Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 32) sorted by relevance

12

/titanic_44/usr/src/lib/libkmf/libkmf/common/
H A Dcertgetsetop.c145 if (cert->certificate.extensions.numberOfExtensions == 0) { in kmf_get_cert_extn()
151 i < cert->certificate.extensions.numberOfExtensions; in kmf_get_cert_extn()
153 eptr = &cert->certificate.extensions.extensions[i]; in kmf_get_cert_extn()
205 if (cert->certificate.extensions.numberOfExtensions == 0) in kmf_get_cert_extns()
208 for (i = 0; i < cert->certificate.extensions.numberOfExtensions; in kmf_get_cert_extns()
210 eptr = &cert->certificate.extensions.extensions[i]; in kmf_get_cert_extns()
1648 ret = GetIDFromSPKI(&cert->certificate.subjectPublicKeyInfo, ID); in kmf_get_cert_id_data()
1714 not_before_str = certData->certificate.validity.notBefore.time.Data; in kmf_get_cert_validity()
1730 not_after_str = certData->certificate.validity.notAfter.time.Data; in kmf_get_cert_validity()
1781 spki_ptr = &Cert->certificate.subjectPublicKeyInfo; in kmf_set_cert_pubkey()
[all …]
H A Dcertop.c293 tbs_cert = &(CertData->certificate); in kmf_encode_cert_record()
929 &SignerCert->certificate.subjectPublicKeyInfo, in kmf_verify_data()
1132 pubkey = &x509cert->certificate.subjectPublicKeyInfo; in kmf_encrypt()
1250 spki_ptr = &x509cert->certificate.subjectPublicKeyInfo; in kmf_decrypt()
1863 signer_retrcert.certificate.Length; in cert_ocsp_check()
1864 signer_cert->Data = signer_retrcert.certificate.Data; in cert_ocsp_check()
2202 tmp_cert.Length = certlist[0].certificate.Length; in find_issuer_cert()
2203 tmp_cert.Data = certlist[0].certificate.Data; in find_issuer_cert()
2211 ret = kmf_get_cert_validity(&certlist[i].certificate, in find_issuer_cert()
2220 certlist[i].certificate.Length; in find_issuer_cert()
[all …]
/titanic_44/usr/src/lib/libelfsign/common/
H A Delfcertlib.c121 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert()
124 KMF_SIGNER_CERT_DATA_ATTR, &CACERT->c_cert.certificate, in elfcertlib_verifycert()
140 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert()
143 KMF_SIGNER_CERT_DATA_ATTR, &OBJCACERT->c_cert.certificate, in elfcertlib_verifycert()
159 KMF_CERT_DATA_ATTR, &cert->c_cert.certificate, in elfcertlib_verifycert()
162 KMF_SIGNER_CERT_DATA_ATTR, &SECACERT->c_cert.certificate, in elfcertlib_verifycert()
278 &cert->c_cert.certificate, &cert->c_subject); in elfcertlib_getcert()
283 &cert->c_cert.certificate, &cert->c_issuer); in elfcertlib_getcert()
418 rv = kmf_get_cert_id_str(&cert->c_cert.certificate, &idstr); in elfcertlib_loadtokenkey()
618 (KMF_DATA *)(&cert->c_cert.certificate), sizeof (KMF_DATA)); in elfcertlib_verifysig()
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c129 tcsize += certs[i].certificate.Length; in kmf_to_kssl()
272 uint32_t certsz = (uint32_t)certs[i].certificate.Length; in kmf_to_kssl()
284 bcopy(certs[i].certificate.Data, buf, in kmf_to_kssl()
285 certs[i].certificate.Length); in kmf_to_kssl()
