Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 25 of 535) sorted by relevance

12345678910>>...22

/freebsd/crypto/openssl/test/recipes/
H A D25-test_req.t541 my $cert = shift @_;
542 my $ss = $cert =~ m/self-signed/;
543 my $is_ca = $cert =~ m/CA/;
548 "-subj", "/CN=$cn", @_, "-out", $cert);
551 ok(run(app([@cmd])), "generate $cert");
555 my $cert = shift @_;
557 cert_contains($cert, "Key Usage", $expect);
560 my $cert = shift @_;
563 $trusted = $cert unless $trusted;
565 "-partial_chain", $cert])) == $expect,
[all …]
/freebsd/crypto/openssl/test/certs/
H A Dsetup.sh4 ./mkcert.sh genroot "Root CA" root-key root-cert
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
14 openssl x509 -in root-cert.pem -trustout \
16 openssl x509 -in root-cert.pem -trustout \
18 openssl x509 -in root-cert.pem -trustout \
20 openssl x509 -in root-cert.pem -trustout \
23 openssl x509 -in root-cert.pem -trustout \
25 openssl x509 -in root-cert.pem -trustout \
43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5
46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768
[all …]
H A Dmkcert.sh90 cert() { function
91 local cert=$1; shift
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
102 local cert=$1; shift
115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}"
135 local cert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
163 local cert=$1; shift
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
188 local cert=$1; shift
[all …]
/freebsd/crypto/heimdal/lib/hx509/
H A Dtest_ca.in66 cert:FILE:cert-ee.pem \
76 cert:FILE:cert-ee.pem \
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert-ee.pem \
97 FILE:cert-ee.pem || exit 1
101 cert:FILE:cert-ee.pem \
153 cert:FILE:cert-ee.pem \
159 cert:FILE:cert-ee.pem \
165 cert:FILE:cert-ee.pem \
179 cert:FILE:cert-ee.pem \
[all …]
H A Dtest_chain.in52 cert:FILE:$srcdir/data/test.crt \
59 cert:FILE:$srcdir/data/test.crt \
65 cert:FILE:$srcdir/data/test.crt \
70 cert:FILE:$srcdir/data/sub-cert.crt \
76 cert:FILE:$srcdir/data/sub-cert.crt \
83 cert:FILE:$srcdir/data/sub-cert.crt \
88 cert:FILE:$srcdir/data/sub-cert.crt \
95 cert:FILE:$srcdir/data/sub-cert.crt \
102 cert:FILE:$srcdir/data/sub-cert.crt \
109 cert:FILE:$srcdir/data/sub-cert.crt \
[all …]
H A Dcert.c191 _hx509_get_cert(hx509_cert cert) in _hx509_get_cert() argument
193 return cert->data; in _hx509_get_cert()
220 hx509_cert_init(hx509_context context, const Certificate *c, hx509_cert *cert) in hx509_cert_init() argument
224 *cert = malloc(sizeof(**cert)); in hx509_cert_init()
225 if (*cert == NULL) in hx509_cert_init()
227 (*cert)->ref = 1; in hx509_cert_init()
228 (*cert)->friendlyname = NULL; in hx509_cert_init()
229 (*cert)->attrs.len = 0; in hx509_cert_init()
230 (*cert)->attrs.val = NULL; in hx509_cert_init()
231 (*cert)->private_key = NULL; in hx509_cert_init()
[all …]
H A Dtest_cert.in61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
71 cert:FILE:$srcdir/data/n0ll.pem \
76 cert:FILE:$srcdir/data/n0ll.pem \
81 cert:FILE:$srcdir/data/win-u16-in-printablestring.der \
/freebsd/contrib/wpa/src/tls/
H A Dx509v3.c45 void x509_certificate_free(struct x509_certificate *cert) in x509_certificate_free() argument
47 if (cert == NULL) in x509_certificate_free()
49 if (cert->next) { in x509_certificate_free()
52 cert, cert->next); in x509_certificate_free()
54 x509_free_name(&cert->issuer); in x509_certificate_free()
55 x509_free_name(&cert->subject); in x509_certificate_free()
56 os_free(cert->public_key); in x509_certificate_free()
57 os_free(cert->sign_value); in x509_certificate_free()
58 os_free(cert->subject_dn); in x509_certificate_free()
59 os_free(cert); in x509_certificate_free()
[all …]
/freebsd/crypto/openssh/regress/
H A Dcert-hostkey.sh6 rm -f $OBJ/known_hosts-cert* $OBJ/host_ca_key* $OBJ/host_revoked_*
19 *rsa*cert*)
26 *cert*) types="$i,$types";;
64 kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
65 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
106 $OBJ/cert_host_key_${ktype}-cert.pub || \
108 cat $OBJ/cert_host_key_${ktype}-cert.pub >> $OBJ/host_revoked_cert
117 cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
118 ${SSH} -oUserKnownHostsFile=$OBJ/known_hosts-cert \
119 -oGlobalKnownHostsFile=$OBJ/known_hosts-cert \
[all …]
H A Dagent-pkcs11-cert.sh46 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub ||
54 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
