 _hx509_get_cert(hx509_cert cert) argument
193 return cert->data;
212 * @param cert
220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) argument
224 *cert = malloc(sizeof(**cert));
225 if (*cert == NULL)
227 (*cert)->ref = 1;
228 (*cert)
271 hx509_cert_init_data(hx509_context context, const void *ptr, size_t len, hx509_cert *cert) argument
297 _hx509_cert_set_release(hx509_cert cert, _hx509_cert_release_func release, void *ctx) argument
309 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument
327 hx509_cert_free(hx509_cert cert) argument
372 hx509_cert_ref(hx509_cert cert) argument
567 find_extension(const Certificate *cert, const heim_oid *oid, int *idx) argument
639 find_extension_subject_alt_name(const Certificate *cert, int *i, GeneralNames *sa) argument
657 find_extension_eku(const Certificate *cert, ExtKeyUsage *eku) argument
729 hx509_cert_find_subjectAltName_otherName(hx509_context context, hx509_cert cert, const heim_oid *oid, hx509_octet_string_list *list) argument
775 check_key_usage(hx509_context context, const Certificate *cert, unsigned flags, int req_present) argument
824 _hx509_check_key_usage(hx509_context context, hx509_cert cert, unsigned flags, int req_present) argument
833 check_basic_constraints(hx509_context context, const Certificate *cert, enum certtype type, int depth) argument
971 certificate_is_anchor(hx509_context context, hx509_certs trust_anchors, const hx509_cert cert) argument
994 certificate_is_self_signed(const Certificate *cert) argument
1105 is_proxy_cert(hx509_context context, const Certificate *cert, ProxyCertInfo *rinfo) argument
1150 _hx509_path_append(hx509_context context, hx509_path *path, hx509_cert cert) argument
1196 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument
1863 hx509_verify_path(hx509_context context, hx509_verify_ctx ctx, hx509_cert cert, hx509_certs pool) argument
2273 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument
2349 _hx509_set_cert_attribute(hx509_context context, hx509_cert cert, const heim_oid *oid, const heim_octet_string *attr) argument
2395 hx509_cert_get_attribute(hx509_cert cert, const heim_oid *oid) argument
2416 hx509_cert_set_friendly_name(hx509_cert cert, const char *name) argument
2438 hx509_cert_get_friendly_name(hx509_cert cert) argument
2669 _hx509_query_match_cert(hx509_context context, const hx509_query *q, hx509_cert cert) argument
2966 hx509_cert_check_eku(hx509_context context, hx509_cert cert, const heim_oid *eku, int allow_any_eku) argument
3002 Certificate *cert; local
3025 _hx509_cert_get_eku(hx509_context context, hx509_cert cert, ExtKeyUsage *e) argument
[all...]
H A Dks_null.c64 hx509_certs certs, void *data, void *iter, hx509_cert *cert)
66 *cert = NULL;
63 null_iter(hx509_context context, hx509_certs certs, void *data, void *iter, hx509_cert *cert) argument
H A Dtest_nist.in63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do
97 args="$args cert:FILE:$nistdir/certs/$cert"
101 echo "verify passed on fail: $id $cert"
106 echo "verify failed on pass: $id $cert"
/freebsd-9.3-release/crypto/openssl/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
99 cert = PEM_read_X509(inf, NULL, NULL);
100 if (!cert) {
106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
107 cert->cert_info->extensions = NULL;
109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
115 count = X509_get_ext_count(cert);
118 ext = X509_get_ext(cert, i);
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dcert_37.c33 dns_cert_t cert; local
48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
49 RETERR(uint16_tobuffer(cert, target));
172 dns_rdata_cert_t *cert = source; local
176 REQUIRE(cert->common.rdtype == type);
177 REQUIRE(cert->common.rdclass == rdclass);
182 RETERR(uint16_tobuffer(cert->type, target));
183 RETERR(uint16_tobuffer(cert->key_tag, target));
184 RETERR(uint8_tobuffer(cert->algorithm, target));
186 return (mem_tobuffer(target, cert
191 dns_rdata_cert_t *cert = target; local
222 dns_rdata_cert_t *cert = source; local
[all...]
