Lines Matching refs:certificate

69 OSSL_CMP_exec_IR_ses() requests an initial certificate from the given PKI.
71 OSSL_CMP_exec_CR_ses() requests an additional certificate.
73 OSSL_CMP_exec_P10CR_ses() conveys a legacy PKCS#10 CSR requesting a certificate.
75 OSSL_CMP_exec_KUR_ses() obtains an updated certificate.
77 These four types of certificate enrollment are implemented as macros
80 OSSL_CMP_exec_certreq() performs a certificate request of the type specified
82 For IR, CR, and KUR, the certificate template to be used in the request
93 When called for the first time (with no certificate request in progress for
94 the given I<ctx>) it starts a new transaction by sending a certificate request
99 If the requested certificate is available the function returns 1 and the
100 caller can use L<OSSL_CMP_CTX_get0_newCert(3)> to retrieve the new certificate.
101 If no error occurred but no certificate is available yet then
110 to see whether meanwhile the requested certificate is available.
111 If the caller decides to abort the pending certificate request and provides
115 OSSL_CMP_exec_RR_ses() requests the revocation of the certificate
119 of the certificate set by L<OSSL_CMP_CTX_set1_oldCert(3)>,
121 of the certificate signing request set by L<OSSL_CMP_CTX_set1_p10CSR(3)>.
125 typically return them as an indication that the certificate was already revoked.
153 given root CA certificate I<oldWithOld> and verifies it as far as possible.
155 On success it assigns to I<*newWithNew> the root certificate received.
158 NULL means that the respective certificate was not provided by the server.
162 The I<newWithNew> certificate is meant to be a certificate that will be trusted.
164 the I<oldwithold> certificate if present, otherwise it cannot be stronger than
176 infoType certReqTemplate to obtain a certificate request template from the
178 the certificate template received. NULL output means that no certificate
192 trust, for instance via the caPubs field of a certificate response or using
197 L<OSSL_CMP_CTX_set0_trusted(3)> (for certificate-based authentication) or
199 If authentication is certificate-based, L<OSSL_CMP_CTX_get0_validatedSrvCert(3)>
200 should be used to obtain the server validated certificate
207 pointer to the newly obtained X509 certificate on success, NULL on error.
211 OSSL_CMP_try_certreq() returns 1 if the requested certificate is available
213 or on successfully aborting a pending certificate request, 0 on error, and -1