55 ${SSH_SOFTHSM_DIR}/RSA-cert.pub | sort > $OBJ/expect_list
61 ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do
68 for x in ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do
78 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
80 ${SSH_SOFTHSM_DIR}/RSA-cert.pub ||
84 ${SSH_SOFTHSM_DIR}/EC-cert.pub \
85 ${SSH_SOFTHSM_DIR}/RSA-cert.pub | sort > $OBJ/expect_list
[all …]
/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_credentials.csv1 expected,description, -section,val, -ref,val, -secret,val, -cert,val, -key,val, -keypass,val, -extr…
3 1,valid secret - wrong cert/key ignored, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.…
6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.…
9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp…
10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key…
12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,…
13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL…
14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA…
15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,…
16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,…
[all …]
/freebsd/crypto/openssh/regress/unittests/authopt/testdata/
H A Dmktestdata.sh7 rm -f *.cert
18 mv user_key-cert.pub "$output"
21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \
23 sign no_permit.cert -Oclear
25 sign no_agentfwd.cert -Ono-agent-forwarding
26 sign no_portfwd.cert -Ono-port-forwarding
27 sign no_pty.cert -Ono-pty
28 sign no_user_rc.cert -Ono-user-rc
29 sign no_x11fwd.cert -Ono-X11-forwarding
31 sign only_agentfwd.cert -Oclear -Opermit-agent-forwarding
[all …]
/freebsd/usr.sbin/certctl/
H A Dcertctl.c224 struct cert { struct
225 RB_ENTRY(cert) entry;
233 free_cert(struct cert *cert) in free_cert() argument
235 free(cert->name); in free_cert()
236 X509_free(cert->x509); in free_cert()
237 free(cert->path); in free_cert()
238 free(cert); in free_cert()
242 certcmp(const struct cert *a, const struct cert *b) in certcmp()
247 RB_HEAD(cert_tree, cert);
250 RB_GENERATE_STATIC(cert_tree, cert, entry, certcmp);
[all …]
/freebsd/contrib/ldns/
H A Ddane.c134 ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, in ldns_dane_cert2rdf() argument
147 assert(cert != NULL); in ldns_dane_cert2rdf()
152 len = (size_t)i2d_X509(cert, &buf); in ldns_dane_cert2rdf()
158 xpubkey = X509_get_X509_PUBKEY(cert); in ldns_dane_cert2rdf()
223 ldns_dane_pkix_validate(X509* cert, STACK_OF(X509)* extra_certs, in ldns_dane_pkix_validate() argument
238 cert, extra_certs) != 1) { in ldns_dane_pkix_validate()
257 ldns_dane_pkix_validate_and_get_chain(STACK_OF(X509)** chain, X509* cert, in ldns_dane_pkix_validate_and_get_chain() argument
276 cert, extra_certs) != 1) { in ldns_dane_pkix_validate_and_get_chain()
306 X509* cert, STACK_OF(X509)* extra_certs) in ldns_dane_pkix_get_chain() argument
322 cert, extra_certs) != 1) { in ldns_dane_pkix_get_chain()
[all …]
/freebsd/crypto/openssl/crypto/cmp/
H A Dcmp_vfy.c26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() argument
33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature()
41 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature()
46 pubkey = X509_get_pubkey(cert); in verify_signature()
65 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature()
103 * certs (possibly including CRLs and a cert verification callback function)
109 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path()
115 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path()
127 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
144 static int verify_cb_cert(X509_STORE *ts, X509 *cert, in in verify_cb_cert()
107 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX * ctx,X509_STORE * trusted_store,X509 * cert) OSSL_CMP_validate_cert_path() argument
142 verify_cb_cert(X509_STORE * ts,X509 * cert,int err) verify_cb_cert() argument
225 already_checked(const X509 * cert,const STACK_OF (X509)* already_checked) already_checked() argument
245 cert_acceptable(const OSSL_CMP_CTX * ctx,const char * desc1,const char * desc2,X509 * cert,const STACK_OF (X509)* already_checked1,const STACK_OF (X509)* already_checked2,const OSSL_CMP_MSG * msg) cert_acceptable() argument
368 check_msg_given_cert(const OSSL_CMP_CTX * ctx,X509 * cert,const OSSL_CMP_MSG * msg) check_msg_given_cert() argument
398 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local
[all...]
