/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Cert/ |
H A D | import_certificate.pm | 111 my $cert_hash = { 134 $cert_hash->{status} = 'REVOKED'; 163 $cert_hash->{reason_code} = $reason_code; 167 $cert_hash->{status} = 'REVOKED'; 168 $cert_hash->{revocation_time} = time(); 233 if (!$cert_hash->{pki_realm}) { 264 if (!$cert_hash->{req_key}) { 286 $cert_hash->{issuer_identifier} = 'unknown'; 291 set => $cert_hash, 296 delete $cert_hash->{data}; [all …]
|
H A D | import_chain.pm | 118 my $cert_hash = $dbi->select_one( 124 if ($cert_hash) { 126 delete $cert_hash->{data}; 127 push @exist, $cert_hash;
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Cert/ |
H A D | import_certificate.pm | 111 my $cert_hash = { 134 $cert_hash->{status} = 'REVOKED'; 163 $cert_hash->{reason_code} = $reason_code; 167 $cert_hash->{status} = 'REVOKED'; 168 $cert_hash->{revocation_time} = time(); 233 if (!$cert_hash->{pki_realm}) { 264 if (!$cert_hash->{req_key}) { 286 $cert_hash->{issuer_identifier} = 'unknown'; 291 set => $cert_hash, 296 delete $cert_hash->{data}; [all …]
|
H A D | import_chain.pm | 118 my $cert_hash = $dbi->select_one( 124 if ($cert_hash) { 126 delete $cert_hash->{data}; 127 push @exist, $cert_hash;
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Activity/Tools/ |
H A D | EvaluateSignerTrust.pm | 46 my $cert_hash = CTX('dbi')->select_one( 52 if (!$cert_hash && $x509->is_selfsigned() && $self->param('allow_surrogate_certificate')) { 67 $cert_hash = $db_results->[0]; 68 $signer_identifier = $cert_hash->{identifier}; 71 $x509 = OpenXPKI::Crypt::X509->new( $cert_hash->{data} ); 111 if ($cert_hash) { 115 $signer_realm = $cert_hash->{pki_realm} || '_global'; 116 $signer_issuer = $cert_hash->{issuer_identifier}; 117 $signer_revoked = ($cert_hash->{status} ne 'ISSUED'); 120 if ($cert_hash->{req_key}) {
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/Workflow/Activity/Tools/ |
H A D | EvaluateSignerTrust.pm | 46 my $cert_hash = CTX('dbi')->select_one( 52 if (!$cert_hash && $x509->is_selfsigned() && $self->param('allow_surrogate_certificate')) { 67 $cert_hash = $db_results->[0]; 68 $signer_identifier = $cert_hash->{identifier}; 71 $x509 = OpenXPKI::Crypt::X509->new( $cert_hash->{data} ); 111 if ($cert_hash) { 115 $signer_realm = $cert_hash->{pki_realm} || '_global'; 116 $signer_issuer = $cert_hash->{issuer_identifier}; 117 $signer_revoked = ($cert_hash->{status} ne 'ISSUED'); 120 if ($cert_hash->{req_key}) {
|
/dports/security/softether/v4.38-9760/src/Cedar/ |
H A D | DDNS.c | 515 BUF *cert_hash = NULL; in DCRegister() local 668 … NULL, NULL, ((cert_hash != NULL && ((cert_hash->Size % SHA1_SIZE) == 0)) ? cert_hash->Buf : NULL), in DCRegister() 669 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), in DCRegister() 676 FreeBuf(cert_hash); in DCRegister() 707 char cert_hash[MAX_SIZE]; in DCRegister() local 713 Zero(cert_hash, sizeof(cert_hash)); in DCRegister() 714 PackGetStr(ret, "azure_cert_hash", cert_hash, sizeof(cert_hash)); in DCRegister() 823 BUF *cert_hash = NULL; in DCGetMyIpMain() local 877 NULL, ((cert_hash != NULL && (cert_hash->Size % SHA1_SIZE) == 0) ? cert_hash->Buf : NULL), in DCGetMyIpMain() 878 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), NULL, 0, NULL, NULL); in DCGetMyIpMain() [all …]
