/openssl/crypto/x509/ |
H A D | x509_d2.c | 18 X509_LOOKUP *lookup; in X509_STORE_set_default_paths_ex() local 20 lookup = X509_STORE_add_lookup(ctx, X509_LOOKUP_file()); in X509_STORE_set_default_paths_ex() 21 if (lookup == NULL) in X509_STORE_set_default_paths_ex() 26 if (lookup == NULL) in X509_STORE_set_default_paths_ex() 28 X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT); in X509_STORE_set_default_paths_ex() 30 lookup = X509_STORE_add_lookup(ctx, X509_LOOKUP_store()); in X509_STORE_set_default_paths_ex() 31 if (lookup == NULL) in X509_STORE_set_default_paths_ex() 38 X509_LOOKUP_add_store_ex(lookup, NULL, libctx, propq); in X509_STORE_set_default_paths_ex() 53 X509_LOOKUP *lookup; in X509_STORE_load_file_ex() local 71 X509_LOOKUP *lookup; in X509_STORE_load_path() local [all …]
|
/openssl/test/ |
H A D | x509_dup_cert_test.c | 21 X509_LOOKUP *lookup = NULL; in test_509_dup_cert() local 25 && TEST_ptr(lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file())) in test_509_dup_cert() 26 && TEST_true(X509_load_cert_file(lookup, cert_f, X509_FILETYPE_PEM)) in test_509_dup_cert() 27 && TEST_true(X509_load_cert_file(lookup, cert_f, X509_FILETYPE_PEM))) in test_509_dup_cert()
|
H A D | x509_load_cert_file_test.c | 21 X509_LOOKUP *lookup = NULL; in test_load_cert_file() local 26 || !TEST_ptr(lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file())) in test_load_cert_file() 27 || !TEST_true(X509_load_cert_file(lookup, chain, X509_FILETYPE_PEM)) in test_load_cert_file() 40 if (crl != NULL && !TEST_true(X509_load_crl_file(lookup, crl, X509_FILETYPE_PEM))) in test_load_cert_file()
|
H A D | verify_extra_test.c | 69 X509_LOOKUP *lookup = NULL; in test_alt_chains_cert_forgery() local 75 lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file()); in test_alt_chains_cert_forgery() 76 if (lookup == NULL) in test_alt_chains_cert_forgery() 78 if (!X509_LOOKUP_load_file(lookup, roots_f, X509_FILETYPE_PEM)) in test_alt_chains_cert_forgery()
|
/openssl/crypto/modes/ |
H A D | ocb128.c | 277 OCB_BLOCK *lookup; in CRYPTO_ocb128_aad() local 280 lookup = ocb_lookup_l(ctx, ocb_ntz(i)); in CRYPTO_ocb128_aad() 281 if (lookup == NULL) in CRYPTO_ocb128_aad() 283 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 358 OCB_BLOCK *lookup; in CRYPTO_ocb128_encrypt() local 362 lookup = ocb_lookup_l(ctx, ocb_ntz(i)); in CRYPTO_ocb128_encrypt() 363 if (lookup == NULL) in CRYPTO_ocb128_encrypt() 365 ocb_block16_xor(&ctx->sess.offset, lookup, &ctx->sess.offset); in CRYPTO_ocb128_encrypt() 454 OCB_BLOCK *lookup = ocb_lookup_l(ctx, ocb_ntz(i)); in CRYPTO_ocb128_decrypt() local 455 if (lookup == NULL) in CRYPTO_ocb128_decrypt() [all …]
|
/openssl/test/recipes/ |
H A D | 80-test_pkcs12.t | 176 pbmac1_defaults => {args => [], lookup => "hmacWithSHA256"}, 177 …pbmac1_nondefaults => {args => ["-pbmac1_pbkdf2_md", "sha512", "-macalg", "sha384"], lookup => "hm… 182 my $lookup = $pbmac1_tests{$instance}{lookup}; 202 my @match = grep /$lookup/, <DATA>;
|
/openssl/apps/ |
H A D | ts.c | 979 X509_LOOKUP *lookup = NULL; in create_cert_store() local 990 lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_hash_dir()); in create_cert_store() 991 if (lookup == NULL) { in create_cert_store() 995 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in create_cert_store() 1002 lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_file()); in create_cert_store() 1003 if (lookup == NULL) { in create_cert_store() 1007 if (X509_LOOKUP_load_file_ex(lookup, CAfile, X509_FILETYPE_PEM, libctx, in create_cert_store() 1015 lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_store()); in create_cert_store() 1016 if (lookup == NULL) { in create_cert_store() 1020 if (X509_LOOKUP_load_store_ex(lookup, CAstore, libctx, propq) <= 0) { in create_cert_store()
|
H A D | crl.c | 83 X509_LOOKUP *lookup = NULL; in crl_main() local 226 lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file()); in crl_main() 227 if (lookup == NULL) in crl_main()
|
/openssl/doc/man3/ |
H A D | X509_STORE_CTX_get_by_subject.pod | 7 - X509 and X509_CRL lookup functions 33 X509_STORE_CTX_get_by_subject() returns 1 if the lookup was successful, else 0.