/freebsd/crypto/openssl/crypto/ocsp/
H A Docsp_srv.c155 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert)
157 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() argument
233 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_basic_sign()
235 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert)))
243 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_name()
255 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex()
276 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key_ex()
278 if (cert == NULL)
280 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key()
236 OCSP_RESPID_set_by_name(OCSP_RESPID * respid,X509 * cert) OCSP_RESPID_set_by_name() argument
246 OCSP_RESPID_set_by_key_ex(OCSP_RESPID * respid,X509 * cert,OSSL_LIB_CTX * libctx,const char * propq) OCSP_RESPID_set_by_key_ex() argument
279 OCSP_RESPID_set_by_key(OCSP_RESPID * respid,X509 * cert) OCSP_RESPID_set_by_key() argument
286 OCSP_RESPID_match_ex(OCSP_RESPID * respid,X509 * cert,OSSL_LIB_CTX * libctx,const char * propq) OCSP_RESPID_match_ex() argument
322 OCSP_RESPID_match(OCSP_RESPID * respid,X509 * cert) OCSP_RESPID_match() argument
[all...]
/freebsd/crypto/openssl/crypto/ess/
H A Dess_lib.c18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert,
21 const X509 *cert,
48 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local
50 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL) { in OSSL_ESS_signing_cert_new_init()
67 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument
78 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) { in ESS_CERT_ID_new_init()
101 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) { in ESS_CERT_ID_new_init()
112 = ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) in ESS_CERT_ID_new_init()
150 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local
152 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init()
171 ESS_CERT_ID_V2_new_init(const EVP_MD * hash_alg,const X509 * cert,int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument
250 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL * is,const X509 * cert) ess_issuer_serial_cmp() argument
273 const X509 *cert; find() local
[all...]
/freebsd/crypto/openssl/test/
H A Dpkcs12_api_test.c64 static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca) in changepass() argument
90 if (!TEST_ptr(cert2) || !TEST_int_eq(X509_cmp(cert, cert2), 0)) in changepass()
108 X509 *cert = NULL; in pkcs12_parse_test() local
116 if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) in pkcs12_parse_test()
121 if ((has_cert && !TEST_ptr(cert)) || (!has_cert && !TEST_ptr_null(cert))) in pkcs12_parse_test()
125 if (has_key && !changepass(p12, key, cert, ca)) in pkcs12_parse_test()
132 X509_free(cert); in pkcs12_parse_test()
143 static PKCS12 *pkcs12_create_ex2_setup(EVP_PKEY **key, X509 **cert, STACK_OF(X509) **ca) in pkcs12_create_ex2_setup() argument
150 if (!TEST_true(PKCS12_parse(p12, "", key, cert, c in pkcs12_create_ex2_setup()
164 X509 *cert = NULL; pkcs12_create_ex2_test() local
[all...]
