Lines Matching defs:cert

128 	X509		*cert;
134 /* print out each client cert */
136 cert = sk_X509_value(keystore->clcerts, i);
137 (void) sunw_get_cert_fname(GETDO_COPY, cert,
144 get_subject_display_name(cert));
155 (void) print_cert(err, cert, format,
169 /* print out each trusted cert */
171 cert = sk_X509_value(keystore->cacerts, i);
173 cert, &fname);
179 get_subject_display_name(cert));
190 (void) print_cert(err, cert, format,
617 * cert - Resulting cert is placed here
620 * 0 - Success - Matching cert/key pair placed in key and cert.
625 EVP_PKEY **key, X509 **cert)
633 if (key == NULL || cert == NULL) {
662 * only one private key and public key cert, and they
667 *cert = tmpcert;
679 /* no key/cert pair found. bail. */
689 *cert = tmpcert;
712 * 0 - Success - trusted cert list returned in cacerts
742 * 0 - Success - trusted cert list returned in cacerts
764 * cert - Certificate which to merge into keystore
765 * key - matching private key to 'cert'
766 * alias - Name which to store the cert and key under
775 merge_cert_and_key(PKG_ERR *err, X509 *cert, EVP_PKEY *key, char *alias,
784 if (check_cert(err, cert) != 0) {
789 /* set the friendlyName of the key and cert to the supplied alias */
790 if (sunw_set_fname(alias, key, cert) != 0) {
853 (void) sk_X509_push(keystore->clcerts, cert);
982 * of validity for the cert.
986 * cert - The certificate to check
993 check_cert(PKG_ERR *err, X509 *cert)
1010 /* check validity of cert */
1011 switch (sunw_check_cert_times(CHK_BOTH, cert)) {
1025 * Ignore expiration time since the trust cert used to
1028 * cert we will check expiration against the time the
1051 * cert - The certificate to check
1058 check_cert_and_key(PKG_ERR *err, X509 *cert, EVP_PKEY *key)
1062 if (check_cert(err, cert) != 0) {
1067 if (sunw_check_keys(cert, key) == 0) {
1069 get_subject_display_name(cert));
1747 * password in client cert file
2059 /* finally do CA cert file */