/openssl/crypto/x509/ |
H A D | x509_req.c | 65 if (req == NULL) in X509_REQ_get_pubkey() 72 if (req == NULL) in X509_REQ_get0_pubkey() 79 return req->req_info.pubkey; in X509_REQ_get_X509_PUBKEY() 240 if (req == NULL) { in X509_REQ_delete_attr() 252 if (req == NULL) { in X509_REQ_add1_attr() 266 if (req == NULL) { in X509_REQ_add1_attr_by_OBJ() 281 if (req == NULL) { in X509_REQ_add1_attr_by_NID() 296 if (req == NULL) { in X509_REQ_add1_attr_by_txt() 328 if (req->signature) in X509_REQ_set0_signature() 330 req->signature = psig; in X509_REQ_set0_signature() [all …]
|
H A D | x_req.c | 165 X509_REQ *req = NULL; in X509_REQ_new_ex() local 167 req = (X509_REQ *)ASN1_item_new((X509_REQ_it())); in X509_REQ_new_ex() 168 if (!ossl_x509_req_set0_libctx(req, libctx, propq)) { in X509_REQ_new_ex() 169 X509_REQ_free(req); in X509_REQ_new_ex() 170 req = NULL; in X509_REQ_new_ex() 172 return req; in X509_REQ_new_ex()
|
/openssl/crypto/cmp/ |
H A D | cmp_server.c | 228 switch (OSSL_CMP_MSG_get_bodytype(req)) { in process_cert_request() 246 p10cr = req->body->value.p10cr; in process_cert_request() 363 if (!srv_ctx->process_genm(srv_ctx, req, req->body->value.genm, &itavs)) in process_genm() 379 errorContent = req->body->value.error; in process_error() 401 ccc = req->body->value.certConf; in process_certConf() 453 && req->body != NULL)) in process_non_polling_request() 456 switch (OSSL_CMP_MSG_get_bodytype(req)) { in process_non_polling_request() 470 rsp = process_rr(srv_ctx, req); in process_non_polling_request() 520 prc = req->body->value.pollReq; in process_pollReq() 583 || req == NULL || req->body == NULL in OSSL_CMP_SRV_process_request() [all …]
|
H A D | cmp_genm.c | 92 if (!OSSL_CMP_CTX_push0_genm_ITAV(ctx, req)) in get_genm_itav() 94 req = NULL; in get_genm_itav() 137 OSSL_CMP_ITAV_free(req); in get_genm_itav() 143 OSSL_CMP_ITAV *req, *itav; in OSSL_CMP_get1_caCerts() local 153 if ((req = OSSL_CMP_ITAV_new_caCerts(NULL)) == NULL) in OSSL_CMP_get1_caCerts() 292 OSSL_CMP_ITAV *req, *itav; in OSSL_CMP_get1_rootCaKeyUpdate() local 301 if ((req = OSSL_CMP_ITAV_new_rootCaCert(oldWithOld)) == NULL) in OSSL_CMP_get1_rootCaKeyUpdate() 356 OSSL_CMP_ITAV *req = NULL, *itav = NULL; in OSSL_CMP_get1_crlUpdate() local 376 if ((req = OSSL_CMP_ITAV_new0_crlStatusList(list)) == NULL) in OSSL_CMP_get1_crlUpdate() 414 OSSL_CMP_ITAV *req, *itav = NULL; in OSSL_CMP_get1_certReqTemplate() local [all …]
|
/openssl/test/quic-openssl-docker/ |
H A D | run_endpoint.sh | 47 for req in $REQUESTS 49 OUTFILE=$(basename $req) 52 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p') 61 for req in $REQUESTS 63 OUTFILE=$(basename $req) 65 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p') 66 HOSTPORT=$(printf "%s\n" "$req" | sed -ne 's,^https://[^:/]*:\([^/]*\).*,\1,p') 72 for req in $REQUESTS 74 OUTFILE=$(basename $req) 76 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p') [all …]
|
/openssl/doc/man3/ |
H A D | OCSP_REQUEST_new.pod | 14 void OCSP_REQUEST_free(OCSP_REQUEST *req); 18 int OCSP_request_sign(OCSP_REQUEST *req, 24 int OCSP_request_onereq_count(OCSP_REQUEST *req); 48 structures in B<req>. 52 OCSP_request_onereq_count(req) - 1. 66 structures in B<req> and -1 on error. 84 OCSP_REQUEST *req; 87 req = OCSP_REQUEST_new(); 88 if (req == NULL) 94 if (OCSP_REQUEST_add0_id(req, cid) == NULL) [all …]
|