/freebsd/crypto/openssl/test/ssl-tests/
H A D20-cert-select.cnf.in30 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
32 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
34 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
40 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
42 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
44 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
46 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
52 "Certificate" => test_pem("server-pss-cert.pem"),
57 "Certificate" => test_pem("server-pss-restrict-cert.pem"),
70 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
[all …]
/freebsd/crypto/openssl/ssl/
H A Dssl_cert.c95 CERT *ssl_cert_dup(CERT *cert)
106 ret->ssl_pkey_num = cert->ssl_pkey_num; in ssl_cert_dup()
113 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup()
120 if (cert->dh_tmp != NULL) { in ssl_cert_dup()
121 if (!EVP_PKEY_up_ref(cert->dh_tmp)) in ssl_cert_dup()
123 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup()
126 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup()
127 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup()
130 CERT_PKEY *cpk = cert in ssl_cert_dup()
96 ssl_cert_dup(CERT * cert) ssl_cert_dup() argument
[all...]
/freebsd/crypto/openssl/test/ocsp-tests/
H A Dmk-ocsp-cert-chain.sh28 -out root-cert.pem
51 -CA root-cert.pem \
55 -out intermediate-cert.pem
80 -CA intermediate-cert.pem \
84 -out server-cert.pem
91 -valid server-cert.pem \
93 -cert intermediate-cert.pem
97 cat server-cert.pem server-key.pem intermediate-cert.pem > server.pem
98 cat intermediate-cert.pem intermediate-key.pem > ocsp.pem
/freebsd/crypto/openssh/
H A Dsshkey.c233 return impl->cert; in sshkey_type_is_cert()
260 if (allow_short && !impl->cert && impl->shortname != NULL && in type_from_name()
343 if ((certs_only && !impl->cert) || (plain_only && impl->cert)) in sshkey_alg_list()
422 return !impl->cert; in sshkey_type_is_valid_ca()
674 cert_free(struct sshkey_cert *cert) in cert_free() argument
678 if (cert == NULL) in cert_free()
680 sshbuf_free(cert->certblob); in cert_free()
681 sshbuf_free(cert->critical); in cert_free()
682 sshbuf_free(cert->extensions); in cert_free()
683 free(cert->key_id); in cert_free()
[all …]
/freebsd/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c423 ASSERT_PTR_NE(k1->cert, NULL); in sshkey_tests()
424 k1->cert->type = SSH2_CERT_TYPE_USER; in sshkey_tests()
425 k1->cert->serial = 1234; in sshkey_tests()
426 k1->cert->key_id = strdup("estragon"); in sshkey_tests()
427 ASSERT_PTR_NE(k1->cert->key_id, NULL); in sshkey_tests()
428 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); in sshkey_tests()
429 ASSERT_PTR_NE(k1->cert->principals, NULL); in sshkey_tests()
430 k1->cert->principals[0] = strdup("estragon"); in sshkey_tests()
431 k1->cert->principals[1] = strdup("vladimir"); in sshkey_tests()
432 k1->cert->principals[2] = strdup("pozzo"); in sshkey_tests()
[all …]
/freebsd/crypto/openssl/fuzz/
H A Dserver.c2331 X509 *cert;
2366 cert = d2i_X509(NULL, &bufp, sizeof(kCertificateDER));
2367 OPENSSL_assert(cert != NULL);
2368 ret = SSL_CTX_use_certificate(ctx, cert);
2370 X509_free(cert);
2389 cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL);
2390 OPENSSL_assert(cert != NULL);
2392 ret = SSL_CTX_use_certificate(ctx, cert);
2394 X509_free(cert);
2413 cert
527 X509 *cert; FuzzerTestOneInput() local
[all...]
H A Ddtlsserver.c3443 X509 *cert;
3481 cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL);
3483 OPENSSL_assert(cert != NULL);
3484 ret = SSL_CTX_use_certificate(ctx, cert);
3486 X509_free(cert);
3505 cert = PEM_read_bio_X509(bio_buf, NULL, NULL, NULL);
3506 OPENSSL_assert(cert != NULL);
3508 ret = SSL_CTX_use_certificate(ctx, cert);
3510 X509_free(cert);
3529 cert
602 X509 *cert; FuzzerTestOneInput() local
[all...]

12345678910>>...22