/openssl/crypto/x509/ |
H A D | x509_ext.c | 21 return X509v3_get_ext_count(x->crl.extensions); in X509_CRL_get_ext_count() 42 return X509v3_get_ext(x->crl.extensions, loc); in X509_CRL_get_ext() 47 return X509v3_delete_ext(x->crl.extensions, loc); in X509_CRL_delete_ext() 68 return X509v3_get_ext_count(x->cert_info.extensions); in X509_get_ext_count() 84 (x->cert_info.extensions, crit, lastpos)); in X509_get_ext_by_critical() 89 return X509v3_get_ext(x->cert_info.extensions, loc); in X509_get_ext() 94 return X509v3_delete_ext(x->cert_info.extensions, loc); in X509_delete_ext() 116 return X509v3_get_ext_count(x->extensions); in X509_REVOKED_get_ext_count() 137 return X509v3_get_ext(x->extensions, loc); in X509_REVOKED_get_ext() 142 return X509v3_delete_ext(x->extensions, loc); in X509_REVOKED_delete_ext() [all …]
|
/openssl/util/perl/ |
H A D | checkhandshake.pm | 17 our @EXPORT = qw(@handmessages @extensions checkhandshake); 61 our @extensions = (); 128 $extensions[$extloop][3] != 0; 138 next if ($message->mt() != $extensions[$extloop][0]); 139 next if ($message->server() != $extensions[$extloop][2]); 216 next if ($message->mt() != $extensions[$extloop][0]); 217 next if ($message->server() != $extensions[$extloop][2]); 218 ok (($extensions[$extloop][3] & $exttype) == 0 219 || defined ($msgexts->{$extensions[$extloop][1]}), 221 ." Extension: ".($extensions[$extloop][3] & $exttype).", " [all …]
|
/openssl/util/perl/TLSProxy/ |
H A D | EncryptedExtensions.pm | 59 my %extensions = (); 64 $extensions{$type} = $extdata; 67 $self->extension_data(\%extensions); 77 my $extensions = ""; 81 $extensions .= pack("n", $key); 82 $extensions .= pack("n", length($extdata)); 83 $extensions .= $extdata; 86 $data = pack('n', length($extensions)); 87 $data .= $extensions;
|
H A D | CertificateRequest.pm | 53 my %extensions = (); 58 $extensions{$type} = $extdata; 60 $self->extension_data(\%extensions); 72 my $extensions = ""; 76 $extensions .= pack("n", $key); 77 $extensions .= pack("n", length($extdata)); 78 $extensions .= $extdata; 81 $data = pack('n', length($extensions)); 82 $data .= $extensions;
|
H A D | ServerHello.pm | 91 my %extensions = (); 96 $extensions{$type} = $extdata; 118 $self->extension_data(\%extensions); 143 my $extensions = ""; 154 $extensions .= pack("n", $key); 155 $extensions .= pack("n", length($extdata)); 156 $extensions .= $extdata; 158 $extensions .= pack("n", $key); 160 $extensions .= $extdata; 164 $data .= pack('n', length($extensions)); [all …]
|
H A D | ClientHello.pm | 75 my %extensions = (); 80 $extensions{$type} = $extdata; 92 $self->extension_data(\%extensions); 107 my %extensions = %{$self->extension_data}; 112 if (exists $extensions{TLSProxy::Message::EXT_ENCRYPT_THEN_MAC}) { 135 my $extensions = ""; 148 $extensions .= $self->extension_contents($key); 150 $extensions .= $self->extension_contents($key) if ($key == $self->dupext); 154 $extensions .= $self->extension_contents(TLSProxy::Message::EXT_PSK); 161 $data .= pack('n', length($extensions)); [all …]
|
H A D | Certificate.pm | 82 my %extensions = (); 87 $extensions{$type} = $extdata; 93 $self->extension_data(\%extensions); 133 my $extensions = ""; 138 $extensions .= pack("n", $key); 139 $extensions .= pack("n", length($extdata)); 140 $extensions .= $extdata; 145 my $certlistlen = $certlen + length($extensions) 153 $data .= pack('n', length($extensions)); 154 $data .= $extensions;
|
/openssl/crypto/ts/ |
H A D | ts_req_utils.c | 134 return a->extensions; in STACK_OF() 141 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_REQ_ext_free() 142 a->extensions = NULL; in TS_REQ_ext_free() 147 return X509v3_get_ext_count(a->extensions); in TS_REQ_get_ext_count() 152 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_REQ_get_ext_by_NID() 157 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_REQ_get_ext_by_OBJ() 162 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_REQ_get_ext_by_critical() 167 return X509v3_get_ext(a->extensions, loc); in TS_REQ_get_ext() 172 return X509v3_delete_ext(a->extensions, loc); in TS_REQ_delete_ext() 177 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_REQ_add_ext() [all …]
|
H A D | ts_rsp_utils.c | 295 return a->extensions; in STACK_OF() 302 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_TST_INFO_ext_free() 303 a->extensions = NULL; in TS_TST_INFO_ext_free() 308 return X509v3_get_ext_count(a->extensions); in TS_TST_INFO_get_ext_count() 313 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_TST_INFO_get_ext_by_NID() 318 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_TST_INFO_get_ext_by_OBJ() 323 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_TST_INFO_get_ext_by_critical() 328 return X509v3_get_ext(a->extensions, loc); in TS_TST_INFO_get_ext() 333 return X509v3_delete_ext(a->extensions, loc); in TS_TST_INFO_delete_ext() 338 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_TST_INFO_add_ext() [all …]
|
H A D | ts_lib.c | 48 int TS_ext_print_bio(BIO *bio, const STACK_OF(X509_EXTENSION) *extensions) in TS_ext_print_bio() argument 55 n = X509v3_get_ext_count(extensions); in TS_ext_print_bio() 57 ex = X509v3_get_ext(extensions, i); in TS_ext_print_bio()
|
/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 25 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem 30 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem 35 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa3.pem 44 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa1.pem 48 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa2.pem 52 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa3.pem 62 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smec1.pem 66 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smec2.pem 83 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdh.pem 91 -extensions codesign_cert >>csrsa1.pem