H A D | X509_REQ_get_attr.pod | 16 int X509_REQ_get_attr_count(const X509_REQ *req); 17 int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos); 20 X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc); 21 X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc); 22 int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr); 23 int X509_REQ_add1_attr_by_OBJ(X509_REQ *req, 26 int X509_REQ_add1_attr_by_NID(X509_REQ *req, 29 int X509_REQ_add1_attr_by_txt(X509_REQ *req, 47 I<req> attribute list. I<loc> should be in the range from 0 to 51 the I<req> objects list of attributes. An error occurs if I<req> is NULL. [all …]
|
H A D | X509_REQ_get_extensions.pod | 13 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(const X509_REQ *req); 14 int X509_REQ_add_extensions(X509_REQ *req, const STACK_OF(X509_EXTENSION) *exts); 15 int X509_REQ_add_extensions_nid(X509_REQ *req, 21 found in the attributes of I<req>. 22 The returned list is empty if there are no such extensions in I<req>. 25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>, 27 I<req> is unchanged if I<exts> is NULL or an empty list. 28 This function may be called more than once on the same I<req> and I<nid>.
|
H A D | OCSP_sendreq_new.pod | 21 const OCSP_REQUEST *req, int buf_size); 22 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *io, const char *path, OCSP_REQUEST *req); 30 int OCSP_REQ_CTX_i2d(OCSP_REQ_CT *rctx, const ASN1_ITEM *it, ASN1_VALUE *req); 35 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, const OCSP_REQUEST *req); 44 optionally the OCSP request I<req>, and a response header maximum line length 46 The I<req> may be set to NULL and provided later using OCSP_REQ_CTX_set1_req() 69 OCSP_REQ_CTX_i2d(rctx, it, req) is equivalent to the following: 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 73 OCSP_REQ_CTX_set1_req(rctx, req) is equivalent to the following: 77 (const ASN1_VALUE *)req)
|
H A D | OCSP_request_add1_nonce.pod | 11 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 13 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 14 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *resp); 19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len> 25 OCSP_check_nonce() compares the nonce value in B<req> and B<resp>. 27 OCSP_copy_nonce() copies any nonce value present in B<req> to B<resp>. 35 was present in B<req> and 0 if an error occurred. 37 OCSP_check_nonce() returns the result of the nonce comparison between B<req>
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \ 16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \ 19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \ 23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \ 24 -keyout skey.pem -out req.pem -newkey rsa:1024 26 opensslcmd x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \ 37 CN="Test Revoked Cert" opensslcmd req -config ca.cnf -nodes \ 62 CN="Test Server DH Cert" opensslcmd req -config ca.cnf -new \ 65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ [all …]
|
