/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 64 * incert - File to read certs and keys from 74 * is returned. If no certs are found, but one or more 85 STACK_OF(X509) *certs = NULL; 107 &data, &keys, &certs) < 0) { 118 if (cert && (certs != NULL)) { 119 if (sk_X509_num(certs) != 1) { 124 tmpcert = sk_X509_value(certs, 0); 177 * incert - File to read certs and keys from 180 * certs - Location to store resulting cert if found. 182 * Returns: 0 - success, all certs place 186 load_all_certs(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, STACK_OF(X509) **certs) argument [all...] |
/illumos-gate/usr/src/common/net/wanboot/ |
H A D | p12auxutl.c | 82 * Given one or more of user private key, user cert and/or other (CA) certs, 91 * certs - Points to stack of client (public ke) certs 92 * cacerts - Points to stack of 'certificate authority' certs (or trust 104 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) 133 if (certs != NULL && sk_X509_num(certs) > 0) { 135 for (i = 0; i < sk_X509_num(certs); i++) { 136 cert = sk_X509_value(certs, i); 184 /* Put all certs i 103 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument [all...] |
H A D | p12auxpars.c | 89 * treats the handling of the difference between CA certs and certs 92 * a CA cert. In parse_pkcs12, certs which have matching private keys are 93 * not returned as part of the CA certs. 95 * the matching of private keys and certs is done at this level, rather than 98 * return just a cert, just a private key, the stack of CA certs or any 114 * this calls lower levels with stacks of private keys and certs, rather 115 * that a cert, a private key and a stack for CA certs. 151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs); 157 * other (CA) certs 498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument [all...] |
H A D | p12misc.c | 100 * sunw_split_certs() - Given a list of certs and a list of private keys, 101 * moves certs which match one of the keys to a different stack. 105 * allcerts - Points to a stack of certs to be searched. 106 * keycerts - Points to address of a stack of certs with matching private 111 * certs. Keys are moved from 'allkeys' here when they have no 112 * matching certs. If this is NULL, matchless keys will be 115 * Notes: If an error occurs while moving certs, the cert being move may be 116 * lost. 'keycerts' may only contain part of the matching certs. The number 117 * of certs successfully moved can be found by checking sk_X509_num(keycerts). 122 * If all certs ar 494 sunw_find_localkeyid(char *keyid_str, int len, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) argument 566 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 ** matching_cert) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | ksslutil.c | 44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) 90 *certs = tcerts; 104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) 150 if (certs != NULL) 151 *certs = tcerts; 42 PKCS12_get_rsa_key_certs(KMF_HANDLE_T kmfh, const char *filename, const char *password_file, KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) argument 102 PEM_get_rsa_key_certs(KMF_HANDLE_T kmfh, const char *filename, char *password_file, KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) argument
|
H A D | kssladm_create.c | 83 * The address of the certs and key attributes values are offsets 89 KMF_X509_DER_CERT *certs, int *paramsize, 129 tcsize += certs[i].certificate.Length; 272 uint32_t certsz = (uint32_t)certs[i].certificate.Length; 284 bcopy(certs[i].certificate.Data, buf, 285 certs[i].certificate.Length); 286 buf += certs[i].certificate.Length; 766 KMF_X509_DER_CERT *certs = NULL; local 793 certs = (KMF_X509_DER_CERT *)malloc(ncerts * 795 if (certs 88 kmf_to_kssl(int nxkey, KMF_RAW_KEY_DATA *rsa, int ncerts, KMF_X509_DER_CERT *certs, int *paramsize, char *token_label, KMF_DATA *idstr, KMF_CREDENTIAL *creds) argument 870 KMF_X509_DER_CERT *certs = NULL; local 901 KMF_X509_DER_CERT *certs = NULL; local [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | list.c | 43 pk_show_certs(KMF_HANDLE_T kmfhandle, KMF_X509_DER_CERT *certs, int num_certs) argument 60 if (certs[i].kmf_private.label != NULL) 62 (certs[i].kmf_private.keystore_type == 64 certs[i].kmf_private.label); 65 if (kmf_get_cert_id_str(&certs[i].certificate, 69 &certs[i].certificate, &subject) == KMF_OK) 73 &certs[i].certificate, &issuer) == KMF_OK) 77 &certs[i].certificate, &start) == KMF_OK) 81 &certs[i].certificate, &end) == KMF_OK) 85 &certs[ [all...] |
