Searched refs:certs (Results 1 - 15 of 15) sorted by relevance

/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Dcerts.c64 * incert - File to read certs and keys from
74 * is returned. If no certs are found, but one or more
85 STACK_OF(X509) *certs = NULL;
107 &data, &keys, &certs) < 0) {
118 if (cert && (certs != NULL)) {
119 if (sk_X509_num(certs) != 1) {
124 tmpcert = sk_X509_value(certs, 0);
177 * incert - File to read certs and keys from
180 * certs - Location to store resulting cert if found.
182 * Returns: 0 - success, all certs place
186 load_all_certs(PKG_ERR *err, FILE *incert, keystore_encoding_format_t format, char *passarg, STACK_OF(X509) **certs) argument
[all...]
H A DMakefile30 certs.o \
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dksslutil.c44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs)
90 *certs = tcerts;
104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs)
150 if (certs != NULL)
151 *certs = tcerts;
42 PKCS12_get_rsa_key_certs(KMF_HANDLE_T kmfh, const char *filename, const char *password_file, KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) argument
102 PEM_get_rsa_key_certs(KMF_HANDLE_T kmfh, const char *filename, char *password_file, KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) argument
H A Dkssladm_create.c83 * The address of the certs and key attributes values are offsets
89 KMF_X509_DER_CERT *certs, int *paramsize,
129 tcsize += certs[i].certificate.Length;
272 uint32_t certsz = (uint32_t)certs[i].certificate.Length;
284 bcopy(certs[i].certificate.Data, buf,
285 certs[i].certificate.Length);
286 buf += certs[i].certificate.Length;
766 KMF_X509_DER_CERT *certs = NULL; local
793 certs = (KMF_X509_DER_CERT *)malloc(ncerts *
795 if (certs
88 kmf_to_kssl(int nxkey, KMF_RAW_KEY_DATA *rsa, int ncerts, KMF_X509_DER_CERT *certs, int *paramsize, char *token_label, KMF_DATA *idstr, KMF_CREDENTIAL *creds) argument
870 KMF_X509_DER_CERT *certs = NULL; local
901 KMF_X509_DER_CERT *certs = NULL; local
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dimport.c63 KMF_X509_DER_CERT *certs = NULL; local
73 &certs, &ncerts, &keys, &nkeys);
116 if (certs[i].kmf_private.label != NULL) {
119 certs[i].kmf_private.label,
120 strlen(certs[i].kmf_private.label));
124 KMF_CERT_DATA_ATTR, &certs[i].certificate,
174 KMF_CERT_DATA_ATTR, &certs[i],
192 if (certs) {
194 kmf_free_kmf_cert(kmfhandle, &certs[i]);
195 free(certs);
216 KMF_X509_DER_CERT *certs = NULL; local
494 KMF_X509_DER_CERT *certs = NULL; local
[all...]
H A Dlist.c43 pk_show_certs(KMF_HANDLE_T kmfhandle, KMF_X509_DER_CERT *certs, int num_certs) argument
60 if (certs[i].kmf_private.label != NULL)
62 (certs[i].kmf_private.keystore_type ==
64 certs[i].kmf_private.label);
65 if (kmf_get_cert_id_str(&certs[i].certificate,
69 &certs[i].certificate, &subject) == KMF_OK)
73 &certs[i].certificate, &issuer) == KMF_OK)
77 &certs[i].certificate, &start) == KMF_OK)
81 &certs[i].certificate, &end) == KMF_OK)
85 &certs[
[all...]
/illumos-gate/usr/src/common/net/wanboot/
H A Dp12auxutl.c82 * Given one or more of user private key, user cert and/or other (CA) certs,
91 * certs - Points to stack of client (public ke) certs
92 * cacerts - Points to stack of 'certificate authority' certs (or trust
104 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts)
133 if (certs != NULL && sk_X509_num(certs) > 0) {
135 for (i = 0; i < sk_X509_num(certs); i++) {
136 cert = sk_X509_value(certs, i);
184 /* Put all certs i
103 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument
[all...]
H A Dp12misc.c100 * sunw_split_certs() - Given a list of certs and a list of private keys,
101 * moves certs which match one of the keys to a different stack.
105 * allcerts - Points to a stack of certs to be searched.
106 * keycerts - Points to address of a stack of certs with matching private
111 * certs. Keys are moved from 'allkeys' here when they have no
112 * matching certs. If this is NULL, matchless keys will be
115 * Notes: If an error occurs while moving certs, the cert being move may be
116 * lost. 'keycerts' may only contain part of the matching certs. The number
117 * of certs successfully moved can be found by checking sk_X509_num(keycerts).
122 * If all certs ar
494 sunw_find_localkeyid(char *keyid_str, int len, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) argument
566 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 ** matching_cert) argument
[all...]
