| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_clnt.c | 57 pkinit_req_context reqctx, krb5_timestamp ctsec, 64 pkinit_req_context reqctx, krb5_preauthtype pa_type, 74 pkinit_req_context reqctx, in pa_pkinit_gen_req() argument 96 reqctx->pa_type = pa_type; in pa_pkinit_gen_req() 106 retval = pkinit_get_kdc_cert(context, plgctx->cryptoctx, reqctx->cryptoctx, in pa_pkinit_gen_req() 107 reqctx->idctx, request->server); in pa_pkinit_gen_req() 136 retval = pkinit_as_req_create(context, plgctx, reqctx, ctsec, cusec, in pa_pkinit_gen_req() 175 pkinit_req_context reqctx, krb5_timestamp ctsec, in pkinit_as_req_create() argument 186 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type); in pkinit_as_req_create() 194 if (!reqctx->opts->disable_freshness) in pkinit_as_req_create() [all …]
|
| H A D | pkinit_srv.c | 41 pkinit_kdc_req_context reqctx; member 174 pkinit_kdc_req_context reqctx, in verify_client_san() argument 191 reqctx->cryptoctx, plgctx->idctx, in verify_client_san() 285 pkinit_kdc_req_context reqctx, in verify_client_eku() argument 300 reqctx->cryptoctx, plgctx->idctx, in verify_client_eku() 321 pkinit_kdc_context plgctx, pkinit_kdc_req_context reqctx, in authorize_cert() argument 336 ret = crypto_encode_der_cert(context, reqctx->cryptoctx, &cert, &cert_len); in authorize_cert() 342 opts.reqctx = reqctx; in authorize_cert() 433 pkinit_kdc_req_context reqctx = NULL; in pkinit_server_verify_padata() local 465 retval = pkinit_init_kdc_req_context(context, &reqctx); in pkinit_server_verify_padata() [all …]
|
| H A D | pkinit_crypto_openssl.c | 1933 pkinit_req_crypto_context reqctx, in cms_signeddata_verify() argument 2162 reqctx->received_cert = X509_dup(cert); in cms_signeddata_verify() 2179 if (reqctx->received_cert == NULL) in cms_signeddata_verify() 2182 X509_NAME_oneline(X509_get_subject_name(reqctx->received_cert), in cms_signeddata_verify() 2241 reqctx->received_cert = X509_dup(x); in cms_signeddata_verify() 2307 pkinit_req_crypto_context reqctx, in crypto_retrieve_X509_sans() argument 2481 pkinit_req_crypto_context reqctx, in crypto_retrieve_cert_sans() argument 2488 if (reqctx->received_cert == NULL) { in crypto_retrieve_cert_sans() 2493 return crypto_retrieve_X509_sans(context, plgctx, reqctx, in crypto_retrieve_cert_sans() 2494 reqctx->received_cert, princs_ret, in crypto_retrieve_cert_sans() [all …]
|
| H A D | pkinit_crypto.h | 573 crypto_encode_der_cert(krb5_context context, pkinit_req_crypto_context reqctx, 579 pkinit_req_crypto_context reqctx,
|
| H A D | pkinit.h | 303 pkinit_req_crypto_context reqctx,
|
| H A D | pkinit_matching.c | 718 pkinit_req_crypto_context reqctx, in pkinit_client_cert_match() argument 733 ret = crypto_req_cert_matching_data(context, plgctx, reqctx, &md); in pkinit_client_cert_match()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth2.c | 103 krb5_preauth_req_context reqctx = ctx->preauth_reqctx; in find_module() local 107 if (pctx == NULL || reqctx == NULL) in find_module() 114 *modreq_out = reqctx->modreqs[i]; in find_module() 210 krb5_preauth_req_context reqctx = ctx->preauth_reqctx; in k5_preauth_note_failed() local 214 for (i = 0; reqctx->failed != NULL && reqctx->failed[i] != 0; i++); in k5_preauth_note_failed() 215 newptr = realloc(reqctx->failed, (i + 2) * sizeof(*newptr)); in k5_preauth_note_failed() 218 reqctx->failed = newptr; in k5_preauth_note_failed() 219 reqctx->failed[i] = pa_type; in k5_preauth_note_failed() 220 reqctx->failed[i + 1] = 0; in k5_preauth_note_failed() 247 krb5_preauth_req_context reqctx; in k5_preauth_request_context_init() local [all …]
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_clnt.c | 2614 PACKET reqctx, extensions; in tls_process_certificate_request() local 2634 …if (!PACKET_get_length_prefixed_1(pkt, &reqctx) || !PACKET_memdup(&reqctx, &s->pha_context, &s->ph… in tls_process_certificate_request()
|