|
H A D | X509_LOOKUP.pod | 18 - OpenSSL certificate lookup mechanisms 74 to enable lookup in that store. 76 X509_LOOKUP_new() creates a new B<X509_LOOKUP> using the given lookup 79 will associate a B<X509_STORE> with the lookup mechanism. 113 This can only be used with a lookup using the implementation 123 This can only be used with a lookup using the implementation 138 These functions can only be used with a lookup using the
|
H A D | X509_LOOKUP_hash_dir.pod | 9 - Default OpenSSL certificate lookup methods 30 lookup methods to use with B<X509_STORE>, provided by OpenSSL library. 71 lookup source. 84 upon each lookup, so that newer CRLs are as soon as they appear in 109 loaded, hash_dir lookup method checks only for certificates with
|
H A D | X509_LOOKUP_meth_new.pod | 104 implementation of various X509 and X509_CRL lookup capabilities. One instance 109 be given a human-readable string containing a brief description of the lookup 148 related to the lookup, and an X509_OBJECT that will receive the requested
|
H A D | ASN1_ITEM_lookup.pod | 5 ASN1_ITEM_lookup, ASN1_ITEM_get - lookup ASN.1 structures
|
H A D | OpenSSL_add_all_algorithms.pod | 25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
|
H A D | X509_STORE_add_cert.pod | 52 It admits multiple lookup mechanisms and efficient scaling performance 95 I<store>. This also associates the B<X509_STORE> with the lookup, so
|
H A D | CMS_get0_SignerInfos.pod | 46 The main purpose of these functions is to enable an application to lookup
|
H A D | SSL_CTX_set_cert_store.pod | 34 via lookup methods, handled inside the X509_STORE. From the X509_STORE
|
H A D | X509_get_default_cert_file.pod | 31 specified. If a given directory in the list exists, OpenSSL attempts to lookup
|
H A D | X509_NAME_get_index_by_NID.pod | 7 X509_NAME lookup and enumeration functions
|
H A D | BIO_ADDRINFO.pod | 49 the lookup. B<family> can be any of AF_INET, AF_INET6, AF_UNIX and
|
/openssl/apps/lib/ |
H A D | s_cb.c | 40 static const char *lookup(int val, const STRINT_PAIR* list, const char* def) in lookup() function 218 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types() 661 str_version = lookup(version, ssl_versions, "???"); in msg_cb() 680 str_details2 = lookup((int)bp[1], alert_types, " ???"); in msg_cb() 688 str_details1 = lookup((int)bp[0], handshakes, "???"); in msg_cb() 829 const char *extname = lookup(type, tlsext_types, "unknown"); in tlsext_cb() 1482 nm = lookup(op, callback_types, NULL); in security_callback_debug() 1491 BIO_printf(sdb->out, "Version=%s", lookup(nid, ssl_versions, "???")); in security_callback_debug() 1560 sname = lookup(raw_sig_code, signature_tls13_scheme_list, NULL); in security_callback_debug() 1566 const char *alg_str = lookup(alg_code, signature_tls12_alg_list, NULL); in security_callback_debug() [all …]
|
H A D | apps.c | 1427 X509_LOOKUP *lookup; in setup_verify() local 1435 lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file()); in setup_verify() 1436 if (lookup == NULL) in setup_verify() 1439 if (X509_LOOKUP_load_file_ex(lookup, CAfile, X509_FILETYPE_PEM, in setup_verify() 1449 X509_LOOKUP_load_file_ex(lookup, NULL, X509_FILETYPE_DEFAULT, in setup_verify() 1455 lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir()); in setup_verify() 1456 if (lookup == NULL) in setup_verify() 1464 X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT); in setup_verify() 1469 lookup = X509_STORE_add_lookup(store, X509_LOOKUP_store()); in setup_verify() 1470 if (lookup == NULL) in setup_verify() [all …]
|
/openssl/doc/man1/ |
H A D | openssl-errstr.pod.in | 6 openssl-errstr - lookup error codes
|
H A D | openssl-crl.pod.in | 117 Output a hash of the issuer name. This can be use to lookup CRLs in
|
/openssl/engines/ |
H A D | e_capi.txt | 30 CAPI_R_INVALID_LOOKUP_METHOD:120:invalid lookup method
|