/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 68 * cert - Location to store resulting cert if found. 73 * match. If no key matches the cert, then only the cert 80 X509 **cert) 91 if (cert) *cert = NULL; 95 /* first try to load a DER cert, which cannot contain a key */ 117 /* take the first cert in the file, if any */ 118 if (cert 78 load_cert_and_key(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, EVP_PKEY **key, X509 **cert) argument [all...] |
H A D | addcert.c | 85 X509 *cert = NULL; local 273 /* we must have gotten at least one cert, if not, fail */ 281 &key, &cert) != 0) { 287 /* we must have gotten a cert, if not, fail */ 288 if (cert == NULL) { 295 * if we are importing a user cert, and did not get 328 cert = sk_X509_value(trustcerts, i); 329 if (check_cert(err, cert) != 0) { 338 if (check_cert_and_key(err, cert, key) != 0) { 347 * if importing more than one cert, mus 449 verify_trust(X509 *cert) argument [all...] |
/illumos-gate/usr/src/common/net/wanboot/ |
H A D | p12auxutl.c | 82 * Given one or more of user private key, user cert and/or other (CA) certs, 116 X509 *cert = NULL; local 136 cert = sk_X509_value(certs, i); 139 if ((bag = M_PKCS12_x5092certbag(cert)) == NULL) { 143 if (cert->aux != NULL && cert->aux->alias != NULL && 144 cert->aux->alias->type == V_ASN1_UTF8STRING) { 145 str = utf82ascstr(cert->aux->alias); 160 if (cert->aux != NULL && cert [all...] |
H A D | p12access.c | 28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass 69 * cert - Certificate to pass in x509 format 76 sunw_use_x509cert(SSL_CTX *ctx, X509 *cert) argument 80 if (ctx == NULL || cert == NULL) { 85 if (SSL_CTX_use_certificate(ctx, cert) != 1) { 182 * passphrase to decrypt it. Pass the cert to SSL. 197 X509 *cert = NULL; local 209 &cert, NULL); 210 if (ret > 0 && cert != NULL) { 211 if (sunw_use_x509cert(ctx, cert) 410 p12_doparse(PKCS12 *p12, char *passwd, int matchty, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | p12auxpars.c | 91 * PKCS12_parse, any cert which is not the one selected is assumed to be 92 * a CA cert. In parse_pkcs12, certs which have matching private keys are 98 * return just a cert, just a private key, the stack of CA certs or any 115 * that a cert, a private key and a stack for CA certs. 119 * to one cert, one private key and a stack of CA certificates). 126 * cert somewhere in the input. This was done by moving the matching 156 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or 158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 173 * cert - Points to locaiton which points to the client cert returne 208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument [all...] |
H A D | auxutil.c | 295 * cert - Points to locaiton where the address of the matching client cert 315 * - Once a cert is found, verify that the key actually matches by 316 * comparing the private key with the public key (in the cert). 319 * A pointer to cert and/or pkey which matches the name or keyid is stored 329 STACK_OF(X509) *cl, X509 **cert) 344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL; 389 if (cert != NULL) 390 *cert = sk_X509_delete(cl, c); 403 * Looking for pkey to match a cert 328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument 495 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument [all...] |
H A D | p12misc.c | 115 * Notes: If an error occurs while moving certs, the cert being move may be 119 * If there is a key which does not have a matching cert, it is moved to 128 * >= 0 - The number of certs moved from 'cert' to 'pkcerts'. 184 * No cert matching this key. Move the key if 243 * sunw_set_localkeyid() sets the localkeyid in a cert, a private key or 250 * cert - Points to a cert to set the keyidstr in. 252 * Note that setting a keyid into a cert which will not be written out as 253 * a PKCS12 cert is pointless since it will be lost. 263 X509 *cert) 262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument 633 sunw_print_times(FILE *fp, prnt_actions_t dowhat, char *label, X509 *cert) argument 671 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument 707 sunw_issuer_attrs(X509 *cert, char *buf, int len) argument 738 sunw_subject_attrs(X509 *cert, char *buf, int len) argument [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | security.c | 85 * cert - User cert to start with 95 get_cert_chain(PKG_ERR *err, X509 *cert, STACK_OF(X509) *clcerts, argument 130 (void) X509_STORE_CTX_init(store_ctx, ca_store, cert, clcerts); 131 /* attempt to verify the cert, which builds the cert chain */ 135 get_subject_display_name(cert), 157 * Arguments: cert - The certificate to get the name from 160 * subject of the cert. 166 *get_subject_display_name(X509 *cert) argument 197 get_issuer_display_name(X509 *cert) argument 228 get_serial_num(X509 *cert) argument 256 get_fingerprint(X509 *cert, const EVP_MD *alg) argument [all...] |
