/openssl/crypto/x509/ |
H A D | x509_ext.c | 21 return X509v3_get_ext_count(x->crl.extensions); in X509_CRL_get_ext_count() 42 return X509v3_get_ext(x->crl.extensions, loc); in X509_CRL_get_ext() 47 return X509v3_delete_ext(x->crl.extensions, loc); in X509_CRL_delete_ext() 68 return X509v3_get_ext_count(x->cert_info.extensions); in X509_get_ext_count() 84 (x->cert_info.extensions, crit, lastpos)); in X509_get_ext_by_critical() 89 return X509v3_get_ext(x->cert_info.extensions, loc); in X509_get_ext() 94 return X509v3_delete_ext(x->cert_info.extensions, loc); in X509_delete_ext() 116 return X509v3_get_ext_count(x->extensions); in X509_REVOKED_get_ext_count() 137 return X509v3_get_ext(x->extensions, loc); in X509_REVOKED_get_ext() 142 return X509v3_delete_ext(x->extensions, loc); in X509_REVOKED_delete_ext() [all …]
|
/openssl/util/perl/ |
H A D | checkhandshake.pm | 17 our @EXPORT = qw(@handmessages @extensions checkhandshake); 66 our @extensions = (); 133 $extensions[$extloop][3] != 0; 143 next if ($message->mt() != $extensions[$extloop][0]); 144 next if ($message->server() != $extensions[$extloop][2]); 221 next if ($message->mt() != $extensions[$extloop][0]); 222 next if ($message->server() != $extensions[$extloop][2]); 223 ok (($extensions[$extloop][3] & $exttype) == 0 224 || defined ($msgexts->{$extensions[$extloop][1]}), 226 ." Extension: ".($extensions[$extloop][3] & $exttype).", " [all …]
|
/openssl/util/perl/TLSProxy/ |
H A D | EncryptedExtensions.pm | 67 my %extensions = (); 72 $extensions{$type} = $extdata; 75 $self->extension_data(\%extensions); 85 my $extensions = ""; 89 $extensions .= pack("n", $key); 90 $extensions .= pack("n", length($extdata)); 91 $extensions .= $extdata; 94 $data = pack('n', length($extensions)); 95 $data .= $extensions;
|
H A D | CertificateRequest.pm | 61 my %extensions = (); 66 $extensions{$type} = $extdata; 68 $self->extension_data(\%extensions); 80 my $extensions = ""; 84 $extensions .= pack("n", $key); 85 $extensions .= pack("n", length($extdata)); 86 $extensions .= $extdata; 89 $data = pack('n', length($extensions)); 90 $data .= $extensions;
|
H A D | ServerHello.pm | 101 my %extensions = (); 106 $extensions{$type} = $extdata; 128 $self->extension_data(\%extensions); 153 my $extensions = ""; 164 $extensions .= pack("n", $key); 165 $extensions .= pack("n", length($extdata)); 166 $extensions .= $extdata; 168 $extensions .= pack("n", $key); 170 $extensions .= $extdata; 174 $data .= pack('n', length($extensions)); [all …]
|
H A D | Certificate.pm | 90 my %extensions = (); 95 $extensions{$type} = $extdata; 101 $self->extension_data(\%extensions); 141 my $extensions = ""; 146 $extensions .= pack("n", $key); 147 $extensions .= pack("n", length($extdata)); 148 $extensions .= $extdata; 153 my $certlistlen = $certlen + length($extensions) 161 $data .= pack('n', length($extensions)); 162 $data .= $extensions;
|
H A D | ClientHello.pm | 96 my %extensions = (); 101 $extensions{$type} = $extdata; 115 $self->extension_data(\%extensions); 133 my %extensions = %{$self->extension_data}; 138 if (exists $extensions{TLSProxy::Message::EXT_ENCRYPT_THEN_MAC}) { 161 my $extensions = ""; 180 $extensions .= $self->extension_contents($key); 182 $extensions .= $self->extension_contents($key) if ($key == $self->dupext); 186 $extensions .= $self->extension_contents(TLSProxy::Message::EXT_PSK); 193 $data .= pack('n', length($extensions)); [all …]
|
/openssl/crypto/ts/ |
H A D | ts_req_utils.c | 134 return a->extensions; in STACK_OF() 141 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_REQ_ext_free() 142 a->extensions = NULL; in TS_REQ_ext_free() 147 return X509v3_get_ext_count(a->extensions); in TS_REQ_get_ext_count() 152 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_REQ_get_ext_by_NID() 157 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_REQ_get_ext_by_OBJ() 162 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_REQ_get_ext_by_critical() 167 return X509v3_get_ext(a->extensions, loc); in TS_REQ_get_ext() 172 return X509v3_delete_ext(a->extensions, loc); in TS_REQ_delete_ext() 177 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_REQ_add_ext() [all …]