H A D | import.c | 63 KMF_X509_DER_CERT *certs = NULL; local 73 &certs, &ncerts, &keys, &nkeys); 116 if (certs[i].kmf_private.label != NULL) { 119 certs[i].kmf_private.label, 120 strlen(certs[i].kmf_private.label)); 124 KMF_CERT_DATA_ATTR, &certs[i].certificate, 174 KMF_CERT_DATA_ATTR, &certs[i], 192 if (certs) { 194 kmf_free_kmf_cert(kmfhandle, &certs[i]); 195 free(certs); 216 KMF_X509_DER_CERT *certs = NULL; local 494 KMF_X509_DER_CERT *certs = NULL; local [all...] |
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_auth.c | 726 ami_cert *certs = NULL; local 757 if ((ami_err = dld_ami_get_cert(amih, spi, &certs, &ccnt)) != AMI_OK) { 769 certs[icert].info.pubKeyInfo->algorithm, 770 certs[icert].info.pubKeyInfo->pubKey.value, 771 certs[icert].info.pubKeyInfo->pubKey.length, 780 err = check_spis(amih, certs, icert, spi); 783 if (certs) { 784 dld_ami_free_cert_list(&certs, ccnt); 801 ami_cert *certs; local 807 if ((status = dld_ami_get_cert(amih, NULL, &certs, 843 check_spis(ami_handle_t *amih, ami_cert *certs, int icert, const char *spi) argument [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 225 * other (CA) certs. Note either ca should be NULL, *ca should be NULL, 233 * matchty - Info about which certs/keys to return if many are in the file. 243 * authority' certs/trust anchors. 246 * and/or 'name_str', as appropriate. Go through the lists of certs and 260 * Append to the CA list, the certs which do not have matching private 263 * If none of the bits are set, no client certs or private keys will be 264 * returned. CA (aka trust anchor) certs can be. 266 * Notes: If #3 is selected, then #4 will never occur. CA certs will be 357 * Parse and decrypt a PEM file, returning any user keys and certs. 373 * certs 391 sunw_PEM_contents(FILE *fp, pem_password_cb *cb, void *userdata, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 455 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 637 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument 1191 sunw_find_localkeyid(char *keyid_str, int len, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) argument 1263 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 ** matching_cert) argument 2032 pem_info(FILE *fp, pem_password_cb cb, void *userdata, STACK_OF(EVP_PKEY) **pkeys, STACK_OF(X509) **certs) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 910 /* If no algorithm specified, use the certs signature alg */ 2206 * More than one issuer certs are found. We will 2908 KMF_X509_DER_CERT **certs, int *ncerts, 2920 if (filename == NULL || cred == NULL || certs == NULL || 2939 rv = import_objects(handle, filename, cred, certs, ncerts, 2906 kmf_import_objects(KMF_HANDLE_T handle, char *filename, KMF_CREDENTIAL *cred, KMF_X509_DER_CERT **certs, int *ncerts, KMF_RAW_KEY_DATA **rawkeys, int *nkeys) argument
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 671 KMF_DATA *certs = NULL; local 684 certs = (KMF_DATA *)malloc(sizeof (KMF_DATA)); 685 if (certs == NULL) 687 certs->Data = NULL; 688 certs->Length = 0; 690 pathname, certs); 692 *certlist = certs; 695 kmf_free_data(certs); 696 free(certs); 697 certs 2513 ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument 3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument 3924 openssl_pkcs12_parse(PKCS12 *p12, char *pin, STACK_OF(EVP_PKEY) *keys, STACK_OF(X509) *certs, STACK_OF(X509) *ca) argument 3989 extract_pkcs12(BIO *fbio, CK_UTF8CHAR *pin, CK_ULONG pinlen, STACK_OF(EVP_PKEY) **priv_key, STACK_OF(X509) **certs, STACK_OF(X509) **ca) argument [all...] |