/openssl/crypto/asn1/ |
H A D | asn_mstbl.c | 64 CONF_VALUE *cnf = NULL; in do_tcreate() local 74 cnf = sk_CONF_VALUE_value(lst, i); in do_tcreate() 75 if (strcmp(cnf->name, "min") == 0) { in do_tcreate() 76 tbl_min = strtoul(cnf->value, &eptr, 0); in do_tcreate() 79 } else if (strcmp(cnf->name, "max") == 0) { in do_tcreate() 80 tbl_max = strtoul(cnf->value, &eptr, 0); in do_tcreate() 83 } else if (strcmp(cnf->name, "mask") == 0) { in do_tcreate() 86 } else if (strcmp(cnf->name, "flags") == 0) { in do_tcreate() 87 if (strcmp(cnf->value, "nomask") == 0) in do_tcreate() 99 if (cnf) in do_tcreate() [all …]
|
H A D | asn1_gen.c | 65 static ASN1_TYPE *generate_v3(const char *str, X509V3_CTX *cnf, int depth, 80 X509V3_CTX cnf; in ASN1_generate_nconf() local 85 X509V3_set_nconf(&cnf, nconf); in ASN1_generate_nconf() 86 return ASN1_generate_v3(str, &cnf); in ASN1_generate_nconf() 89 ASN1_TYPE *ASN1_generate_v3(const char *str, X509V3_CTX *cnf) in ASN1_generate_v3() argument 92 ASN1_TYPE *ret = generate_v3(str, cnf, 0, &err); in ASN1_generate_v3() 127 if (!cnf) { in generate_v3() 414 if (!cnf) in asn1_multi() 416 sect = X509V3_get_section(cnf, (char *)section); in asn1_multi() 421 generate_v3(sk_CONF_VALUE_value(sect, i)->value, cnf, in asn1_multi() [all …]
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 4 OPENSSL_CONF=../../apps/openssl.cnf 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ 32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ 57 CN="Test Server DH Cert" $OPENSSL req -config ca.cnf -new \ 82 -config ca.cnf -md sha1 84 -config ca.cnf -md sha1 86 -config ca.cnf -md sha1 [all …]
|
/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 13 OPENSSL_CONF=./ca.cnf 17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \ 21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \ 27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \ 32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \ 41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \ 45 CN="Test S/MIME EE DSA #2" $OPENSSL req -config ca.cnf -noenc \ 49 CN="Test S/MIME EE DSA #3" $OPENSSL req -config ca.cnf -noenc \ 59 CN="Test S/MIME EE EC #1" $OPENSSL req -config ca.cnf -noenc \ 63 CN="Test S/MIME EE EC #2" $OPENSSL req -config ca.cnf -noenc \ [all …]
|
/openssl/crypto/x509/ |
H A D | v3_cpols.c | 97 CONF_VALUE *cnf; variable 115 if (cnf->value != NULL || cnf->name == NULL) { 120 pstr = cnf->name; 170 CONF_VALUE *cnf; in policy_section() local 183 X509V3_conf_err(cnf); in policy_section() 206 if (*cnf->value != '@') { in policy_section() 208 X509V3_conf_err(cnf); in policy_section() 228 X509V3_conf_err(cnf); in policy_section() 285 CONF_VALUE *cnf; in notice_section() local 302 value = cnf->value; in notice_section() [all …]
|
H A D | v3_ist.c | 46 CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i); 48 if (cnf == NULL) { 51 if (strcmp(cnf->name, "signTool") == 0) { 58 ASN1_STRING_set(ist->signTool, cnf->value, strlen(cnf->value)); 59 } else if (strcmp(cnf->name, "cATool") == 0) { 66 ASN1_STRING_set(ist->cATool, cnf->value, strlen(cnf->value)); 67 } else if (strcmp(cnf->name, "signToolCert") == 0) { 74 ASN1_STRING_set(ist->signToolCert, cnf->value, strlen(cnf->value)); 75 } else if (strcmp(cnf->name, "cAToolCert") == 0) { 82 ASN1_STRING_set(ist->cAToolCert, cnf->value, strlen(cnf->value));
|
H A D | v3_akid.c | 102 CONF_VALUE *cnf; in v2i_AUTHORITY_KEYID() local 121 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID() 122 if (cnf->value != NULL && strcmp(cnf->value, "always") != 0) { in v2i_AUTHORITY_KEYID() 124 "name=%s option=%s", cnf->name, cnf->value); in v2i_AUTHORITY_KEYID() 129 if (cnf->value != NULL) in v2i_AUTHORITY_KEYID() 133 if (cnf->value != NULL) in v2i_AUTHORITY_KEYID() 135 } else if (strcmp(cnf->name, "none") == 0 in v2i_AUTHORITY_KEYID() 136 || strcmp(cnf->name, "keyid") == 0 in v2i_AUTHORITY_KEYID() 137 || strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID() 139 "name=%s", cnf->name); in v2i_AUTHORITY_KEYID() [all …]
|