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_cred.h20 struct x509_certificate *cert; member in struct:tlsv1_credentials
33 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
36 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
H A Dx509v3.c49 * @cert: Certificate to be freed
51 void x509_certificate_free(struct x509_certificate *cert) argument
53 if (cert == NULL)
55 if (cert->next) {
58 cert, cert->next);
60 x509_free_name(&cert->issuer);
61 x509_free_name(&cert->subject);
62 os_free(cert->public_key);
63 os_free(cert
72 x509_certificate_chain_free(struct x509_certificate *cert) argument
225 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
657 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
731 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
768 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1030 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1057 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1084 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1113 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1195 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1225 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1485 struct x509_certificate *cert; local
1587 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1800 x509_valid_issuer(const struct x509_certificate *cert) argument
1841 struct x509_certificate *cert, *trust; local
1967 struct x509_certificate *cert; local
1982 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
H A Dx509v3.h114 void x509_certificate_free(struct x509_certificate *cert);
118 void x509_certificate_chain_free(struct x509_certificate *cert);
120 struct x509_certificate *cert);
127 int x509_certificate_self_signed(struct x509_certificate *cert);
/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/
H A Dssltest.sh61 # but ssltest expects a cert file and complains if it can't
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
99 -cert $SERVER_PEM -server_auth \
104 -cert $SERVER_PEM -server_auth \
116 -cert $SERVER_PEM -server_auth \
121 -cert $SERVER_PEM -server_auth \
131 -cert $SERVER_PEM -server_auth \
149 -cert
[all...]
H A DECCcertgen.sh42 # 4. [Optional] One can combine the cert and private key into a single
66 # The certificate is written into $TEST_CA_FILE.cert.pem
72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
82 # Remove the cert request file (no longer needed)
102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in
106 # $TEST_SERVER_FILE.cert.pem
109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert
[all...]
H A DRSAcertgen.sh39 # 4. [Optional] One can combine the cert and private key into a single
59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
69 # Remove the cert request file (no longer needed)
82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial
87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text
90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \
94 # Remove the cert reques
[all...]
H A DECC-RSAcertgen.sh40 # 4. [Optional] One can combine the cert and private key into a single
58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
60 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial
63 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text
66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \
70 # Remove the cert request file (no longer needed)
84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
86 -out $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -CAcreateserial
89 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -text
92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert
[all...]
/freebsd-9.3-release/crypto/openssh/regress/
H A Dcert-hostkey.sh1 # $OpenBSD: cert-hostkey.sh,v 1.9 2014/01/26 10:22:10 djm Exp $
6 rm -f $OBJ/known_hosts-cert $OBJ/host_ca_key* $OBJ/cert_host_key*
15 printf '@cert-authority '
18 ) > $OBJ/known_hosts-cert
31 verbose "$tid: sign host ${ktype} cert"
43 verbose "$tid: sign host ${ktype}_v00 cert"
53 verbose "$tid: host ${ktype} cert connect privsep $privsep"
57 echo HostCertificate $OBJ/cert_host_key_${ktype}-cert.pub
61 ${SSH} -2 -oUserKnownHostsFile=$OBJ/known_hosts-cert \
62 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_kiss.c67 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca);
70 int passlen, EVP_PKEY **pkey, X509 **cert,
75 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca,
79 * Parse and decrypt a PKCS#12 structure returning user key, user cert and
81 * should point to a valid STACK structure. pkey and cert can be passed
85 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
107 if (cert)
108 *cert = NULL;
133 if (!parse_pk12(p12, pass, -1, pkey, cert, ca)) {
144 if (cert
154 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
211 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/
H A Dcert.h18 /* $Id: cert.h,v 1.19 2007/06/19 23:47:16 tbox Exp $ */
23 /*! \file dns/cert.h */
49 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target);
51 * Put a textual representation of certificate type 'cert' into 'target'.
54 *\li 'cert' is a valid cert.
/freebsd-9.3-release/crypto/openssl/demos/pkcs12/
H A Dpkread.c15 X509 *cert; local
36 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
50 if (cert) {
52 PEM_write_X509_AUX(fp, cert);
/freebsd-9.3-release/crypto/openssh/
H A Dkey.c67 struct KeyCert *cert; local
69 cert = xcalloc(1, sizeof(*cert));
70 buffer_init(&cert->certblob);
71 buffer_init(&cert->critical);
72 buffer_init(&cert->extensions);
73 cert->key_id = NULL;
74 cert->principals = NULL;
75 cert->signature_key = NULL;
76 return cert;
197 cert_free(struct KeyCert *cert) argument
956 int cert; member in struct:keytype
2472 u_char *cert; local
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hx509/data/
H A Dgen-req.sh20 -out cert.req > /dev/null 2>/dev/null
26 -in cert.req \
30 -out cert.crt
32 ln -s ca.crt `${openssl} x509 -hash -noout -in cert.crt`.0
40 -in cert.req \
42 -out cert.crt \
55 -cert $2.crt \
57 -in cert.req \
58 -out cert.crt \
66 mv cert
[all...]

Completed in 126 milliseconds

1234567