/apps/include/ |
A D | cmp_mock_srv.h | 23 int ossl_cmp_mock_srv_set1_refCert(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert); 24 int ossl_cmp_mock_srv_set1_certOut(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert); 31 int ossl_cmp_mock_srv_set1_newWithNew(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert); 32 int ossl_cmp_mock_srv_set1_newWithOld(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert); 33 int ossl_cmp_mock_srv_set1_oldWithNew(OSSL_CMP_SRV_CTX *srv_ctx, X509 *cert);
|
A D | s_apps.h | 31 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
|
A D | apps.h | 266 int cert_matches_key(const X509 *cert, const EVP_PKEY *pkey);
|
/apps/ |
A D | sess_id.c | 55 int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; in sess_id_main() local 89 cert = ++num; in sess_id_main() 132 if (cert) { in sess_id_main() 140 if (!noout && !cert) { in sess_id_main()
|
A D | openssl-vms.cnf | 97 x509_extensions = usr_cert # The extensions to add to the cert 149 x509_extensions = v3_ca # The extensions to add to the self signed cert 331 ess_cert_id_chain = no # Must the ESS cert id chain be included? 345 ignore_keyusage = 1 # quirk needed to accept Insta CA cert not including digitalsignature 360 certout = insta.cert.pem 374 cert = $insta::certout # insta.cert.pem 385 oldcert = $insta::certout # insta.cert.pem 390 oldcert = $insta::certout # insta.cert.pem
|
A D | openssl.cnf | 97 x509_extensions = usr_cert # The extensions to add to the cert 149 x509_extensions = v3_ca # The extensions to add to the self signed cert 331 ess_cert_id_chain = no # Must the ESS cert id chain be included? 345 ignore_keyusage = 1 # quirk needed to accept Insta CA cert not including digitalsignature 360 certout = insta.cert.pem 374 cert = $insta::certout # insta.cert.pem 385 oldcert = $insta::certout # insta.cert.pem 390 oldcert = $insta::certout # insta.cert.pem
|
A D | cmp.c | 782 X509 *cert; in load_cert_pwd() local 787 return cert; in load_cert_pwd() 1033 X509 *cert; in setup_cert() local 1040 ok = (*set1_fn)(ctx, cert); in setup_cert() 1041 X509_free(cert); in setup_cert() 1397 X509 *cert; in setup_ssl_ctx() local 1408 X509_free(cert); in setup_ssl_ctx() 1470 X509_free(cert); in setup_ssl_ctx() 1580 X509 *cert; in setup_protection_ctx() local 1591 X509_free(cert); in setup_protection_ctx() [all …]
|
A D | ts.c | 41 int cert, const char *in, const char *out, int text); 43 const char *policy, int no_nonce, int cert); 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 235 cert = 1; in ts_main() 323 ret = !query_command(data, digest, md, policy, no_nonce, cert, in ts_main() 399 int cert, const char *in, const char *out, int text) in query_command() argument 416 query = create_query(data_bio, digest, md, policy, no_nonce, cert); in query_command() 445 const char *policy, int no_nonce, int cert) in create_query() argument 489 if (!TS_REQ_set_cert_req(ts_req, cert)) in create_query()
|
A D | smime.c | 169 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 486 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main() 488 if (cert == NULL) in smime_main() 490 if (!sk_X509_push(encerts, cert)) in smime_main() 492 cert = NULL; in smime_main() 697 X509_free(cert); in smime_main()
|
A D | ocsp.c | 53 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, 226 X509 *issuer = NULL, *cert = NULL; in ocsp_main() local 437 X509_free(cert); in ocsp_main() 438 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main() 439 if (cert == NULL) in ocsp_main() 443 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) in ocsp_main() 860 X509_free(cert); in ocsp_main() 903 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, in add_ocsp_cert() argument 917 id = OCSP_cert_to_id(cert_id_md, cert, issuer); in add_ocsp_cert()
|
A D | pkcs7.c | 158 certs = p7->d.sign->cert; in pkcs7_main() 164 certs = p7->d.signed_and_enveloped->cert; in pkcs7_main()
|
