/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 23 int OCSP_request_onereq_count(OCSP_REQUEST *req) in OCSP_request_onereq_count() argument 25 return sk_OCSP_ONEREQ_num(req->tbsRequest.requestList); in OCSP_request_onereq_count() 28 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) in OCSP_request_onereq_get0() argument 30 return sk_OCSP_ONEREQ_value(req->tbsRequest.requestList, i); in OCSP_request_onereq_get0() 55 int OCSP_request_is_signed(OCSP_REQUEST *req) in OCSP_request_is_signed() argument 57 if (req->optionalSignature) in OCSP_request_is_signed()
|
H A D | ocsp_ext.c | 282 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len) in OCSP_request_add1_nonce() argument 284 return ocsp_add1_nonce(&req->tbsRequest.requestExtensions, val, len); in OCSP_request_add1_nonce() 309 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs) in OCSP_check_nonce() argument 321 req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1); in OCSP_check_nonce() 335 req_ext = OCSP_REQUEST_get_ext(req, req_idx); in OCSP_check_nonce() 347 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req) in OCSP_copy_nonce() argument 352 req_idx = OCSP_REQUEST_get_ext_by_NID(req, NID_id_pkix_OCSP_Nonce, -1); in OCSP_copy_nonce() 356 req_ext = OCSP_REQUEST_get_ext(req, req_idx); in OCSP_copy_nonce()
|
/openssl/apps/ |
H A D | x509.c | 200 X509_REQ *req = X509_to_X509_REQ(cert, NULL, NULL); in x509_to_req() local 202 if (req == NULL) in x509_to_req() 224 && !X509_REQ_add_extensions(req, exts)) { in x509_to_req() 230 return req; in x509_to_req() 234 X509_REQ_free(req); in x509_to_req() 271 X509_REQ *req = NULL, *rq = NULL; in x509_main() local 710 if (req == NULL) in x509_main() 717 i = do_X509_REQ_verify(req, pkey, vfyopts); in x509_main() 765 if ((fsubj != NULL || req != NULL) in x509_main() 772 X509_REQ_get0_pubkey(req))) in x509_main() [all …]
|
H A D | ca.c | 318 req = 1; in ca_main() 455 req = 1; in ca_main() 459 req = 1; in ca_main() 463 req = 1; in ca_main() 797 if (req || gencrl) { in ca_main() 825 if (req) { in ca_main() 1373 X509_REQ *req = NULL; in certify() local 1378 if (req == NULL) in certify() 1414 X509_REQ_free(req); in certify() 2033 if (req == NULL) in certify_spkac() [all …]
|
/openssl/crypto/x509/ |
H A D | x_all.c | 230 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) in d2i_X509_REQ_fp() argument 232 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); in d2i_X509_REQ_fp() 235 int i2d_X509_REQ_fp(FILE *fp, const X509_REQ *req) in i2d_X509_REQ_fp() argument 237 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); in i2d_X509_REQ_fp() 241 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) in d2i_X509_REQ_bio() argument 246 if (req != NULL && *req != NULL) { in d2i_X509_REQ_bio() 247 libctx = (*req)->libctx; in d2i_X509_REQ_bio() 248 propq = (*req)->propq; in d2i_X509_REQ_bio() 251 return ASN1_item_d2i_bio_ex(ASN1_ITEM_rptr(X509_REQ), bp, req, libctx, propq); in d2i_X509_REQ_bio() 254 int i2d_X509_REQ_bio(BIO *bp, const X509_REQ *req) in i2d_X509_REQ_bio() argument [all …]
