| /freebsd/crypto/heimdal/lib/asn1/ |
| H A D | rfc2459.asn1 | 24 id-heim-rsa-pkcs1-x509 OBJECT IDENTIFIER ::= { 1 2 752 43 16 1 } 145 id-x509-ce OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 29} 280 id-x509-ce-keyUsage OBJECT IDENTIFIER ::= { id-x509-ce 15 } 294 id-x509-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-x509-ce 35 } 305 id-x509-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-x509-ce 14 } 309 id-x509-ce-basicConstraints OBJECT IDENTIFIER ::= { id-x509-ce 19 } 316 id-x509-ce-nameConstraints OBJECT IDENTIFIER ::= { id-x509-ce 30 } 333 id-x509-ce-privateKeyUsagePeriod OBJECT IDENTIFIER ::= { id-x509-ce 16 } 334 id-x509-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-x509-ce 32 } 335 id-x509-ce-policyMappings OBJECT IDENTIFIER ::= { id-x509-ce 33 } [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | x509_test.c | 128 X509 *x509 = NULL; in test_asn1_item_verify() local 139 || !TEST_ptr(x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL)) in test_asn1_item_verify() 140 || !TEST_ptr(pkey = X509_get0_pubkey(x509))) in test_asn1_item_verify() 152 X509_get0_signature(&sig, &alg, x509); in test_asn1_item_verify() 156 &x509->cert_info, pkey), in test_asn1_item_verify() 176 X509_free(x509); in test_asn1_item_verify() 184 X509 *x509 = NULL; in test_x509_delete_last_extension() local 188 if (!TEST_ptr((x509 = X509_new())) in test_x509_delete_last_extension() 190 || !TEST_ptr_null(X509_get0_extensions(x509)) in test_x509_delete_last_extension() 195 || !TEST_int_eq(X509_add_ext(x509, ext, -1), 1) in test_x509_delete_last_extension() [all …]
|
| H A D | x509_check_cert_pkey_test.c | 31 X509 *x509 = NULL; in test_x509_check_cert_pkey() local 73 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); in test_x509_check_cert_pkey() 74 if (x509 == NULL) { in test_x509_check_cert_pkey() 79 result = X509_check_private_key(x509, pkey); in test_x509_check_cert_pkey() 103 X509_free(x509); in test_x509_check_cert_pkey() 125 if (it->x509 != NULL) in test_PEM_X509_INFO_read_bio()
|
| H A D | algorithmid_test.c | 280 int n, x509 = 0, spki = 0, testcount = 0; in setup_tests() local 285 x509 = 1; in setup_tests() 299 testcount = x509 + spki; in setup_tests() 311 } else if (x509 && n == 2) { in setup_tests() 319 } else if (x509 && (eecert_filename == NULL || cacert_filename == NULL)) { in setup_tests() 324 if (x509) in setup_tests()
|
| /freebsd/crypto/openssl/test/certs/ |
| H A D | setup.sh | 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert.pem -trustout \ 28 openssl x509 -in root-cert2.pem -trustout \ 30 openssl x509 -in root-cert2.pem -trustout \ 32 openssl x509 -in root-cert2.pem -trustout \ 35 openssl x509 -in root-nonca.pem -trustout \ [all …]
|
| /freebsd/crypto/openssl/demos/certs/apps/ |
| H A D | mkacerts.sh | 12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \ 18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 24 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 opensslcmd x509 -nameopt oneline -subject -issuer >client.pem 31 opensslcmd x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 33 opensslcmd x509 -nameopt oneline -subject -issuer >server.pem 38 opensslcmd x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 40 opensslcmd x509 -nameopt oneline -subject -issuer >server2.pem
|
| H A D | mkxcerts.sh | 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 16 -config apps.cnf -extensions usr_cert -x509 -nodes \ 19 -config apps.cnf -extensions usr_cert -x509 -nodes \ 28 -config apps.cnf -extensions ec_cert -x509 -nodes \ 33 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
| /freebsd/crypto/openssl/apps/ |
| H A D | nseq.c | 43 X509 *x509 = NULL; in nseq_main() local 95 while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in nseq_main() 96 if (!sk_X509_push(seq->certs, x509)) in nseq_main() 120 x509 = sk_X509_value(seq->certs, i); in nseq_main() 121 dump_cert_text(out, x509); in nseq_main() 122 PEM_write_bio_X509(out, x509); in nseq_main()
|
| H A D | ca.c | 94 EVP_PKEY *pkey, X509 *x509, 106 const char *passin, EVP_PKEY *pkey, X509 *x509, 117 X509 *x509, const char *dgst, 125 static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, 135 static int do_revoke(X509 *x509, CA_DB *db, REVINFO_TYPE rev_type, 351 X509 *x509 = NULL, *x509p = NULL, *x = NULL; in ca_main() local 652 x509 = load_cert_pass(certfile, certformat, 1, passin, "CA certificate"); in ca_main() 653 if (x509 == NULL) in ca_main() 656 if (!X509_check_private_key(x509, pkey)) { in ca_main() 663 x509p = x509; in ca_main() [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 25-test_verify_store.t | 42 x509( 'convert request into self-signed cert', 51 x509( 'convert cert into a cert request', 83 x509( 'sign user cert request', 96 x509( 'Certificate details', 113 sub x509 {
