/openssl/test/certs/ |
H A D | mkcert.sh | 113 csr=$(req "$key" "CN = $cn") || return 1 114 echo "$csr" | 150 echo "$csr" | 171 echo "$csr" | 263 echo "$csr" | 297 echo "$csr" | 343 echo "$csr" | 352 csr=$(req_nocn "$key") || return 1 353 echo "$csr" | 386 echo "$csr" | [all …]
|
/openssl/test/testutil/ |
H A D | load.c | 94 X509_REQ *csr = NULL; in load_csr_der() local 100 csr = X509_REQ_new_ex(libctx, NULL); in load_csr_der() 101 if (TEST_ptr(csr)) in load_csr_der() 102 (void)TEST_ptr(d2i_X509_REQ_bio(bio, &csr)); in load_csr_der() 104 return csr; in load_csr_der()
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_enrollment.csv | 1 …ble_confirm,noarg, -certout,val,val2, -out_trusted,val,val2, -oldcert,val, -csr,val, -revreason,val 87 …csr used in ir, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLA… 88 …csr present, -section,, -cmd,p10cr,BLANK,,, BLANK,,,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLA… 89 0,p10cr csr missing, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLA… 90 …csr missing arg, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,… 91 …csr non-existing file, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,… 92 …csr empty file, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,… 93 …csr, -section,, -cmd,p10cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,BLAN…
|
H A D | test_commands.csv | 36 1, --- use csr for revocation ----, -section,, -cmd,rr,,BLANK,,,BLANK,,,BLANK,, -revreason,0, -csr,…
|
/openssl/test/recipes/ |
H A D | 90-test_store.t | 410 (my $csr = $dstfile) =~ s|\.pem|.csr|; 414 "-key", $srckey, "-out", $csr])) 421 "-in", $csr, "-out", $dstfile])));
|
/openssl/apps/ |
H A D | cmp.c | 696 X509_REQ *csr; in load_csr_autofmt() local 700 csr = load_csr(infile, FORMAT_PEM, desc); in load_csr_autofmt() 702 if (csr == NULL) { in load_csr_autofmt() 704 csr = load_csr(infile, FORMAT_ASN1, desc); in load_csr_autofmt() 706 if (csr == NULL) { in load_csr_autofmt() 711 EVP_PKEY *pkey = X509_REQ_get0_pubkey(csr); in load_csr_autofmt() 719 return csr; in load_csr_autofmt() 1516 X509_REQ *csr = NULL; in setup_request_ctx() local 1646 if (!OSSL_CMP_CTX_set1_p10CSR(ctx, csr)) in setup_request_ctx() 1669 X509_REQ_free(csr); in setup_request_ctx() [all …]
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 110 csr =
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 55 openssl req -new -key privkey.pem -out cert.csr 57 Now, cert.csr can be sent to the certificate authority, if they can
|
/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 36 [B<-csr> I<filename>] 256 Defaults to the public key in the PKCS#10 CSR given with the B<-csr> option, 272 Default is the subject DN of any PKCS#10 CSR given with the B<-csr> option. 277 If provided and neither of B<-cert>, B<-oldcert>, or B<-csr> is given, 312 If the B<-csr> option is present, these extensions augment the extensions 356 =item B<-csr> I<filename> 411 For RR the certificate to be revoked can also be specified using B<-csr>.
|
H A D | openssl-req.pod.in | 602 openssl req -new -key sm2.key -out sm2.csr -sm3 -sigopt "distid:1234567812345678" 606 openssl req -verify -in sm2.csr -sm3 -vfyopt "distid:1234567812345678"
|
H A D | openssl-ca.pod.in | 664 openssl ca -in sm2.csr -out sm2.crt -md sm3 \
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 345 int OSSL_CMP_CTX_set1_p10CSR(OSSL_CMP_CTX *ctx, const X509_REQ *csr);
|
/openssl/doc/man3/ |
H A D | OSSL_CMP_CTX_new.pod | 138 int OSSL_CMP_CTX_set1_p10CSR(OSSL_CMP_CTX *ctx, const X509_REQ *csr);
|