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | DDNS.c | 418 BUF *cert_hash = NULL; in DCRegister() local 557 NULL, NULL, ((cert_hash != NULL && ((cert_hash->Size % SHA1_SIZE) == 0)) ? cert_hash->Buf : NULL), in DCRegister() 558 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), in DCRegister() 564 FreeBuf(cert_hash); in DCRegister() 595 char cert_hash[MAX_SIZE]; in DCRegister() local 601 Zero(cert_hash, sizeof(cert_hash)); in DCRegister() 602 PackGetStr(ret, "azure_cert_hash", cert_hash, sizeof(cert_hash)); in DCRegister() 711 BUF *cert_hash = NULL; in DCGetMyIpMain() local 760 NULL, ((cert_hash != NULL && (cert_hash->Size % SHA1_SIZE) == 0) ? cert_hash->Buf : NULL), in DCGetMyIpMain() 761 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), NULL, 0, NULL, NULL); in DCGetMyIpMain() [all …]
|
/dports/security/softether-devel/v4.36-9754/src/Cedar/ |
H A D | DDNS.c | 515 BUF *cert_hash = NULL; in DCRegister() local 668 … NULL, NULL, ((cert_hash != NULL && ((cert_hash->Size % SHA1_SIZE) == 0)) ? cert_hash->Buf : NULL), in DCRegister() 669 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), in DCRegister() 676 FreeBuf(cert_hash); in DCRegister() 707 char cert_hash[MAX_SIZE]; in DCRegister() local 713 Zero(cert_hash, sizeof(cert_hash)); in DCRegister() 714 PackGetStr(ret, "azure_cert_hash", cert_hash, sizeof(cert_hash)); in DCRegister() 823 BUF *cert_hash = NULL; in DCGetMyIpMain() local 877 NULL, ((cert_hash != NULL && (cert_hash->Size % SHA1_SIZE) == 0) ? cert_hash->Buf : NULL), in DCGetMyIpMain() 878 (cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), NULL, 0, NULL, NULL); in DCGetMyIpMain() [all …]
|
/dports/japanese/mutt-devel/mutt-1.5.21/ |
H A D | smime_keys.pl | 96 my $cert_hash = `$cmd`; 98 chomp($cert_hash); 100 &add_certificate($ARGV[1], \$cert_hash, 1, $label, '?'); 132 my $cert_hash = `$cmd`; 142 chomp($cert_hash); 148 my @mailbox = &add_certificate($ARGV[2], \$cert_hash, 1, $label, $issuer_hash); 152 add_key($ARGV[1], $cert_hash, $mailbox, $label); 678 my $cert_hash = `$cmd`; 686 chomp($cert_hash); chomp($issuer_hash); 691 @mailbox = &add_certificate("$tmp_certificate", \$cert_hash, 1, $label, $issuer_hash); [all …]
|
/dports/databases/evolution-data-server/evolution-data-server-3.42.1/src/camel/ |
H A D | camel-certdb.c | 45 GHashTable *cert_hash; member 138 g_hash_table_destroy (priv->cert_hash); in certdb_finalize() 249 certdb->priv->cert_hash = g_hash_table_new_full ( in camel_certdb_init() 669 cert = g_hash_table_lookup (certdb->priv->cert_hash, key); in camel_certdb_get_host() 705 old_cert = g_hash_table_lookup (certdb->priv->cert_hash, key); in camel_certdb_put() 707 g_hash_table_remove (certdb->priv->cert_hash, key); in camel_certdb_put() 715 g_hash_table_insert (certdb->priv->cert_hash, key, cert); in camel_certdb_put() 745 cert = g_hash_table_lookup (certdb->priv->cert_hash, key); in camel_certdb_remove_host() 747 g_hash_table_remove (certdb->priv->cert_hash, key); in camel_certdb_remove_host() 777 g_hash_table_foreach_remove (certdb->priv->cert_hash, cert_remove, NULL); in camel_certdb_clear()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/internal/ |