|
| /freebsd/contrib/libfido2/regress/ |
| H A D | cred.c | 469 static const unsigned char x509[742] = { variable 2266 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in valid_cred() 2291 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_cdh() 2315 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_rp_id() 2340 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_rp_name() 2368 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_authdata() 2418 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_sig() 2442 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in no_fmt() 2466 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in wrong_options() 2497 assert(fido_cred_set_x509(c, x509, sizeof(x509)) == FIDO_OK); in junk_cdh() [all …]
|
| /freebsd/crypto/openssl/demos/certs/ |
| H A D | mkcerts.sh | 13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \ 19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \ 26 opensslcmd x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 33 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 40 opensslcmd x509 -req -in rreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 47 opensslcmd x509 -req -in respreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ 75 opensslcmd x509 -req -in dhcreq.pem -CA root.pem -days 3600 \
|
| /freebsd/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_kiss.c | 194 X509 *x509; in parse_bag() local 238 if ((x509 = PKCS12_SAFEBAG_get1_cert_ex(bag, libctx, propq)) == NULL) in parse_bag() 240 if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { in parse_bag() 241 X509_free(x509); in parse_bag() 250 r = X509_alias_set1(x509, data, len); in parse_bag() 253 X509_free(x509); in parse_bag() 259 if (!sk_X509_push(ocerts, x509)) { in parse_bag() 260 X509_free(x509); in parse_bag()
|
| /freebsd/usr.sbin/certctl/ |
| H A D | certctl.c | 228 X509 *x509; member 236 X509_free(cert->x509); in free_cert() 244 return (X509_cmp(a->x509, b->x509)); in certcmp() 264 find_cert(struct cert_tree *haystack, X509 *x509) in find_cert() argument 266 struct cert needle = { .x509 = x509 }; in find_cert() 316 X509 *x509; in read_cert() local 327 (x509 = PEM_read_X509(f, NULL, NULL, NULL)) != NULL; in read_cert() 329 hash = X509_subject_name_hash(x509); in read_cert() 330 if (exclude && find_cert(exclude, x509)) { in read_cert() 332 X509_free(x509); in read_cert() [all …]
|
| /freebsd/crypto/openssl/crypto/pkcs7/ |
| H A D | pk7_lib.c | 257 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) in PKCS7_add_certificate() argument 275 return ossl_x509_add_cert_new(sk, x509, X509_ADD_FLAG_UP_REF); in PKCS7_add_certificate() 346 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, in PKCS7_SIGNER_INFO_set() argument 355 X509_get_issuer_name(x509))) in PKCS7_SIGNER_INFO_set() 363 if (!(p7i->issuer_and_serial->serial = ASN1_INTEGER_dup(X509_get0_serialNumber(x509)))) in PKCS7_SIGNER_INFO_set() 396 PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, in PKCS7_add_signature() argument 414 if (PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst) <= 0) in PKCS7_add_signature() 572 PKCS7_RECIP_INFO *PKCS7_add_recipient(PKCS7 *p7, X509 *x509) in PKCS7_add_recipient() argument 578 if (PKCS7_RECIP_INFO_set(ri, x509) <= 0) in PKCS7_add_recipient() 625 int PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) in PKCS7_RECIP_INFO_set() argument [all …]
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_rsa.c | 21 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx); 142 if (c->pkeys[i].x509 != NULL in ssl_set_pkey() 143 && !X509_check_private_key(c->pkeys[i].x509, pkey)) in ssl_set_pkey() 304 X509_free(c->pkeys[i].x509); in ssl_set_cert() 305 c->pkeys[i].x509 = x; in ssl_set_cert() 979 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 996 rv = ssl_security_cert(sc, ctx, x509, 0, 1); in ssl_set_cert_and_key() 1009 pubkey = X509_get_pubkey(x509); /* bumps reference */ in ssl_set_cert_and_key() 1047 …if (!override && (c->pkeys[i].x509 != NULL || c->pkeys[i].privatekey != NULL || c->pkeys[i].chain … in ssl_set_cert_and_key() 1061 if (!X509_up_ref(x509)) { in ssl_set_cert_and_key() [all …]
