Searched refs:cert (Results 1 - 25 of 157) sorted by path

1234567

/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/
H A Dcert.h18 /* $Id: cert.h,v 1.19 2007/06/19 23:47:16 tbox Exp $ */
23 /*! \file dns/cert.h */
49 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target);
51 * Put a textual representation of certificate type 'cert' into 'target'.
54 *\li 'cert' is a valid cert.
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Drcode.c34 #include <dns/cert.h>
307 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target) { argument
308 return (dns_mnemonic_totext(cert, target, certs));
H A Drdata.c36 #include <dns/cert.h>
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/
H A Dcert_37.c33 dns_cert_t cert; local
48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
49 RETERR(uint16_tobuffer(cert, target));
172 dns_rdata_cert_t *cert = source; local
176 REQUIRE(cert->common.rdtype == type);
177 REQUIRE(cert->common.rdclass == rdclass);
182 RETERR(uint16_tobuffer(cert->type, target));
183 RETERR(uint16_tobuffer(cert->key_tag, target));
184 RETERR(uint8_tobuffer(cert->algorithm, target));
186 return (mem_tobuffer(target, cert
191 dns_rdata_cert_t *cert = target; local
222 dns_rdata_cert_t *cert = source; local
[all...]
/freebsd-9.3-release/contrib/ntp/include/
H A Dntp_crypto.h168 struct value cert; /* certificate/value */ member in struct:cert_info
/freebsd-9.3-release/contrib/ntp/ntpd/
H A Dntp_crypto.c434 X509 *cert; /* X509 certificate */ local
676 puch = xinfo->cert.ptr;
677 cert = d2i_X509(NULL, &puch,
678 ntohl(xinfo->cert.vallen));
679 peer->pkey = X509_get_pubkey(cert);
680 X509_free(cert);
685 "cert %s %s 0x%x %s (%u) fs %u",
1090 struct cert_info *cp, *xp, *yp; /* cert info/value pointer */
1162 len = crypto_send(fp, &cert_host->cert, start);
1229 len = crypto_send(fp, &xp->cert, star
3138 X509 *cert; /* X509 certificate */ local
3341 X509 *cert; /* X509 certificate */ local
3432 X509 *cert; /* X509 certificate */ local
[all...]
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/
H A Dregress_ssl.c291 X509 *cert = getcert(); local
299 tt_assert(cert);
317 SSL_use_certificate(ssl2, cert);
/freebsd-9.3-release/contrib/ntp/util/
H A Dntp-keygen.c168 char *hostname = NULL; /* host, used in cert filenames */
301 X509 *cert = NULL; /* X509 certificate */ local
503 cert = PEM_read_X509(fstr, NULL, NULL, NULL);
506 if (cert != NULL) {
511 X509_NAME_oneline(X509_get_subject_name(cert), groupbuf,
518 nid = X509_get_signature_nid(cert);
528 cnt = X509_get_ext_count(cert);
533 ext = X509_get_ext(cert, i);
1946 const char *exten, /* private cert extension */
1950 X509 *cert; /* X50 local
[all...]
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c303 X509 *cert; local
310 cert = SSL_get_peer_certificate(ssl);
311 if (cert == NULL)
314 if (X509_digest(cert, EVP_sha256(), md, &mdsize) != 1)
318 X509_free(cert);
653 const char *cert, int debuglevel)
687 if (SSL_use_certificate_file(ssl, cert, SSL_FILETYPE_PEM) != 1) {
690 cert);
652 tls_exec_server(const char *user, int startfd, const char *privkey, const char *cert, int debuglevel) argument
/freebsd-9.3-release/contrib/sendmail/src/
H A Dtls.c361 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */
362 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */
365 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */
366 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */
367 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */
368 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */
373 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */
374 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */
379 # define TLS_S_DH_OK 0x00200000 /* DH cert is ok */
1108 ** SSL_VERIFY_PEER requests a client cert bu
1229 X509 *cert; local
1649 X509 *cert; local
[all...]
/freebsd-9.3-release/contrib/tcpdump/
H A Disakmp.h261 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert
H A Dprint-isakmp.c147 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */
1044 struct ikev1_pl_cert cert; local
1055 safememcpy(&cert, ext, sizeof(cert));
