/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | cert.h | 18 /* $Id: cert.h,v 1.19 2007/06/19 23:47:16 tbox Exp $ */ 23 /*! \file dns/cert.h */ 49 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target); 51 * Put a textual representation of certificate type 'cert' into 'target'. 54 *\li 'cert' is a valid cert.
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | rcode.c | 34 #include <dns/cert.h> 307 dns_cert_totext(dns_cert_t cert, isc_buffer_t *target) { argument 308 return (dns_mnemonic_totext(cert, target, certs));
|
H A D | rdata.c | 36 #include <dns/cert.h>
|
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | cert_37.c | 33 dns_cert_t cert; local 48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 49 RETERR(uint16_tobuffer(cert, target)); 172 dns_rdata_cert_t *cert = source; local 176 REQUIRE(cert->common.rdtype == type); 177 REQUIRE(cert->common.rdclass == rdclass); 182 RETERR(uint16_tobuffer(cert->type, target)); 183 RETERR(uint16_tobuffer(cert->key_tag, target)); 184 RETERR(uint8_tobuffer(cert->algorithm, target)); 186 return (mem_tobuffer(target, cert 191 dns_rdata_cert_t *cert = target; local 222 dns_rdata_cert_t *cert = source; local [all...] |
/freebsd-9.3-release/contrib/ntp/include/ |
H A D | ntp_crypto.h | 168 struct value cert; /* certificate/value */ member in struct:cert_info
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 434 X509 *cert; /* X509 certificate */ local 676 puch = xinfo->cert.ptr; 677 cert = d2i_X509(NULL, &puch, 678 ntohl(xinfo->cert.vallen)); 679 peer->pkey = X509_get_pubkey(cert); 680 X509_free(cert); 685 "cert %s %s 0x%x %s (%u) fs %u", 1090 struct cert_info *cp, *xp, *yp; /* cert info/value pointer */ 1162 len = crypto_send(fp, &cert_host->cert, start); 1229 len = crypto_send(fp, &xp->cert, star 3138 X509 *cert; /* X509 certificate */ local 3341 X509 *cert; /* X509 certificate */ local 3432 X509 *cert; /* X509 certificate */ local [all...] |
/freebsd-9.3-release/contrib/ntp/sntp/libevent/test/ |
H A D | regress_ssl.c | 291 X509 *cert = getcert(); local 299 tt_assert(cert); 317 SSL_use_certificate(ssl2, cert);
|
/freebsd-9.3-release/contrib/ntp/util/ |
H A D | ntp-keygen.c | 168 char *hostname = NULL; /* host, used in cert filenames */ 301 X509 *cert = NULL; /* X509 certificate */ local 503 cert = PEM_read_X509(fstr, NULL, NULL, NULL); 506 if (cert != NULL) { 511 X509_NAME_oneline(X509_get_subject_name(cert), groupbuf, 518 nid = X509_get_signature_nid(cert); 528 cnt = X509_get_ext_count(cert); 533 ext = X509_get_ext(cert, i); 1946 const char *exten, /* private cert extension */ 1950 X509 *cert; /* X50 local [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tls.c | 303 X509 *cert; local 310 cert = SSL_get_peer_certificate(ssl); 311 if (cert == NULL) 314 if (X509_digest(cert, EVP_sha256(), md, &mdsize) != 1) 318 X509_free(cert); 653 const char *cert, int debuglevel) 687 if (SSL_use_certificate_file(ssl, cert, SSL_FILETYPE_PEM) != 1) { 690 cert); 652 tls_exec_server(const char *user, int startfd, const char *privkey, const char *cert, int debuglevel) argument
|
/freebsd-9.3-release/contrib/sendmail/src/ |
H A D | tls.c | 361 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */ 362 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */ 365 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */ 366 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */ 367 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */ 368 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */ 373 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */ 374 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */ 379 # define TLS_S_DH_OK 0x00200000 /* DH cert is ok */ 1108 ** SSL_VERIFY_PEER requests a client cert bu 1229 X509 *cert; local 1649 X509 *cert; local [all...] |
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | isakmp.h | 261 char cert; /* Certificate Data */ member in struct:ikev1_pl_cert
|
H A D | print-isakmp.c | 147 "none", "sa", "p", "t", "ke", "id", "cert", "cr", "hash", /* 0 - 8 */ 1044 struct ikev1_pl_cert cert; local 1055 safememcpy(&cert, ext, sizeof(cert)); 1057 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr))); 1076 struct ikev1_pl_cert cert; local 1087 safememcpy(&cert, ext, sizeof(cert)); 1089 ND_PRINT((ndo," type=%s", STR_OR_ID((cert.encode), certstr)));
