/titanic_44/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | certs.c | 85 STACK_OF(X509) *certs = NULL; in load_cert_and_key() 107 &data, &keys, &certs) < 0) { in load_cert_and_key() 118 if (cert && (certs != NULL)) { in load_cert_and_key() 119 if (sk_X509_num(certs) != 1) { in load_cert_and_key() 124 tmpcert = sk_X509_value(certs, 0); in load_cert_and_key() 187 keystore_encoding_format_t format, char *passarg, STACK_OF(X509) **certs) in load_all_certs() 194 if (certs) *certs = NULL; in load_all_certs() 229 if (certs && tmpcerts) { in load_all_certs() 230 *certs = tmpcerts; in load_all_certs()
|
H A D | Makefile | 30 certs.o \
|
/titanic_44/usr/src/cmd/cmd-crypto/pktool/ |
H A D | import.c | 63 KMF_X509_DER_CERT *certs = NULL; in pk_import_pk12_files() local 73 &certs, &ncerts, &keys, &nkeys); in pk_import_pk12_files() 116 if (certs[i].kmf_private.label != NULL) { in pk_import_pk12_files() 119 certs[i].kmf_private.label, in pk_import_pk12_files() 120 strlen(certs[i].kmf_private.label)); in pk_import_pk12_files() 124 KMF_CERT_DATA_ATTR, &certs[i].certificate, in pk_import_pk12_files() 174 KMF_CERT_DATA_ATTR, &certs[i], in pk_import_pk12_files() 192 if (certs) { in pk_import_pk12_files() 194 kmf_free_kmf_cert(kmfhandle, &certs[i]); in pk_import_pk12_files() 195 free(certs); in pk_import_pk12_files() [all …]
|
H A D | list.c | 43 pk_show_certs(KMF_HANDLE_T kmfhandle, KMF_X509_DER_CERT *certs, int num_certs) in pk_show_certs() argument 60 if (certs[i].kmf_private.label != NULL) in pk_show_certs() 62 (certs[i].kmf_private.keystore_type == in pk_show_certs() 64 certs[i].kmf_private.label); in pk_show_certs() 65 if (kmf_get_cert_id_str(&certs[i].certificate, in pk_show_certs() 69 &certs[i].certificate, &subject) == KMF_OK) in pk_show_certs() 73 &certs[i].certificate, &issuer) == KMF_OK) in pk_show_certs() 77 &certs[i].certificate, &start) == KMF_OK) in pk_show_certs() 81 &certs[i].certificate, &end) == KMF_OK) in pk_show_certs() 85 &certs[i].certificate, &serial) == KMF_OK) in pk_show_certs() [all …]
|
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 89 KMF_X509_DER_CERT *certs, int *paramsize, in kmf_to_kssl() argument 129 tcsize += certs[i].certificate.Length; in kmf_to_kssl() 272 uint32_t certsz = (uint32_t)certs[i].certificate.Length; in kmf_to_kssl() 284 bcopy(certs[i].certificate.Data, buf, in kmf_to_kssl() 285 certs[i].certificate.Length); in kmf_to_kssl() 286 buf += certs[i].certificate.Length; in kmf_to_kssl() 766 KMF_X509_DER_CERT *certs = NULL; in add_cacerts() local 793 certs = (KMF_X509_DER_CERT *)malloc(ncerts * in add_cacerts() 795 if (certs == NULL) { in add_cacerts() 799 bzero(certs, ncerts * sizeof (KMF_X509_DER_CERT)); in add_cacerts() [all …]
|
H A D | ksslutil.c | 44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PKCS12_get_rsa_key_certs() argument 90 *certs = tcerts; in PKCS12_get_rsa_key_certs() 104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PEM_get_rsa_key_certs() argument 150 if (certs != NULL) in PEM_get_rsa_key_certs() 151 *certs = tcerts; in PEM_get_rsa_key_certs()
|
/titanic_44/usr/src/lib/libslp/clib/ |
H A D | slp_auth.c | 726 ami_cert *certs = NULL; in do_verify() local 757 if ((ami_err = dld_ami_get_cert(amih, spi, &certs, &ccnt)) != AMI_OK) { in do_verify() 769 certs[icert].info.pubKeyInfo->algorithm, in do_verify() 770 certs[icert].info.pubKeyInfo->pubKey.value, in do_verify() 771 certs[icert].info.pubKeyInfo->pubKey.length, in do_verify() 780 err = check_spis(amih, certs, icert, spi); in do_verify() 783 if (certs) { in do_verify() 784 dld_ami_free_cert_list(&certs, ccnt); in do_verify() 801 ami_cert *certs; in alias2dn() local 807 if ((status = dld_ami_get_cert(amih, NULL, &certs, &ccnt)) != AMI_OK) { in alias2dn() [all …]
|
/titanic_44/usr/src/common/net/wanboot/ |
H A D | p12auxutl.c | 104 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) in sunw_PKCS12_create() 133 if (certs != NULL && sk_X509_num(certs) > 0) { in sunw_PKCS12_create() 135 for (i = 0; i < sk_X509_num(certs); i++) { in sunw_PKCS12_create() 136 cert = sk_X509_value(certs, i); in sunw_PKCS12_create() 231 if (certs != NULL || cacerts != NULL && certs_there) { in sunw_PKCS12_create()
