/openssl/test/certs/ |
H A D | mkcert.sh | 113 csr=$(req "$key" "CN = $cn") || return 1 114 echo "$csr" | 155 echo "$csr" | 176 echo "$csr" | 268 echo "$csr" | 302 echo "$csr" | 348 echo "$csr" | 357 csr=$(req_nocn "$key") || return 1 358 echo "$csr" | 391 echo "$csr" | [all …]
|
/openssl/test/testutil/ |
H A D | load.c | 94 X509_REQ *csr = NULL; in load_csr_der() local 100 csr = X509_REQ_new_ex(libctx, NULL); in load_csr_der() 101 if (TEST_ptr(csr)) in load_csr_der() 102 (void)TEST_ptr(d2i_X509_REQ_bio(bio, &csr)); in load_csr_der() 104 return csr; in load_csr_der()
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 44 -out intermediate-csr.pem 53 -in intermediate-csr.pem \ 72 -out server-csr.pem 82 -in server-csr.pem \
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_enrollment.csv | 1 …le_confirm,noarg, -certout,val,val2, -out_trusted,val,val2, -oldcert,val, -csr,val, -revreason,val… 95 …,BLANK,, -certout,_RESULT_DIR/test.certout_csr1.pem,, -out_trusted,root.crt,,BLANK,, -csr,csr.pem,, 96 …,BLANK,, -certout,_RESULT_DIR/test.certout_csr2.pem,, -out_trusted,root.crt,,BLANK,, -csr,csr.pem,, 97 …,BLANK,, -certout,_RESULT_DIR/test.certout_csr3.pem,, -out_trusted,root.crt,,BLANK,, -csr,csr.pem,, 98 …,BLANK,, -certout,_RESULT_DIR/test.certout_csr4.pem,, -out_trusted,root.crt,,BLANK,, -csr,csr.pem,, 99 …csr present, -section,, -cmd,p10cr,BLANK,,, BLANK,,,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLA… 100 0,p10cr csr missing, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLA… 101 …csr missing arg, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,… 102 …csr non-existing file, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,… 103 …csr empty file, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,… [all …]
|
H A D | test_commands.csv | 37 1, --- use csr for revocation ----, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,0,,, -cs… 46 1,use csr for revocation, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,0, -csr,csr.pem 56 0,rr without oldcert/csr/issuer/serial, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,,BLANK,
|
/openssl/test/ |
H A D | cmp_client_test.c | 333 X509_REQ *csr = NULL; in test_exec_P10CR_ses() local 340 if (!TEST_ptr(csr = load_csr_der(pkcs10_f, libctx)) in test_exec_P10CR_ses() 341 || !TEST_true(OSSL_CMP_CTX_set1_p10CSR(ctx, csr)) in test_exec_P10CR_ses() 347 X509_REQ_free(csr); in test_exec_P10CR_ses()
|
/openssl/test/recipes/ |
H A D | 90-test_store.t | 425 (my $csr = $dstfile) =~ s|\.pem|.csr|; 429 "-key", $srckey, "-out", $csr])) 436 "-in", $csr, "-out", $dstfile])));
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 109 csr =
|
/openssl/apps/lib/ |
H A D | apps.c | 561 X509_REQ *csr; in load_csr_autofmt() local 564 csr = load_csr(infile, format, desc); in load_csr_autofmt() 569 csr = load_csr(infile, FORMAT_PEM, NULL /* desc */); in load_csr_autofmt() 571 if (csr == NULL) { in load_csr_autofmt() 573 csr = load_csr(infile, FORMAT_ASN1, NULL /* desc */); in load_csr_autofmt() 575 if (csr == NULL) { in load_csr_autofmt() 580 if (csr != NULL) { in load_csr_autofmt() 581 EVP_PKEY *pkey = X509_REQ_get0_pubkey(csr); in load_csr_autofmt() 582 int ret = do_X509_REQ_verify(csr, pkey, vfyopts); in load_csr_autofmt() 588 return csr; in load_csr_autofmt() [all …]
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 55 openssl req -new -key privkey.pem -out cert.csr 57 Now, cert.csr can be sent to the certificate authority, if they can
|
/openssl/apps/ |
H A D | cmp.c | 1663 X509_REQ *csr = NULL; in setup_request_ctx() local 1858 csr = load_csr_autofmt(opt_csr, FORMAT_UNDEF, NULL, "PKCS#10 CSR"); in setup_request_ctx() 1859 if (csr == NULL) in setup_request_ctx() 1861 if (!OSSL_CMP_CTX_set1_p10CSR(ctx, csr)) in setup_request_ctx() 1868 X509V3_set_ctx(&ext_ctx, NULL, NULL, csr, NULL, X509V3_CTX_REPLACE); in setup_request_ctx() 1884 X509_REQ_free(csr); in setup_request_ctx() 1956 X509_REQ_free(csr); in setup_request_ctx()
|
/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 38 [B<-csr> I<filename>] 294 Defaults to the public key in the PKCS#10 CSR given with the B<-csr> option, 316 Default is the subject DN of any PKCS#10 CSR given with the B<-csr> option. 321 If provided and neither of B<-cert>, B<-oldcert>, or B<-csr> is given, 344 If the B<-csr> option is present, these extensions augment the extensions 388 =item B<-csr> I<filename> 456 For RR the certificate to be revoked can also be specified using B<-csr>. 457 B<-oldcert> and B<-csr> is ignored if B<-issuer> and B<-serial> is provided. 1056 and no B<-newkey>, B<-key>, B<-oldcert>, or B<-csr> option is given,
|
H A D | openssl-req.pod.in | 664 openssl req -newkey rsa:2048 -keyout privatekey.pem -out request.csr -cipher aes-256-cbc 682 openssl req -new -key sm2.key -out sm2.csr -sm3 -sigopt "distid:1234567812345678" 686 openssl req -verify -in sm2.csr -sm3 -vfyopt "distid:1234567812345678"
|
H A D | openssl-ca.pod.in | 680 openssl ca -in sm2.csr -out sm2.crt -md sm3 \
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 424 int OSSL_CMP_CTX_set1_p10CSR(OSSL_CMP_CTX *ctx, const X509_REQ *csr);
|
/openssl/doc/man3/ |
H A D | OSSL_CMP_CTX_new.pod | 148 int OSSL_CMP_CTX_set1_p10CSR(OSSL_CMP_CTX *ctx, const X509_REQ *csr);
|