/src/usr.bin/nbsvtool/ |
nbsvtool.c | 64 * `outfile'. The signer certificate `cert' and private key 66 * to find the path from the `cert' to the x509 anchor can be passed 71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain, 86 p7 = PKCS7_sign(cert, private_key, cert_chain, in, 198 X509 *cert; local in function:STACK_OF 200 cert = PEM_read_X509(f, NULL, NULL, NULL); 201 if (cert == NULL) { 213 sk_X509_insert(certs, cert, sk_X509_num(certs)); 290 printf("%s -k keyfile -c cert-chain [-f cert-chain] sign file\n", [all...] |
nbsvtool.c | 64 * `outfile'. The signer certificate `cert' and private key 66 * to find the path from the `cert' to the x509 anchor can be passed 71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain, 86 p7 = PKCS7_sign(cert, private_key, cert_chain, in, 198 X509 *cert; local in function:STACK_OF 200 cert = PEM_read_X509(f, NULL, NULL, NULL); 201 if (cert == NULL) { 213 sk_X509_insert(certs, cert, sk_X509_num(certs)); 290 printf("%s -k keyfile -c cert-chain [-f cert-chain] sign file\n", [all...] |
/src/usr.sbin/syslogd/ |
sign.c | 172 X509 *cert; local in function:sign_get_keys 173 DPRINTF(D_SIGN, "Try to get keys from TLS X.509 cert...\n"); 175 if (!(cert = SSL_get_certificate(ssl))) { 185 if (!(pubkey = X509_get_pubkey(cert))) { 198 DPRINTF(D_SIGN, "X.509 cert has no DSA key\n"); 210 der_len = i2d_X509(cert, NULL); 217 if (i2d_X509(cert, &ptr_der_pubkey) <= 0) { 544 sd_len = snprintf(sd, sizeof(sd), "[ssign-cert " 792 * requires a ssign or ssigt-cert SD element
|
sign.c | 172 X509 *cert; local in function:sign_get_keys 173 DPRINTF(D_SIGN, "Try to get keys from TLS X.509 cert...\n"); 175 if (!(cert = SSL_get_certificate(ssl))) { 185 if (!(pubkey = X509_get_pubkey(cert))) { 198 DPRINTF(D_SIGN, "X.509 cert has no DSA key\n"); 210 der_len = i2d_X509(cert, NULL); 217 if (i2d_X509(cert, &ptr_der_pubkey) <= 0) { 544 sd_len = snprintf(sd, sizeof(sd), "[ssign-cert " 792 * requires a ssign or ssigt-cert SD element
|
tls.c | 160 X509 *cert = NULL; local in function:init_global_TLS_CTX 201 if (!mk_x509_cert(&cert, &pkey, TLS_GENCERT_BITS, 206 if (!write_x509files(pkey, cert, 220 if (cert && pkey) { 222 || !SSL_CTX_use_certificate(ctx, cert)) { 273 /* ask for cert, but a client does not have to send one */ 276 /* default: ask for cert and check it */ 297 if (cert || read_certfile(&cert, certfilename)) { 298 get_fingerprint(cert, &fp, NULL) 2088 X509 *cert; local in function:mk_x509_cert [all...] |
tls.c | 160 X509 *cert = NULL; local in function:init_global_TLS_CTX 201 if (!mk_x509_cert(&cert, &pkey, TLS_GENCERT_BITS, 206 if (!write_x509files(pkey, cert, 220 if (cert && pkey) { 222 || !SSL_CTX_use_certificate(ctx, cert)) { 273 /* ask for cert, but a client does not have to send one */ 276 /* default: ask for cert and check it */ 297 if (cert || read_certfile(&cert, certfilename)) { 298 get_fingerprint(cert, &fp, NULL) 2088 X509 *cert; local in function:mk_x509_cert [all...] |
/src/usr.bin/ftp/ |
ssl.c | 715 X509 *cert; local in function:fetch_start_ssl 721 cert = SSL_get_peer_certificate(ssl); 722 name = X509_get_subject_name(cert); 726 name = X509_get_issuer_name(cert);
|
ssl.c | 715 X509 *cert; local in function:fetch_start_ssl 721 cert = SSL_get_peer_certificate(ssl); 722 name = X509_get_subject_name(cert); 726 name = X509_get_issuer_name(cert);
|