/openssl/crypto/x509/ |
H A D | x509_vpm.c | 103 OPENSSL_free(param->email); in X509_VERIFY_PARAM_free() 206 if (test_x509_verify_param_copy(email, NULL)) { in X509_VERIFY_PARAM_inherit() 207 if (!X509_VERIFY_PARAM_set1_email(dest, src->email, src->emaillen)) in X509_VERIFY_PARAM_inherit() 432 return param->email; in X509_VERIFY_PARAM_get0_email() 436 const char *email, size_t emaillen) in X509_VERIFY_PARAM_set1_email() argument 438 return int_x509_param_set1(¶m->email, ¶m->emaillen, in X509_VERIFY_PARAM_set1_email() 439 email, emaillen); in X509_VERIFY_PARAM_set1_email()
|
H A D | v3_utl.c | 31 const ASN1_IA5STRING *email); 504 const ASN1_IA5STRING *email; in STACK_OF() local 513 email = X509_NAME_ENTRY_get_data(ne); in STACK_OF() 514 if (!append_ia5(&ret, email)) in STACK_OF() 533 const ASN1_IA5STRING *email) in append_ia5() argument 538 if (email->type != V_ASN1_IA5STRING) in append_ia5() 540 if (email->data == NULL || email->length == 0) in append_ia5() 542 if (memchr(email->data, 0, email->length) != NULL) in append_ia5() 549 emtmp = OPENSSL_strndup((char *)email->data, email->length); in append_ia5()
|
H A D | v3_san.c | 423 ASN1_IA5STRING *email = NULL; in copy_email() local 444 email = ASN1_STRING_dup(X509_NAME_ENTRY_get_data(ne)); in copy_email() 450 if (email == NULL || (gen = GENERAL_NAME_new()) == NULL) { in copy_email() 454 gen->d.ia5 = email; in copy_email() 455 email = NULL; in copy_email() 468 ASN1_IA5STRING_free(email); in copy_email()
|
H A D | x509_local.h | 35 char *email; /* If not NULL email address to match */ member
|
H A D | x509_vfy.c | 895 if (vpm->email != NULL in check_id() 896 && X509_check_email(x, vpm->email, vpm->emaillen, 0) <= 0) { in check_id()
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 82 email = steve@example.com 83 email = steve@example.org 92 email.1 = steve@example.com 93 email.2 = steve@example.org 237 B<email> (an email address), 246 The B<email> option has two special values. 264 subjectAltName = email:copy, email:my@example.com, URI:http://my.example.com/ 295 it does not support B<email:copy>. 502 B<email:copy> 510 nameConstraints = permitted;email:.example.com [all …]
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 219 # Import the email address. 220 # subjectAltName=email:copy 223 # subjectAltName=email:move 257 # Include email address in subject alt name: another PKIX recommendation 258 # subjectAltName=email:copy 292 # Import the email address. 293 # subjectAltName=email:copy 296 # subjectAltName=email:move
|
H A D | openssl.cnf | 219 # Import the email address. 220 # subjectAltName=email:copy 223 # subjectAltName=email:move 257 # Include email address in subject alt name: another PKIX recommendation 258 # subjectAltName=email:copy 292 # Import the email address. 293 # subjectAltName=email:copy 296 # subjectAltName=email:move
|
H A D | x509.c | 295 int noout = 0, CA_createserial = 0, email = 0; in x509_main() local 486 email = ++num; in x509_main() 978 } else if (i == email || i == ocsp_uri) { in x509_main() 980 i == email ? X509_get1_email(x) : X509_get1_ocsp(x); in x509_main()
|
/openssl/doc/man3/ |
H A D | X509_check_host.pod | 22 certificate matches a given hostname, email address, or IP address. 51 email B<address>. The mailbox syntax of RFC 822 is supported, 92 one subject alternative name of the right type (DNS name or email 98 names of the right type (DNS name or email address as appropriate); the default
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 66 const char *email, size_t emaillen); 192 X509_VERIFY_PARAM_get0_email() returns the expected RFC822 email address. 194 X509_VERIFY_PARAM_set1_email() sets the expected RFC822 email address to 195 B<email>. If B<email> is NUL-terminated, B<emaillen> may be zero, otherwise 196 B<emaillen> must be set to the length of B<email>. When an email address
|
H A D | X509V3_set_ctx.pod | 25 Similarly, when constructing subject alternative names from any email addresses
|
H A D | X509_STORE_CTX_get_error.pod | 362 supports directory name, DNS name, email and URI types. 367 The format of the name constraint is not recognised: for example an email 388 =item B<X509_V_ERR_EMAIL_MISMATCH: email address mismatch>
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_blake.txt | 148 Custom = "email" 204 Custom = "email"
|
/openssl/test/ |
H A D | v3nametest.c | 234 int email; member 327 if (fn->email) { in run_cert()
|
H A D | test.cnf | 72 emailAddress = email field
|
/openssl/.github/workflows/ |
H A D | static-analysis.yml | 42 --form email=openssl-commits@openssl.org \
|
/openssl/doc/man1/ |
H A D | openssl-x509.pod.in | 39 [B<-email>] 282 =item B<-email> 284 Prints the email address(es) if any. 356 =item B<-checkemail> I<email> 358 Check that the certificate matches the specified email address. 796 The B<-email> option searches the subject name and the subject alternative 797 name extension. Only unique email addresses will be printed out: it will
|
H A D | openssl-verification-options.pod | 72 B<emailProtection> (S/MIME email use), B<codeSigning> (object signer use), 477 =item B<-verify_email> I<email> 479 Verify if I<email> matches the email address in Subject Alternative Name or 480 the email in the subject Distinguished Name. 626 The extended key usage extension must be absent or include the "email 644 The extended key usage extension must be absent or include the "email
|
H A D | openssl-cms.pod.in | 127 This command handles data in CMS format such as S/MIME v3.1 email messages. 501 For B<-sign> option include a signed receipt request. Add an explicit email 506 Add an explicit email address where signed receipts should be sent to. This 593 The relevant email headers. These are included outside the signed 595 then many S/MIME mail clients check the signers certificate's email 883 Ideally a database should be maintained of a certificates for each email
|
H A D | openssl-smime.pod.in | 271 then many S/MIME mail clients check the signers certificate's email 452 Ideally a database should be maintained of a certificates for each email
|
H A D | openssl-req.pod.in | 755 emailAddress = test@email.address 823 statically defined in the configuration file. Some of these: like an email
|
H A D | openssl-ca.pod.in | 729 email_in_dn = no # Don't add the email into cert DN
|
/openssl/include/openssl/ |
H A D | x509_vfy.h.in | 273 /* Host, email and IP check errors */ 744 const char *email, size_t emaillen);
|
/openssl/test/certs/ |
H A D | setup.sh | 420 ./mkcert.sh req alt-email-key "O = NC email in othername Test Certificate" | \
|