/openssl/crypto/x509/ |
H A D | x509_req.c | 63 EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req) in X509_REQ_get_pubkey() argument 65 if (req == NULL) in X509_REQ_get_pubkey() 72 if (req == NULL) in X509_REQ_get0_pubkey() 79 return req->req_info.pubkey; in X509_REQ_get_X509_PUBKEY() 126 if ((req == NULL) || !ext_nids) in STACK_OF() 247 return req->req_info.subject; in X509_REQ_get_subject_name() 254 *psig = req->signature; in X509_REQ_get0_signature() 256 *palg = &req->sig_alg; in X509_REQ_get0_signature() 261 if (req->signature) in X509_REQ_set0_signature() 263 req->signature = psig; in X509_REQ_set0_signature() [all …]
|
H A D | x_req.c | 165 X509_REQ *req = NULL; in X509_REQ_new_ex() local 167 req = (X509_REQ *)ASN1_item_new((X509_REQ_it())); in X509_REQ_new_ex() 168 if (!ossl_x509_req_set0_libctx(req, libctx, propq)) { in X509_REQ_new_ex() 169 X509_REQ_free(req); in X509_REQ_new_ex() 170 req = NULL; in X509_REQ_new_ex() 172 return req; in X509_REQ_new_ex()
|
/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 87 -new -out req.pem -key ../certs/ee-key.pem [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_server.c | 170 switch (OSSL_CMP_MSG_get_bodytype(req)) { in process_cert_request() 188 p10cr = req->body->value.p10cr; in process_cert_request() 299 if (!srv_ctx->process_genm(srv_ctx, req, req->body->value.genm, &itavs)) in process_genm() 315 errorContent = req->body->value.error; in process_error() 337 ccc = req->body->value.certConf; in process_certConf() 391 prc = req->body->value.pollReq; in process_pollReq() 453 || req == NULL || req->body == NULL in OSSL_CMP_SRV_process_request() 460 req_type = OSSL_CMP_MSG_get_bodytype(req); in OSSL_CMP_SRV_process_request() 529 rsp = process_rr(srv_ctx, req); in OSSL_CMP_SRV_process_request() 535 rsp = process_genm(srv_ctx, req); in OSSL_CMP_SRV_process_request() [all …]
|
H A D | cmp_http.c | 50 const OSSL_CMP_MSG *req) in OSSL_CMP_MSG_http_perform() argument 60 if (ctx == NULL || req == NULL) { in OSSL_CMP_MSG_http_perform() 67 if ((req_mem = ASN1_item_i2d_mem_bio(it, (const ASN1_VALUE *)req)) == NULL) in OSSL_CMP_MSG_http_perform() 87 keep_alive(ctx->keep_alive, req->body->type)); in OSSL_CMP_MSG_http_perform()
|
/openssl/doc/man3/ |
H A D | OCSP_REQUEST_new.pod | 14 void OCSP_REQUEST_free(OCSP_REQUEST *req); 18 int OCSP_request_sign(OCSP_REQUEST *req, 24 int OCSP_request_onereq_count(OCSP_REQUEST *req); 47 structures in B<req>. 51 OCSP_request_onereq_count(req) - 1. 65 structures in B<req>. 83 OCSP_REQUEST *req; 86 req = OCSP_REQUEST_new(); 87 if (req == NULL) 93 if (OCSP_REQUEST_add0_id(req, cid) == NULL) [all …]
|
H A D | X509_REQ_get_extensions.pod | 13 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); 14 int X509_REQ_add_extensions(X509_REQ *req, const STACK_OF(X509_EXTENSION) *exts); 15 int X509_REQ_add_extensions_nid(X509_REQ *req, 21 found in the attributes of I<req>. 22 The returned list is empty if there are no such extensions in I<req>. 25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>, 27 This function must not be called more than once on the same I<req>. 31 This function must not be called more than once with the same I<req> and I<nid>.
