Searched refs:cert (Results 1 - 25 of 99) sorted by relevance

1234

/opensolaris-onvv-gate/usr/src/common/openssl/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
98 cert = PEM_read_X509(inf, NULL, NULL);
99 if(!cert) {
105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
106 cert->cert_info->extensions = NULL;
108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
114 count = X509_get_ext_count(cert);
117 ext = X509_get_ext(cert, i);
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
H A Dv3_akey.c106 * issuer: use the issuers cert issuer and serial number. The default is
123 X509 *cert; local
157 cert = ctx->issuer_cert;
161 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
162 if((i >= 0) && (ext = X509_get_ext(cert, i)))
173 isname = X509_NAME_dup(X509_get_issuer_name(cert));
174 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
/opensolaris-onvv-gate/usr/src/common/net/wanboot/
H A Dp12auxutl.c82 * Given one or more of user private key, user cert and/or other (CA) certs,
116 X509 *cert = NULL; local
136 cert = sk_X509_value(certs, i);
139 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) {
143 if (cert->aux != NULL && cert->aux->alias != NULL &&
144 cert->aux->alias->type == V_ASN1_UTF8STRING) {
145 str = utf82ascstr(cert->aux->alias);
160 if (cert->aux != NULL && cert
[all...]
H A Dp12access.c28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass
69 * cert - Certificate to pass in x509 format
76 sunw_use_x509cert(SSL_CTX *ctx, X509 *cert) argument
80 if (ctx == NULL || cert == NULL) {
85 if (SSL_CTX_use_certificate(ctx, cert) != 1) {
182 * passphrase to decrypt it. Pass the cert to SSL.
197 X509 *cert = NULL; local
209 &cert, NULL);
210 if (ret > 0 && cert != NULL) {
211 if (sunw_use_x509cert(ctx, cert)
410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dp12auxpars.c91 * PKCS12_parse, any cert which is not the one selected is assumed to be
92 * a CA cert. In parse_pkcs12, certs which have matching private keys are
98 * return just a cert, just a private key, the stack of CA certs or any
115 * that a cert, a private key and a stack for CA certs.
119 * to one cert, one private key and a stack of CA certificates).
126 * cert somewhere in the input. This was done by moving the matching
156 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or
158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
173 * cert - Points to locaiton which points to the client cert returne
208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dauxutil.c287 * cert - Points to locaiton where the address of the matching client cert
307 * - Once a cert is found, verify that the key actually matches by
308 * comparing the private key with the public key (in the cert).
311 * A pointer to cert and/or pkey which matches the name or keyid is stored
321 STACK_OF(X509) *cl, X509 **cert)
336 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL;
381 if (cert != NULL)
382 *cert = sk_X509_delete(cl, c);
395 * Looking for pkey to match a cert
320 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
487 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
[all...]
H A Dp12misc.c111 * Notes: If an error occurs while moving certs, the cert being move may be
115 * If there is a key which does not have a matching cert, it is moved to
124 * >= 0 - The number of certs moved from 'cert' to 'pkcerts'.
180 * No cert matching this key. Move the key if
239 * sunw_set_localkeyid() sets the localkeyid in a cert, a private key or
246 * cert - Points to a cert to set the keyidstr in.
248 * Note that setting a keyid into a cert which will not be written out as
249 * a PKCS12 cert is pointless since it will be lost.
259 X509 *cert)
258 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument
625 sunw_print_times(FILE *fp, prnt_actions_t dowhat, char *label, X509 *cert) argument
663 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument
699 sunw_issuer_attrs(X509 *cert, char *buf, int len) argument
730 sunw_subject_attrs(X509 *cert, char *buf, int len) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/libelfsign/common/
H A Delfcertlib.c75 * cert
83 * We then verify the given cert using the publickey of a TA.