H A D | p12lib.c | 206 STACK_OF(X509) *, X509 **cert); 224 * Parse and decrypt a PKCS#12 structure returning user key, user cert and/or 226 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 241 * cert - Points to locaiton which points to the client cert returned 252 * 1) Find the key and/or cert whose localkeyid attributes matches 254 * 2) Find the key and/or cert whose friendlyname attributes matches 256 * 3) Return the first matching key/cert pair found. 257 * 4) Return the last matching key/cert pair found. 258 * 5) Return whatever cert an 345 X509_free(*cert); variable 650 X509 *cert = NULL; local 959 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, X509 *cert) argument 1325 sunw_get_cert_fname(getdo_actions_t dowhat, X509 *cert, char **fname) argument 1375 sunw_set_fname(const char *ascname, EVP_PKEY *pkey, X509 *cert) argument 1470 sunw_check_keys(X509 *cert, EVP_PKEY *pkey) argument 1495 sunw_check_cert_times(chk_actions_t chkwhat, X509 *cert) argument 1541 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 2254 get_key_cert(int n, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument 2523 check_time(chk_actions_t chkwhat, X509 *cert) argument 2594 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, STACK_OF(X509) *cl, X509 **cert) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | download.c | 54 KMF_DATA cert = { 0, NULL }; local 223 ch_rv = kmf_read_input_file(kmfhandle, fullpath, &cert); 229 ch_rv = kmf_pem_to_der(cert.Data, cert.Length, 237 format == KMF_FORMAT_ASN1 ? &cert : &cert_der); 252 kmf_free_data(&cert);
|
H A D | export.c | 45 int numattr, KMF_X509_DER_CERT *cert) 51 (void) memset(cert, 0, sizeof (KMF_X509_DER_CERT)); 68 KMF_X509_DER_CERT_ATTR, cert, 769 case 'c': /* input cert file name */ 826 cryptoerror(LOG_STDERR, gettext("A cert file" 44 pk_find_export_cert(KMF_HANDLE_T kmfhandle, KMF_ATTRIBUTE *attrlist, int numattr, KMF_X509_DER_CERT *cert) argument
|
H A D | signcsr.c | 207 pk_sign_cert(KMF_HANDLE_T handle, KMF_X509_CERTIFICATE *cert, argument 221 /* cert data that is to be signed */ 223 cert, sizeof (KMF_X509_CERTIFICATE)); 225 /* output buffer for the signed cert */ 460 * If we found the key, now we can sign the cert. 501 gettext("Failed to store cert "
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | mapping.c | 307 kmf_map_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, KMF_DATA *name) argument 324 return (cert2name(handle, cert, name)); 332 kmf_match_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, argument 352 return (cert2name(handle, cert, name_to_match, mapped_name));
|
/illumos-gate/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/ |
H A D | mapper_cn.c | 88 mapper_map_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, KMF_DATA *name) argument 98 if ((rv = kmf_get_cert_subject_str(h, cert, &dn)) != KMF_OK) 147 mapper_match_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, argument 163 if ((rv = mapper_map_cert_to_name(h, cert, &get_name)) != KMF_OK)
|
/illumos-gate/usr/src/cmd/fm/modules/sun4/cpumem-diagnosis/ |
H A D | cmd_bank.c | 113 uint_t cert) 115 return (cmd_nvl_create_fault(hdl, fltnm, cert, bank->bank_asru_nvl, 112 cmd_bank_create_fault(fmd_hdl_t *hdl, cmd_bank_t *bank, const char *fltnm, uint_t cert) argument
|
H A D | cmd_dimm.c | 80 uint_t cert) 92 flt = cmd_nvl_create_fault(hdl, fltnm, cert, 96 flt = cmd_nvl_create_fault(hdl, fltnm, cert, 102 return (cmd_nvl_create_fault(hdl, fltnm, cert, dimm->dimm_asru_nvl, 79 cmd_dimm_create_fault(fmd_hdl_t *hdl, cmd_dimm_t *dimm, const char *fltnm, uint_t cert) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