|
H A D | v3_conf.c | 379 X509_REQ *req) in X509V3_EXT_REQ_add_nconf() argument 384 if (ret && req != NULL && exts != NULL) in X509V3_EXT_REQ_add_nconf() 385 ret = X509_REQ_add_extensions(req, exts); in X509V3_EXT_REQ_add_nconf() 457 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, in X509V3_set_ctx() argument 467 ctx->subject_req = req; in X509V3_set_ctx() 583 const char *section, X509_REQ *req) in X509V3_EXT_REQ_add_conf() argument 591 ret = X509V3_EXT_REQ_add_nconf(ctmp, ctx, section, req); in X509V3_EXT_REQ_add_conf()
|
/openssl/include/openssl/ |
H A D | http.h | 51 const ASN1_ITEM *it, const ASN1_VALUE *req); 74 const char *content_type, BIO *req, 91 const char *content_type, BIO *req,
|
H A D | x509.h.in | 377 int i2d_X509_REQ_fp(FILE *fp, const X509_REQ *req); 423 int i2d_X509_REQ_bio(BIO *bp, const X509_REQ *req); 684 long X509_REQ_get_version(const X509_REQ *req); 695 EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req); 702 int X509_REQ_add_extensions_nid(X509_REQ *req, 705 int X509_REQ_get_attr_count(const X509_REQ *req); 712 int X509_REQ_add1_attr_by_OBJ(X509_REQ *req, 715 int X509_REQ_add1_attr_by_NID(X509_REQ *req, 718 int X509_REQ_add1_attr_by_txt(X509_REQ *req, 813 int X509_REQ_print_fp(FILE *bp, X509_REQ *req); [all …]
|
H A D | cmp.h.in | 186 * -- response MAY use the polling req/rep PKIMessages specified 307 const OSSL_CMP_MSG *req); 402 const OSSL_CMP_MSG *req); 407 const OSSL_CMP_MSG *req); 409 const OSSL_CMP_MSG *req); 413 (OSSL_CMP_SRV_CTX *srv_ctx, const OSSL_CMP_MSG *req, int certReqId, 417 const OSSL_CMP_MSG *req, 421 const OSSL_CMP_MSG *req, 425 const OSSL_CMP_MSG *req, 430 const OSSL_CMP_MSG *req, [all …]
|
/openssl/test/ |
H A D | cmp_server_test.c | 18 OSSL_CMP_MSG *req; member 96 if (!TEST_ptr(rsp = OSSL_CMP_CTX_server_perform(client_ctx, fixture->req)) in execute_test_handle_request() 115 fixture->req = request; in test_handle_request()
|
H A D | test.cnf | 51 [ req ] 55 # Make altreq be identical to req
|
H A D | cmp_client_test.c | 220 X509_REQ *req = NULL; in test_exec_P10CR_ses() local 225 if (!TEST_ptr(req = load_csr_der(pkcs10_f, libctx)) in test_exec_P10CR_ses() 226 || !TEST_true(OSSL_CMP_CTX_set1_p10CSR(fixture->cmp_ctx, req))) { in test_exec_P10CR_ses() 230 X509_REQ_free(req); in test_exec_P10CR_ses()
|
/openssl/doc/man3/ |
H A D | X509V3_set_ctx.pod | 13 X509_REQ *req, X509_CRL *crl, int flags); 21 request I<req>, or the certificate revocation list I<crl>. 24 hash value of its public key, the public key is taken from I<subject> or I<req>. 26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>.
|
H A D | X509_get_pubkey.pod | 19 EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req); 20 EVP_PKEY *X509_REQ_get0_pubkey(X509_REQ *req); 41 X509_REQ_get_X509_PUBKEY() are similar but operate on certificate request B<req>.
|
H A D | X509_check_private_key.pod | 15 int X509_REQ_check_private_key(X509_REQ *req, EVP_PKEY *pkey); 23 except that I<req> represents a certificate request of structure B<X509_REQ>.