H A D | v3_crld.c | 68 CONF_VALUE *cnf) in set_dist_point_name() argument 73 if (HAS_PREFIX(cnf->name, "fullname")) { in set_dist_point_name() 206 CONF_VALUE *cnf; in crldp_from_section() local 213 cnf = sk_CONF_VALUE_value(nval, i); in crldp_from_section() 242 CONF_VALUE *cnf; in v2i_crld() local 252 cnf = sk_CONF_VALUE_value(nval, i); in v2i_crld() 253 if (cnf->value == NULL) { in v2i_crld() 363 CONF_VALUE *cnf; in v2i_idp() local 370 cnf = sk_CONF_VALUE_value(nval, i); in v2i_idp() 371 name = cnf->name; in v2i_idp() [all …]
|
H A D | v3_san.c | 317 if (!ossl_v3_name_cmp(cnf->name, "issuer") in v2i_issuer_alt() 318 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_issuer_alt() 383 CONF_VALUE *cnf; in v2i_subject_alt() local 395 cnf = sk_CONF_VALUE_value(nval, i); in v2i_subject_alt() 396 if (ossl_v3_name_cmp(cnf->name, "email") == 0 in v2i_subject_alt() 397 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_subject_alt() 401 && cnf->value && strcmp(cnf->value, "move") == 0) { in v2i_subject_alt() 479 CONF_VALUE *cnf; in v2i_GENERAL_NAMES() local 491 cnf = sk_CONF_VALUE_value(nval, i); in v2i_GENERAL_NAMES() 607 name = cnf->name; in v2i_GENERAL_NAME_ex() [all …]
|
H A D | v3_pci.c | 252 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); in r2i_pci() local 254 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { in r2i_pci() 256 X509V3_conf_err(cnf); in r2i_pci() 259 if (*cnf->name == '@') { in r2i_pci() 263 sect = X509V3_get_section(ctx, cnf->name + 1); in r2i_pci() 266 X509V3_conf_err(cnf); in r2i_pci() 278 if (!process_pci_value(cnf, &language, &pathlen, &policy)) { in r2i_pci() 279 X509V3_conf_err(cnf); in r2i_pci()
|
H A D | v3_info.c | 107 CONF_VALUE *cnf, ctmp; in v2i_AUTHORITY_INFO_ACCESS() local 118 cnf = sk_CONF_VALUE_value(nval, i); in v2i_AUTHORITY_INFO_ACCESS() 124 ptmp = strchr(cnf->name, ';'); in v2i_AUTHORITY_INFO_ACCESS() 130 ctmp.value = cnf->value; in v2i_AUTHORITY_INFO_ACCESS() 133 if ((objtmp = OPENSSL_strndup(cnf->name, ptmp - cnf->name)) == NULL) { in v2i_AUTHORITY_INFO_ACCESS()
|
/openssl/demos/bio/ |
H A D | server-conf.c | 33 CONF_VALUE *cnf; in main() local 64 cnf = sk_CONF_VALUE_value(sect, i); in main() 65 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 70 cnf->name, cnf->value); in main() 74 if (strcmp(cnf->name, "Port") == 0) { in main() 75 port = cnf->value; in main() 77 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
|
H A D | client-conf.c | 25 CONF_VALUE *cnf; in main() local 52 cnf = sk_CONF_VALUE_value(sect, i); in main() 53 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 58 cnf->name, cnf->value); in main() 62 if (strcmp(cnf->name, "Connect") == 0) { in main() 63 connect_str = cnf->value; in main() 65 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 15 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem 17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \ 21 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \ 28 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \ 35 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
|
H A D | mkxcerts.sh | 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 22 -config apps.cnf -extensions ec_cert -x509 -nodes \ 27 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
/openssl/crypto/ |
H A D | provider_conf.c | 70 const CONF *cnf) in provider_conf_params() argument 75 sect = NCONF_get_section(cnf, value); in provider_conf_params() 97 cnf)) in provider_conf_params() 135 int soft, const CONF *cnf) in provider_conf_activate() argument 172 ok = provider_conf_params(prov, NULL, NULL, value, cnf); in provider_conf_activate() 207 const char *value, const CONF *cnf) in provider_conf_load() argument 219 ecmds = NCONF_get_section(cnf, value); in provider_conf_load() 288 static int provider_conf_init(CONF_IMODULE *md, const CONF *cnf) in provider_conf_init() argument 298 elist = NCONF_get_section(cnf, CONF_imodule_get_value(md)); in provider_conf_init() 307 if (!provider_conf_load(NCONF_get0_libctx((CONF *)cnf), in provider_conf_init() [all …]
|
/openssl/crypto/conf/ |