|
H A D | OCSP_sendreq_new.pod | 21 const OCSP_REQUEST *req, int buf_size); 22 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *io, const char *path, OCSP_REQUEST *req); 30 int OCSP_REQ_CTX_i2d(OCSP_REQ_CT *rctx, const ASN1_ITEM *it, ASN1_VALUE *req); 35 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, const OCSP_REQUEST *req); 44 optionally the OCSP request I<req>, and a response header maximum line length 46 The I<req> may be set to NULL and provided later using OCSP_REQ_CTX_set1_req() 69 OCSP_REQ_CTX_i2d(rctx, it, req) is equivalent to the following: 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 73 OCSP_REQ_CTX_set1_req(rctx, req) is equivalent to the following: 77 (const ASN1_VALUE *)req)
|
H A D | OCSP_request_add1_nonce.pod | 11 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 13 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 14 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *resp); 19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len> 25 OCSP_check_nonce() compares the nonce value in B<req> and B<resp>. 27 OCSP_copy_nonce() copies any nonce value present in B<req> to B<resp>. 35 was present in B<req> and 0 if an error occurred. 37 OCSP_check_nonce() returns the result of the nonce comparison between B<req>
|
H A D | OSSL_CMP_SRV_CTX_new.pod | 29 const OSSL_CMP_MSG *req); 31 const OSSL_CMP_MSG *req); 37 const OSSL_CMP_MSG *req, 45 const OSSL_CMP_MSG *req, 49 const OSSL_CMP_MSG *req, 53 const OSSL_CMP_MSG *req, 58 const OSSL_CMP_MSG *req, 63 const OSSL_CMP_MSG *req, 89 I<req>. It does the typical generic checks on I<req>, calls
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 19 -keyout skey.pem -out req.pem -newkey rsa:1024 21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ 32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ 57 CN="Test Server DH Cert" $OPENSSL req -config ca.cnf -new \ 60 $OPENSSL x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ [all …]
|
/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 38 if (req && !sk_OCSP_ONEREQ_push(req->tbsRequest.requestList, one)) { in OCSP_request_add0_id() 47 int OCSP_request_set1_name(OCSP_REQUEST *req, const X509_NAME *nm) in OCSP_request_set1_name() argument 58 GENERAL_NAME_free(req->tbsRequest.requestorName); in OCSP_request_set1_name() 59 req->tbsRequest.requestorName = gen; in OCSP_request_set1_name() 64 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) in OCSP_request_add1_cert() argument 66 if (req->optionalSignature == NULL in OCSP_request_add1_cert() 80 int OCSP_request_sign(OCSP_REQUEST *req, in OCSP_request_sign() argument 89 if ((req->optionalSignature = OCSP_SIGNATURE_new()) == NULL) in OCSP_request_sign() 102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign() 110 OCSP_SIGNATURE_free(req->optionalSignature); in OCSP_request_sign() [all …]
|
H A D | ocsp_http.c | 16 const OCSP_REQUEST *req, int buf_size) in OCSP_sendreq_new() argument 39 if (req != NULL in OCSP_sendreq_new() 42 (const ASN1_VALUE *)req)) in OCSP_sendreq_new() 51 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, const char *path, OCSP_REQUEST *req) in OCSP_sendreq_bio() argument 57 ctx = OCSP_sendreq_new(b, path, req, 0 /* default buf_size */); in OCSP_sendreq_bio()
|
H A D | ocsp_vfy.c | 25 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, 76 static int ocsp_verify(OCSP_REQUEST *req, OCSP_BASICRESP *bs, in ocsp_verify() argument 87 if (req != NULL) in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 385 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, in OCSP_request_verify() argument 393 if (!req->optionalSignature) { in OCSP_request_verify() 397 gen = req->tbsRequest.requestorName; in OCSP_request_verify() 403 ret = ocsp_req_find_signer(&signer, req, nm, certs, flags); in OCSP_request_verify() 411 if ((ret = ocsp_verify(req, NULL, signer, flags)) <= 0) in OCSP_request_verify() 421 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, in ocsp_req_find_signer() argument [all …]
|
/openssl/apps/ |
H A D | ocsp.c | 575 if (req == NULL) { in ocsp_main() 663 req = NULL; in ocsp_main() 668 if (req == NULL) { in ocsp_main() 679 if (req == NULL in ocsp_main() 790 req = NULL; in ocsp_main() 823 if (req != NULL && ((i = OCSP_check_nonce(req, bs)) <= 0)) { in ocsp_main() 870 OCSP_REQUEST_free(req); in ocsp_main() 915 if (*req == NULL) in add_ocsp_cert() 917 if (*req == NULL) in add_ocsp_cert() 944 if (*req == NULL) in add_ocsp_serial() [all …]
|
