/openssl-master/crypto/x509/ |
A D | x509_vpm.c | 105 OPENSSL_free(param->email); in X509_VERIFY_PARAM_free() 215 if (test_x509_verify_param_copy(email, NULL)) { in X509_VERIFY_PARAM_inherit() 216 if (!X509_VERIFY_PARAM_set1_email(dest, src->email, src->emaillen)) in X509_VERIFY_PARAM_inherit() 433 return param->email; in X509_VERIFY_PARAM_get0_email() 437 const char *email, size_t emaillen) in X509_VERIFY_PARAM_set1_email() argument 439 return int_x509_param_set1(¶m->email, ¶m->emaillen, in X509_VERIFY_PARAM_set1_email() 440 email, emaillen); in X509_VERIFY_PARAM_set1_email()
|
A D | v3_utl.c | 31 const ASN1_IA5STRING *email); 496 const ASN1_IA5STRING *email; in STACK_OF() local 505 email = X509_NAME_ENTRY_get_data(ne); in STACK_OF() 506 if (!append_ia5(&ret, email)) in STACK_OF() 525 const ASN1_IA5STRING *email) in append_ia5() argument 530 if (email->type != V_ASN1_IA5STRING) in append_ia5() 532 if (email->data == NULL || email->length == 0) in append_ia5() 534 if (memchr(email->data, 0, email->length) != NULL) in append_ia5() 541 emtmp = OPENSSL_strndup((char *)email->data, email->length); in append_ia5()
|
A D | v3_san.c | 424 ASN1_IA5STRING *email = NULL; in copy_email() local 446 email = ASN1_STRING_dup(X509_NAME_ENTRY_get_data(ne)); in copy_email() 452 if (email == NULL || (gen = GENERAL_NAME_new()) == NULL) { in copy_email() 456 gen->d.ia5 = email; in copy_email() 457 email = NULL; in copy_email() 470 ASN1_IA5STRING_free(email); in copy_email()
|
A D | x509_local.h | 35 char *email; /* If not NULL email address to match */ member
|
A D | x509_vfy.c | 799 if (vpm->email != NULL in check_id() 800 && X509_check_email(x, vpm->email, vpm->emaillen, 0) <= 0) { in check_id()
|
/openssl-master/doc/man5/ |
A D | x509v3_config.pod | 82 email = steve@example.com 83 email = steve@example.org 92 email.1 = steve@example.com 93 email.2 = steve@example.org 223 B<email> (an email address), 248 subjectAltName = email:copy, email:my@example.com, URI:http://my.example.com/ 254 subjectAltName = email:my@example.com, RID:1.2.3.4 279 it does not support B<email:copy>. 486 B<email:copy> 494 nameConstraints = permitted;email:.example.com [all …]
|
/openssl-master/apps/ |
A D | openssl-vms.cnf | 219 # Import the email address. 220 # subjectAltName=email:copy 223 # subjectAltName=email:move 257 # Include email address in subject alt name: another PKIX recommendation 258 # subjectAltName=email:copy 292 # Import the email address. 293 # subjectAltName=email:copy 296 # subjectAltName=email:move
|
A D | openssl.cnf | 219 # Import the email address. 220 # subjectAltName=email:copy 223 # subjectAltName=email:move 257 # Include email address in subject alt name: another PKIX recommendation 258 # subjectAltName=email:copy 292 # Import the email address. 293 # subjectAltName=email:copy 296 # subjectAltName=email:move
|
A D | x509.c | 286 int noout = 0, CA_createserial = 0, email = 0; in x509_main() local 467 email = ++num; in x509_main() 935 } else if (i == email || i == ocsp_uri) { in x509_main() 937 i == email ? X509_get1_email(x) : X509_get1_ocsp(x); in x509_main()
|
/openssl-master/doc/man3/ |
A D | X509_check_host.pod | 22 certificate matches a given hostname, email address, or IP address. 51 email B<address>. The mailbox syntax of RFC 822 is supported, 91 one subject alternative name of the right type (DNS name or email 97 names of the right type (DNS name or email address as appropriate); the default
|
A D | X509_VERIFY_PARAM_set_flags.pod | 66 const char *email, size_t emaillen); 190 X509_VERIFY_PARAM_get0_email() returns the expected RFC822 email address. 192 X509_VERIFY_PARAM_set1_email() sets the expected RFC822 email address to 193 B<email>. If B<email> is NUL-terminated, B<emaillen> may be zero, otherwise 194 B<emaillen> must be set to the length of B<email>. When an email address
|
A D | X509_STORE_CTX_get_error.pod | 311 supports directory name, DNS name, email and URI types. 316 The format of the name constraint is not recognised: for example an email 380 =item B<X509_V_ERR_EMAIL_MISMATCH: email address mismatch>
|
/openssl-master/test/ |
A D | v3nametest.c | 238 int email; member 329 if (fn->email) { in run_cert()
|
A D | test.cnf | 73 emailAddress = email field
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpmac_blake.txt | 148 Custom = "email" 204 Custom = "email"
|
/openssl-master/doc/man1/ |
A D | openssl-x509.pod.in | 39 [B<-email>] 273 =item B<-email> 275 Prints the email address(es) if any. 347 =item B<-checkemail> I<email> 349 Check that the certificate matches the specified email address. 743 The B<-email> option searches the subject name and the subject alternative 744 name extension. Only unique email addresses will be printed out: it will
|
A D | openssl-verification-options.pod | 72 B<emailProtection> (S/MIME email use), B<codeSigning> (object signer use), 477 =item B<-verify_email> I<email> 479 Verify if I<email> matches the email address in Subject Alternative Name or 480 the email in the subject Distinguished Name. 626 The extended key usage extension must be absent or include the "email 644 The extended key usage extension must be absent or include the "email
|
A D | openssl-cms.pod.in | 126 This command handles data in CMS format such as S/MIME v3.1 email messages. 489 For B<-sign> option include a signed receipt request. Add an explicit email 494 Add an explicit email address where signed receipts should be sent to. This 581 The relevant email headers. These are included outside the signed 583 then many S/MIME mail clients check the signers certificate's email 871 Ideally a database should be maintained of a certificates for each email
|
A D | openssl-smime.pod.in | 276 then many S/MIME mail clients check the signers certificate's email 457 Ideally a database should be maintained of a certificates for each email
|
A D | openssl-req.pod.in | 675 emailAddress = test@email.address 743 statically defined in the configuration file. Some of these: like an email
|
A D | openssl-ca.pod.in | 707 email_in_dn = no # Don't add the email into cert DN
|
A D | openssl-cmp.pod.in | 315 One or more IP addresses, email addresses, DNS names, or URIs
|
/openssl-master/include/openssl/ |
A D | x509_vfy.h.in | 273 /* Host, email and IP check errors */ 736 const char *email, size_t emaillen);
|
/openssl-master/crypto/objects/ |
A D | objects.txt | 530 !Cname email-protect
|
/openssl-master/ |
A D | CHANGES.md | 5842 * Integrate hostname, email address and IP address checking with certificate 5847 * Fixes and wildcard matching support to hostname and email checking 5852 * New functions to check a hostname email or IP address against a 8466 * Support for name constraints certificate extension. DN, email, DNS 15396 a STACK of email addresses from a certificate or request, these look 16332 for a given id. SSL client, server and email already have functions 16478 Side note: I get *lots* of email saying the extension code doesn't
|