Searched defs:cert (Results 1 - 25 of 45) sorted by relevance

12

/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Dcerts.c68 * cert - Location to store resulting cert if found.
73 * match. If no key matches the cert, then only the cert
80 X509 **cert)
91 if (cert) *cert = NULL;
95 /* first try to load a DER cert, which cannot contain a key */
117 /* take the first cert in the file, if any */
118 if (cert
78 load_cert_and_key(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, X509 **cert) argument
[all...]
H A Daddcert.c85 X509 *cert = NULL; local
273 /* we must have gotten at least one cert, if not, fail */
281 &key, &cert) != 0) {
287 /* we must have gotten a cert, if not, fail */
288 if (cert == NULL) {
295 * if we are importing a user cert, and did not get
328 cert = sk_X509_value(trustcerts, i);
329 if (check_cert(err, cert) != 0) {
338 if (check_cert_and_key(err, cert, key) != 0) {
347 * if importing more than one cert, mus
449 verify_trust(X509 *cert) argument
[all...]
/illumos-gate/usr/src/common/net/wanboot/
H A Dp12auxutl.c82 * Given one or more of user private key, user cert and/or other (CA) certs,
116 X509 *cert = NULL; local
136 cert = sk_X509_value(certs, i);
139 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) {
143 if (cert->aux != NULL && cert->aux->alias != NULL &&
144 cert->aux->alias->type == V_ASN1_UTF8STRING) {
145 str = utf82ascstr(cert->aux->alias);
160 if (cert->aux != NULL && cert
[all...]
H A Dp12access.c28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass
69 * cert - Certificate to pass in x509 format
76 sunw_use_x509cert(SSL_CTX *ctx, X509 *cert) argument
80 if (ctx == NULL || cert == NULL) {
85 if (SSL_CTX_use_certificate(ctx, cert) != 1) {
182 * passphrase to decrypt it. Pass the cert to SSL.
197 X509 *cert = NULL; local
209 &cert, NULL);
210 if (ret > 0 && cert != NULL) {
211 if (sunw_use_x509cert(ctx, cert)
410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dp12auxpars.c91 * PKCS12_parse, any cert which is not the one selected is assumed to be
92 * a CA cert. In parse_pkcs12, certs which have matching private keys are
98 * return just a cert, just a private key, the stack of CA certs or any
115 * that a cert, a private key and a stack for CA certs.
119 * to one cert, one private key and a stack of CA certificates).
126 * cert somewhere in the input. This was done by moving the matching
156 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or
158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
173 * cert - Points to locaiton which points to the client cert returne
208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
[all...]
H A Dauxutil.c295 * cert - Points to locaiton where the address of the matching client cert
315 * - Once a cert is found, verify that the key actually matches by
316 * comparing the private key with the public key (in the cert).
319 * A pointer to cert and/or pkey which matches the name or keyid is stored
329 STACK_OF(X509) *cl, X509 **cert)
344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL;
389 if (cert != NULL)
390 *cert = sk_X509_delete(cl, c);
403 * Looking for pkey to match a cert
328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
495 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
[all...]
H A Dp12misc.c115 * Notes: If an error occurs while moving certs, the cert being move may be
119 * If there is a key which does not have a matching cert, it is moved to
128 * >= 0 - The number of certs moved from 'cert' to 'pkcerts'.
184 * No cert matching this key. Move the key if
243 * sunw_set_localkeyid() sets the localkeyid in a cert, a private key or
250 * cert - Points to a cert to set the keyidstr in.
252 * Note that setting a keyid into a cert which will not be written out as
253 * a PKCS12 cert is pointless since it will be lost.
263 X509 *cert)
262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument
633 sunw_print_times(FILE *fp, prnt_actions_t dowhat, char *label, X509 *cert) argument
671 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument
707 sunw_issuer_attrs(X509 *cert, char *buf, int len) argument
738 sunw_subject_attrs(X509 *cert, char *buf, int len) argument
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dsecurity.c85 * cert - User cert to start with
95 get_cert_chain(PKG_ERR *err, X509 *cert, STACK_OF(X509) *clcerts, argument
130 (void) X509_STORE_CTX_init(store_ctx, ca_store, cert, clcerts);
131 /* attempt to verify the cert, which builds the cert chain */
135 get_subject_display_name(cert),
157 * Arguments: cert - The certificate to get the name from
160 * subject of the cert.