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls.h | 58 const struct wpabuf *cert; member in struct:tls_event_data::__anon4328 64 const struct wpabuf *cert; member in struct:tls_event_data::__anon4329
|
H A D | tls_gnutls.c | 451 static int tls_match_altsubject(X509 *cert, const char *match) 459 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); 580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 587 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 620 "cert/key in DER format: %s", 711 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 718 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 745 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 752 "cert/ke 875 gnutls_x509_crt_t cert; local [all...] |
H A D | tls_nss.c | 297 CERTCertificate *cert; local 307 cert = SSL_PeerCertificate(fd); 308 subject = CERT_NameToAscii(&cert->subject); 309 issuer = CERT_NameToAscii(&cert->issuer); 312 CERT_DestroyCertificate(cert);
|
H A D | tls_openssl.c | 135 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 258 if (priv->cert) 259 CertFreeCertificateContext(priv->cert); 286 if (strncmp(name, "cert://", 7) == 0) { 321 X509 *cert = NULL; local 327 (strncmp(name, "cert://", 7) != 0 && 341 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 342 if (priv->cert == NULL) { 343 priv->cert = cryptoapi_find_cert( 346 if (priv->cert 423 X509 *cert; local 980 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1002 tls_match_altsubject(X509 *cert, const char *match) argument 1083 get_x509_cert(X509 *cert) argument 1108 struct wpabuf *cert = NULL; local 1130 struct wpabuf *cert = NULL; local 1193 struct wpabuf *cert; local 1353 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1620 X509 *cert; local 1745 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 1752 X509 *cert; member in struct:__anon4334 1779 X509 *cert; local 1806 X509 *cert; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 373 payloads->cert = pdata;
|
H A D | ikev2_common.h | 314 const u8 *cert; member in struct:ikev2_payloads
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap.c | 1194 if (data->peer_cert.cert) { 1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1; 1200 wpabuf_head(data->peer_cert.cert), 1201 wpabuf_len(data->peer_cert.cert)); 1204 "depth=%d subject='%s' cert=%s",
|
H A D | ikev2.c | 530 const u8 *cert, size_t cert_len) 534 if (cert == NULL) { 547 cert_encoding = cert[0]; 548 cert++; 552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 677 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 529 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 564 const u8 *cert, size_t cert_len) 568 if (cert == NULL) { 581 cert_encoding = cert[0]; 582 cert++; 586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 709 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 563 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 346 cert = x509_certificate_parse(pos, cert_len); 347 if (cert == NULL) { 357 chain = cert; 359 last->next = cert; 360 last = cert;
|
H A D | tlsv1_client_write.c | 31 struct x509_certificate *cert; local 36 cert = conn->cred->cert; 37 while (cert) { 38 len += 3 + cert->cert_len; 39 if (x509_certificate_self_signed(cert)) 41 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 42 &cert->issuer); 137 struct x509_certificate *cert; local 158 cert [all...] |
H A D | tlsv1_common.c | 149 struct x509_certificate *cert; local 158 cert = x509_certificate_parse(buf, len); 159 if (cert == NULL) { 177 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 178 x509_certificate_free(cert);
|
H A D | tlsv1_cred.c | 38 x509_certificate_chain_free(cred->cert); 49 struct x509_certificate *cert; local 52 cert = x509_certificate_parse(buf, len); 53 if (cert == NULL) { 59 cert->next = *chain; 60 *chain = cert; 62 x509_name_string(&cert->subject, name, sizeof(name)); 147 const char *cert, const u8 *cert_blob, 153 if (cert) { 158 buf = (u8 *) os_readfile(cert, 146 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 183 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 210 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |