Lines Matching refs:cert

410 ssl_cert2KMFDATA(KMF_HANDLE *kmfh, X509 *x509cert, KMF_DATA *cert)
442 cert->Data = buf;
443 cert->Length = len;
449 cert->Data = NULL;
450 cert->Length = 0;
721 /* Remove this cert from the list by clearing it. */
754 KMF_DATA *cert)
760 if (rv == KMF_OK && x509cert != NULL && cert != NULL) {
761 rv = ssl_cert2KMFDATA(kmfh, x509cert, cert);
766 rv = kmf_check_cert_date(kmfh, cert);
768 rv = kmf_check_cert_date(kmfh, cert);
771 * This is a valid cert so skip it.
778 * find an invalid cert.
1211 KMF_DATA *cert = NULL;
1217 /* Get the cert data */
1218 cert = kmf_get_attr_ptr(KMF_CERT_DATA_ATTR, attrlist, numattr);
1219 if (cert == NULL || cert->Data == NULL)
1246 ret = kmf_create_cert_file(cert, format, fullpath);
2040 /* copy cert data to outbuf */
2358 X509 *cert = NULL;
2365 /* convert the DER-encoded issuer cert to an internal X509 */
2375 /* convert the DER-encoded user cert to an internal X509 */
2377 cert = d2i_X509(NULL, (const uchar_t **)&ptmp,
2379 if (cert == NULL) {
2387 *certid = OCSP_cert_to_id(NULL, cert, issuer);
2399 if (cert != NULL) {
2400 X509_free(cert);
2558 * If signer_cert is not NULL, we will use that as the signer cert.
2559 * Otherwise, we will check if the issuer cert is actually the signer.
2574 * Convert the issuer cert into X509 and push it into a
2753 printf("successfully created a certid for the cert.\n");
2765 printf("Successfully found the single response index for the cert.\n");
2768 /* Retrieve the single response and get the cert status */
3048 /* Convert cert from X509 struct to PKCS#12 bag */
3374 /* Check if there is a key corresponding to this cert */
3575 /* Stick the key and the cert into a PKCS#12 file */
3599 * private key and an associated public key wrapped in an x509 cert.
3665 * Make sure the private key matchs the last cert in the file.
4192 KMF_X509_DER_CERT cert;
4205 (void) memset(&cert, 0, sizeof (cert));
4206 rv = ssl_cert2KMFDATA(kmfh, sslcert, &cert.certificate);
4209 /* Get the alias name for the cert if there is one */
4212 cert.kmf_private.label = strdup(a);
4213 cert.kmf_private.keystore_type = KMF_KEYSTORE_OPENSSL;
4215 list[n] = cert;
4388 X509 *cert = sk_X509_value(sslcert, i);
4390 X509 *cert = sk_X509_value(sslcert, i);
4392 rv = add_cert_to_list(kmfh, cert, certlist, ncerts);
4413 /* Now add the ca cert to the certlist */
5121 /* Read in the CA cert file and convert to X509 */
5142 /* Now get the public key from the CA cert */