H A D | conf_mod.c | 81 const CONF *cnf); 110 static int conf_diagnostics(const CONF *cnf) in conf_diagnostics() argument 125 if (!cnf) in CONF_modules_load() 128 if (conf_diagnostics(cnf)) in CONF_modules_load() 147 values = NCONF_get_section(cnf, vsection); in CONF_modules_load() 256 md = module_load_dso(cnf, name, value); in module_run() 266 ret = module_init(md, name, value, cnf); in module_run() 279 static CONF_MODULE *module_load_dso(const CONF *cnf, in module_load_dso() argument 290 path = _CONF_get_string(cnf, value, "path"); in module_load_dso() 400 const CONF *cnf) in module_init() argument [all …]
|
/openssl/test/recipes/ |
H A D | 80-test_ca.t | 23 my $cnf = srctop_file("test","ca-and-certs.cnf"); 33 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); 40 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); 57 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf"); 67 $cnf, 136 '-config', $cnf, 150 '-config', $cnf, 160 '-config', $cnf, 179 '-config', $cnf,
|
H A D | 25-test_verify_store.t | 23 my $cnf = srctop_file("test", "ca-and-certs.cnf"); 36 -config => $cnf, 48 -extfile => $cnf ); 77 -config => $cnf, 90 -extfile => $cnf )
|
H A D | 80-test_ssl_old.t | 48 my $cnf = srctop_file("test", "ca-and-certs.cnf"); 128 ok(run(app([@reqcmd, "-config", $cnf, 136 "-extfile", $cnf, "-extensions", "v3_ca"], 162 ok(run(app([@reqcmd, "-config", $cnf, "-section", "userreq", 171 "-extfile", $cnf, "-extensions", "v3_ee"], 197 ok(run(app([@reqcmd, "-new", "-config", $cnf, 210 "-extfile", $cnf, 243 ok(run(app([@reqcmd, "-config", $cnf, 257 "-extfile", $cnf,
|
/openssl/crypto/evp/ |
H A D | evp_cnf.c | 21 static int alg_module_init(CONF_IMODULE *md, const CONF *cnf) in alg_module_init() argument 32 if ((sktmp = NCONF_get_section(cnf, oid_section)) == NULL) { in alg_module_init() 50 NCONF_get0_libctx((CONF *)cnf), m > 0, 0)) { in alg_module_init() 55 if (!evp_set_default_properties_int(NCONF_get0_libctx((CONF *)cnf), in alg_module_init()
|
/openssl/crypto/engine/ |
H A D | eng_cnf.c | 43 static int int_engine_configure(const char *name, const char *value, const CONF *cnf) in int_engine_configure() argument 57 ecmds = NCONF_get_section(cnf, value); in int_engine_configure() 112 if (!NCONF_get_number_e(cnf, value, "init", &do_init)) in int_engine_configure() 147 static int int_engine_module_init(CONF_IMODULE *md, const CONF *cnf) in int_engine_module_init() argument 155 elist = NCONF_get_section(cnf, CONF_imodule_get_value(md)); in int_engine_module_init() 164 if (!int_engine_configure(cval->name, cval->value, cnf)) in int_engine_module_init()
|
/openssl/test/ |
H A D | README.ssltest.md | 6 Each `ssl_*.cnf.in` file contains a number of test configurations. These files 14 `test/ssl-tests/*.cnf` files. 16 For more details, see `ssl-tests/01-simple.cnf.in` for an example. 216 existing `*.cnf.in` files (for example, `01-simple.cnf.in`). 224 ssl-tests/my.cnf.in default > ssl-tests/my.cnf 232 ssl-tests/01-simple.cnf.in default > ssl-tests/01-simple.cnf 264 test/ssl-tests/01-simple.cnf default 268 $ CTLOG_FILE=test/ct/log_list.cnf TEST_CERTS_DIR=test/certs \ 285 `*.cnf` file from the `*.cnf.in` input first. 294 $ make test TESTS=test_ssl_new SSL_TESTS="0*.cnf.in" [all …]
|
/openssl/doc/man3/ |
H A D | CONF_modules_load_file.pod | 18 int CONF_modules_load(const CONF *cnf, const char *appname, 27 L<X509_get_default_cert_area(3)> with the filename C<"openssl.cnf"> appended. 43 reads configuration information from B<cnf>. 118 if (CONF_modules_load_file_ex(NULL, "/something/app.cnf", "myapp", 127 CONF *cnf = NULL; 130 fp = fopen("/somepath/app.cnf", "r"); 135 cnf = NCONF_new_ex(libctx, NULL); 136 if (NCONF_load_fp(cnf, fp, &eline) == 0) { 140 } else if (CONF_modules_load(cnf, "appname", 0) <= 0) { 146 NCONF_free(cnf);
|
/openssl/apps/ |
H A D | asn1parse.c | 319 CONF *cnf = NULL; in do_generate() local 325 if ((cnf = app_load_config(genconf)) == NULL) in do_generate() 328 genstr = NCONF_get_string(cnf, "default", "asn1"); in do_generate() 335 atyp = ASN1_generate_nconf(genstr, cnf); in do_generate() 336 NCONF_free(cnf); in do_generate() 337 cnf = NULL; in do_generate() 358 NCONF_free(cnf); in do_generate()
|