Searched refs:cert (Results 101 - 125 of 782) sorted by last modified time

1234567891011>>

/external/openssl/apps/
H A Dpkcs12.c82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
524 /* If chaining get chain from user cert */
834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument
843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
881 X509 *cert; local
884 CRYPTO_push_info("cert_load(): reading one cert");
886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
891 sk_X509_push(sk, cert);
893 CRYPTO_push_info("cert_load(): reading one cert");
H A Dpkcs7.c252 certs=p7->d.sign->cert;
256 certs=p7->d.signed_and_enveloped->cert;
H A Ds_apps.h157 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
H A Ds_cb.c150 BIO_puts(bio_err, "<no cert>\n");
242 /* Now we know that a key and cert have been set against
253 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key) argument
255 if (cert == NULL)
257 if (SSL_CTX_use_certificate(ctx,cert) <= 0)
271 /* Now we know that a key and cert have been set against
704 extname = "cert type";
H A Ds_client.c188 /*#define TEST_CERT "client.pem" */ /* no default cert. */
294 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
296 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
297 BIO_printf(bio_err," not specified but cert file is.\n");
582 X509 *cert = NULL; local
697 else if (strcmp(*argv,"-cert") == 0)
1087 cert = load_cert(bio_err,cert_file,cert_format,
1090 if (!cert)
1222 if (!set_cert_key_stuff(ctx,cert,key))
1958 if (cert)
[all...]
H A Dsess_id.c80 " -cert - output certificate \n",
98 int cert=0,noout=0,text=0; local
137 else if (strcmp(*argv,"-cert") == 0)
138 cert= ++num;
234 if (cert)
243 if (!noout && !cert)
H A Dsmime.c101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
432 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
491 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n");
554 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
562 sk_X509_push(encerts, cert);
563 cert = NULL;
814 X509_free(cert);
H A Dx509.c131 " -checkend arg - check whether the cert expires in the next arg seconds\n",
133 " -signkey arg - self sign cert with arg\n",
164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
1068 nx.cert=x;
1295 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument
1303 idret = X509_check_purpose(cert, id, i);
/external/openssl/crypto/asn1/
H A Dasn1.h562 X509 *cert; member in struct:NETSCAPE_X509_st
1037 /* Used to load and write netscape format cert */
H A Dx_nx509.c68 ASN1_OPT(NETSCAPE_X509, cert, X509)
/external/openssl/crypto/cms/
H A Dcms.h180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert,
184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert);
197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert);
245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert);
246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert);
264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
H A Dcms_env.c277 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument
285 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
H A Dcms_lcl.h202 /* Recipient Key and cert */
439 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type);
443 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
H A Dcms_lib.c460 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument
473 if (!X509_cmp(cch->d.certificate, cert))
485 cch->d.certificate = cert;
489 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument
492 r = CMS_add0_cert(cms, cert);
494 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
H A Dcms_sd.c210 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type) argument
220 X509_get_issuer_name(cert)))
224 X509_get_serialNumber(cert)))
229 if (!cert->skid)
235 sid->d.subjectKeyIdentifier = ASN1_STRING_dup(cert->skid);
276 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) argument
282 X509_get_issuer_name(cert));
286 X509_get_serialNumber(cert));
290 X509_check_purpose(cert, -1, -1);
291 if (!cert
550 CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) argument
[all...]
H A Dcms_smime.c609 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) argument
624 /* If we have a cert try matching RecipientInfo
627 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0))
632 if (cert)
649 /* If no cert and not debugging don't leave loop
658 /* If no cert and not debugging always return success */
659 if (ri_match && !cert && !debug)
733 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, argument
750 if (!pk && !cert
[all...]
/external/openssl/crypto/ocsp/
H A Docsp.h435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
483 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
H A Docsp_cl.c121 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) argument
128 if (!cert) return 1;
132 if(!sk_X509_push(sig->certs, cert)) return 0;
133 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
H A Docsp_srv.c198 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument
203 if(!sk_X509_push(resp->certs, cert)) return 0;
204 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
H A Docsp_vfy.c68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp);
298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument
320 iname = X509_get_subject_name(cert);
325 X509_pubkey_digest(cert, dgst, md, NULL);
340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
/external/openssl/crypto/pkcs12/
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if(!pkey && !cert && !ca)
118 if (pkey && cert)
120 if(!X509_check_private_key(cert, pkey))
122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
125 if (cert)
127 bag = PKCS12_add_cert(&bags, cert);
198 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
207 if(!(bag = PKCS12_x5092certbag(cert)))
214 name = (char *)X509_alias_get0(cert,
[all...]
H A Dp12_kiss.c74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
76 * or it should point to a valid STACK structure. pkey and cert can be
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
95 if(cert)
96 *cert = NULL;
135 if (pkey && *pkey && cert && !*cert)
139 *cert = x;
167 if (cert && *cert)
[all...]
H A Dpkcs12.h245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
/external/openssl/crypto/pkcs7/
H A Dpk7_asn1.c122 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0),
178 X509_free(ri->cert);
205 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
H A Dpk7_doit.c150 pkey = X509_get_pubkey(ri->cert);
971 STACK_OF(X509) *cert;
976 cert=p7->d.sign->cert;
980 cert=p7->d.signed_and_enveloped->cert;
990 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
992 /* were we able to find the cert in passed to us */
1000 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))

Completed in 178 milliseconds

1234567891011>>