/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 38 if (req && !sk_OCSP_ONEREQ_push(req->tbsRequest.requestList, one)) { in OCSP_request_add0_id() 47 int OCSP_request_set1_name(OCSP_REQUEST *req, const X509_NAME *nm) in OCSP_request_set1_name() argument 58 GENERAL_NAME_free(req->tbsRequest.requestorName); in OCSP_request_set1_name() 59 req->tbsRequest.requestorName = gen; in OCSP_request_set1_name() 64 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) in OCSP_request_add1_cert() argument 66 if (req->optionalSignature == NULL in OCSP_request_add1_cert() 80 int OCSP_request_sign(OCSP_REQUEST *req, in OCSP_request_sign() argument 89 if ((req->optionalSignature = OCSP_SIGNATURE_new()) == NULL) in OCSP_request_sign() 102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign() 110 OCSP_SIGNATURE_free(req->optionalSignature); in OCSP_request_sign() [all …]
|
H A D | ocsp_http.c | 16 const OCSP_REQUEST *req, int buf_size) in OCSP_sendreq_new() argument 39 if (req != NULL in OCSP_sendreq_new() 42 (const ASN1_VALUE *)req)) in OCSP_sendreq_new() 51 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, const char *path, OCSP_REQUEST *req) in OCSP_sendreq_bio() argument 57 ctx = OCSP_sendreq_new(b, path, req, 0 /* default buf_size */); in OCSP_sendreq_bio()
|
H A D | ocsp_vfy.c | 25 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, 76 static int ocsp_verify(OCSP_REQUEST *req, OCSP_BASICRESP *bs, in ocsp_verify() argument 87 if (req != NULL) in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 385 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, in OCSP_request_verify() argument 393 if (!req->optionalSignature) { in OCSP_request_verify() 397 gen = req->tbsRequest.requestorName; in OCSP_request_verify() 403 ret = ocsp_req_find_signer(&signer, req, nm, certs, flags); in OCSP_request_verify() 411 if ((ret = ocsp_verify(req, NULL, signer, flags)) <= 0) in OCSP_request_verify() 421 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, in ocsp_req_find_signer() argument [all …]
|
/openssl/apps/ |
H A D | ocsp.c | 565 if (req == NULL) { in ocsp_main() 655 req = NULL; in ocsp_main() 660 if (req == NULL) { in ocsp_main() 671 if (req == NULL in ocsp_main() 788 req = NULL; in ocsp_main() 821 if (req != NULL && ((i = OCSP_check_nonce(req, bs)) <= 0)) { in ocsp_main() 868 OCSP_REQUEST_free(req); in ocsp_main() 913 if (*req == NULL) in add_ocsp_cert() 915 if (*req == NULL) in add_ocsp_cert() 942 if (*req == NULL) in add_ocsp_serial() [all …]
|
H A D | req.c | 53 static int prompt_info(X509_REQ *req, 254 X509_REQ *req = NULL; in req_main() local 749 if (req == NULL) in req_main() 789 if (req == NULL) { in req_main() 791 if (req == NULL) { in req_main() 1022 i = i2d_X509_REQ_bio(out, req); in req_main() 1062 X509_REQ_free(req); in req_main() 1120 if (!X509_REQ_set_pubkey(req, pkey)) in make_REQ() 1128 static int prompt_info(X509_REQ *req, in prompt_info() argument 1262 if (!add_attribute_object(req, in prompt_info() [all …]
|
/openssl/test/ |
H A D | x509_req_test.c | 29 X509_REQ *req = NULL; in test_x509_req_detect_invalid_version() local 37 req = PEM_read_bio_X509_REQ(bio, NULL, 0, NULL); in test_x509_req_detect_invalid_version() 38 if (req == NULL) { in test_x509_req_detect_invalid_version() 42 if (!TEST_ptr(pkey = X509_REQ_get_pubkey(req))) in test_x509_req_detect_invalid_version() 45 if (!TEST_int_ne(X509_REQ_verify(req, pkey), 1)) in test_x509_req_detect_invalid_version() 50 X509_REQ_free(req); in test_x509_req_detect_invalid_version()
|
