Lines Matching refs:cert
121 * parse the cert data and return the data associated with
134 KMF_X509_CERTIFICATE *cert = NULL;
141 ret = DerDecodeSignedCertificate(certdata, &cert);
145 if (cert->certificate.extensions.numberOfExtensions == 0) {
151 i < cert->certificate.extensions.numberOfExtensions;
153 eptr = &cert->certificate.extensions.extensions[i];
163 if (cert != NULL) {
164 kmf_free_signed_cert(cert);
165 free(cert);
189 KMF_X509_CERTIFICATE *cert;
201 ret = DerDecodeSignedCertificate(certdata, &cert);
205 if (cert->certificate.extensions.numberOfExtensions == 0)
208 for (i = 0; i < cert->certificate.extensions.numberOfExtensions;
210 eptr = &cert->certificate.extensions.extensions[i];
231 kmf_free_signed_cert(cert);
232 free(cert);
1605 kmf_get_cert_extn_str(KMF_HANDLE_T handle, const KMF_DATA *cert,
1615 if (cert == NULL || result == NULL)
1623 ret = KMF_CertGetPrintable(handle, cert, extension, tmpstr);
1639 KMF_X509_CERTIFICATE *cert = NULL;
1644 ret = DerDecodeSignedCertificate(SignedCert, &cert);
1648 ret = GetIDFromSPKI(&cert->certificate.subjectPublicKeyInfo, ID);
1650 kmf_free_signed_cert(cert);
1651 free(cert);
1695 kmf_get_cert_validity(const KMF_DATA *cert, time_t *not_before,
1706 if (cert == NULL || not_before == NULL || not_after == NULL)
1709 rv = DerDecodeSignedCertificate(cert, &certData);
2099 * If the EKU is already in the cert, then just return OK.