286 buf += certs[i].certificate.Length; in kmf_to_kssl()
659 rv = kmf_get_cert_id_str(&cert.certificate, &idstr); in load_from_pkcs11()
728 rv = kmf_get_cert_id_data(&cert.certificate, &iddata); in load_from_pkcs11()
735 rv = kmf_get_cert_id_data(&cert.certificate, &iddata); in load_from_pkcs11()
819 newlen += certs[i].certificate.Length; in add_cacerts()
836 uint32_t size = (uint32_t)certs[i].certificate.Length; in add_cacerts()
[all …]
/titanic_44/usr/src/cmd/cmd-crypto/pktool/
H A Dlist.c65 if (kmf_get_cert_id_str(&certs[i].certificate, in pk_show_certs()
69 &certs[i].certificate, &subject) == KMF_OK) in pk_show_certs()
73 &certs[i].certificate, &issuer) == KMF_OK) in pk_show_certs()
77 &certs[i].certificate, &start) == KMF_OK) in pk_show_certs()
81 &certs[i].certificate, &end) == KMF_OK) in pk_show_certs()
85 &certs[i].certificate, &serial) == KMF_OK) in pk_show_certs()
89 &certs[i].certificate, KMF_X509_EXT_SUBJ_ALTNAME, in pk_show_certs()
95 &certs[i].certificate, KMF_X509_EXT_KEY_USAGE, in pk_show_certs()
101 &certs[i].certificate, KMF_X509_EXT_EXT_KEY_USAGE, in pk_show_certs()
H A Dsigncsr.c151 signedCert->certificate.subject = csrdata->csr.subject; in build_cert_from_csr()
154 signedCert->certificate.subjectPublicKeyInfo = in build_cert_from_csr()
157 signedCert->certificate.extensions = csrdata->csr.extensions; in build_cert_from_csr()
159 signedCert->certificate.signature = in build_cert_from_csr()
H A Dimport.c124 KMF_CERT_DATA_ATTR, &certs[i].certificate, in pk_import_pk12_files()
328 &certs[i].certificate, sizeof (KMF_DATA)); in pk_import_pk12_nss()
540 KMF_CERT_DATA_ATTR, &certs[i].certificate, in pk_import_pk12_pk11()
582 KMF_CERT_DATA_ATTR, &certs[i].certificate, in pk_import_pk12_pk11()
H A Dexport.c140 KMF_CERT_DATA_ATTR, &kmfcert.certificate, in pk_export_file_objects()
348 KMF_CERT_DATA_ATTR, &kmfcert.certificate, in pk_export_nss_objects()
651 KMF_CERT_DATA_ATTR, &kmfcert.certificate, in pk_export_pk11_objects()
/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftObject.h321 certificate_obj_t *certificate; member
673 ((o)->object_class_u.certificate)
678 ((o)->object_class_u.certificate->cert_type_u.x509)
680 ((o)->object_class_u.certificate->cert_type_u.x509.subject)
682 ((o)->object_class_u.certificate->cert_type_u.x509.value)
688 ((o)->object_class_u.certificate->cert_type_u.x509_attr)
690 ((o)->object_class_u.certificate->cert_type_u.x509_attr.owner)
692 ((o)->object_class_u.certificate->cert_type_u.x509_attr.value)
H A DsoftKeystore.c1755 objp->object_class_u.certificate = cert; in soft_unpack_object()
/titanic_44/usr/src/tools/opensolaris/
H A DREADME.opensolaris.tmpl20 The cryptographic binaries have been signed with a certificate and key
23 certificate and key. See elfsign(1) for more information related to
/titanic_44/usr/src/cmd/cmd-inet/etc/ike/
H A Dconfig.sample47 ## certificate parameters...
50 # I MUST have this certificate in my local filesystem, see ikecert(1m).
