/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 89 elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert) in elfcertlib_verifycert() argument 95 if ((cert->c_verified == E_OK) || (cert->c_verified == E_IS_TA)) { in elfcertlib_verifycert() 121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert() 131 cert, CACERT); in elfcertlib_verifycert() 132 cert->c_verified = E_OK; in elfcertlib_verifycert() 140 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert() 150 cert, OBJCACERT); in elfcertlib_verifycert() 151 cert->c_verified = E_OK; in elfcertlib_verifycert() 159 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert() 169 cert, SECACERT); in elfcertlib_verifycert() [all …]
|
H A D | libelfsign.h | 167 extern char *elfcertlib_getdn(ELFCert_t cert); 168 extern char *elfcertlib_getissuer(ELFCert_t cert); 170 extern boolean_t elfcertlib_loadprivatekey(ELFsign_t ess, ELFCert_t cert, 172 extern boolean_t elfcertlib_loadtokenkey(ELFsign_t ess, ELFCert_t cert, 175 extern boolean_t elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, 179 extern boolean_t elfcertlib_verifycert(ELFsign_t ess, ELFCert_t cert); 180 extern boolean_t elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert,
|
H A D | elfsignlib.c | 431 ELFCert_t cert = NULL; in elfsign_setcertpath() local 436 &cert, ess->es_action)) { in elfsign_setcertpath() 437 if ((subject = elfcertlib_getdn(cert)) != NULL) { in elfsign_setcertpath() 447 elfcertlib_releasecert(ess, cert); in elfsign_setcertpath() 1029 ELFCert_t cert = NULL; in elfsign_verify_signature() local 1089 if (cert != NULL) in elfsign_verify_signature() 1090 elfcertlib_releasecert(ess, cert); in elfsign_verify_signature() 1096 fsx.fsx_signer_DN, &cert, ess->es_action)) { in elfsign_verify_signature() 1111 !elfcertlib_verifycert(ess, cert)) { in elfsign_verify_signature() 1149 if (elfcertlib_verifysig(ess, cert, in elfsign_verify_signature() [all …]
|
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 35 import java.security.cert.*; 302 X509Certificate cert = getCert(someDN, ks); in canSignAs() local 305 myCert.getSubjectDN().toString(), cert.getSubjectDN()); in canSignAs() 370 X509Certificate cert = getSignAsCert(); in getSignAs() local 373 if (cert == null) { in getSignAs() 378 String DN = cert.getSubjectDN().toString(); in getSignAs() 389 String alg = cert.getPublicKey().getAlgorithm(); in getSignAs() 422 X509Certificate cert = null; in getSignAsCert() local 429 cert = getCert(alias, ks); in getSignAsCert() 432 return cert; in getSignAsCert() [all …]
|
/illumos-gate/usr/src/cmd/cmd-crypto/elfsign/ |
H A D | elfsign.c | 85 char *cert; /* -c <certificate_file> | */ member 164 cmd_info.cert = NULL; in main() 217 cmd_info.cert = optarg; in main() 271 cmd_info.cert = optarg; in main() 307 (cmd_info.cert == NULL) || in main() 317 (cmd_info.cert == NULL)) { in main() 323 if ((cmd_info.cert != NULL) == (cmd_info.elfcnt > 0)) { in main() 431 if (cmd_info.cert == NULL) in setcertpath() 433 estatus = elfsign_setcertpath(cmd_info.ess, cmd_info.cert); in setcertpath() 439 if (cmd_info.cert != NULL) { in setcertpath() [all …]
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 468 der.Data = node->cert->derIssuer.data; in nss_find_matching_certs() 469 der.Length = node->cert->derIssuer.len; in nss_find_matching_certs() 482 der.Data = node->cert->derSubject.data; in nss_find_matching_certs() 483 der.Length = node->cert->derSubject.len; in nss_find_matching_certs() 498 sernum = &node->cert->serialNumber; in nss_find_matching_certs() 513 ret = CERT_CertTimesValid(node->cert); in nss_find_matching_certs() 521 ret = CERT_CertTimesValid(node->cert); in nss_find_matching_certs() 569 rv = nss2kmf_cert(node->cert, &kmfcerts[*numcerts]); in convertCertList() 692 CERTCertificate *cert = NULL; in NSS_DeleteCert() local 722 cert = PK11_FindCertFromNickname(certlabel, NULL); in NSS_DeleteCert() [all …]
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | download.c | 54 KMF_DATA cert = { 0, NULL }; in pk_download() local 223 ch_rv = kmf_read_input_file(kmfhandle, fullpath, &cert); in pk_download() 229 ch_rv = kmf_pem_to_der(cert.Data, cert.Length, in pk_download() 237 format == KMF_FORMAT_ASN1 ? &cert : &cert_der); in pk_download() 252 kmf_free_data(&cert); in pk_download()