A D | cms.c | 323 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local 672 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main() 674 if (cert == NULL) in cms_main() 676 if (!sk_X509_push(encerts, cert)) in cms_main() 678 cert = NULL; in cms_main() 925 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main() 927 if (cert == NULL) in cms_main() 929 if (!sk_X509_push(encerts, cert)) in cms_main() 931 cert = NULL; in cms_main() 1431 X509_free(cert); in cms_main()
|
A D | x509.c | 39 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt); 203 static X509_REQ *x509_to_req(X509 *cert, int ext_copy, const char *names) in x509_to_req() argument 205 const STACK_OF(X509_EXTENSION) *cert_exts = X509_get0_extensions(cert); in x509_to_req() 210 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req() 248 static int self_signed(X509_STORE *ctx, X509 *cert) in self_signed() argument 253 if (xsc == NULL || !X509_STORE_CTX_init(xsc, ctx, cert, NULL)) { in self_signed() 1236 static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt) in purpose_print() argument 1243 idret = X509_check_purpose(cert, id, i); in purpose_print()
|
A D | pkcs12.c | 39 static int get_cert_chain(X509 *cert, X509_STORE *store, 1107 static int get_cert_chain(X509 *cert, X509_STORE *store, in get_cert_chain() argument 1120 if (!X509_STORE_CTX_init(store_ctx, store, cert, untrusted_certs)) { in get_cert_chain() 1229 X509 *cert; in cert_load() local 1231 while ((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in cert_load() 1233 if (!sk_X509_push(sk, cert)) in cert_load()
|
A D | verify.c | 302 X509 *cert = sk_X509_value(chain, j); in check() local 305 X509_get_subject_name(cert), in check()
|
A D | crl2pkcs7.c | 150 p7s->cert = cert_stack; in crl2pkcs7_main()
|
A D | s_client.c | 865 X509 *cert = NULL; in s_client_main() local 1781 cert = load_cert_pass(cert_file, cert_format, 1, pass, in s_client_main() 1783 if (cert == NULL) in s_client_main() 2043 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main() 3329 X509_free(cert); in s_client_main() 3379 static void print_cert_key_info(BIO *bio, X509 *cert) in print_cert_key_info() argument 3381 EVP_PKEY *pkey = X509_get0_pubkey(cert); in print_cert_key_info() 3395 OBJ_nid2ln(X509_get_signature_nid(cert))); in print_cert_key_info() 3399 OBJ_nid2ln(X509_get_signature_nid(cert))); in print_cert_key_info()
|
A D | s_server.c | 490 X509 *cert; in get_ocsp_resp_from_responder_single() local 533 cert = sk_X509_value(chain, i); in get_ocsp_resp_from_responder_single() 534 if (X509_name_cmp(iname, X509_get_subject_name(cert)) == 0) { in get_ocsp_resp_from_responder_single() 536 id = OCSP_cert_to_id(NULL, x, cert); in get_ocsp_resp_from_responder_single()
|
/apps/lib/ |
A D | apps.c | 492 X509 *cert = NULL; in load_cert_pass() local 500 if (cert == NULL) { in load_cert_pass() 508 return cert; in load_cert_pass() 725 uint32_t ex_flags = X509_get_extension_flags(cert); in warn_cert() 727 X509_get0_notAfter(cert)); in warn_cert() 732 warn_cert_msg(uri, cert, "is not a CA cert"); in warn_cert() 2353 X509_delete_ext(cert, idx); in adapt_keyid_ext() 2369 match = X509_check_private_key(cert, pkey); in cert_matches_key() 2383 if (!X509_set_version(cert, X509_VERSION_3)) in do_X509_sign() 2394 self_sign = cert_matches_key(cert, pkey); in do_X509_sign() [all …]
|
A D | s_cb.c | 158 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, in set_cert_key_stuff() argument 163 if (cert == NULL) in set_cert_key_stuff() 165 if (SSL_CTX_use_certificate(ctx, cert) <= 0) { in set_cert_key_stuff() 964 X509 *cert; member 1034 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb() 1036 X509_NAME_print_ex(bio_err, X509_get_subject_name(exc->cert), 0, in set_cert_cb() 1041 if (!SSL_use_certificate(ssl, exc->cert) in set_cert_cb() 1096 X509_free(exc->cert); in ssl_excert_free() 1122 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert() 1124 if (exc->cert == NULL) in load_excert()
|
A D | cmp_mock_srv.c | 72 X509 *cert) \ 80 if (cert == NULL || X509_up_ref(cert)) { \ 82 ctx->FIELD = cert; \
|