Home
last modified time | relevance | path

Searched refs:certs (Results 1 – 21 of 21) sorted by relevance

/titanic_44/usr/src/cmd/svr4pkg/pkgadm/
H A Dcerts.c85 STACK_OF(X509) *certs = NULL; in load_cert_and_key()
107 &data, &keys, &certs) < 0) { in load_cert_and_key()
118 if (cert && (certs != NULL)) { in load_cert_and_key()
119 if (sk_X509_num(certs) != 1) { in load_cert_and_key()
124 tmpcert = sk_X509_value(certs, 0); in load_cert_and_key()
187 keystore_encoding_format_t format, char *passarg, STACK_OF(X509) **certs) in load_all_certs()
194 if (certs) *certs = NULL; in load_all_certs()
229 if (certs && tmpcerts) { in load_all_certs()
230 *certs = tmpcerts; in load_all_certs()
H A DMakefile30 certs.o \
/titanic_44/usr/src/cmd/cmd-crypto/pktool/
H A Dimport.c63 KMF_X509_DER_CERT *certs = NULL; in pk_import_pk12_files() local
73 &certs, &ncerts, &keys, &nkeys); in pk_import_pk12_files()
116 if (certs[i].kmf_private.label != NULL) { in pk_import_pk12_files()
119 certs[i].kmf_private.label, in pk_import_pk12_files()
120 strlen(certs[i].kmf_private.label)); in pk_import_pk12_files()
124 KMF_CERT_DATA_ATTR, &certs[i].certificate, in pk_import_pk12_files()
174 KMF_CERT_DATA_ATTR, &certs[i], in pk_import_pk12_files()
192 if (certs) { in pk_import_pk12_files()
194 kmf_free_kmf_cert(kmfhandle, &certs[i]); in pk_import_pk12_files()
195 free(certs); in pk_import_pk12_files()
[all …]
H A Dlist.c43 pk_show_certs(KMF_HANDLE_T kmfhandle, KMF_X509_DER_CERT *certs, int num_certs) in pk_show_certs() argument
60 if (certs[i].kmf_private.label != NULL) in pk_show_certs()
62 (certs[i].kmf_private.keystore_type == in pk_show_certs()
64 certs[i].kmf_private.label); in pk_show_certs()
65 if (kmf_get_cert_id_str(&certs[i].certificate, in pk_show_certs()
69 &certs[i].certificate, &subject) == KMF_OK) in pk_show_certs()
73 &certs[i].certificate, &issuer) == KMF_OK) in pk_show_certs()
77 &certs[i].certificate, &start) == KMF_OK) in pk_show_certs()
81 &certs[i].certificate, &end) == KMF_OK) in pk_show_certs()
85 &certs[i].certificate, &serial) == KMF_OK) in pk_show_certs()
[all …]
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c89 KMF_X509_DER_CERT *certs, int *paramsize, in kmf_to_kssl() argument
129 tcsize += certs[i].certificate.Length; in kmf_to_kssl()
272 uint32_t certsz = (uint32_t)certs[i].certificate.Length; in kmf_to_kssl()
284 bcopy(certs[i].certificate.Data, buf, in kmf_to_kssl()
285 certs[i].certificate.Length); in kmf_to_kssl()
286 buf += certs[i].certificate.Length; in kmf_to_kssl()
766 KMF_X509_DER_CERT *certs = NULL; in add_cacerts() local
793 certs = (KMF_X509_DER_CERT *)malloc(ncerts * in add_cacerts()
795 if (certs == NULL) { in add_cacerts()
799 bzero(certs, ncerts * sizeof (KMF_X509_DER_CERT)); in add_cacerts()
[all …]
H A Dksslutil.c44 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PKCS12_get_rsa_key_certs() argument
90 *certs = tcerts; in PKCS12_get_rsa_key_certs()
104 KMF_RAW_KEY_DATA **rsa, KMF_X509_DER_CERT **certs) in PEM_get_rsa_key_certs() argument
150 if (certs != NULL) in PEM_get_rsa_key_certs()
151 *certs = tcerts; in PEM_get_rsa_key_certs()
/titanic_44/usr/src/lib/libslp/clib/
H A Dslp_auth.c726 ami_cert *certs = NULL; in do_verify() local
757 if ((ami_err = dld_ami_get_cert(amih, spi, &certs, &ccnt)) != AMI_OK) { in do_verify()
769 certs[icert].info.pubKeyInfo->algorithm, in do_verify()
770 certs[icert].info.pubKeyInfo->pubKey.value, in do_verify()
771 certs[icert].info.pubKeyInfo->pubKey.length, in do_verify()
780 err = check_spis(amih, certs, icert, spi); in do_verify()
783 if (certs) { in do_verify()
784 dld_ami_free_cert_list(&certs, ccnt); in do_verify()
801 ami_cert *certs; in alias2dn() local
807 if ((status = dld_ami_get_cert(amih, NULL, &certs, &ccnt)) != AMI_OK) { in alias2dn()
[all …]
/titanic_44/usr/src/common/net/wanboot/
H A Dp12auxutl.c104 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) in sunw_PKCS12_create()
133 if (certs != NULL && sk_X509_num(certs) > 0) { in sunw_PKCS12_create()
135 for (i = 0; i < sk_X509_num(certs); i++) { in sunw_PKCS12_create()
136 cert = sk_X509_value(certs, i); in sunw_PKCS12_create()
