Home
last modified time | relevance | path

Searched refs:email (Results 1 – 25 of 28) sorted by relevance

12

/openssl/crypto/x509/
H A Dx509_vpm.c103 OPENSSL_free(param->email); in X509_VERIFY_PARAM_free()
206 if (test_x509_verify_param_copy(email, NULL)) { in X509_VERIFY_PARAM_inherit()
207 if (!X509_VERIFY_PARAM_set1_email(dest, src->email, src->emaillen)) in X509_VERIFY_PARAM_inherit()
432 return param->email; in X509_VERIFY_PARAM_get0_email()
436 const char *email, size_t emaillen) in X509_VERIFY_PARAM_set1_email() argument
438 return int_x509_param_set1(&param->email, &param->emaillen, in X509_VERIFY_PARAM_set1_email()
439 email, emaillen); in X509_VERIFY_PARAM_set1_email()
H A Dv3_utl.c31 const ASN1_IA5STRING *email);
504 const ASN1_IA5STRING *email; in STACK_OF() local
513 email = X509_NAME_ENTRY_get_data(ne); in STACK_OF()
514 if (!append_ia5(&ret, email)) in STACK_OF()
533 const ASN1_IA5STRING *email) in append_ia5() argument
538 if (email->type != V_ASN1_IA5STRING) in append_ia5()
540 if (email->data == NULL || email->length == 0) in append_ia5()
542 if (memchr(email->data, 0, email->length) != NULL) in append_ia5()
549 emtmp = OPENSSL_strndup((char *)email->data, email->length); in append_ia5()
H A Dv3_san.c423 ASN1_IA5STRING *email = NULL; in copy_email() local
444 email = ASN1_STRING_dup(X509_NAME_ENTRY_get_data(ne)); in copy_email()
450 if (email == NULL || (gen = GENERAL_NAME_new()) == NULL) { in copy_email()
454 gen->d.ia5 = email; in copy_email()
455 email = NULL; in copy_email()
468 ASN1_IA5STRING_free(email); in copy_email()
H A Dx509_local.h35 char *email; /* If not NULL email address to match */ member
H A Dx509_vfy.c895 if (vpm->email != NULL in check_id()
896 && X509_check_email(x, vpm->email, vpm->emaillen, 0) <= 0) { in check_id()
/openssl/doc/man5/
H A Dx509v3_config.pod82 email = steve@example.com
83 email = steve@example.org
92 email.1 = steve@example.com
93 email.2 = steve@example.org
237 B<email> (an email address),
246 The B<email> option has two special values.
264 subjectAltName = email:copy, email:my@example.com, URI:http://my.example.com/
295 it does not support B<email:copy>.
502 B<email:copy>
510 nameConstraints = permitted;email:.example.com
[all …]
/openssl/apps/
H A Dopenssl-vms.cnf219 # Import the email address.
220 # subjectAltName=email:copy
223 # subjectAltName=email:move
257 # Include email address in subject alt name: another PKIX recommendation
258 # subjectAltName=email:copy
292 # Import the email address.
293 # subjectAltName=email:copy
296 # subjectAltName=email:move
H A Dopenssl.cnf219 # Import the email address.
220 # subjectAltName=email:copy
223 # subjectAltName=email:move
257 # Include email address in subject alt name: another PKIX recommendation
258 # subjectAltName=email:copy
292 # Import the email address.
293 # subjectAltName=email:copy
296 # subjectAltName=email:move
H A Dx509.c295 int noout = 0, CA_createserial = 0, email = 0; in x509_main() local
486 email = ++num; in x509_main()
978 } else if (i == email || i == ocsp_uri) { in x509_main()
980 i == email ? X509_get1_email(x) : X509_get1_ocsp(x); in x509_main()
/openssl/doc/man3/
H A DX509_check_host.pod22 certificate matches a given hostname, email address, or IP address.
51 email B<address>. The mailbox syntax of RFC 822 is supported,
92 one subject alternative name of the right type (DNS name or email
98 names of the right type (DNS name or email address as appropriate); the default
H A DX509_VERIFY_PARAM_set_flags.pod66 const char *email, size_t emaillen);
192 X509_VERIFY_PARAM_get0_email() returns the expected RFC822 email address.
194 X509_VERIFY_PARAM_set1_email() sets the expected RFC822 email address to
195 B<email>. If B<email> is NUL-terminated, B<emaillen> may be zero, otherwise
196 B<emaillen> must be set to the length of B<email>. When an email address
H A DX509V3_set_ctx.pod25 Similarly, when constructing subject alternative names from any email addresses
H A DX509_STORE_CTX_get_error.pod362 supports directory name, DNS name, email and URI types.
367 The format of the name constraint is not recognised: for example an email
388 =item B<X509_V_ERR_EMAIL_MISMATCH: email address mismatch>
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_blake.txt148 Custom = "email"
204 Custom = "email"
/openssl/test/
H A Dv3nametest.c234 int email; member
327 if (fn->email) { in run_cert()
H A Dtest.cnf72 emailAddress = email field
/openssl/.github/workflows/
H A Dstatic-analysis.yml42 --form email=openssl-commits@openssl.org \
/openssl/doc/man1/
H A Dopenssl-x509.pod.in39 [B<-email>]
282 =item B<-email>
284 Prints the email address(es) if any.
356 =item B<-checkemail> I<email>
358 Check that the certificate matches the specified email address.
796 The B<-email> option searches the subject name and the subject alternative
797 name extension. Only unique email addresses will be printed out: it will
H A Dopenssl-verification-options.pod72 B<emailProtection> (S/MIME email use), B<codeSigning> (object signer use),
477 =item B<-verify_email> I<email>
479 Verify if I<email> matches the email address in Subject Alternative Name or
480 the email in the subject Distinguished Name.
626 The extended key usage extension must be absent or include the "email
644 The extended key usage extension must be absent or include the "email
H A Dopenssl-cms.pod.in127 This command handles data in CMS format such as S/MIME v3.1 email messages.
501 For B<-sign> option include a signed receipt request. Add an explicit email
506 Add an explicit email address where signed receipts should be sent to. This
593 The relevant email headers. These are included outside the signed
595 then many S/MIME mail clients check the signers certificate's email
883 Ideally a database should be maintained of a certificates for each email
H A Dopenssl-smime.pod.in271 then many S/MIME mail clients check the signers certificate's email
452 Ideally a database should be maintained of a certificates for each email
H A Dopenssl-req.pod.in755 emailAddress = test@email.address
823 statically defined in the configuration file. Some of these: like an email
H A Dopenssl-ca.pod.in729 email_in_dn = no # Don't add the email into cert DN
/openssl/include/openssl/
H A Dx509_vfy.h.in273 /* Host, email and IP check errors */
744 const char *email, size_t emaillen);
/openssl/test/certs/
H A Dsetup.sh420 ./mkcert.sh req alt-email-key "O = NC email in othername Test Certificate" | \

Completed in 95 milliseconds

12