H A D | trust_store_mac.cc | 307 const SHA256HashValue& cert_hash, in IsCertTrusted() argument 309 auto cache_iter = trust_status_cache_.find(cert_hash); in IsCertTrusted() 332 bool ContainsCert(const SHA256HashValue& cert_hash) const { in ContainsCert() 333 return trust_status_cache_.find(cert_hash) != trust_status_cache_.end(); in ContainsCert() 492 SHA256HashValue cert_hash = CalculateFingerprint256(cert->der_cert()); in IsKnownRoot() local 496 return system_domain_cache_.ContainsCert(cert_hash); in IsKnownRoot() 502 SHA256HashValue cert_hash = CalculateFingerprint256(cert->der_cert()); in IsCertTrusted() local 513 trust_domain_cache->IsCertTrusted(cert, cert_hash, debug_data); in IsCertTrusted()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/internal/ |
H A D | trust_store_mac.cc | 304 const SHA256HashValue& cert_hash, in IsCertTrusted() argument 306 auto cache_iter = trust_status_cache_.find(cert_hash); in IsCertTrusted() 329 bool ContainsCert(const SHA256HashValue& cert_hash) const { in ContainsCert() 330 return trust_status_cache_.find(cert_hash) != trust_status_cache_.end(); in ContainsCert() 489 SHA256HashValue cert_hash = CalculateFingerprint256(cert->der_cert()); in IsKnownRoot() local 493 return system_domain_cache_.ContainsCert(cert_hash); in IsKnownRoot() 499 SHA256HashValue cert_hash = CalculateFingerprint256(cert->der_cert()); in IsCertTrusted() local 510 trust_domain_cache->IsCertTrusted(cert, cert_hash, debug_data); in IsCertTrusted()
|
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify_mbedtls.c | 336 struct buffer cert_hash; in x509_setenv_track() local 341 cert_hash = x509_get_sha1_fingerprint(cert, &gc); in x509_setenv_track() 345 cert_hash = x509_get_sha256_fingerprint(cert, &gc); in x509_setenv_track() 348 fingerprint = format_hex_ex(BPTR(&cert_hash), in x509_setenv_track() 349 BLEN(&cert_hash), 0, 1 | FHE_CAPS, ":", &gc); in x509_setenv_track()
|
H A D | ssl_verify.h | 54 struct cert_hash { struct 60 struct cert_hash *ch[MAX_CERT_DEPTH]; /**< Array of certificate hashes */ argument
|
H A D | ssl_verify.c | 216 const struct buffer *cert_hash) in cert_hash_remember() argument 226 ALLOC_OBJ(session->cert_hash_set->ch[error_depth], struct cert_hash); in cert_hash_remember() 229 struct cert_hash *ch = session->cert_hash_set->ch[error_depth]; in cert_hash_remember() 230 ASSERT(sizeof(ch->sha256_hash) == BLEN(cert_hash)); in cert_hash_remember() 231 memcpy(ch->sha256_hash, BPTR(cert_hash), sizeof(ch->sha256_hash)); in cert_hash_remember() 257 const struct cert_hash *ch1 = chs1->ch[i]; in cert_hash_compare() 258 const struct cert_hash *ch2 = chs2->ch[i]; in cert_hash_compare() 296 const struct cert_hash *ch = chs->ch[i]; in cert_hash_copy() 299 ALLOC_OBJ(dest->ch[i], struct cert_hash); in cert_hash_copy()
