/openssl-master/test/recipes/ |
A D | 25-test_x509.t | 27 my @certs = qw(test certs); 28 my $pem = srctop_file(@certs, "cyrillic.pem"); 33 my $msb = srctop_file(@certs, "cyrillic.msb"); 34 my $utf = srctop_file(@certs, "cyrillic.utf8"); 70 my $pkey = srctop_file(@certs, "ca-key.pem"); # issuer private key 73 my $signkey = srctop_file(@certs, "serverkey.pem"); 75 my $testcert = srctop_file(@certs, "ee-cert.pem"); 99 ok(run(test(["v3ext", srctop_file(@certs, "pathlen.pem")]))); 102 cert_contains(srctop_file(@certs, "fake-gp.pem"), 108 my $infile = srctop_file(@certs, $cert);
|
A D | 25-test_req.t | 22 my @certs = qw(test certs); 383 my $ca_key = srctop_file(@certs, "ca-key.pem"); 504 "-in", srctop_file(@certs, "x509-check.csr")); 511 "-in", srctop_file(@certs, "x509-check.csr")); 517 "-in", srctop_file(@certs, "x509-check.csr")); 523 "-in", srctop_file(@certs, "x509-check.csr")); 528 "-in", srctop_file(@certs, "x509-check.csr")); 533 "-in", srctop_file(@certs, "x509-check.csr")); 538 "-in", srctop_file(@certs, "x509-check.csr")); 543 "-in", srctop_file(@certs, "x509-check.csr")); [all …]
|
A D | 06-test_algorithmid.t | 46 my @certs = sort keys %certs_info; 49 scalar @certs 52 foreach (@certs) {
|
/openssl-master/test/ |
A D | cmp_protect_test.c | 28 STACK_OF(X509) *certs; 45 sk_X509_free(fixture->certs); in tear_down() 371 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_cmp_build_cert_chain() 397 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_cmp_build_cert_chain_missing_intermediate() 415 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_cmp_build_cert_chain_no_root() 434 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_cmp_build_cert_chain_only_root() 451 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_cmp_build_cert_chain_no_certs() 487 if (!TEST_ptr(fixture->certs = sk_X509_new_null()) in test_X509_STORE() 488 || !sk_X509_push(fixture->certs, endentity1) in test_X509_STORE() 490 || !sk_X509_push(fixture->certs, root) in test_X509_STORE() [all …]
|
A D | test.cnf | 10 certs = $dir/certs # Where the issued certs are kept 13 new_certs_dir = $dir/new_certs # default place for new certs.
|
A D | CAtsa.cnf | 29 certs = $dir/certs # Where the issued certs are kept 31 new_certs_dir = $dir/newcerts # default place for new certs. 131 certs = $dir/tsaca.pem # Certificate chain to include in reply 157 certs = $dir/demoCA/cacert.pem# Certificate chain to include in reply
|
/openssl-master/crypto/ocsp/ |
A D | ocsp_vfy.c | 17 STACK_OF(X509) *certs, unsigned long flags); 97 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, in OCSP_basic_verify() argument 103 int ret = ocsp_find_signer(&signer, bs, certs, flags); in OCSP_basic_verify() 117 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) in OCSP_basic_verify() 173 if ((signer = ocsp_find_signer_sk(certs, rid)) != NULL) { in ocsp_find_signer() 178 (signer = ocsp_find_signer_sk(bs->certs, rid))) { in ocsp_find_signer() 197 return X509_find_by_subject(certs, id->value.byName); in ocsp_find_signer_sk() 206 for (i = 0; i < sk_X509_num(certs); i++) { in ocsp_find_signer_sk() 207 if ((x = sk_X509_value(certs, i)) != NULL) { in ocsp_find_signer_sk() 402 ret = ocsp_req_find_signer(&signer, req, nm, certs, flags); in OCSP_request_verify() [all …]
|