|
H A D | ca.cnf | 21 x509_extensions = v3_ca # The extensions to add to the self signed cert 24 # req_extensions = v3_req # The extensions to add to a certificate request 35 # These extensions are added when 'ca' signs a request for an end entity 47 # These extensions are added when 'ca' signs a request for an end entity 59 # These extensions are added when 'ca' signs a request for a code-signing
|
/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 22 -config apps.cnf -extensions ec_cert -x509 -nodes \ 27 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
H A D | apps.cnf | 21 x509_extensions = v3_ca # The extensions to add to the self signed cert 24 # req_extensions = v3_req # The extensions to add to a certificate request 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
H A D | mkacerts.sh | 15 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem 21 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 28 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 35 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 15 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem 22 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem 29 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem 36 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem 43 -extfile ca.cnf -extensions ocsp_cert -CAcreateserial -out resp.pem 62 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhserver.pem 72 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhclient.pem
|
H A D | ca.cnf | 21 x509_extensions = v3_ca # The extensions to add to the self signed cert 24 # req_extensions = v3_req # The extensions to add to a certificate request 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/doc/man3/ |
H A D | X509V3_get_d2i.pod | 42 X509V3_get_d2i() looks for an extension with OID I<nid> in the extensions 63 X509_get_ext_d2i() and X509_add1_ext_i2d() operate on the extensions of 72 extensions of B<X509_REVOKED> structure I<r> (i.e for CRL entry extensions). 76 X509_REVOKED_get0_extensions() return a STACK of all the extensions 118 The following sections contain a list of all supported extensions 123 The following certificate extensions are defined in PKIX standards such as 152 The following are (largely obsolete) Netscape certificate extensions. 170 The following are CRL extensions from PKIX standards such as RFC5280. 196 The following extensions are used by certificate transparency, RFC6962 215 X509_REVOKED_get0_extensions() return a stack of extensions. They return [all …]
|
H A D | SSL_CTX_use_serverinfo.pod | 25 These functions load "serverinfo" TLS extensions into the SSL_CTX. A 29 SSL_CTX_use_serverinfo_ex() loads one or more serverinfo extensions from 33 If B<version> is B<SSL_SERVERINFOV2> then the extensions in the array must 37 extensions to be added to a Certificate message, then the extension will only 41 If B<version> is B<SSL_SERVERINFOV1> then the extensions in the array must 54 SSL_CTX_use_serverinfo_file() loads one or more serverinfo extensions from 55 B<file> into B<ctx>. The extensions must be in PEM format. Each extension
|
H A D | X509_REQ_get_extensions.pod | 20 X509_REQ_get_extensions() returns the first list of X.509 extensions 22 The returned list is empty if there are no such extensions in I<req>. 25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>, 30 except that I<nid> is used to identify the extensions attribute.
|
H A D | SSL_CTX_set_client_hello_cb.pod | 45 cipher suite, and not allowing extensions. Additionally, the SSLv2 format 58 Similarly, SSL_client_hello_get0_ext() provides access to individual extensions 64 SSL_client_hello_get0_ext(), to determine which extensions are present in the 70 In situations when the ClientHello has no extensions, the function will return 75 When called with B<exts> set to NULL, returns the number of extensions 77 with the ExtensionType values in the order that the corresponding extensions 81 is smaller then the number of extensions in question, that is treated as an error. 83 A ClientHello that contained no extensions is treated as success, with B<*num_exts>
|
/openssl/doc/man1/ |
H A D | openssl-x509.pod.in | 45 [B<-ext> I<extensions>] 63 [B<-extensions> I<section>] 146 Determines how to handle X.509 extensions 301 =item B<-ext> I<extensions> 431 =item B<-extensions> I<section> 650 Don't print out any X509V3 extensions. 655 certificate extensions. 663 ASN1 parse unsupported extensions. 667 Hex dump unsupported extensions. 723 extensions for a CA: [all …]
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 50 [extensions] 67 [extensions] 78 [extensions] 88 [extensions] 260 [extensions] 357 [extensions] 403 [extensions] 445 [extensions] 526 =head2 Netscape String extensions 530 Other extensions of this type are: B<nsBaseUrl>, [all …]
|
/openssl/doc/internal/man3/ |
H A D | x509v3_cache_extensions.pod | 6 - cache info on various X.509v3 extensions and further derived certificate data 16 This function processes any X509v3 extensions present in an X509 object I<x> 28 This function returns 0 if the extensions or other portions of the certificate
|
/openssl/test/ |
H A D | asynciotest.c | 149 PACKET payload, wholebody, sessionid, extensions; in async_write() local 182 &extensions)) in async_write() 189 while (PACKET_remaining(&extensions)) { in async_write() 193 if (!PACKET_get_net_2(&extensions, &type) in async_write() 194 || !PACKET_get_length_prefixed_2(&extensions, in async_write()
|