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify_mbedtls.c | 336 struct buffer cert_hash; in x509_setenv_track() local 341 cert_hash = x509_get_sha1_fingerprint(cert, &gc); in x509_setenv_track() 345 cert_hash = x509_get_sha256_fingerprint(cert, &gc); in x509_setenv_track() 348 fingerprint = format_hex_ex(BPTR(&cert_hash), in x509_setenv_track() 349 BLEN(&cert_hash), 0, 1 | FHE_CAPS, ":", &gc); in x509_setenv_track()
|
H A D | ssl_verify.h | 54 struct cert_hash { struct 60 struct cert_hash *ch[MAX_CERT_DEPTH]; /**< Array of certificate hashes */ argument
|
H A D | ssl_verify.c | 216 const struct buffer *cert_hash) in cert_hash_remember() argument 226 ALLOC_OBJ(session->cert_hash_set->ch[error_depth], struct cert_hash); in cert_hash_remember() 229 struct cert_hash *ch = session->cert_hash_set->ch[error_depth]; in cert_hash_remember() 230 ASSERT(sizeof(ch->sha256_hash) == BLEN(cert_hash)); in cert_hash_remember() 231 memcpy(ch->sha256_hash, BPTR(cert_hash), sizeof(ch->sha256_hash)); in cert_hash_remember() 257 const struct cert_hash *ch1 = chs1->ch[i]; in cert_hash_compare() 258 const struct cert_hash *ch2 = chs2->ch[i]; in cert_hash_compare() 296 const struct cert_hash *ch = chs->ch[i]; in cert_hash_copy() 299 ALLOC_OBJ(dest->ch[i], struct cert_hash); in cert_hash_copy()
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/ |
H A D | ssl_verify.h | 54 struct cert_hash { struct 60 struct cert_hash *ch[MAX_CERT_DEPTH]; /**< Array of certificate hashes */ argument
|
H A D | ssl_verify_mbedtls.c | 352 struct buffer cert_hash; in x509_setenv_track() local 357 cert_hash = x509_get_sha1_fingerprint(cert, &gc); in x509_setenv_track() 361 cert_hash = x509_get_sha256_fingerprint(cert, &gc); in x509_setenv_track() 364 fingerprint = format_hex_ex(BPTR(&cert_hash), in x509_setenv_track() 365 BLEN(&cert_hash), 0, 1 | FHE_CAPS, ":", &gc); in x509_setenv_track()
|
/dports/security/gnutls/gnutls-3.6.16/lib/ |
H A D | handshake-checks.c | 115 if (memcmp(tmp, session->internals.cert_hash, 32) != 0) { in _gnutls_check_if_cert_hash_is_same() 120 memcpy(session->internals.cert_hash, tmp, 32); in _gnutls_check_if_cert_hash_is_same()
|
/dports/security/zeronet/ZeroNet-0.7.1/src/Crypt/ |
H A D | CryptConnection.py | 87 cert_hash = hashlib.sha256(sock_wrapped.getpeercert(True)).hexdigest() 88 if cert_hash != cert_pin: 89 … raise Exception("Socket certificate does not match (%s != %s)" % (cert_hash, cert_pin))
|
/dports/net/glib-networking/glib-networking-2.66.0/tls/gnutls/ |
H A D | gtlsclientconnection-gnutls.c | 167 gchar *cert_hash = NULL; in g_tls_client_connection_gnutls_compute_session_id() local 186 cert_hash = g_compute_checksum_for_data (G_CHECKSUM_SHA256, der->data, der->len); in g_tls_client_connection_gnutls_compute_session_id() 194 cert_hash ? cert_hash : ""); in g_tls_client_connection_gnutls_compute_session_id() 197 g_free (cert_hash); in g_tls_client_connection_gnutls_compute_session_id()
|
/dports/www/xsp/xsp-4.5/src/Mono.WebServer.Apache/ |
H A D | ModMonoWorkerRequest.cs | 74 string cert_hash; field in Mono.WebServer.ModMonoWorkerRequest 308 cert_hash = null; in IsCertificateValidForMono() 312 if (hash != cert_hash) { in IsCertificateValidForMono() 315 cert_hash = hash; in IsCertificateValidForMono()
|