84 * If the passed in cert is a TA or it has been verified already we
89 elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert) argument
95 if ((cert->c_verified == E_OK) || (cert->c_verified == E_IS_TA)) {
121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate,
131 cert, CACERT); local
132 cert->c_verified = E_OK;
140 KMF_CERT_DATA_ATTR, &cert
150 cert, OBJCACERT); local
169 cert, SECACERT); local
195 ELFCert_t cert = NULL; local
305 (ess->es_certCAcallback)(ess->es_callbackctx, cert, local
338 elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, const char *pathname) argument
396 elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, const char *token_label, const char *pin) argument
496 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument
580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
635 elfcertlib_getdn(ELFCert_t cert) argument
650 elfcertlib_getissuer(ELFCert_t cert) argument
742 elfcertlib_releasecert(ELFsign_t ess, ELFCert_t cert) argument
757 ELFCert_t cert = NULL; local
782 elfcertlib_freecert(ELFsign_t ess, ELFCert_t cert) argument
[all...]
H A Dlibelfsign.h167 extern char *elfcertlib_getdn(ELFCert_t cert);
168 extern char *elfcertlib_getissuer(ELFCert_t cert);
170 extern boolean_t elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert,
172 extern boolean_t elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert,
175 extern boolean_t elfcertlib_sign(ELFsign_t ess, ELFCert_t cert,
179 extern boolean_t elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert);
180 extern boolean_t elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert,
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/
H A Dp12_kiss.c66 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca);
69 int passlen, EVP_PKEY **pkey, X509 **cert,
74 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca,
77 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
79 * or it should point to a valid STACK structure. pkey and cert can be
83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
103 if(cert) *cert = NULL;
125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca))
136 if (cert
144 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
H A Dp12_crt.c66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
88 if(!pkey && !cert && !ca)
94 if (pkey && cert)
96 if(!X509_check_private_key(cert, pkey))
98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
101 if (cert)
103 bag = PKCS12_add_cert(&bags, cert);
176 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
185 if(!(bag = PKCS12_x5092certbag(cert)))
192 name = (char *)X509_alias_get0(cert,
[all...]
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/
H A Dsecurity.c85 * cert - User cert to start with
95 get_cert_chain(PKG_ERR *err, X509 *cert, STACK_OF(X509) *clcerts, argument
130 (void) X509_STORE_CTX_init(store_ctx, ca_store, cert, clcerts);
131 /* attempt to verify the cert, which builds the cert chain */
135 get_subject_display_name(cert),
157 * Arguments: cert - The certificate to get the name from
160 * subject of the cert.
166 *get_subject_display_name(X509 *cert) argument
197 get_issuer_display_name(X509 *cert) argument
228 get_serial_num(X509 *cert) argument
256 get_fingerprint(X509 *cert, const EVP_MD *alg) argument
[all...]
H A Dp12lib.c202 STACK_OF(X509) *, X509 **cert);
220 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or
222 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
237 * cert - Points to locaiton which points to the client cert returned
248 * 1) Find the key and/or cert whose localkeyid attributes matches
250 * 2) Find the key and/or cert whose friendlyname attributes matches
252 * 3) Return the first matching key/cert pair found.
253 * 4) Return the last matching key/cert pair found.
254 * 5) Return whatever cert an
341 X509_free(*cert); variable
646 X509 *cert = NULL; local
955 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument
1317 sunw_get_cert_fname(getdo_actions_t dowhat, X509 *cert, char **fname) argument
1367 sunw_set_fname(const char *ascname, EVP_PKEY *pkey, X509 *cert) argument
1462 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument
1487 sunw_check_cert_times(chk_actions_t chkwhat, X509 *cert) argument
1533 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
2246 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
2511 check_time(chk_actions_t chkwhat, X509 *cert) argument
2582 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/libslp/javalib/com/sun/slp/
H A DAuthBlock.java35 import java.security.cert.*;
289 * cert has been signed by someDN.
302 X509Certificate cert = getCert(someDN, ks);
305 myCert.getSubjectDN().toString(), cert.getSubjectDN());
310 * is in ab's cert chain.
313 // Get cert for input DN
338 // Get cert for input DN
370 X509Certificate cert = getSignAsCert();
373 if (cert == null) {
378 String DN = cert
867 checkSPIs(X509Certificate cert, KeyStore ks) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Daddcert.c85 X509 *cert = NULL; local
273 /* we must have gotten at least one cert, if not, fail */
281 &key, &cert) != 0) {
287 /* we must have gotten a cert, if not, fail */
288 if (cert == NULL) {
295 * if we are importing a user cert, and did not get
328 cert = sk_X509_value(trustcerts, i);
329 if (check_cert(err, cert) != 0) {
338 if (check_cert_and_key(err, cert, key) != 0) {
347 * if importing more than one cert, mus
449 verify_trust(X509 *cert) argument
[all...]