166 *get_subject_display_name(X509 *cert) argument
197 get_issuer_display_name(X509 *cert) argument
228 get_serial_num(X509 *cert) argument
256 get_fingerprint(X509 *cert, const EVP_MD *alg) argument
[all...]
H A Dp12lib.c206 STACK_OF(X509) *, X509 **cert);
224 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or
226 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can
241 * cert - Points to locaiton which points to the client cert returned
252 * 1) Find the key and/or cert whose localkeyid attributes matches
254 * 2) Find the key and/or cert whose friendlyname attributes matches
256 * 3) Return the first matching key/cert pair found.
257 * 4) Return the last matching key/cert pair found.
258 * 5) Return whatever cert an
345 X509_free(*cert); variable
650 X509 *cert = NULL; local
959 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument
1325 sunw_get_cert_fname(getdo_actions_t dowhat, X509 *cert, char **fname) argument
1375 sunw_set_fname(const char *ascname, EVP_PKEY *pkey, X509 *cert) argument
1470 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument
1495 sunw_check_cert_times(chk_actions_t chkwhat, X509 *cert) argument
1541 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
2254 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
2523 check_time(chk_actions_t chkwhat, X509 *cert) argument
2594 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddownload.c54 KMF_DATA cert = { 0, NULL }; local
223 ch_rv = kmf_read_input_file(kmfhandle, fullpath, &cert);
229 ch_rv = kmf_pem_to_der(cert.Data, cert.Length,
237 format == KMF_FORMAT_ASN1 ? &cert : &cert_der);
252 kmf_free_data(&cert);
H A Dexport.c45 int numattr, KMF_X509_DER_CERT *cert)
51 (void) memset(cert, 0, sizeof (KMF_X509_DER_CERT));
68 KMF_X509_DER_CERT_ATTR, cert,
769 case 'c': /* input cert file name */
826 cryptoerror(LOG_STDERR, gettext("A cert file"
44 pk_find_export_cert(KMF_HANDLE_T kmfhandle, KMF_ATTRIBUTE *attrlist, int numattr, KMF_X509_DER_CERT *cert) argument
H A Dsigncsr.c207 pk_sign_cert(KMF_HANDLE_T handle, KMF_X509_CERTIFICATE *cert, argument
221 /* cert data that is to be signed */
223 cert, sizeof (KMF_X509_CERTIFICATE));
225 /* output buffer for the signed cert */
460 * If we found the key, now we can sign the cert.
501 gettext("Failed to store cert "
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dmapping.c307 kmf_map_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, KMF_DATA *name) argument
324 return (cert2name(handle, cert, name));
332 kmf_match_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, argument
352 return (cert2name(handle, cert, name_to_match, mapped_name));
/illumos-gate/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/
H A Dmapper_cn.c88 mapper_map_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, KMF_DATA *name) argument
98 if ((rv = kmf_get_cert_subject_str(h, cert, &dn)) != KMF_OK)
147 mapper_match_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, argument
163 if ((rv = mapper_map_cert_to_name(h, cert, &get_name)) != KMF_OK)
/illumos-gate/usr/src/cmd/fm/modules/sun4/cpumem-diagnosis/
H A Dcmd_bank.c113 uint_t cert)
115 return (cmd_nvl_create_fault(hdl, fltnm, cert, bank->bank_asru_nvl,
112 cmd_bank_create_fault(fmd_hdl_t *hdl, cmd_bank_t *bank, const char *fltnm, uint_t cert) argument
H A Dcmd_dimm.c80 uint_t cert)
92 flt = cmd_nvl_create_fault(hdl, fltnm, cert,
96 flt = cmd_nvl_create_fault(hdl, fltnm, cert,
102 return (cmd_nvl_create_fault(hdl, fltnm, cert, dimm->dimm_asru_nvl,
79 cmd_dimm_create_fault(fmd_hdl_t *hdl, cmd_dimm_t *dimm, const char *fltnm, uint_t cert) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/
H A Dp12split.c52 /* The following match/cert values require PKCS12 */
58 #define IO_CERTFILE 2 /* Have a separate cert file or data */
236 (void) printf(gettext("\nMain cert:\n"));
268 gettext("\nTrust Anchor cert %d:\n"), i);
318 * is no trust anchor but is a regular cert, use it instead. Do this
319 * to handle the insanity with openssl, which requires a matching cert
369 (void) fprintf(stderr, gettext(" Removing cert\n"));
384 (void) fprintf(stderr, gettext(" Removing cert\n"));
395 time_check_print(X509 *cert) argument
400 ret = time_check(cert);
438 time_check(X509 *cert) argument
527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) argument
[all...]
