/vbox/src/VBox/Devices/PC/ipxe/src/crypto/ |
H A D | clientcert.c | 95 .name = "cert", 115 static void *cert = NULL; local 130 free ( cert ); 131 len = fetch_setting_copy ( NULL, &cert_setting, &cert ); 138 if ( cert ) { 139 client_certificate.data = cert; 165 "certificate:\n", ( cert ? "external" : "built-in" ) );
|
H A D | cms.c | 112 struct x509_certificate *cert; local 130 cert = x509_last ( sig->certificates ); 132 sig, cert->subject.name ); 147 * @ret cert X.509 certificate, or NULL if not found 154 struct x509_certificate *cert; local 160 cert = link->cert; 161 if ( ( asn1_compare ( issuer, &cert->issuer.raw ) == 0 ) && 162 ( asn1_compare ( serial, &cert->serial.raw ) == 0 ) ) 163 return cert; 183 struct x509_certificate *cert; local 574 cms_verify_digest( struct cms_signature *sig, struct cms_signer_info *info, struct x509_certificate *cert, userptr_t data, size_t len ) argument 626 struct x509_certificate *cert; local 675 struct x509_certificate *cert; local [all...] |
H A D | ocsp.c | 120 x509_put ( ocsp->cert ); 145 digest_update ( digest, digest_ctx, ocsp->cert->issuer.raw.data, 146 ocsp->cert->issuer.raw.len ); 155 if ( ( rc = ( asn1_prepend_raw ( builder, ocsp->cert->serial.raw.data, 156 ocsp->cert->serial.raw.len ), 170 ocsp, ocsp->cert->subject.name, strerror ( rc ) ); 174 ocsp, ocsp->cert->subject.name ); 185 ocsp, ocsp->cert->subject.name, strerror ( rc ) ); 195 * @v cert Certificate to check 200 int ocsp_check ( struct x509_certificate *cert, argument [all...] |
H A D | x509.c | 111 struct x509_certificate *cert = local 114 DBGC2 ( cert, "X509 %p freed\n", cert ); 115 free ( cert->subject.name ); 116 free ( cert->extensions.auth_info.ocsp.uri ); 117 free ( cert ); 126 struct x509_certificate *cert; local 131 list_for_each_entry_reverse ( cert, &x509_cache, list ) { 132 if ( cert->refcnt.count == 0 ) { 133 list_del ( &cert 160 x509_parse_version( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 200 x509_parse_serial( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 225 x509_parse_issuer( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 250 x509_parse_validity( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 294 x509_parse_common_name( struct x509_certificate *cert, char **name, const struct asn1_cursor *raw ) argument 352 x509_parse_subject( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 379 x509_parse_public_key( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 424 x509_parse_basic_constraints( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 486 x509_parse_key_usage( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 545 x509_parse_key_purpose( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 584 x509_parse_extended_key_usage( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 610 x509_parse_ocsp( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 675 x509_parse_access_description( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 708 x509_parse_authority_info_access( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 796 x509_parse_extension( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 864 x509_parse_extensions( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 891 x509_parse_tbscertificate( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 961 x509_parse( struct x509_certificate *cert, const struct asn1_cursor *raw ) argument 1088 x509_check_signature( struct x509_certificate *cert, struct x509_public_key *public_key ) argument 1151 x509_check_issuer( struct x509_certificate *cert, struct x509_certificate *issuer ) argument 1208 x509_fingerprint( struct x509_certificate *cert, struct digest_algorithm *digest, void *fingerprint ) argument 1226 x509_check_root( struct x509_certificate *cert, struct x509_root *root ) argument 1258 x509_check_time( struct x509_certificate *cert, time_t time ) argument 1293 x509_validate( struct x509_certificate *cert, struct x509_certificate *issuer, time_t time, struct x509_root *root ) argument 1439 struct x509_certificate *cert; local 1472 struct x509_certificate *cert; local 1497 struct x509_certificate *cert; local [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/include/ipxe/ |
H A D | ocsp.h | 70 struct x509_certificate *cert; member in struct:ocsp_check 101 extern int ocsp_check ( struct x509_certificate *cert,
|
H A D | x509.h | 188 * @v cert X.509 certificate 189 * @ret cert X.509 certificate 192 x509_get ( struct x509_certificate *cert ) { 193 ref_get ( &cert->refcnt ); 194 return cert; 200 * @v cert X.509 certificate 203 x509_put ( struct x509_certificate *cert ) { 204 ref_put ( &cert->refcnt ); 212 struct x509_certificate *cert; member in struct:x509_link 249 * @ret cert [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/net/ |
H A D | validator.c | 212 struct x509_certificate *cert; local 246 cert = x509_last ( certs ); 248 validator, cert->subject.name );
|
H A D | tls.c | 911 struct x509_certificate *cert; local 923 &cert ) ) != 0 ) { 928 tls->verify_pubkey = cert->signature_algorithm->pubkey; 929 x509_put ( cert ); 930 cert = NULL; 1308 struct x509_certificate *cert; local 1345 cert = x509_last ( tls->chain ); 1347 tls, cert->subject.name ); 2204 struct x509_certificate *cert; local 2218 cert [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/tests/ |
H A D | ocsp_test.c | 38 * openssl ocsp -no_nonce -issuer issuer.crt -cert cert.crt \ 60 struct x509_certificate *cert; member in struct:ocsp_test_certificate 66 struct ocsp_test_certificate *cert; member in struct:ocsp_test 97 .cert = CERT, \ 111 struct x509_certificate *cert = test->cert->cert; local 112 struct x509_certificate *issuer = test->issuer->cert; 115 x509_invalidate ( cert ); [all...] |
H A D | x509_test.c | 51 struct x509_certificate *cert; member in struct:x509_test_certificate 700 &(crt)->cert ) == 0 ); \ 712 ok ( temp == (crt)->cert ); \ 723 x509_fingerprint ( (crt)->cert, &x509_test_algorithm, \ 736 ok ( x509_check_issuer ( (crt)->cert, (issuer)->cert ) == 0 ); \ 746 ok ( x509_check_issuer ( (crt)->cert, (issuer)->cert ) != 0 ); \ 756 ok ( x509_check_root ( (crt)->cert, root ) == 0 ); \ 766 ok ( x509_check_root ( (crt)->cert, roo [all...] |
/vbox/src/VBox/RDP/client-1.8.3/ |
H A D | ssl.c | 140 rdssl_cert_free(RDSSL_CERT * cert) argument 142 X509_free(cert); 147 rdssl_cert_to_rkey(RDSSL_CERT * cert, uint32 * key_len) argument 158 nid = OBJ_obj2nid(cert->cert_info->key->algor->algorithm); 162 ASN1_OBJECT_free(cert->cert_info->key->algor->algorithm); 163 cert->cert_info->key->algor->algorithm = OBJ_nid2obj(NID_rsaEncryption); 165 epk = X509_get_pubkey(cert); 195 rdssl_cert_print_fp(FILE * fp, RDSSL_CERT * cert) argument 197 return X509_print_fp(fp, cert);
|
H A D | tcp.c | 384 X509 *cert = NULL; local 393 cert = SSL_get_peer_certificate(g_ssl); 394 if (cert == NULL) 400 pkey = X509_get_pubkey(cert); 420 if (cert) 421 X509_free(cert);
|
/vbox/src/VBox/Runtime/common/misc/ |
H A D | http.cpp | 293 BIO *cert = BIO_new_mem_buf(pcszCert, (int)cbCert); local 294 if (cert) 297 if (PEM_read_bio_X509(cert, &crt, NULL, NULL)) 338 BIO_free(cert);
|