H A D | p12split.c | 52 /* The following match/cert values require PKCS12 */ 58 #define IO_CERTFILE 2 /* Have a separate cert file or data */ 236 (void) printf(gettext("\nMain cert:\n")); 268 gettext("\nTrust Anchor cert %d:\n"), i); 318 * is no trust anchor but is a regular cert, use it instead. Do this 319 * to handle the insanity with openssl, which requires a matching cert 369 (void) fprintf(stderr, gettext(" Removing cert\n")); 384 (void) fprintf(stderr, gettext(" Removing cert\n")); 395 time_check_print(X509 *cert) argument 400 ret = time_check(cert); 438 time_check(X509 *cert) argument 527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) argument [all...] |
/illumos-gate/usr/src/cmd/fm/modules/sun4u/cpumem-diagnosis/ |
H A D | cmd_cpu_arch.c | 256 cmd_nvl_create_fault(fmd_hdl_t *hdl, const char *class, uint8_t cert, argument 261 return (fmd_nvl_create_fault(hdl, class, cert, asru, fru, rsrc));
|
H A D | cmd_oplerr.c | 145 uint8_t cert; local 216 cert = opl_avg(100, nsusp); 230 opl_cpu->oc_cmd_cpu, fltname, cpu_rsrc, cert);
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 58 X509 *cert; member in struct:_pkinit_cred_info 70 int cert_index; /* cert to use out of available certs*/ 187 EVP_PKEY *pkey, X509 *cert);
|
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 35 import java.security.cert.*; 289 * cert has been signed by someDN. 302 X509Certificate cert = getCert(someDN, ks); 305 myCert.getSubjectDN().toString(), cert.getSubjectDN()); 310 * is in ab's cert chain. 313 // Get cert for input DN 338 // Get cert for input DN 370 X509Certificate cert = getSignAsCert(); 373 if (cert == null) { 378 String DN = cert 867 checkSPIs(X509Certificate cert, KeyStore ks) argument [all...] |
/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 75 * cert 83 * We then verify the given cert using the publickey of a TA. 84 * If the passed in cert is a TA or it has been verified already we 89 elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert) argument 95 if ((cert->c_verified == E_OK) || (cert->c_verified == E_IS_TA)) { 121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, 131 cert, CACERT); local 132 cert->c_verified = E_OK; 140 KMF_CERT_DATA_ATTR, &cert 150 cert, OBJCACERT); local 169 cert, SECACERT); local 195 ELFCert_t cert = NULL; local 305 (ess->es_certCAcallback)(ess->es_callbackctx, cert, local 338 elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, const char *pathname) argument 396 elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, const char *token_label, const char *pin) argument 496 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument 580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument 635 elfcertlib_getdn(ELFCert_t cert) argument 650 elfcertlib_getissuer(ELFCert_t cert) argument 742 elfcertlib_releasecert(ELFsign_t ess, ELFCert_t cert) argument 757 ELFCert_t cert = NULL; local 782 elfcertlib_freecert(ELFsign_t ess, ELFCert_t cert) argument [all...] |
/illumos-gate/usr/src/cmd/fm/modules/sun4v/cpumem-diagnosis/ |
H A D | cmd_branch.c | 310 uint_t cert = 0; local 362 cert = (100 - CMD_BOARDS_CERT) / dimm_count; 371 flt = cmd_dimm_create_fault(hdl, dimm, fltnm, cert);
|
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslioctl.c | 60 certificate_free(Certificate_t *cert) argument 62 kmem_free(cert->msg, cert->len); 63 kmem_free(cert, sizeof (struct Certificate)); 110 Certificate_t *cert; local 119 if ((cert = kssl_entry->ke_server_certificate) != NULL) { 120 certificate_free(cert); 194 Certificate_t *cert; local 268 cert = kmem_alloc(sizeof (Certificate_t), KM_SLEEP); 269 cert 400 create_kssl_entry(kssl_params_t *kssl_params, Certificate_t *cert, crypto_key_t *privkey) argument 533 Certificate_t *cert; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.c | 510 * cert: TRUE for certificate (use cert_dest) 525 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) 540 if (cert) { 1327 certificate_obj_t *cert; local 1748 cert = calloc(1, sizeof (certificate_obj_t)); 1749 if (cert == NULL) { 1752 (void) memset((void *)cert, 0, sizeof (certificate_obj_t)); 1754 cert->certificate_type = certtype; 1755 objp->object_class_u.certificate = cert; 1761 &cert 524 soft_unpack_obj_attribute(uchar_t *buf, biginteger_t *key_dest, cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) argument [all...] |