Lines Matching defs:cert
52 /* The following match/cert values require PKCS12 */
58 #define IO_CERTFILE 2 /* Have a separate cert file or data */
236 (void) printf(gettext("\nMain cert:\n"));
268 gettext("\nTrust Anchor cert %d:\n"), i);
318 * is no trust anchor but is a regular cert, use it instead. Do this
319 * to handle the insanity with openssl, which requires a matching cert
369 (void) fprintf(stderr, gettext(" Removing cert\n"));
384 (void) fprintf(stderr, gettext(" Removing cert\n"));
395 time_check_print(X509 *cert)
400 ret = time_check(cert);
405 sunw_subject_attrs(cert, buf, sizeof (buf)));
407 sunw_issuer_attrs(cert, buf, sizeof (buf)));
412 gettext("\n Invalid cert 'not before' field\n"));
417 gettext("\n Invalid cert 'not after' field\n"));
422 gettext("\n Cert has expired\n"), cert);
427 gettext("\n Warning: cert not yet valid\n"), cert);
438 time_check(X509 *cert)
442 i = X509_cmp_time(X509_get_notBefore(cert), NULL);
449 i = X509_cmp_time(X509_get_notAfter(cert), NULL);
469 (void) printf(gettext("%s: writing cert\n"), progname);
516 wbku_printerr("cannot find matching cert and key\n");
527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta)
553 if (cert != NULL && sk_X509_push(clist, cert) == 0) {
583 * Put the cert and pkey off of the stack so that they won't
588 if (cert != NULL && sk_X509_num(clist) == 1) {
623 " -l - value of 'localkeyid' attribute in client cert and\n"