Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 21 of 21) sorted by relevance

/apps/include/
A Dcmp_mock_srv.h23 int ossl_cmp_mock_srv_set1_refCert(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
24 int ossl_cmp_mock_srv_set1_certOut(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
31 int ossl_cmp_mock_srv_set1_newWithNew(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
32 int ossl_cmp_mock_srv_set1_newWithOld(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
33 int ossl_cmp_mock_srv_set1_oldWithNew(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
A Ds_apps.h31 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
A Dapps.h266 int cert_matches_key(const X509 *cert, const EVP_PKEY *pkey);
/apps/
A Dsess_id.c55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local
89 cert = ++num; in sess_id_main()
132 if (cert) { in sess_id_main()
140 if (!noout && !cert) { in sess_id_main()
A Dopenssl-vms.cnf97 x509_extensions = usr_cert # The extensions to add to the cert
149 x509_extensions = v3_ca # The extensions to add to the self signed cert
331 ess_cert_id_chain = no # Must the ESS cert id chain be included?
345 ignore_keyusage = 1 # quirk needed to accept Insta CA cert not including digitalsignature
360 certout = insta.cert.pem
374 cert = $insta::certout # insta.cert.pem
385 oldcert = $insta::certout # insta.cert.pem
390 oldcert = $insta::certout # insta.cert.pem
A Dopenssl.cnf97 x509_extensions = usr_cert # The extensions to add to the cert
149 x509_extensions = v3_ca # The extensions to add to the self signed cert
331 ess_cert_id_chain = no # Must the ESS cert id chain be included?
345 ignore_keyusage = 1 # quirk needed to accept Insta CA cert not including digitalsignature
360 certout = insta.cert.pem
374 cert = $insta::certout # insta.cert.pem
385 oldcert = $insta::certout # insta.cert.pem
390 oldcert = $insta::certout # insta.cert.pem
A Dcmp.c782 X509 *cert; in load_cert_pwd() local
787 return cert; in load_cert_pwd()
1033 X509 *cert; in setup_cert() local
1040 ok = (*set1_fn)(ctx, cert); in setup_cert()
1041 X509_free(cert); in setup_cert()
1397 X509 *cert; in setup_ssl_ctx() local
1408 X509_free(cert); in setup_ssl_ctx()
1470 X509_free(cert); in setup_ssl_ctx()
1580 X509 *cert; in setup_protection_ctx() local
1591 X509_free(cert); in setup_protection_ctx()
[all …]
A Dts.c41 int cert, const char *in, const char *out, int text);
43 const char *policy, int no_nonce, int cert);
173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local
235 cert = 1; in ts_main()
323 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main()
399 int cert, const char *in, const char *out, int text) in query_command() argument
416 query = create_query(data_bio, digest, md, policy, no_nonce, cert); in query_command()
445 const char *policy, int no_nonce, int cert) in create_query() argument
489 if (!TS_REQ_set_cert_req(ts_req, cert)) in create_query()
A Dsmime.c169 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local
486 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main()
488 if (cert == NULL) in smime_main()
490 if (!sk_X509_push(encerts, cert)) in smime_main()
492 cert = NULL; in smime_main()
697 X509_free(cert); in smime_main()
A Docsp.c53 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert,
226 X509 *issuer = NULL, *cert = NULL; in ocsp_main() local
437 X509_free(cert); in ocsp_main()
438 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main()
439 if (cert == NULL) in ocsp_main()
443 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) in ocsp_main()
860 X509_free(cert); in ocsp_main()
903 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, in add_ocsp_cert() argument
917 id = OCSP_cert_to_id(cert_id_md, cert, issuer); in add_ocsp_cert()
A Dpkcs7.c158 certs = p7->d.sign->cert; in pkcs7_main()
164 certs = p7->d.signed_and_enveloped->cert; in pkcs7_main()
A Dcms.c323 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local
672 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main()
674 if (cert == NULL) in cms_main()
676 if (!sk_X509_push(encerts, cert)) in cms_main()
678 cert = NULL; in cms_main()
925 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main()
927 if (cert == NULL) in cms_main()
929 if (!sk_X509_push(encerts, cert)) in cms_main()
931 cert = NULL; in cms_main()
1431 X509_free(cert); in cms_main()
A Dx509.c39 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
203 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument
205 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req()
210 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req()
248 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument
253 if (xsc == NULL || !X509_STORE_CTX_init(xsc, ctx, cert, NULL)) { in self_signed()
1236 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) in purpose_print() argument
1243 idret = X509_check_purpose(cert, id, i); in purpose_print()
A Dpkcs12.c39 static int get_cert_chain(X509 *cert, X509_STORE *store,
1107 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument
1120 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain()
1229 X509 *cert; in cert_load() local
1231 while ((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in cert_load()
1233 if (!sk_X509_push(sk, cert)) in cert_load()
A Dverify.c302 X509 *cert = sk_X509_value(chain, j); in check() local
305 X509_get_subject_name(cert), in check()
A Dcrl2pkcs7.c150 p7s->cert = cert_stack; in crl2pkcs7_main()
A Ds_client.c865 X509 *cert = NULL; in s_client_main() local
1781 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main()
1783 if (cert == NULL) in s_client_main()
2043 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main()
3329 X509_free(cert); in s_client_main()
3379 static void print_cert_key_info(BIO *bio, X509 *cert) in print_cert_key_info() argument
3381 EVP_PKEY *pkey = X509_get0_pubkey(cert); in print_cert_key_info()
3395 OBJ_nid2ln(X509_get_signature_nid(cert))); in print_cert_key_info()
3399 OBJ_nid2ln(X509_get_signature_nid(cert))); in print_cert_key_info()
A Ds_server.c490 X509 *cert; in get_ocsp_resp_from_responder_single() local
533 cert = sk_X509_value(chain, i); in get_ocsp_resp_from_responder_single()
534 if (X509_name_cmp(iname, X509_get_subject_name(cert)) == 0) { in get_ocsp_resp_from_responder_single()
536 id = OCSP_cert_to_id(NULL, x, cert); in get_ocsp_resp_from_responder_single()
/apps/lib/
A Dapps.c492 X509 *cert = NULL; in load_cert_pass() local
500 if (cert == NULL) { in load_cert_pass()
508 return cert; in load_cert_pass()
725 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert()
727 X509_get0_notAfter(cert)); in warn_cert()
732 warn_cert_msg(uri, cert, "is not a CA cert"); in warn_cert()
2353 X509_delete_ext(cert, idx); in adapt_keyid_ext()
2369 match = X509_check_private_key(cert, pkey); in cert_matches_key()
2383 if (!X509_set_version(cert, X509_VERSION_3)) in do_X509_sign()
2394 self_sign = cert_matches_key(cert, pkey); in do_X509_sign()
[all …]
A Ds_cb.c158 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument
163 if (cert == NULL) in set_cert_key_stuff()
165 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff()
964 X509 *cert; member
1034 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb()
1036 X509_NAME_print_ex(bio_err, X509_get_subject_name(exc->cert), 0, in set_cert_cb()
1041 if (!SSL_use_certificate(ssl, exc->cert) in set_cert_cb()
1096 X509_free(exc->cert); in ssl_excert_free()
1122 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert()
1124 if (exc->cert == NULL) in load_excert()
A Dcmp_mock_srv.c72 X509 *cert) \
80 if (cert == NULL || X509_up_ref(cert)) { \
82 ctx->FIELD = cert; \

Completed in 53 milliseconds