H A Dauxutil.c187 * set_results - Given two pointers to stacks of private keys, certs or CA
188 * CA certs, either copy the second stack to the first, or append the
194 * certs - Points to stack of certs
195 * work_cl - Points to working stack of certs
196 * cacerts - Points to stack of CA certs
197 * work_ca - Points to working stack of CA certs
202 * of keys or certs. The second of the pair points at a 'working stack'
222 STACK_OF(X509) **certs, STACK_OF(X509) **work_cl,
240 if (certs !
[all...]
H A Dp12auxpars.c89 * treats the handling of the difference between CA certs and certs
92 * a CA cert. In parse_pkcs12, certs which have matching private keys are
93 * not returned as part of the CA certs.
95 * the matching of private keys and certs is done at this level, rather than
98 * return just a cert, just a private key, the stack of CA certs or any
114 * this calls lower levels with stacks of private keys and certs, rather
115 * that a cert, a private key and a stack for CA certs.
151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs);
157 * other (CA) certs
498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument
[all...]
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_auth.c726 ami_cert *certs = NULL; local
757 if ((ami_err = dld_ami_get_cert(amih, spi, &certs, &ccnt)) != AMI_OK) {
769 certs[icert].info.pubKeyInfo->algorithm,
770 certs[icert].info.pubKeyInfo->pubKey.value,
771 certs[icert].info.pubKeyInfo->pubKey.length,
780 err = check_spis(amih, certs, icert, spi);
783 if (certs) {
784 dld_ami_free_cert_list(&certs, ccnt);
801 ami_cert *certs; local
807 if ((status = dld_ami_get_cert(amih, NULL, &certs,
843 check_spis(ami_handle_t *amih, ami_cert *certs, int icert, const char *spi) argument
[all...]
/illumos-gate/usr/src/lib/libpkg/common/
H A Dp12lib.c225 * other (CA) certs. Note either ca should be NULL, *ca should be NULL,
233 * matchty - Info about which certs/keys to return if many are in the file.
243 * authority' certs/trust anchors.
246 * and/or 'name_str', as appropriate. Go through the lists of certs and
260 * Append to the CA list, the certs which do not have matching private
263 * If none of the bits are set, no client certs or private keys will be
264 * returned. CA (aka trust anchor) certs can be.
266 * Notes: If #3 is selected, then #4 will never occur. CA certs will be
357 * Parse and decrypt a PEM file, returning any user keys and certs.
373 * certs
391 sunw_PEM_contents(FILE *fp, pem_password_cb *cb, void *userdata, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument
455 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument
637 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument
1191 sunw_find_localkeyid(char *keyid_str, int len, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) argument
1263 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 ** matching_cert) argument
2032 pem_info(FILE *fp, pem_password_cb cb, void *userdata, STACK_OF(EVP_PKEY) **pkeys, STACK_OF(X509) **certs) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c671 KMF_DATA *certs = NULL; local
684 certs = (KMF_DATA *)malloc(sizeof (KMF_DATA));
685 if (certs == NULL)
687 certs->Data = NULL;
688 certs->Length = 0;
690 pathname, certs);
692 *certlist = certs;
695 kmf_free_data(certs);
696 free(certs);
697 certs
2513 ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags) argument
3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument
3924 openssl_pkcs12_parse(PKCS12 *p12, char *pin, STACK_OF(EVP_PKEY) *keys, STACK_OF(X509) *certs, STACK_OF(X509) *ca) argument
3989 extract_pkcs12(BIO *fbio, CK_UTF8CHAR *pin, CK_ULONG pinlen, STACK_OF(EVP_PKEY) **priv_key, STACK_OF(X509) **certs, STACK_OF(X509) **ca) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c774 * Add the certs found in the trustfile found in path (a trust store) to
877 * Merge the two stacks of pkcs12 certs.
1064 STACK_OF(X509) *certs = NULL;
1083 NULL, NULL, &certs);
1092 for (i = 0; i < sk_X509_num(certs); i++) {
1094 x = sk_X509_value(certs, i);
1123 if (certs != NULL) {
1124 sk_X509_pop_free(certs, X509_free);
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c910 /* If no algorithm specified, use the certs signature alg */
2206 * More than one issuer certs are found. We will
2908 KMF_X509_DER_CERT **certs, int *ncerts,
2920 if (filename == NULL || cred == NULL || certs == NULL ||
2939 rv = import_objects(handle, filename, cred, certs, ncerts,
2906 kmf_import_objects(KMF_HANDLE_T handle, char *filename, KMF_CREDENTIAL *cred, KMF_X509_DER_CERT **certs, int *ncerts, KMF_RAW_KEY_DATA **rawkeys, int *nkeys) argument

Completed in 73 milliseconds