H A D | req.c | 52 static int prompt_info(X509_REQ *req, 241 X509_REQ *req = NULL; in req_main() local 734 if (req == NULL) in req_main() 774 if (req == NULL) { in req_main() 776 if (req == NULL) { in req_main() 1004 i = i2d_X509_REQ_bio(out, req); in req_main() 1044 X509_REQ_free(req); in req_main() 1108 if (!X509_REQ_set_pubkey(req, pkey)) in make_REQ() 1116 static int prompt_info(X509_REQ *req, in prompt_info() argument 1268 if (!add_attribute_object(req, in prompt_info() [all …]
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \ 20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \ 27 $OPENSSL x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \ 34 $OPENSSL x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
|
H A D | mkxcerts.sh | 6 CN="OpenSSL Test RSA SHA-1 cert" $OPENSSL req \ 9 CN="OpenSSL Test RSA SHA-256 cert" $OPENSSL req \ 12 CN="OpenSSL Test RSA SHA-512 cert" $OPENSSL req \ 21 CN="OpenSSL Test P-256 SHA-256 cert" $OPENSSL req \ 26 CN="OpenSSL Test P-384 SHA-384 cert" $OPENSSL req \
|
/openssl/test/ |
H A D | http_test.c | 41 const char *req, *path; in mock_http_server() local 42 long count = BIO_get_mem_data(in, (unsigned char **)&req); in mock_http_server() 43 const char *hdr = (char *)req; in mock_http_server() 65 count -= (hdr - req); in mock_http_server() 128 BIO *req, *rsp; in test_http_method() local 136 req = BIO_new(BIO_s_mem()); in test_http_method() 137 if (req == NULL in test_http_method() 140 BIO_free(req); in test_http_method() 141 req = NULL; in test_http_method() 149 if (wbio == NULL || rbio == NULL || req == NULL) in test_http_method() [all …]
|
/openssl/test/certs/ |
H A D | mkcert.sh | 67 req() { function 74 openssl req -new -"${OPENSSL_SIGALG}" -key "${key}.pem" \ 85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \ 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 113 csr=$(req "$key" "CN = $cn") || return 1 149 csr=$(req "$key" "CN = $cn") || return 1 170 csr=$(req "$key" "CN = $cn") || return 1 262 csr=$(req "$key" "CN = $cn") || return 1 296 csr=$(req "$key" "CN = $cn") || return 1 342 csr=$(req "$key" "CN = $cn") || return 1 [all …]
|
H A D | setup.sh | 289 ./mkcert.sh req alt1-key "O = Good NC Test Certificate 1" \ 298 ./mkcert.sh req goodcn1-key "O = Good NC Test Certificate 1" \ 312 ./mkcert.sh req badcn1-key "O = Good NC Test Certificate 1" \ 319 ./mkcert.sh req alt2-key "O = Good NC Test Certificate 2" | \ 347 ./mkcert.sh req badalt4-key 'O = Bad NC Test Certificate 4' \ 361 ./mkcert.sh req badalt6-key "O = Bad NC Test Certificate 6" \ 376 ./mkcert.sh req alt3-key "O = Good NC Test Certificate 3" \ 385 ./mkcert.sh req badalt8-key "O = Bad NC Test Certificate 8" \ 394 ./mkcert.sh req badalt9-key "O = Bad NC Test Certificate 9" \ 429 openssl req -new -noenc -subj "/CN=localhost" \ [all …]
|
/openssl/test/recipes/ |
H A D | 25-test_verify_store.t | 34 req( 'make cert request', 58 req( 'verify request 1', 64 req( 'verify request 2', 75 req( 'make a user cert request', 107 sub req {
|
/openssl/crypto/ts/ |
H A D | ts_verify_ctx.c | 101 TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) in TS_REQ_to_TS_VERIFY_CTX() argument 110 OPENSSL_assert(req != NULL); in TS_REQ_to_TS_VERIFY_CTX() 118 if ((policy = req->policy_id) != NULL) { in TS_REQ_to_TS_VERIFY_CTX() 124 imprint = req->msg_imprint; in TS_REQ_to_TS_VERIFY_CTX() 136 if ((nonce = req->nonce) != NULL) { in TS_REQ_to_TS_VERIFY_CTX()
|
/openssl/include/openssl/ |
H A D | ocsp.h.in | 187 # define OCSP_REQ_CTX_i2d(r, it, req) \ argument 189 # define OCSP_REQ_CTX_set1_req(r, req) \ argument 212 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); 213 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 215 int OCSP_request_set1_name(OCSP_REQUEST *req, const X509_NAME *nm); 216 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 218 int OCSP_request_sign(OCSP_REQUEST *req, 257 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, 266 int OCSP_request_onereq_count(OCSP_REQUEST *req); 267 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i); [all …]
|
/openssl/crypto/http/ |
H A D | http_client.c | 128 BIO_free(rctx->req); in OSSL_HTTP_REQ_CTX_free() 283 BIO_free(rctx->req); in set1_content() 284 rctx->req = NULL; in set1_content() 285 if (req == NULL) in set1_content() 300 if (BIO_method_type(req) == BIO_TYPE_FILE) { in set1_content() 324 if (!BIO_up_ref(req)) in set1_content() 326 rctx->req = req; in set1_content() 336 if (req != NULL) in OSSL_HTTP_REQ_CTX_set1_req() 601 if (rctx->req != NULL && !BIO_eof(rctx->req)) { in OSSL_HTTP_REQ_CTX_nbio() 604 if (BIO_should_retry(rctx->req)) in OSSL_HTTP_REQ_CTX_nbio() [all …]
|