| /src/usr.sbin/certctl/ | 
| certctl.sh | 46 	printf '       %s trust <cert>\n' "$progname" 47 	printf '       %s untrust <cert>\n' "$progname"
 252 	local vpath path cert base vcert vbase
 259 		for cert in "$path"/*.pem "$path"/*.cer "$path"/*.crt; do
 261 			vcert=$(printf '%s' "$cert" | vis -M)
 269 			if [ ! -e "$cert" ]; then
 270 				if [ -h "$cert" ]; then
 295 	local status link vlink cert vcert
 322 		cert=$(readlink -n -- "$link" && printf .)
 323 		cert=${cert%.
 [all...]
 | 
| /src/usr.sbin/syslogd/ | 
| tls.c | 160 	X509	 *cert = NULL;  local in function:init_global_TLS_CTX 201 		if (!mk_x509_cert(&cert, &pkey, TLS_GENCERT_BITS,
 206 		if (!write_x509files(pkey, cert,
 220 	if (cert && pkey) {
 222 		    || !SSL_CTX_use_certificate(ctx, cert)) {
 273 		/* ask for cert, but a client does not have to send one */
 276 		/* default: ask for cert and check it */
 297 	if (cert || read_certfile(&cert, certfilename)) {
 298 		get_fingerprint(cert, &fp, NULL)
 2088  X509 *cert;  local in function:mk_x509_cert
 [all...]
 | 
| sign.c | 172 		X509 *cert;  local in function:sign_get_keys 173 		DPRINTF(D_SIGN, "Try to get keys from TLS X.509 cert...\n");
 175 		if (!(cert = SSL_get_certificate(ssl))) {
 185 		if (!(pubkey = X509_get_pubkey(cert))) {
 198 			DPRINTF(D_SIGN, "X.509 cert has no DSA key\n");
 210 			der_len = i2d_X509(cert, NULL);
 217 			if (i2d_X509(cert, &ptr_der_pubkey) <= 0) {
 544 		sd_len = snprintf(sd, sizeof(sd), "[ssign-cert "
 792  * requires a ssign or ssigt-cert SD element
 
 | 
| /src/usr.bin/nbsvtool/ | 
| nbsvtool.c | 64  * `outfile'. The signer certificate `cert' and private key 66  * to find the path from the `cert' to the x509 anchor can be passed
 71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain,
 86 	p7 = PKCS7_sign(cert, private_key, cert_chain, in,
 198 		X509 *cert;  local in function:STACK_OF
 200 		cert = PEM_read_X509(f, NULL, NULL, NULL);
 201 		if (cert == NULL) {
 213 		sk_X509_insert(certs, cert, sk_X509_num(certs));
 290 	printf("%s -k keyfile -c cert-chain [-f cert-chain] sign file\n",
 [all...]
 | 
| /src/tests/usr.sbin/certctl/ | 
| t_certctl.sh | 126 		for cert in "$srcdir"/*.pem; do 128 			certbase=$(basename "$cert")
 129 			atf_check -s exit:0 -o inline:"$cert" \
 133 			hash=$(openssl x509 -hash -noout <$cert)
 137 				if cmp -s "certs/$hash.$counter" "$cert"; then
 144 				atf_fail "missing $cert"
 208 	check_empty "empty cert path"
 216 	check_empty "empty cert path"
 455 	local cert certbase target
 462 	for cert in "$(atf_get_srcdir)/certs2"/*.pem; d
 [all...]
 | 
| /src/tests/crypto/libcrypto/ | 
| t_libcrypto.sh | 78 		    -cert "$s/d_server.pem" \ 
 | 
| /src/libexec/httpd/lua/ | 
| bozo.lua | 46 opt.add_option{"-Z", "--ssl", action="store", dest="ssl", help="--ssl 'cert priv'"} 104 	cert, priv = string.find(options.ssl, "(%S+)%s+(%S+)")
 105         bozohttpd.dynamic_mime(httpd, cert, priv)
 
 | 
| /src/usr.bin/ftp/ | 
| ssl.c | 715 		X509 *cert;  local in function:fetch_start_ssl 721 		cert = SSL_get_peer_certificate(ssl);
 722 		name = X509_get_subject_name(cert);
 726 		name = X509_get_issuer_name(cert);
 
 | 
| /src/libexec/httpd/ | 
| ssl-bozo.c | 361 bozo_ssl_set_opts(bozohttpd_t *httpd, const char *cert, const char *priv) 365 	sslinfo->certificate_file = bozostrdup(httpd, NULL, cert);
 367 	debug((httpd, DEBUG_NORMAL, "using cert/priv files: %s & %s",
 
 |