/opensolaris-onvv-gate/usr/src/common/openssl/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 69 X509 *cert; local 76 fprintf(stderr, "Usage v3prin cert.pem\n"); 83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) { 89 count = X509_get_ext_count(cert); 92 ext = X509_get_ext(cert, i);
|
H A D | v3_akey.c | 106 * issuer: use the issuers cert issuer and serial number. The default is 123 X509 *cert; local 157 cert = ctx->issuer_cert; 161 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1); 162 if((i >= 0) && (ext = X509_get_ext(cert, i))) 173 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 174 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));
|
/opensolaris-onvv-gate/usr/src/common/net/wanboot/ |
H A D | p12auxutl.c | 82 * Given one or more of user private key, user cert and/or other (CA) certs, 116 X509 *cert = NULL; local 136 cert = sk_X509_value(certs, i); 139 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) { 143 if (cert->aux != NULL && cert->aux->alias != NULL && 144 cert->aux->alias->type == V_ASN1_UTF8STRING) { 145 str = utf82ascstr(cert->aux->alias); 160 if (cert->aux != NULL && cert [all...] |
H A D | p12access.c | 28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass 69 * cert - Certificate to pass in x509 format 76 sunw_use_x509cert(SSL_CTX *ctx, X509 *cert) argument 80 if (ctx == NULL || cert == NULL) { 85 if (SSL_CTX_use_certificate(ctx, cert) != 1) { 182 * passphrase to decrypt it. Pass the cert to SSL. 197 X509 *cert = NULL; local 209 &cert, NULL); 210 if (ret > 0 && cert != NULL) { 211 if (sunw_use_x509cert(ctx, cert) 410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | p12auxpars.c | 91 * PKCS12_parse, any cert which is not the one selected is assumed to be 92 * a CA cert. In parse_pkcs12, certs which have matching private keys are 98 * return just a cert, just a private key, the stack of CA certs or any 115 * that a cert, a private key and a stack for CA certs. 119 * to one cert, one private key and a stack of CA certificates). 126 * cert somewhere in the input. This was done by moving the matching 156 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or 158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 173 * cert - Points to locaiton which points to the client cert returne 208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | auxutil.c | 287 * cert - Points to locaiton where the address of the matching client cert 307 * - Once a cert is found, verify that the key actually matches by 308 * comparing the private key with the public key (in the cert). 311 * A pointer to cert and/or pkey which matches the name or keyid is stored 321 STACK_OF(X509) *cl, X509 **cert) 336 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL; 381 if (cert != NULL) 382 *cert = sk_X509_delete(cl, c); 395 * Looking for pkey to match a cert 320 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument 487 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument [all...] |
H A D | p12misc.c | 111 * Notes: If an error occurs while moving certs, the cert being move may be 115 * If there is a key which does not have a matching cert, it is moved to 124 * >= 0 - The number of certs moved from 'cert' to 'pkcerts'. 180 * No cert matching this key. Move the key if 239 * sunw_set_localkeyid() sets the localkeyid in a cert, a private key or 246 * cert - Points to a cert to set the keyidstr in. 248 * Note that setting a keyid into a cert which will not be written out as 249 * a PKCS12 cert is pointless since it will be lost. 259 X509 *cert) 258 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument 625 sunw_print_times(FILE *fp, prnt_actions_t dowhat, char *label, X509 *cert) argument 663 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument 699 sunw_issuer_attrs(X509 *cert, char *buf, int len) argument 730 sunw_subject_attrs(X509 *cert, char *buf, int len) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 75 * cert 83 * We then verify the given cert using the publickey of a TA. 84 * If the passed in cert is a TA or it has been verified already we 89 elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert) argument 95 if ((cert->c_verified == E_OK) || (cert->c_verified == E_IS_TA)) { 121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, 131 cert, CACERT); local 132 cert->c_verified = E_OK; 140 KMF_CERT_DATA_ATTR, &cert 150 cert, OBJCACERT); local 169 cert, SECACERT); local 195 ELFCert_t cert = NULL; local 305 (ess->es_certCAcallback)(ess->es_callbackctx, cert, local 338 elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, const char *pathname) argument 396 elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, const char *token_label, const char *pin) argument 496 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument 580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument 635 elfcertlib_getdn(ELFCert_t cert) argument 650 elfcertlib_getissuer(ELFCert_t cert) argument 742 elfcertlib_releasecert(ELFsign_t ess, ELFCert_t cert) argument 757 ELFCert_t cert = NULL; local 782 elfcertlib_freecert(ELFsign_t ess, ELFCert_t cert) argument [all...] |
H A D | libelfsign.h | 167 extern char *elfcertlib_getdn(ELFCert_t cert); 168 extern char *elfcertlib_getissuer(ELFCert_t cert); 170 extern boolean_t elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, 172 extern boolean_t elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, 175 extern boolean_t elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, 179 extern boolean_t elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert); 180 extern boolean_t elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert,
|
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 66 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca); 69 int passlen, EVP_PKEY **pkey, X509 **cert, 74 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, 77 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 79 * or it should point to a valid STACK structure. pkey and cert can be 83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 103 if(cert) *cert = NULL; 125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca)) 136 if (cert 144 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
H A D | p12_crt.c | 66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 88 if(!pkey && !cert && !ca) 94 if (pkey && cert) 96 if(!X509_check_private_key(cert, pkey)) 98 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 101 if (cert) 103 bag = PKCS12_add_cert(&bags, cert); 176 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 185 if(!(bag = PKCS12_x5092certbag(cert))) 192 name = (char *)X509_alias_get0(cert, [all...] |
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/ |
H A D | security.c | 85 * cert - User cert to start with 95 get_cert_chain(PKG_ERR *err, X509 *cert, STACK_OF(X509) *clcerts, argument 130 (void) X509_STORE_CTX_init(store_ctx, ca_store, cert, clcerts); 131 /* attempt to verify the cert, which builds the cert chain */ 135 get_subject_display_name(cert), 157 * Arguments: cert - The certificate to get the name from 160 * subject of the cert. 166 *get_subject_display_name(X509 *cert) argument 197 get_issuer_display_name(X509 *cert) argument 228 get_serial_num(X509 *cert) argument 256 get_fingerprint(X509 *cert, const EVP_MD *alg) argument [all...] |
H A D | p12lib.c | 202 STACK_OF(X509) *, X509 **cert); 220 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or 222 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 237 * cert - Points to locaiton which points to the client cert returned 248 * 1) Find the key and/or cert whose localkeyid attributes matches 250 * 2) Find the key and/or cert whose friendlyname attributes matches 252 * 3) Return the first matching key/cert pair found. 253 * 4) Return the last matching key/cert pair found. 254 * 5) Return whatever cert an 341 X509_free(*cert); variable 646 X509 *cert = NULL; local 955 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument 1317 sunw_get_cert_fname(getdo_actions_t dowhat, X509 *cert, char **fname) argument 1367 sunw_set_fname(const char *ascname, EVP_PKEY *pkey, X509 *cert) argument 1462 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument 1487 sunw_check_cert_times(chk_actions_t chkwhat, X509 *cert) argument 1533 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 2246 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument 2511 check_time(chk_actions_t chkwhat, X509 *cert) argument 2582 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 35 import java.security.cert.*; 289 * cert has been signed by someDN. 302 X509Certificate cert = getCert(someDN, ks); 305 myCert.getSubjectDN().toString(), cert.getSubjectDN()); 310 * is in ab's cert chain. 313 // Get cert for input DN 338 // Get cert for input DN 370 X509Certificate cert = getSignAsCert(); 373 if (cert == null) { 378 String DN = cert 867 checkSPIs(X509Certificate cert, KeyStore ks) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | addcert.c | 85 X509 *cert = NULL; local 273 /* we must have gotten at least one cert, if not, fail */ 281 &key, &cert) != 0) { 287 /* we must have gotten a cert, if not, fail */ 288 if (cert == NULL) { 295 * if we are importing a user cert, and did not get 328 cert = sk_X509_value(trustcerts, i); 329 if (check_cert(err, cert) != 0) { 338 if (check_cert_and_key(err, cert, key) != 0) { 347 * if importing more than one cert, mus 449 verify_trust(X509 *cert) argument [all...] |