|
H A D | ts_rsp_utils.c | 295 return a->extensions; in STACK_OF() 302 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_TST_INFO_ext_free() 303 a->extensions = NULL; in TS_TST_INFO_ext_free() 308 return X509v3_get_ext_count(a->extensions); in TS_TST_INFO_get_ext_count() 313 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_TST_INFO_get_ext_by_NID() 318 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_TST_INFO_get_ext_by_OBJ() 323 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_TST_INFO_get_ext_by_critical() 328 return X509v3_get_ext(a->extensions, loc); in TS_TST_INFO_get_ext() 333 return X509v3_delete_ext(a->extensions, loc); in TS_TST_INFO_delete_ext() 338 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_TST_INFO_add_ext() [all …]
|
H A D | ts_lib.c | 48 int TS_ext_print_bio(BIO *bio, const STACK_OF(X509_EXTENSION) *extensions) in TS_ext_print_bio() argument 55 n = X509v3_get_ext_count(extensions); in TS_ext_print_bio() 57 ex = X509v3_get_ext(extensions, i); in TS_ext_print_bio()
|
/openssl/demos/certs/apps/ |
H A D | mkxcerts.sh | 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 16 -config apps.cnf -extensions usr_cert -x509 -nodes \ 19 -config apps.cnf -extensions usr_cert -x509 -nodes \ 28 -config apps.cnf -extensions ec_cert -x509 -nodes \ 33 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
H A D | apps.cnf | 21 x509_extensions = v3_ca # The extensions to add to the self signed cert 24 # req_extensions = v3_req # The extensions to add to a certificate request 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
H A D | mkacerts.sh | 19 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem 25 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 32 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 39 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
|
/openssl/doc/man3/ |
H A D | X509V3_get_d2i.pod | 48 X509V3_get_d2i() looks for an extension with OID I<nid> in the extensions 69 X509_get_ext_d2i() and X509_add1_ext_i2d() operate on the extensions of 82 extensions of B<X509_REVOKED> structure I<r> (i.e for CRL entry extensions). 87 STACK of all the extensions of a certificate, an attribute certificate, 130 The following sections contain a list of all supported extensions 135 The following certificate extensions are defined in PKIX standards such as 164 The following are (largely obsolete) Netscape certificate extensions. 182 The following are CRL extensions from PKIX standards such as RFC5280. 208 The following extensions are used by certificate transparency, RFC6962 227 X509_REVOKED_get0_extensions() return a stack of extensions. They return [all …]
|
H A D | X509_REQ_get_extensions.pod | 20 X509_REQ_get_extensions() returns the first list of X.509 extensions 22 The returned list is empty if there are no such extensions in I<req>. 25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>, 26 using I<nid> to identify the extensions attribute. 29 In such case any previous extensions are augmented, where an extension to be
|
H A D | SSL_CTX_use_serverinfo.pod | 25 These functions load "serverinfo" TLS extensions into the SSL_CTX. A 29 SSL_CTX_use_serverinfo_ex() loads one or more serverinfo extensions from 33 If B<version> is B<SSL_SERVERINFOV2> then the extensions in the array must 37 extensions to be added to a Certificate message, then the extension will only 41 If B<version> is B<SSL_SERVERINFOV1> then the extensions in the array must 54 SSL_CTX_use_serverinfo_file() loads one or more serverinfo extensions from 55 B<file> into B<ctx>. The extensions must be in PEM format. Each extension