A D | ocsp_prn.c | 122 for (i = 0; i < sk_X509_num(sig->certs); i++) { in OCSP_REQUEST_print() 123 X509_print(bp, sk_X509_value(sig->certs, i)); in OCSP_REQUEST_print() 124 PEM_write_bio_X509(bp, sk_X509_value(sig->certs, i)); in OCSP_REQUEST_print() 237 for (i = 0; i < sk_X509_num(br->certs); i++) { in OCSP_RESPONSE_print() 238 X509_print(bp, sk_X509_value(br->certs, i)); in OCSP_RESPONSE_print() 239 PEM_write_bio_X509(bp, sk_X509_value(br->certs, i)); in OCSP_RESPONSE_print()
|
A D | ocsp_srv.c | 159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() 169 STACK_OF(X509) *certs, unsigned long flags) in OCSP_basic_sign_ctx() 187 || !X509_add_certs(brsp->certs, certs, X509_ADD_FLAG_UP_REF)) in OCSP_basic_sign_ctx() 217 STACK_OF(X509) *certs, unsigned long flags) in OCSP_basic_sign() 231 i = OCSP_basic_sign_ctx(brsp, signer, ctx, certs, flags); in OCSP_basic_sign()
|
A D | ocsp_cl.c | 71 return ossl_x509_add_cert_new(&req->optionalSignature->certs, cert, in OCSP_request_add1_cert() 84 STACK_OF(X509) *certs, unsigned long flags) in OCSP_request_sign() 103 || !X509_add_certs(req->optionalSignature->certs, certs, in OCSP_request_sign() 180 return bs->certs; in STACK_OF()
|
/openssl-master/test/testutil/ |
A D | load.c | 35 STACK_OF(X509) *certs; in STACK_OF() 42 certs = sk_X509_new_null(); in STACK_OF() 43 if (certs == NULL) { in STACK_OF() 51 if (x != NULL && !sk_X509_push(certs, x)) { in STACK_OF() 52 sk_X509_pop_free(certs, X509_free); in STACK_OF() 66 return certs; in STACK_OF()
|
/openssl-master/apps/ |
A D | nseq.c | 91 seq->certs = sk_X509_new_null(); in nseq_main() 92 if (seq->certs == NULL) in nseq_main() 95 if (!sk_X509_push(seq->certs, x509)) in nseq_main() 99 if (!sk_X509_num(seq->certs)) { in nseq_main() 118 for (i = 0; i < sk_X509_num(seq->certs); i++) { in nseq_main() 119 x509 = sk_X509_value(seq->certs, i); in nseq_main()
|
A D | pkcs7.c | 147 STACK_OF(X509) *certs = NULL; in pkcs7_main() 154 certs = p7->d.sign->cert; in pkcs7_main() 160 certs = p7->d.signed_and_enveloped->cert; in pkcs7_main() 168 if (certs != NULL) { in pkcs7_main() 171 for (i = 0; i < sk_X509_num(certs); i++) { in pkcs7_main() 172 x = sk_X509_value(certs, i); in pkcs7_main()
|
/openssl-master/crypto/pkcs7/ |
A D | pk7_smime.c | 23 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign_ex() argument 47 for (i = 0; i < sk_X509_num(certs); i++) { in PKCS7_sign_ex() 48 if (!PKCS7_add_certificate(p7, sk_X509_value(certs, i))) in PKCS7_sign_ex() 67 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign() argument 263 signers = PKCS7_get0_signers(p7, certs, flags); in PKCS7_verify() 419 if (certs) in STACK_OF() 420 signer = X509_find_by_issuer_and_serial(certs, in STACK_OF() 443 PKCS7 *PKCS7_encrypt_ex(STACK_OF(X509) *certs, BIO *in, in PKCS7_encrypt_ex() argument 464 for (i = 0; i < sk_X509_num(certs); i++) { in PKCS7_encrypt_ex() 465 x509 = sk_X509_value(certs, i); in PKCS7_encrypt_ex() [all …]
|
/openssl-master/crypto/ess/ |
A D | ess_lib.c | 25 const STACK_OF(X509) *certs, in OSSL_ESS_signing_cert_new_init() 41 for (i = 0; i < sk_X509_num(certs); ++i) { in OSSL_ESS_signing_cert_new_init() 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() 102 STACK_OF(X509) *certs, in OSSL_ESS_signing_cert_v2_new_init() 118 for (i = 0; i < sk_X509_num(certs); ++i) { in OSSL_ESS_signing_cert_v2_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() 218 int index, const STACK_OF(X509) *certs) in find() 254 for (i = 0; i < sk_X509_num(certs); ++i) { in find() 255 cert = sk_X509_value(certs, i); in find()
|
/openssl-master/test/recipes/90-test_includes_data/conf-includes/ |
A D | includes1.cnf | 15 certs = $dir/certs # Where the issued certs are kept 18 new_certs_dir = $dir/new_certs # default place for new certs.
