/external/openssl/apps/ |
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 524 /* If chaining get chain from user cert */ 834 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument 843 X509_STORE_CTX_init(&store_ctx, store, cert, NULL); 881 X509 *cert; local 884 CRYPTO_push_info("cert_load(): reading one cert"); 886 while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { 891 sk_X509_push(sk, cert); 893 CRYPTO_push_info("cert_load(): reading one cert");
|
H A D | pkcs7.c | 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert;
|
H A D | s_apps.h | 157 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
H A D | s_cb.c | 150 BIO_puts(bio_err, "<no cert>\n"); 242 /* Now we know that a key and cert have been set against 253 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key) argument 255 if (cert == NULL) 257 if (SSL_CTX_use_certificate(ctx,cert) <= 0) 271 /* Now we know that a key and cert have been set against 704 extname = "cert type";
|
H A D | s_client.c | 188 /*#define TEST_CERT "client.pem" */ /* no default cert. */ 294 BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n"); 296 BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n"); 297 BIO_printf(bio_err," not specified but cert file is.\n"); 582 X509 *cert = NULL; local 697 else if (strcmp(*argv,"-cert") == 0) 1087 cert = load_cert(bio_err,cert_file,cert_format, 1090 if (!cert) 1222 if (!set_cert_key_stuff(ctx,cert,key)) 1958 if (cert) [all...] |
H A D | sess_id.c | 80 " -cert - output certificate \n", 98 int cert=0,noout=0,text=0; local 137 else if (strcmp(*argv,"-cert") == 0) 138 cert= ++num; 234 if (cert) 243 if (!noout && !cert)
|
H A D | smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 432 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n"); 491 BIO_printf (bio_err, "cert.pem recipient certificate(s) for encryption\n"); 554 if (!(cert = load_cert(bio_err,*args,FORMAT_PEM, 562 sk_X509_push(encerts, cert); 563 cert = NULL; 814 X509_free(cert);
|
H A D | x509.c | 131 " -checkend arg - check whether the cert expires in the next arg seconds\n", 133 " -signkey arg - self sign cert with arg\n", 164 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 1068 nx.cert=x; 1295 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) argument 1303 idret = X509_check_purpose(cert, id, i);
|
/external/openssl/crypto/asn1/ |
H A D | asn1.h | 562 X509 *cert; member in struct:NETSCAPE_X509_st 1037 /* Used to load and write netscape format cert */
|
H A D | x_nx509.c | 68 ASN1_OPT(NETSCAPE_X509, cert, X509)
|
/external/openssl/crypto/cms/ |
H A D | cms.h | 180 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, 184 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); 197 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); 245 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); 246 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); 264 int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert);
|
H A D | cms_env.c | 277 int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert) argument 285 return cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert);
|
H A D | cms_lcl.h | 202 /* Recipient Key and cert */ 439 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type); 443 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert);
|
H A D | cms_lib.c | 460 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument 473 if (!X509_cmp(cch->d.certificate, cert)) 485 cch->d.certificate = cert; 489 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument 492 r = CMS_add0_cert(cms, cert); 494 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
H A D | cms_sd.c | 210 int cms_set1_SignerIdentifier(CMS_SignerIdentifier *sid, X509 *cert, int type) argument 220 X509_get_issuer_name(cert))) 224 X509_get_serialNumber(cert))) 229 if (!cert->skid) 235 sid->d.subjectKeyIdentifier = ASN1_STRING_dup(cert->skid); 276 int cms_SignerIdentifier_cert_cmp(CMS_SignerIdentifier *sid, X509 *cert) argument 282 X509_get_issuer_name(cert)); 286 X509_get_serialNumber(cert)); 290 X509_check_purpose(cert, -1, -1); 291 if (!cert 550 CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert) argument [all...] |
H A D | cms_smime.c | 609 int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) argument 624 /* If we have a cert try matching RecipientInfo 627 if (!cert || (CMS_RecipientInfo_ktri_cert_cmp(ri, cert) == 0)) 632 if (cert) 649 /* If no cert and not debugging don't leave loop 658 /* If no cert and not debugging always return success */ 659 if (ri_match && !cert && !debug) 733 int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, argument 750 if (!pk && !cert [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp.h | 435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 483 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
H A D | ocsp_cl.c | 121 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) argument 128 if (!cert) return 1; 132 if(!sk_X509_push(sig->certs, cert)) return 0; 133 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
H A D | ocsp_srv.c | 198 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) argument 203 if(!sk_X509_push(resp->certs, cert)) return 0; 204 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
|
H A D | ocsp_vfy.c | 68 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, STACK_OF(OCSP_SINGLERESP) *sresp); 298 static int ocsp_match_issuerid(X509 *cert, OCSP_CERTID *cid, argument 320 iname = X509_get_subject_name(cert); 325 X509_pubkey_digest(cert, dgst, md, NULL); 340 ret = ocsp_match_issuerid(cert, tmpid, NULL);
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 112 if(!pkey && !cert && !ca) 118 if (pkey && cert) 120 if(!X509_check_private_key(cert, pkey)) 122 X509_digest(cert, EVP_sha1(), keyid, &keyidlen); 125 if (cert) 127 bag = PKCS12_add_cert(&bags, cert); 198 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) 207 if(!(bag = PKCS12_x5092certbag(cert))) 214 name = (char *)X509_alias_get0(cert, [all...] |
H A D | p12_kiss.c | 74 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 95 if(cert) 96 *cert = NULL; 135 if (pkey && *pkey && cert && !*cert) 139 *cert = x; 167 if (cert && *cert) [all...] |
H A D | pkcs12.h | 245 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, 247 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 251 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); variable
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 122 ASN1_IMP_SEQUENCE_OF_OPT(PKCS7_SIGNED, cert, X509, 0), 178 X509_free(ri->cert); 205 ASN1_IMP_SET_OF_OPT(PKCS7_SIGN_ENVELOPE, cert, X509, 0),
|
H A D | pk7_doit.c | 150 pkey = X509_get_pubkey(ri->cert); 971 STACK_OF(X509) *cert; 976 cert=p7->d.sign->cert; 980 cert=p7->d.signed_and_enveloped->cert; 990 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial); 992 /* were we able to find the cert in passed to us */ 1000 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
|