|
H A D | export.c | 45 int numattr, KMF_X509_DER_CERT *cert) in pk_find_export_cert() argument 51 (void) memset(cert, 0, sizeof (KMF_X509_DER_CERT)); in pk_find_export_cert() 68 KMF_X509_DER_CERT_ATTR, cert, in pk_find_export_cert()
|
H A D | signcsr.c | 207 pk_sign_cert(KMF_HANDLE_T handle, KMF_X509_CERTIFICATE *cert, in pk_sign_cert() argument 223 cert, sizeof (KMF_X509_CERTIFICATE)); in pk_sign_cert()
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 53 get_keyalg_from_cert(KMF_DATA *cert, KMF_KEY_ALG *keyalg) in get_keyalg_from_cert() argument 59 rv = DerDecodeSignedCertificate(cert, &SignerCert); in get_keyalg_from_cert() 112 KMF_DATA *cert = NULL; in kmf_find_prikey_by_cert() local 138 cert = kmf_get_attr_ptr(KMF_CERT_DATA_ATTR, attrlist, numattr); in kmf_find_prikey_by_cert() 139 if (cert == NULL) in kmf_find_prikey_by_cert() 142 ret = get_keyalg_from_cert(cert, &keyalg); in kmf_find_prikey_by_cert() 167 const KMF_DATA *cert, in check_key_usage() argument 175 if (handle == NULL || cert == NULL) in check_key_usage() 181 ret = kmf_get_cert_ku(cert, &keyusage); in check_key_usage() 204 ret = kmf_get_cert_basic_constraint(cert, in check_key_usage() [all …]
|
H A D | certgetsetop.c | 134 KMF_X509_CERTIFICATE *cert = NULL; in kmf_get_cert_extn() local 141 ret = DerDecodeSignedCertificate(certdata, &cert); in kmf_get_cert_extn() 145 if (cert->certificate.extensions.numberOfExtensions == 0) { in kmf_get_cert_extn() 151 i < cert->certificate.extensions.numberOfExtensions; in kmf_get_cert_extn() 153 eptr = &cert->certificate.extensions.extensions[i]; in kmf_get_cert_extn() 163 if (cert != NULL) { in kmf_get_cert_extn() 164 kmf_free_signed_cert(cert); in kmf_get_cert_extn() 165 free(cert); in kmf_get_cert_extn() 189 KMF_X509_CERTIFICATE *cert; in kmf_get_cert_extns() local 201 ret = DerDecodeSignedCertificate(certdata, &cert); in kmf_get_cert_extns() [all …]
|
H A D | mapping.c | 307 kmf_map_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, KMF_DATA *name) in kmf_map_cert_to_name() argument 324 return (cert2name(handle, cert, name)); in kmf_map_cert_to_name() 332 kmf_match_cert_to_name(KMF_HANDLE_T handle, KMF_DATA *cert, in kmf_match_cert_to_name() argument 352 return (cert2name(handle, cert, name_to_match, mapped_name)); in kmf_match_cert_to_name()
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/ssldap/ |
H A D | ldapsinit.c | 738 CERTCertificate *cert; in ldapssl_AuthCertificate() local 756 cert = SSL_PeerCertificate( fd ); in ldapssl_AuthCertificate() 758 rv = CERT_VerifyCertNow(sseip->lssei_certdbh, cert, checkSig, in ldapssl_AuthCertificate() 775 rv = CERT_VerifyCertName(cert, hostname); in ldapssl_AuthCertificate() 815 CERTCertificate *cert; in get_keyandcert() local 818 if (( cert = PK11_FindCertFromNickname( ssip->lssei_certnickname, NULL )) in get_keyandcert() 832 if (( key = PK11_FindKeyByAnyCert( cert, (void *)ssip )) == NULL ) { in get_keyandcert() 833 CERT_DestroyCertificate( cert ); in get_keyandcert() 840 *pRetCert = cert; in get_keyandcert() 881 CERTCertificate *cert = NULL; in check_clientauth_nicknames_and_passwd() local [all …]
|
/illumos-gate/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/ |
H A D | mapper_cn.c | 88 mapper_map_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, KMF_DATA *name) in mapper_map_cert_to_name() argument 98 if ((rv = kmf_get_cert_subject_str(h, cert, &dn)) != KMF_OK) in mapper_map_cert_to_name() 147 mapper_match_cert_to_name(KMF_HANDLE_T h, KMF_DATA *cert, in mapper_match_cert_to_name() argument 163 if ((rv = mapper_map_cert_to_name(h, cert, &get_name)) != KMF_OK) in mapper_match_cert_to_name()
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 1190 X509 *cert; local 1208 cert = SSL_get_peer_certificate(ssl); 1213 who, verifyok, (unsigned long) cert); 1214 if (cert != NULL) 1221 subj = X509_get_subject_name(cert); 1222 issuer = X509_get_issuer_name(cert); 1276 if (X509_digest(cert, EVP_md5(), md, &n) != 0 && n > 0) 1305 if (cert != NULL) 1322 if (cert != NULL) 1323 X509_free(cert); [all …]