H A D | http_test.c | 41 const char *req, *path; in mock_http_server() local 42 long count = BIO_get_mem_data(in, (unsigned char **)&req); in mock_http_server() 43 const char *hdr = (char *)req; in mock_http_server() 65 count -= (hdr - req); in mock_http_server() 128 BIO *req, *rsp; in test_http_method() local 136 req = BIO_new(BIO_s_mem()); in test_http_method() 137 if (req == NULL in test_http_method() 140 BIO_free(req); in test_http_method() 141 req = NULL; in test_http_method() 149 if (wbio == NULL || rbio == NULL || req == NULL) in test_http_method() [all …]
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \ 15 CN="OpenSSL Test Intermediate CA" opensslcmd req -config apps.cnf -nodes \ 18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 21 CN="Test Client Cert" opensslcmd req -config apps.cnf -nodes \ 24 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 28 CN="Test Server Cert" opensslcmd req -config apps.cnf -nodes \ 31 opensslcmd x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 35 CN="Test Server Cert #2" opensslcmd req -config apps.cnf -nodes \ 38 opensslcmd x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
|
H A D | mkxcerts.sh | 12 CN="OpenSSL Test RSA SHA-1 cert" opensslcmd req \ 15 CN="OpenSSL Test RSA SHA-256 cert" opensslcmd req \ 18 CN="OpenSSL Test RSA SHA-512 cert" opensslcmd req \ 27 CN="OpenSSL Test P-256 SHA-256 cert" opensslcmd req \ 32 CN="OpenSSL Test P-384 SHA-384 cert" opensslcmd req \
|
/openssl/apps/lib/ |
H A D | cmp_mock_srv.c | 46 OSSL_CMP_MSG_free(ctx->req); in mock_srv_ctx_free() 206 int req_type = OSSL_CMP_MSG_get_bodytype(req); in delayed_delivery() 208 if (ctx == NULL || req == NULL) { in delayed_delivery() 227 if ((ctx->req = OSSL_CMP_MSG_dup(req)) == NULL) in delayed_delivery() 261 OSSL_CMP_MSG_free(ctx->req); in clean_transaction() 262 ctx->req = NULL; in clean_transaction() 535 rsp = OSSL_CMP_ITAV_dup(req); in process_genm_itav() 659 if (req != NULL) in process_pollReq() 660 *req = NULL; in process_pollReq() 679 *req = ctx->req; in process_pollReq() [all …]
|
/openssl/test/certs/ |
H A D | mkcert.sh | 67 req() { function 74 openssl req -new -"${OPENSSL_SIGALG}" -key "${key}.pem" \ 85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \ 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 113 csr=$(req "$key" "CN = $cn") || return 1 154 csr=$(req "$key" "CN = $cn") || return 1 175 csr=$(req "$key" "CN = $cn") || return 1 267 csr=$(req "$key" "CN = $cn") || return 1 301 csr=$(req "$key" "CN = $cn") || return 1 347 csr=$(req "$key" "CN = $cn") || return 1 [all …]
|
H A D | setup.sh | 293 ./mkcert.sh req alt1-key "O = Good NC Test Certificate 1" \ 302 ./mkcert.sh req goodcn1-key "O = Good NC Test Certificate 1" \ 316 ./mkcert.sh req badcn1-key "O = Good NC Test Certificate 1" \ 323 ./mkcert.sh req alt2-key "O = Good NC Test Certificate 2" | \ 351 ./mkcert.sh req badalt4-key 'O = Bad NC Test Certificate 4' \ 365 ./mkcert.sh req badalt6-key "O = Bad NC Test Certificate 6" \ 380 ./mkcert.sh req alt3-key "O = Good NC Test Certificate 3" \ 389 ./mkcert.sh req badalt8-key "O = Bad NC Test Certificate 8" \ 398 ./mkcert.sh req badalt9-key "O = Bad NC Test Certificate 9" \ 444 openssl req -new -noenc -subj "/CN=localhost" \ [all …]
|
/openssl/test/recipes/ |
H A D | 25-test_verify_store.t | 34 req( 'make cert request', 58 req( 'verify request 1', 64 req( 'verify request 2', 75 req( 'make a user cert request', 107 sub req {
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 22 opensslcmd req \ 39 opensslcmd req \ 47 opensslcmd req \ 66 opensslcmd req \ 75 opensslcmd req \
|