|
| /freebsd/crypto/openssl/crypto/pem/ |
| H A D | pem_info.c | 97 if (xi->x509 != NULL) { in STACK_OF() 108 xi->x509 = X509_new_ex(libctx, propq); in STACK_OF() 109 if (xi->x509 == NULL) in STACK_OF() 111 pp = &(xi->x509); in STACK_OF() 193 if ((xi->x509 != NULL) || (xi->crl != NULL) || (xi->x_pkey != NULL) || (xi->enc_data != NULL)) { in STACK_OF() 298 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp, xi->x509) <= 0)) in PEM_X509_INFO_write_bio()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_add1_chain_cert.pod | 19 int SSL_CTX_add0_chain_cert(SSL_CTX *ctx, X509 *x509); 20 int SSL_CTX_add1_chain_cert(SSL_CTX *ctx, X509 *x509); 26 int SSL_add0_chain_cert(SSL *ssl, X509 *x509); 27 int SSL_add1_chain_cert(SSL *ssl, X509 *x509); 34 int SSL_CTX_select_current_cert(SSL_CTX *ctx, X509 *x509); 35 int SSL_select_current_cert(SSL *ssl, X509 *x509); 45 certificate B<x509> to the chain associated with the current certificate of 74 SSL_CTX_select_current_cert() selects B<x509> as the current end entity 75 certificate, but only if B<x509> has already been loaded into B<ctx> using a
|
| /freebsd/lib/libbearssl/ |
| H A D | Makefile | 144 x509/encode_ec_pk8der.c \ 145 x509/encode_ec_rawder.c \ 146 x509/encode_rsa_pk8der.c \ 147 x509/encode_rsa_rawder.c \ 148 x509/skey_decoder.c \ 149 x509/x509_knownkey.c \ 150 x509/x509_minimal_full.c \
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 349 X509 x, *x509 = NULL; in X509_find_by_issuer_and_serial() local 358 x509 = sk_X509_value(sk, i); in X509_find_by_issuer_and_serial() 359 if (X509_issuer_and_serial_cmp(x509, &x) == 0) in X509_find_by_issuer_and_serial() 360 return x509; in X509_find_by_issuer_and_serial() 367 X509 *x509; in X509_find_by_subject() local 371 x509 = sk_X509_value(sk, i); in X509_find_by_subject() 372 if (X509_NAME_cmp(X509_get_subject_name(x509), name) == 0) in X509_find_by_subject() 373 return x509; in X509_find_by_subject()
|
| H A D | x509_lu.c | 170 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509); in x509_object_cmp() 332 stmp.data.x509 = NULL; in ossl_x509_store_ctx_get_by_subject() 402 obj->data.x509 = (X509 *)x; in x509_store_add() 453 return X509_up_ref(a->data.x509); in X509_OBJECT_up_ref_count() 464 return a->data.x509; in X509_OBJECT_get0_X509() 497 X509_free(a->data.x509); in x509_object_free_internal() 512 a->data.x509 = obj; in X509_OBJECT_set1_X509() 544 stmp.data.x509 = &x509_s; in x509_object_idx_cnt() 690 x = obj->data.x509; in STACK_OF() 766 if (!X509_cmp(obj->data.x509, x->data.x509)) in X509_OBJECT_retrieve_match()
|
| /freebsd/contrib/ntp/sntp/libevent/test/ |
| H A D | regress_ssl.c | 126 X509 *x509 = NULL; in ssl_getcert() local 133 x509 = X509_new(); in ssl_getcert() 134 tt_assert(x509); in ssl_getcert() 135 tt_assert(0 != X509_set_version(x509, 2)); in ssl_getcert() 136 tt_assert(0 != ASN1_INTEGER_set(X509_get_serialNumber(x509), in ssl_getcert() 147 X509_set_subject_name(x509, name); in ssl_getcert() 148 X509_set_issuer_name(x509, name); in ssl_getcert() 151 X509_time_adj(X509_getm_notBefore(x509), 0, &now); in ssl_getcert() 153 X509_time_adj(X509_getm_notAfter(x509), 0, &now); in ssl_getcert() 154 X509_set_pubkey(x509, key); in ssl_getcert() [all …]
|
| /freebsd/contrib/libevent/test/ |
| H A D | regress_ssl.c | 126 X509 *x509 = NULL; in ssl_getcert() local 133 x509 = X509_new(); in ssl_getcert() 134 tt_assert(x509); in ssl_getcert() 135 tt_assert(0 != X509_set_version(x509, 2)); in ssl_getcert() 136 tt_assert(0 != ASN1_INTEGER_set(X509_get_serialNumber(x509), in ssl_getcert() 147 X509_set_subject_name(x509, name); in ssl_getcert() 148 X509_set_issuer_name(x509, name); in ssl_getcert() 151 X509_time_adj(X509_getm_notBefore(x509), 0, &now); in ssl_getcert() 153 X509_time_adj(X509_getm_notAfter(x509), 0, &now); in ssl_getcert() 154 X509_set_pubkey(x509, key); in ssl_getcert() [all …]
|
| /freebsd/crypto/openssl/test/ocsp-tests/ |
| H A D | mk-ocsp-cert-chain.sh | 24 -x509 \ 49 -x509 \ 78 -x509 \
|
| /freebsd/contrib/unbound/smallapp/ |
| H A D | unbound-control-setup.sh.in | 146 -new -x509 \ 181 openssl x509 \ 190 | openssl x509 \ 217 # openssl x509 -in $CTL_BASE.pem -addtrust clientAuth -out $CTL_BASE"_trust.pem" 219 # see details with openssl x509 -noout -text < $SVR_BASE.pem
|