/illumos-gate/usr/src/cmd/fm/modules/sun4u/cpumem-diagnosis/
H A Dcmd_cpu_arch.c256 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument
261 return (fmd_nvl_create_fault(hdl, class, cert, asru, fru, rsrc));
H A Dcmd_oplerr.c145 uint8_t cert; local
216 cert = opl_avg(100, nsusp);
230 opl_cpu->oc_cmd_cpu, fltname, cpu_rsrc, cert);
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h58 X509 *cert; member in struct:_pkinit_cred_info
70 int cert_index; /* cert to use out of available certs*/
187 EVP_PKEY *pkey, X509 *cert);
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/
H A DAuthBlock.java35 import java.security.cert.*;
289 * cert has been signed by someDN.
302 X509Certificate cert = getCert(someDN, ks);
305 myCert.getSubjectDN().toString(), cert.getSubjectDN());
310 * is in ab's cert chain.
313 // Get cert for input DN
338 // Get cert for input DN
370 X509Certificate cert = getSignAsCert();
373 if (cert == null) {
378 String DN = cert
867 checkSPIs(X509Certificate cert, KeyStore ks) argument
[all...]
/illumos-gate/usr/src/lib/libelfsign/common/
H A Delfcertlib.c75 * cert
83 * We then verify the given cert using the publickey of a TA.
84 * If the passed in cert is a TA or it has been verified already we
89 elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert) argument
95 if ((cert->c_verified == E_OK) || (cert->c_verified == E_IS_TA)) {
121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate,
131 cert, CACERT); local
132 cert->c_verified = E_OK;
140 KMF_CERT_DATA_ATTR, &cert
150 cert, OBJCACERT); local
169 cert, SECACERT); local
195 ELFCert_t cert = NULL; local
305 (ess->es_certCAcallback)(ess->es_callbackctx, cert, local
338 elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, const char *pathname) argument
396 elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, const char *token_label, const char *pin) argument
496 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument
580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
635 elfcertlib_getdn(ELFCert_t cert) argument
650 elfcertlib_getissuer(ELFCert_t cert) argument
742 elfcertlib_releasecert(ELFsign_t ess, ELFCert_t cert) argument
757 ELFCert_t cert = NULL; local
782 elfcertlib_freecert(ELFsign_t ess, ELFCert_t cert) argument
[all...]
/illumos-gate/usr/src/cmd/fm/modules/sun4v/cpumem-diagnosis/
H A Dcmd_branch.c310 uint_t cert = 0; local
362 cert = (100 - CMD_BOARDS_CERT) / dimm_count;
371 flt = cmd_dimm_create_fault(hdl, dimm, fltnm, cert);
/illumos-gate/usr/src/uts/common/inet/kssl/
H A Dksslioctl.c60 certificate_free(Certificate_t *cert) argument
62 kmem_free(cert->msg, cert->len);
63 kmem_free(cert, sizeof (struct Certificate));
110 Certificate_t *cert; local
119 if ((cert = kssl_entry->ke_server_certificate) != NULL) {
120 certificate_free(cert);
194 Certificate_t *cert; local
268 cert = kmem_alloc(sizeof (Certificate_t), KM_SLEEP);
269 cert
400 create_kssl_entry(kssl_params_t *kssl_params, Certificate_t *cert, crypto_key_t *privkey) argument
533 Certificate_t *cert; local
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftKeystore.c510 * cert: TRUE for certificate (use cert_dest)
525 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert)
540 if (cert) {
1327 certificate_obj_t *cert; local
1748 cert = calloc(1, sizeof (certificate_obj_t));
1749 if (cert == NULL) {
1752 (void) memset((void *)cert, 0, sizeof (certificate_obj_t));
1754 cert->certificate_type = certtype;
1755 objp->object_class_u.certificate = cert;
1761 &cert
524 soft_unpack_obj_attribute(uchar_t *buf, biginteger_t *key_dest, cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) argument
[all...]

Completed in 437 milliseconds

12