H A Dcerts.c68 * cert - Location to store resulting cert if found.
73 * match. If no key matches the cert, then only the cert
80 X509 **cert)
91 if (cert) *cert = NULL;
95 /* first try to load a DER cert, which cannot contain a key */
117 /* take the first cert in the file, if any */
118 if (cert
78 load_cert_and_key(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, X509 **cert) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddownload.c54 KMF_DATA cert = {NULL, 0}; local
223 ch_rv = kmf_read_input_file(kmfhandle, fullpath, &cert);
229 ch_rv = kmf_pem_to_der(cert.Data, cert.Length,
237 format == KMF_FORMAT_ASN1 ? &cert : &cert_der);
252 kmf_free_data(&cert);
/opensolaris-onvv-gate/usr/src/common/openssl/ssl/
H A Dssl_cert.c169 CERT *ssl_cert_dup(CERT *cert) argument
183 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
184 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
187 ret->valid = cert->valid;
188 ret->mask = cert->mask;
189 ret->export_mask = cert->export_mask;
192 if (cert->rsa_tmp != NULL)
194 RSA_up_ref(cert
[all...]
H A Ds3_lib.c1515 if (!ssl_cert_inst(&s->cert))
1545 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
1546 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1547 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
1563 if (s->cert->rsa_tmp != NULL)
1564 RSA_free(s->cert->rsa_tmp);
1565 s->cert->rsa_tmp = rsa;
1599 if (s->cert->dh_tmp != NULL)
1600 DH_free(s->cert
1709 CERT *cert; local
1852 CERT *cert; local
1924 CERT *cert; local
[all...]
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/
H A Dpk7_enc.c70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/elfsign/
H A Delfsign.c85 char *cert; /* -c <certificate_file> | */ member in struct:__anon84
164 cmd_info.cert = NULL;
217 cmd_info.cert = optarg;
271 cmd_info.cert = optarg;
307 (cmd_info.cert == NULL) ||
309 cryptodebug("Missing privpath|token_label/cert/elfobj");
317 (cmd_info.cert == NULL)) {
323 if ((cmd_info.cert != NULL) == (cmd_info.elfcnt > 0)) {
324 cryptodebug("Neither or both of cert/elfobj");
431 if (cmd_info.cert
503 ELFCert_t cert = NULL; local
1006 ELFCert_t cert; local
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/inet/kssl/
H A Dksslioctl.c60 certificate_free(Certificate_t *cert) argument
62 kmem_free(cert->msg, cert->len);
63 kmem_free(cert, sizeof (struct Certificate));
110 Certificate_t *cert; local
119 if ((cert = kssl_entry->ke_server_certificate) != NULL) {
120 certificate_free(cert);
194 Certificate_t *cert; local
268 cert = kmem_alloc(sizeof (Certificate_t), KM_SLEEP);
269 cert
400 create_kssl_entry(kssl_params_t *kssl_params, Certificate_t *cert, crypto_key_t *privkey) argument
533 Certificate_t *cert; local
[all...]
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/
H A Dp12split.c52 /* The following match/cert values require PKCS12 */
58 #define IO_CERTFILE 2 /* Have a separate cert file or data */
236 (void) printf(gettext("\nMain cert:\n"));
268 gettext("\nTrust Anchor cert %d:\n"), i);
318 * is no trust anchor but is a regular cert, use it instead. Do this
319 * to handle the insanity with openssl, which requires a matching cert
369 (void) fprintf(stderr, gettext(" Removing cert\n"));
384 (void) fprintf(stderr, gettext(" Removing cert\n"));
395 time_check_print(X509 *cert) argument
400 ret = time_check(cert);
438 time_check(X509 *cert) argument
527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/
H A Dmapper_cn.c88 mapper_map_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, KMF_DATA *name) argument
98 if ((rv = kmf_get_cert_subject_str(h, cert, &dn)) != KMF_OK)
147 mapper_match_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, argument
163 if ((rv = mapper_map_cert_to_name(h, cert, &get_name)) != KMF_OK)

Completed in 216 milliseconds

1234