|
H A D | p12misc.c | 495 STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) in sunw_find_localkeyid() 504 (pkeys == NULL || certs == NULL) || in sunw_find_localkeyid() 506 (certs != NULL && matching_cert == NULL)) { in sunw_find_localkeyid() 523 retval = find_attr(NID_localKeyID, cmpstr, pkeys, &tmp_pkey, certs, in sunw_find_localkeyid() 566 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, in sunw_find_fname() argument 576 (pkeys == NULL || certs == NULL) || in sunw_find_fname() 578 (certs != NULL && matching_cert == NULL)) { in sunw_find_fname() 596 retval = find_attr(NID_friendlyName, cmpstr, pkeys, &tmp_pkey, certs, in sunw_find_fname()
|
H A D | auxutil.c | 222 STACK_OF(X509) **certs, STACK_OF(X509) **work_cl, 240 if (certs != NULL && work_cl != NULL && *work_cl != NULL && 242 if (*certs == NULL) { 243 *certs = *work_cl; 246 if (move_certs(*certs, *work_cl) < 0) {
|
H A D | p12auxpars.c | 151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs); 499 STACK_OF(X509) **certs) in sunw_PKCS12_contents() 527 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, in sunw_PKCS12_contents()
|
/titanic_44/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 392 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) in sunw_PEM_contents() 418 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, NULL, NULL, in sunw_PEM_contents() 456 STACK_OF(X509) **certs) in sunw_PKCS12_contents() 484 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, in sunw_PKCS12_contents() 638 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) in sunw_PKCS12_create() 667 if (certs != NULL && sk_X509_num(certs) > 0) { in sunw_PKCS12_create() 669 for (i = 0; i < sk_X509_num(certs); i++) { in sunw_PKCS12_create() 670 cert = sk_X509_value(certs, i); in sunw_PKCS12_create() 765 if (certs != NULL || cacerts != NULL && certs_there) { in sunw_PKCS12_create() 1192 STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) in sunw_find_localkeyid() [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 671 KMF_DATA *certs = NULL; in load_certs() local 684 certs = (KMF_DATA *)malloc(sizeof (KMF_DATA)); in load_certs() 685 if (certs == NULL) in load_certs() 687 certs->Data = NULL; in load_certs() 688 certs->Length = 0; in load_certs() 690 pathname, certs); in load_certs() 692 *certlist = certs; in load_certs() 695 kmf_free_data(certs); in load_certs() 696 free(certs); in load_certs() 697 certs = NULL; in load_certs() [all …]
|
/titanic_44/usr/src/cmd/cmd-inet/etc/ike/ |
H A D | config.sample | 53 # Explicitly trusted certs that need no signatures, or perhaps self-signed 63 # If you wish to use HTTP (with name resolution) for URLs inside certs,
|
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 1064 STACK_OF(X509) *certs = NULL; in get_hostnames() 1083 NULL, NULL, &certs); in get_hostnames() 1092 for (i = 0; i < sk_X509_num(certs); i++) { in get_hostnames() 1094 x = sk_X509_value(certs, i); in get_hostnames() 1123 if (certs != NULL) { in get_hostnames() 1124 sk_X509_pop_free(certs, X509_free); in get_hostnames()
|
/titanic_44/exception_lists/ |
H A D | closed-bins | 1 ./etc/certs
|
/titanic_44/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 2908 KMF_X509_DER_CERT **certs, int *ncerts, in kmf_import_objects() argument 2920 if (filename == NULL || cred == NULL || certs == NULL || in kmf_import_objects() 2939 rv = import_objects(handle, filename, cred, certs, ncerts, in kmf_import_objects()
|
/titanic_44/usr/src/cmd/sendmail/cf/ |
H A D | README | 2745 certification authority, which signs (issues) certs. 2750 define(`confCACERT_PATH', `/etc/mail/certs/') 2751 define(`confCACERT', `/etc/mail/certs/CA.cert.pem') 2752 define(`confSERVER_CERT', `/etc/mail/certs/my.cert.pem') 2753 define(`confSERVER_KEY', `/etc/mail/certs/my.key.pem') 3891 with certs of CAs.
|
/titanic_44/usr/src/ |
H A D | Targetdirs | 92 /etc/crypto/certs \
|
/titanic_44/usr/src/pkg/manifests/ |
H A D | SUNWcs.mf | 45 dir path=etc/crypto/certs group=sys
|
/titanic_44/ |
H A D | .gitignore | 260 usr/src/cmd/cmd-crypto/etc/certs/SUNWObjectCA 2776 usr/src/cmd/svr4pkg/pkgadm/certs.i
|