H A D | certs.c | 68 * cert - Location to store resulting cert if found. 73 * match. If no key matches the cert, then only the cert 80 X509 **cert) 91 if (cert) *cert = NULL; 95 /* first try to load a DER cert, which cannot contain a key */ 117 /* take the first cert in the file, if any */ 118 if (cert 78 load_cert_and_key(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, X509 **cert) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | download.c | 54 KMF_DATA cert = {NULL, 0}; local 223 ch_rv = kmf_read_input_file(kmfhandle, fullpath, &cert); 229 ch_rv = kmf_pem_to_der(cert.Data, cert.Length, 237 format == KMF_FORMAT_ASN1 ? &cert : &cert_der); 252 kmf_free_data(&cert);
|
/opensolaris-onvv-gate/usr/src/common/openssl/ssl/ |
H A D | ssl_cert.c | 169 CERT *ssl_cert_dup(CERT *cert) argument 183 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]]; 184 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys), 187 ret->valid = cert->valid; 188 ret->mask = cert->mask; 189 ret->export_mask = cert->export_mask; 192 if (cert->rsa_tmp != NULL) 194 RSA_up_ref(cert [all...] |
H A D | s3_lib.c | 1515 if (!ssl_cert_inst(&s->cert)) 1545 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) && 1546 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || 1547 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) 1563 if (s->cert->rsa_tmp != NULL) 1564 RSA_free(s->cert->rsa_tmp); 1565 s->cert->rsa_tmp = rsa; 1599 if (s->cert->dh_tmp != NULL) 1600 DH_free(s->cert 1709 CERT *cert; local 1852 CERT *cert; local 1924 CERT *cert; local [all...] |
/opensolaris-onvv-gate/usr/src/common/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 70 PKCS7_add_signer(PKCS7 *p7,X509 *cert,EVP_PKEY *key);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-crypto/elfsign/ |
H A D | elfsign.c | 85 char *cert; /* -c <certificate_file> | */ member in struct:__anon84 164 cmd_info.cert = NULL; 217 cmd_info.cert = optarg; 271 cmd_info.cert = optarg; 307 (cmd_info.cert == NULL) || 309 cryptodebug("Missing privpath|token_label/cert/elfobj"); 317 (cmd_info.cert == NULL)) { 323 if ((cmd_info.cert != NULL) == (cmd_info.elfcnt > 0)) { 324 cryptodebug("Neither or both of cert/elfobj"); 431 if (cmd_info.cert 503 ELFCert_t cert = NULL; local 1006 ELFCert_t cert; local [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslioctl.c | 60 certificate_free(Certificate_t *cert) argument 62 kmem_free(cert->msg, cert->len); 63 kmem_free(cert, sizeof (struct Certificate)); 110 Certificate_t *cert; local 119 if ((cert = kssl_entry->ke_server_certificate) != NULL) { 120 certificate_free(cert); 194 Certificate_t *cert; local 268 cert = kmem_alloc(sizeof (Certificate_t), KM_SLEEP); 269 cert 400 create_kssl_entry(kssl_params_t *kssl_params, Certificate_t *cert, crypto_key_t *privkey) argument 533 Certificate_t *cert; local [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
H A D | p12split.c | 52 /* The following match/cert values require PKCS12 */ 58 #define IO_CERTFILE 2 /* Have a separate cert file or data */ 236 (void) printf(gettext("\nMain cert:\n")); 268 gettext("\nTrust Anchor cert %d:\n"), i); 318 * is no trust anchor but is a regular cert, use it instead. Do this 319 * to handle the insanity with openssl, which requires a matching cert 369 (void) fprintf(stderr, gettext(" Removing cert\n")); 384 (void) fprintf(stderr, gettext(" Removing cert\n")); 395 time_check_print(X509 *cert) argument 400 ret = time_check(cert); 438 time_check(X509 *cert) argument 527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/ |
H A D | mapper_cn.c | 88 mapper_map_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, KMF_DATA *name) argument 98 if ((rv = kmf_get_cert_subject_str(h, cert, &dn)) != KMF_OK) 147 mapper_match_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, argument 163 if ((rv = mapper_map_cert_to_name(h, cert, &get_name)) != KMF_OK)
|