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c311 kmfcert->certificate.Data = value; in PK11Cert2KMFCert()
312 kmfcert->certificate.Length = value_len; in PK11Cert2KMFCert()
334 kmfcert->certificate.Data = NULL; in PK11Cert2KMFCert()
335 kmfcert->certificate.Length = 0; in PK11Cert2KMFCert()
602 &tmp_kmf_cert.certificate); in search_certs()
758 if (kmf_cert != NULL && kmf_cert->certificate.Data != NULL) { in KMFPK11_FreeKMFCert()
759 free(kmf_cert->certificate.Data); in KMFPK11_FreeKMFCert()
760 kmf_cert->certificate.Data = NULL; in KMFPK11_FreeKMFCert()
761 kmf_cert->certificate.Length = 0; in KMFPK11_FreeKMFCert()
1135 rv = DerEncodeName(&signed_cert_ptr->certificate.subject, &data); in CreateCertObject()
[all …]
/titanic_44/usr/src/lib/libkmf/include/
H A Dkmftypes.h70 KMF_DATA certificate; member
599 KMF_X509_TBS_CERT certificate; member
603 #define CERT_ALG_OID(c) &c->certificate.signature.algorithm
/titanic_44/usr/src/uts/common/inet/kssl/
H A Dksslproto.h132 certificate = 11, enumerator
H A Dksslioctl.c242 cert_buf[0] = (uchar_t)certificate; in extract_certificate()
/titanic_44/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c355 kmf_cert->certificate.Length = nss_cert->derCert.len; in nss2kmf_cert()
357 if ((kmf_cert->certificate.Data = malloc(nss_cert->derCert.len)) == in nss2kmf_cert()
359 kmf_cert->certificate.Length = 0; in nss2kmf_cert()
362 (void) memcpy(kmf_cert->certificate.Data, nss_cert->derCert.data, in nss2kmf_cert()
673 if (kmf_cert->certificate.Data != NULL) { in NSS_FreeKMFCert()
674 free(kmf_cert->certificate.Data); in NSS_FreeKMFCert()
675 kmf_cert->certificate.Data = NULL; in NSS_FreeKMFCert()
676 kmf_cert->certificate.Length = 0; in NSS_FreeKMFCert()
/titanic_44/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ldap.h185 char *certificate; member
H A Dldap_misc.c425 krb5_xfree(ldap_context->certificates[i]->certificate);
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A DREADME565 EAP-TTLS only require the server side certificate. When client
566 certificate is used, a matching private key file has to also be
571 formats. User certificate and private key can be included in the same
574 If the user certificate and private key is received in PKCS#12/PFX
578 # convert client certificate and private key to PEM format
580 # convert CA certificate (if included in PFX file) to PEM format
/titanic_44/usr/src/lib/libslp/clib/
H A Dlibslp.po151 msgid "Can not get certificate for %s: %s"
H A Dslp_ami.h340 struct ami_cert *certificate; member
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c1120 kmf_cert[n].certificate.Data = in OpenSSL_FindCert()
1122 kmf_cert[n].certificate.Length = in OpenSSL_FindCert()
1168 kmf_cert[n].certificate.Data = in OpenSSL_FindCert()
1170 kmf_cert[n].certificate.Length = in OpenSSL_FindCert()
1204 if (kmf_cert->certificate.Data != NULL) { in OpenSSL_FreeKMFCert()
1205 kmf_free_data(&kmf_cert->certificate); in OpenSSL_FreeKMFCert()
3356 const uchar_t *p = certlist[i].certificate.Data; in local_export_pk12()
3357 long len = certlist[i].certificate.Length; in local_export_pk12()
3535 fullpath, &certdata.certificate); in OpenSSL_ExportPK12()
4181 rv = ssl_cert2KMFDATA(kmfh, sslcert, &cert.certificate); in add_cert_to_list()
[all …]
/titanic_44/usr/src/lib/libslp/javalib/com/sun/slp/
H A DClientLib_en.properties131 no_cert = Can not find certificate for ``{0}'': {1}
132 no_cert_chain = Can not get certificate chain for ``{0}''
/titanic_44/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c195 free_tbscert(&certptr->certificate); in free_decoded_cert()
1473 certptr->certificate = *tbscert; in DerDecodeSignedCertificate()
1751 tbscert = &signed_cert_ptr->certificate; in DerEncodeSignedCertificate()

12