1057 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
1076 struct ikev1_pl_cert cert; local
1087 safememcpy(&cert, ext, sizeof(cert));
1089 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls.h58 const struct wpabuf *cert; member in struct:tls_event_data::__anon4328
64 const struct wpabuf *cert; member in struct:tls_event_data::__anon4329
H A Dtls_gnutls.c451 static int tls_match_altsubject(X509 *cert, const char *match)
459 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
587 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key "
620 "cert/key in DER format: %s",
711 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
718 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
745 wpa_printf(MSG_DEBUG, "Failed to read client cert/key "
752 "cert/ke
875 gnutls_x509_crt_t cert; local
[all...]
H A Dtls_nss.c297 CERTCertificate *cert; local
307 cert = SSL_PeerCertificate(fd);
308 subject = CERT_NameToAscii(&cert->subject);
309 issuer = CERT_NameToAscii(&cert->issuer);
312 CERT_DestroyCertificate(cert);
H A Dtls_openssl.c135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data
258 if (priv->cert)
259 CertFreeCertificateContext(priv->cert);
286 if (strncmp(name, "cert://", 7) == 0) {
321 X509 *cert = NULL; local
327 (strncmp(name, "cert://", 7) != 0 &&
341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
342 if (priv->cert == NULL) {
343 priv->cert = cryptoapi_find_cert(
346 if (priv->cert
423 X509 *cert; local
980 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument
1002 tls_match_altsubject(X509 *cert, const char *match) argument
1083 get_x509_cert(X509 *cert) argument
1108 struct wpabuf *cert = NULL; local
1130 struct wpabuf *cert = NULL; local
1193 struct wpabuf *cert; local
1353 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local
1620 X509 *cert; local
1745 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument
1752 X509 *cert; member in struct:__anon4334
1779 X509 *cert; local
1806 X509 *cert; local
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Dikev2_common.c373 payloads->cert = pdata;
H A Dikev2_common.h314 const u8 *cert; member in struct:ikev2_payloads
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap.c1194 if (data->peer_cert.cert) {
1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1;
1200 wpabuf_head(data->peer_cert.cert),
1201 wpabuf_len(data->peer_cert.cert));
1204 "depth=%d subject='%s' cert=%s",
H A Dikev2.c530 const u8 *cert, size_t cert_len)
534 if (cert == NULL) {
547 cert_encoding = cert[0];
548 cert++;
552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Dikev2.c564 const u8 *cert, size_t cert_len)
568 if (cert == NULL) {
581 cert_encoding = cert[0];
582 cert++;
586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client_read.c219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
346 cert = x509_certificate_parse(pos, cert_len);
347 if (cert == NULL) {
357 chain = cert;
359 last->next = cert;
360 last = cert;
H A Dtlsv1_client_write.c31 struct x509_certificate *cert; local
36 cert = conn->cred->cert;
37 while (cert) {
38 len += 3 + cert->cert_len;
39 if (x509_certificate_self_signed(cert))
41 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
42 &cert->issuer);
137 struct x509_certificate *cert; local
158 cert
[all...]
H A Dtlsv1_common.c149 struct x509_certificate *cert; local
158 cert = x509_certificate_parse(buf, len);
159 if (cert == NULL) {
177 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
178 x509_certificate_free(cert);
H A Dtlsv1_cred.c38 x509_certificate_chain_free(cred->cert);
49 struct x509_certificate *cert; local
52 cert = x509_certificate_parse(buf, len);
53 if (cert == NULL) {
59 cert->next = *chain;
60 *chain = cert;
62 x509_name_string(&cert->subject, name, sizeof(name));
147 const char *cert, const u8 *cert_blob,
153 if (cert) {
158 buf = (u8 *) os_readfile(cert,
146 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument
183 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument
210 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument
[all...]

Completed in 211 milliseconds

1234567