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 645 X509 *cert = NULL; in get_cert() local 665 cert = (X509 *) PEM_read_bio_X509(tmp, NULL, NULL, NULL); in get_cert() 666 if (cert == NULL) { in get_cert() 671 *retcert = cert; in get_cert() 998 X509 *cert = NULL; in cms_signeddata_create() local 1023 cert = sk_X509_value(id_cryptoctx->my_certs, id_cryptoctx->cert_index); in cms_signeddata_create() 1026 sk_X509_push(cert_stack, X509_dup(cert)); in cms_signeddata_create() 1041 X509_STORE_CTX_init(certctx, certstore, cert, in cms_signeddata_create() 1065 p7s->cert = cert_stack; in cms_signeddata_create() 1073 X509_get_issuer_name(cert))) in cms_signeddata_create() [all …]
|
H A D | pkinit_crypto_openssl.h | 66 X509 *cert; member 196 EVP_PKEY *pkey, X509 *cert);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystore.c | 542 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert) in soft_unpack_obj_attribute() argument 557 if (cert) { in soft_unpack_obj_attribute() 1344 certificate_obj_t *cert; in soft_unpack_object() local 1765 cert = calloc(1, sizeof (certificate_obj_t)); in soft_unpack_object() 1766 if (cert == NULL) { in soft_unpack_object() 1769 (void) memset((void *)cert, 0, sizeof (certificate_obj_t)); in soft_unpack_object() 1771 cert->certificate_type = certtype; in soft_unpack_object() 1772 objp->object_class_u.certificate = cert; in soft_unpack_object() 1778 &cert->cert_type_u.x509.subject, in soft_unpack_object() 1780 free(cert); in soft_unpack_object() [all …]
|
H A D | softKeystore.h | 102 cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert);
|
H A D | softAttributeUtil.c | 493 certificate_obj_t *cert; in soft_copy_certificate() local 497 cert = calloc(1, sizeof (certificate_obj_t)); in soft_copy_certificate() 498 if (cert == NULL) { in soft_copy_certificate() 506 &cert->cert_type_u.x509.subject))) in soft_copy_certificate() 510 &cert->cert_type_u.x509.value))) in soft_copy_certificate() 516 &cert->cert_type_u.x509_attr.owner))) in soft_copy_certificate() 520 &cert->cert_type_u.x509_attr.value))) in soft_copy_certificate() 527 *newcert = cert; in soft_copy_certificate() 3398 certificate_obj_t *cert; local 3449 cert = calloc(1, sizeof (certificate_obj_t)); [all …]
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 402 ssl_cert2KMFDATA(KMF_HANDLE *kmfh, X509 *x509cert, KMF_DATA *cert) in ssl_cert2KMFDATA() argument 435 cert->Data = buf; in ssl_cert2KMFDATA() 436 cert->Length = len; in ssl_cert2KMFDATA() 442 cert->Data = NULL; in ssl_cert2KMFDATA() 443 cert->Length = 0; in ssl_cert2KMFDATA() 743 KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) in kmf_load_cert() argument 749 if (rv == KMF_OK && x509cert != NULL && cert != NULL) { in kmf_load_cert() 750 rv = ssl_cert2KMFDATA(kmfh, x509cert, cert); in kmf_load_cert() 755 rv = kmf_check_cert_date(kmfh, cert); in kmf_load_cert() 757 rv = kmf_check_cert_date(kmfh, cert); in kmf_load_cert() [all …]
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | README | 466 ca_cert="/etc/cert/ca.pem" 467 client_cert="/etc/cert/user.pem" 468 private_key="/etc/cert/user.prv" 485 ca_cert="/etc/cert/ca.pem" 504 ca_cert="/etc/cert/ca.pem" 520 ca_cert="/etc/cert/ca.pem" 521 client_cert="/etc/cert/user.pem" 522 private_key="/etc/cert/user.prv" 545 ca_cert="/etc/cert/ca.pem" 546 client_cert="/etc/cert/user.pem" [all …]
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 1230 KMF_DATA *cert = NULL; in KMFPK11_StoreCert() local 1240 cert = kmf_get_attr_ptr(KMF_CERT_DATA_ATTR, attrlist, numattr); in KMFPK11_StoreCert() 1241 if (cert == NULL || cert->Data == NULL || cert->Length == 0) in KMFPK11_StoreCert() 1254 rv = CreateCertObject(handle, label, cert); in KMFPK11_StoreCert() 2185 KMF_DATA *cert = NULL; in KMFPK11_FindPrikeyByCert() local 2200 cert = kmf_get_attr_ptr(KMF_CERT_DATA_ATTR, attrlist, numattr); in KMFPK11_FindPrikeyByCert() 2201 if (cert == NULL || cert->Data == NULL) in KMFPK11_FindPrikeyByCert() 2204 if ((rv = DerDecodeSignedCertificate(cert, in KMFPK11_FindPrikeyByCert() 3206 KMF_DATA *cert = NULL; in store_raw_key() local 3252 cert = kmf_get_attr_ptr(KMF_CERT_DATA_ATTR, attrlist, numattr); in store_raw_key() [all …]
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | libslp.po | 157 msgid "No cert found for myself" 163 msgid "can not get cert chain: %s"
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/ |
H A D | Makefile.com | 45 cert.o \
|