|
H A D | OSSL_CMP_MSG_http_perform.pod | 13 const OSSL_CMP_MSG *req); 17 OSSL_CMP_MSG_http_perform() sends the given PKIMessage I<req>
|
/openssl/doc/man1/ |
H A D | CA.pl.pod | 68 Invokes L<openssl-req(1)>. 74 Executes L<openssl-req(1)> under the hood. 79 Uses L<openssl-req(1)>. 88 Uses L<openssl-req(1)> and L<openssl-ca(1)>. 149 For example, if L<openssl-req(1)> is invoked, the I<parameter> given with 150 B<-extra-req> will be passed to it. 177 configuration option and value to the B<req> and B<ca> commands invoked by 186 L<openssl-req(1)>,
|
H A D | openssl-req.pod.in | 6 openssl-req - PKCS#10 certificate request and certificate generating command 10 B<openssl> B<req> 254 Specifies the name of the section to use; the default is B<req>. 584 openssl req -in req.pem -text -verify -noout 589 openssl req -new -key key.pem -out req.pem 591 The same but just using req: 593 openssl req -newkey rsa:2048 -keyout key.pem -out req.pem 597 openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem 621 [ req ] 660 [ req ] [all …]
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 471 OSSL_CRMF_MSG *req = NULL; in OSSL_CRMF_MSGS_verify_popo() local 477 if (reqs == NULL || (req = sk_OSSL_CRMF_MSG_value(reqs, rid)) == NULL) { in OSSL_CRMF_MSGS_verify_popo() 482 if (req->popo == NULL) { in OSSL_CRMF_MSGS_verify_popo() 487 switch (req->popo->type) { in OSSL_CRMF_MSGS_verify_popo() 495 pubkey = req->certReq->certTemplate->publicKey; in OSSL_CRMF_MSGS_verify_popo() 500 sig = req->popo->value.signature; in OSSL_CRMF_MSGS_verify_popo() 518 if (req->certReq->certTemplate->subject == NULL) { in OSSL_CRMF_MSGS_verify_popo() 523 asn = req->certReq; in OSSL_CRMF_MSGS_verify_popo()
|
/openssl/doc/man7/ |
H A D | proxy-certificates.pod | 111 openssl req -new -config proxy.cnf \ 112 -out proxy.req -keyout proxy.key \ 115 openssl x509 -req -CAcreateserial -in proxy.req -out proxy.crt \ 123 openssl req -new -config proxy.cnf \ 124 -out proxy2.req -keyout proxy2.key \ 127 openssl x509 -req -CAcreateserial -in proxy2.req -out proxy2.crt \ 349 L<openssl-req(1)>, L<openssl-x509(1)>,
|
/openssl/apps/lib/ |
H A D | http_server.c | 302 ASN1_VALUE *req; in http_server_get_asn1_req() local 487 req = ASN1_item_d2i_bio(it, getbio != NULL ? getbio : cbio, NULL); in http_server_get_asn1_req() 488 if (req == NULL) { in http_server_get_asn1_req() 495 ASN1_item_free(req, it); in http_server_get_asn1_req() 499 *preq = req; in http_server_get_asn1_req()
|
/openssl/crypto/cmp/ |
H A D | cmp_client.c | 128 static int send_receive_check(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *req, in send_receive_check() argument 135 ossl_cmp_bodytype_to_string(OSSL_CMP_MSG_get_bodytype(req)); in send_receive_check() 168 *rep = (*transfer_cb)(ctx, req); in send_receive_check() 643 OSSL_CMP_MSG *req; in initial_certreq() local 654 if ((req = ossl_cmp_certreq_new(ctx, req_type, crm)) == NULL) in initial_certreq() 657 res = send_receive_check(ctx, req, p_rep, rep_type); in initial_certreq() 658 OSSL_CMP_MSG_free(req); in initial_certreq()
|
/openssl/apps/include/ |
H A D | apps.h | 112 int copy_extensions(X509 *x, X509_REQ *req, int copy_type); 187 OCSP_RESPONSE *process_responder(OCSP_REQUEST *req, const char *host, 303 ASN1_VALUE *req, const ASN1_ITEM *req_it,
|
/openssl/demos/sslecho/ |
H A D | A-SSL-Docs.txt | 15 openssl req -newkey rsa:4096 -x509 -sha256 -days 3650 -nodes -out cert.pem -keyout key.pem
|
/openssl/test/recipes/90-test_includes_data/conf-includes/ |
H A D | includes2.cnf | 23 [ req ]
|