231 if (certs != NULL || cacerts != NULL && certs_there) { in sunw_PKCS12_create()
H A Dp12misc.c495 STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) in sunw_find_localkeyid()
504 (pkeys == NULL || certs == NULL) || in sunw_find_localkeyid()
506 (certs != NULL && matching_cert == NULL)) { in sunw_find_localkeyid()
523 retval = find_attr(NID_localKeyID, cmpstr, pkeys, &tmp_pkey, certs, in sunw_find_localkeyid()
566 sunw_find_fname(char *fname, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, in sunw_find_fname() argument
576 (pkeys == NULL || certs == NULL) || in sunw_find_fname()
578 (certs != NULL && matching_cert == NULL)) { in sunw_find_fname()
596 retval = find_attr(NID_friendlyName, cmpstr, pkeys, &tmp_pkey, certs, in sunw_find_fname()
H A Dauxutil.c222 STACK_OF(X509) **certs, STACK_OF(X509) **work_cl,
240 if (certs != NULL && work_cl != NULL && *work_cl != NULL &&
242 if (*certs == NULL) {
243 *certs = *work_cl;
246 if (move_certs(*certs, *work_cl) < 0) {
H A Dp12auxpars.c151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs);
499 STACK_OF(X509) **certs) in sunw_PKCS12_contents()
527 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, in sunw_PKCS12_contents()
/titanic_44/usr/src/lib/libpkg/common/
H A Dp12lib.c392 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) in sunw_PEM_contents()
418 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, NULL, NULL, in sunw_PEM_contents()
456 STACK_OF(X509) **certs) in sunw_PKCS12_contents()
484 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL, in sunw_PKCS12_contents()
638 STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) in sunw_PKCS12_create()
667 if (certs != NULL && sk_X509_num(certs) > 0) { in sunw_PKCS12_create()
669 for (i = 0; i < sk_X509_num(certs); i++) { in sunw_PKCS12_create()
670 cert = sk_X509_value(certs, i); in sunw_PKCS12_create()
765 if (certs != NULL || cacerts != NULL && certs_there) { in sunw_PKCS12_create()
1192 STACK_OF(X509) *certs, EVP_PKEY **matching_pkey, X509 **matching_cert) in sunw_find_localkeyid()
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c671 KMF_DATA *certs = NULL; in load_certs() local
684 certs = (KMF_DATA *)malloc(sizeof (KMF_DATA)); in load_certs()
685 if (certs == NULL) in load_certs()
687 certs->Data = NULL; in load_certs()
688 certs->Length = 0; in load_certs()
690 pathname, certs); in load_certs()
692 *certlist = certs; in load_certs()
695 kmf_free_data(certs); in load_certs()
696 free(certs); in load_certs()
697 certs = NULL; in load_certs()
[all …]
/titanic_44/usr/src/cmd/cmd-inet/etc/ike/
H A Dconfig.sample53 # Explicitly trusted certs that need no signatures, or perhaps self-signed
63 # If you wish to use HTTP (with name resolution) for URLs inside certs,
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c1064 STACK_OF(X509) *certs = NULL; in get_hostnames()
1083 NULL, NULL, &certs); in get_hostnames()
1092 for (i = 0; i < sk_X509_num(certs); i++) { in get_hostnames()
1094 x = sk_X509_value(certs, i); in get_hostnames()
1123 if (certs != NULL) { in get_hostnames()
1124 sk_X509_pop_free(certs, X509_free); in get_hostnames()
/titanic_44/exception_lists/
H A Dclosed-bins1 ./etc/certs
/titanic_44/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c2908 KMF_X509_DER_CERT **certs, int *ncerts, in kmf_import_objects() argument
2920 if (filename == NULL || cred == NULL || certs == NULL || in kmf_import_objects()
2939 rv = import_objects(handle, filename, cred, certs, ncerts, in kmf_import_objects()
/titanic_44/usr/src/cmd/sendmail/cf/
H A DREADME2745 certification authority, which signs (issues) certs.
2750 define(`confCACERT_PATH', `/etc/mail/certs/')
2751 define(`confCACERT', `/etc/mail/certs/CA.cert.pem')
2752 define(`confSERVER_CERT', `/etc/mail/certs/my.cert.pem')
2753 define(`confSERVER_KEY', `/etc/mail/certs/my.key.pem')
3891 with certs of CAs.
/titanic_44/usr/src/
H A DTargetdirs92 /etc/crypto/certs \
/titanic_44/usr/src/pkg/manifests/
H A DSUNWcs.mf45 dir path=etc/crypto/certs group=sys
/titanic_44/
H A D.gitignore260 usr/src/cmd/cmd-crypto/etc/certs/SUNWObjectCA
2776 usr/src/cmd/svr4pkg/pkgadm/certs.i