|
H A D | X509v3_get_ext_by_NID.pod | 64 X509v3_get_ext_count() retrieves the number of extensions in I<x>. 90 X509v3_add_extensions() adds the list of extensions I<exts> to STACK I<*target>. 98 and X509_add_ext() operate on the extensions of certificate I<x>. They are 103 X509_CRL_delete_ext() and X509_CRL_add_ext() operate on the extensions of 109 X509_REVOKED_add_ext() operate on the extensions of CRL entry I<x>. 114 These functions are used to examine stacks of extensions directly. 144 X509v3_add_ext() returns a STACK of extensions or NULL on error. 146 X509v3_add_extensions() returns a STACK of extensions
|
H A D | SSL_CTX_set_client_hello_cb.pod | 45 cipher suite, and not allowing extensions. Additionally, the SSLv2 format 58 Similarly, SSL_client_hello_get0_ext() provides access to individual extensions 64 SSL_client_hello_get0_ext(), to determine which extensions are present in the 70 In situations when the ClientHello has no extensions, the function will return 75 When called with B<exts> set to NULL, returns the number of extensions 77 with the ExtensionType values in the order that the corresponding extensions 81 is smaller then the number of extensions in question, that is treated as an error. 83 A ClientHello that contained no extensions is treated as success, with B<*num_exts>
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 20 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem 27 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem 34 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem 41 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem 48 -extfile ca.cnf -extensions ocsp_cert -CAcreateserial -out resp.pem 67 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhserver.pem 77 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhclient.pem
|
H A D | ca.cnf | 21 x509_extensions = v3_ca # The extensions to add to the self signed cert 24 # req_extensions = v3_req # The extensions to add to a certificate request 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/test/smime-certs/ |
H A D | ca.cnf | 22 x509_extensions = v3_ca # The extensions to add to the self signed cert 25 # req_extensions = v3_req # The extensions to add to a certificate request 36 # These extensions are added when 'ca' signs a request for a normal end-entity 55 # These extensions are added when 'ca' signs a request for an end-entity 63 # These extensions are added when 'ca' signs a request for a code-signing
|
/openssl/doc/man1/ |
H A D | openssl-x509.pod.in | 45 [B<-ext> I<extensions>] 67 [B<-extensions> I<section>] 155 Determines how to handle X.509 extensions 310 =item B<-ext> I<extensions> 476 =item B<-extensions> I<section> 699 Don't print out any X509V3 extensions. 704 certificate extensions. 712 ASN1 parse unsupported extensions. 716 Hex dump unsupported extensions. 772 extensions for a CA: [all …]
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 50 [extensions] 67 [extensions] 78 [extensions] 88 [extensions] 274 [extensions] 371 [extensions] 417 [extensions] 459 [extensions] 540 =head2 Netscape String extensions 544 Other extensions of this type are: B<nsBaseUrl>, [all …]
|
/openssl/doc/internal/man3/ |
H A D | x509v3_cache_extensions.pod | 6 - cache info on various X.509v3 extensions and further derived certificate data 16 This function processes any X509v3 extensions present in an X509 object I<x> 28 This function returns 0 if the extensions or other portions of the certificate
|
/openssl/test/ |
H A D | asynciotest.c | 149 PACKET payload, wholebody, sessionid, extensions; in async_write() local 182 &extensions)) in async_write() 189 while (PACKET_remaining(&extensions)) { in async_write() 193 if (!PACKET_get_net_2(&extensions, &type) in async_write() 194 || !PACKET_get_length_prefixed_2(&extensions, in async_write()
|