|
/openssl-master/crypto/ts/ |
A D | ts_verify_ctx.c | 64 STACK_OF(X509) *certs) in STACK_OF() 66 ctx->certs = certs; in STACK_OF() 67 return ctx->certs; in STACK_OF() 85 sk_X509_pop_free(ctx->certs, X509_free); in TS_VERIFY_CTX_cleanup()
|
A D | ts_rsp_sign.c | 150 sk_X509_pop_free(ctx->certs, X509_free); in TS_RESP_CTX_free() 198 int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs) in TS_RESP_CTX_set_certs() argument 200 sk_X509_pop_free(ctx->certs, X509_free); in TS_RESP_CTX_set_certs() 201 ctx->certs = NULL; in TS_RESP_CTX_set_certs() 203 return certs == NULL || (ctx->certs = X509_chain_up_ref(certs)) != NULL; in TS_RESP_CTX_set_certs() 680 STACK_OF(X509) *certs; /* Certificates to include in sc. */ in ts_RESP_sign() 704 if (ctx->certs) { in ts_RESP_sign() 705 for (i = 0; i < sk_X509_num(ctx->certs); ++i) { in ts_RESP_sign() 706 X509 *cert = sk_X509_value(ctx->certs, i); in ts_RESP_sign() 733 certs = ctx->flags & TS_ESS_CERT_ID_CHAIN ? ctx->certs : NULL; in ts_RESP_sign() [all …]
|
A D | ts_conf.c | 65 BIO *certs = NULL; in STACK_OF() local 70 if ((certs = BIO_new_file(file, "r")) == NULL) in STACK_OF() 75 allcerts = PEM_X509_INFO_read_bio(certs, NULL, NULL, NULL); in STACK_OF() 92 BIO_free(certs); in STACK_OF() 218 int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs, in TS_CONF_set_certs() argument 224 if (certs == NULL) { in TS_CONF_set_certs() 226 if ((certs = NCONF_get_string(conf, section, ENV_CERTS)) == NULL) in TS_CONF_set_certs() 229 if ((certs_obj = TS_CONF_load_certs(certs)) == NULL) in TS_CONF_set_certs()
|
/openssl-master/doc/man3/ |
A D | X509_add_cert.pod | 14 int X509_add_certs(STACK_OF(X509) *sk, STACK_OF(X509) *certs, int flags); 20 X509_add_certs() adds a list of certificate I<certs> to the given list I<sk>. 21 The I<certs> argument may be NULL, which implies no effect. 22 It does not modify the list I<certs> but 52 because otherwise likely not for all members of the I<certs> list 55 Care should also be taken in case the I<certs> argument equals I<sk>.
|
A D | TS_VERIFY_CTX_set_certs.pod | 13 STACK_OF(X509) *certs); 15 STACK_OF(X509) *certs); 32 B<certs> is a stack of B<X509> certificates. 40 passes in via parameter B<certs>.
|
A D | PKCS7_verify.pod | 11 int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, 14 STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); 19 structure to verify. B<certs> is a set of certificates in which to search for 29 B<not> check their validity or whether any signatures are valid. The B<certs> 46 the B<certs> parameter (if it is not B<NULL>) and then looking in any certificates 65 certificates must be in the B<certs> parameter. 83 in the B<certs> parameter. In this case if the signer is not one of the 84 certificates supplied in B<certs> then the verify will fail because the
|
/openssl-master/crypto/cms/ |
A D | cms_smime.c | 262 STACK_OF(X509) *certs, in cms_signerinfo_verify_cert() 278 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) { in cms_signerinfo_verify_cert() 304 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, in CMS_verify() argument 344 scount += CMS_set1_signers_certs(cms, certs, flags); in CMS_verify() 491 STACK_OF(X509) *certs, in CMS_verify_receipt() 497 r = CMS_verify(rcms, certs, store, NULL, NULL, flags); in CMS_verify_receipt() 524 for (i = 0; i < sk_X509_num(certs); i++) { in CMS_sign_ex() 525 X509 *x = sk_X509_value(certs, i); in CMS_sign_ex() 575 cms = CMS_sign_ex(NULL, NULL, certs, NULL, flags, in CMS_sign_receipt() 640 for (i = 0; i < sk_X509_num(certs); i++) { in CMS_encrypt_ex() [all …]
|
/openssl-master/crypto/x509/ |
A D | t_x509.c | 431 static int print_certs(BIO *bio, const STACK_OF(X509) *certs) in print_certs() argument 435 if (certs == NULL || sk_X509_num(certs) <= 0) in print_certs() 438 for (i = 0; i < sk_X509_num(certs); i++) { in print_certs() 439 X509 *cert = sk_X509_value(certs, i); in print_certs() 456 STACK_OF(X509) *certs = X509_STORE_get1_all_certs(store); in print_store_certs() 457 int ret = print_certs(bio, certs); in print_store_certs() 459 sk_X509_pop_free(certs, X509_free); in print_store_certs()
|
/openssl-master/crypto/cmp/ |
A D | cmp_util.c | 202 int ossl_cmp_X509_STORE_add1_certs(X509_STORE *store, STACK_OF(X509) *certs, in ossl_cmp_X509_STORE_add1_certs() argument 211 if (certs == NULL) in ossl_cmp_X509_STORE_add1_certs() 213 for (i = 0; i < sk_X509_num(certs); i++) { in ossl_cmp_X509_STORE_add1_certs() 214 X509 *cert = sk_X509_value(certs, i); in ossl_cmp_X509_STORE_add1_certs()
|