Home
last modified time | relevance | path

Searched refs:req (Results 1 – 25 of 104) sorted by relevance

12345

/openssl/crypto/x509/
H A Dx509_req.c65 if (req == NULL) in X509_REQ_get_pubkey()
72 if (req == NULL) in X509_REQ_get0_pubkey()
79 return req->req_info.pubkey; in X509_REQ_get_X509_PUBKEY()
240 if (req == NULL) { in X509_REQ_delete_attr()
252 if (req == NULL) { in X509_REQ_add1_attr()
266 if (req == NULL) { in X509_REQ_add1_attr_by_OBJ()
281 if (req == NULL) { in X509_REQ_add1_attr_by_NID()
296 if (req == NULL) { in X509_REQ_add1_attr_by_txt()
328 if (req->signature) in X509_REQ_set0_signature()
330 req->signature = psig; in X509_REQ_set0_signature()
[all …]
H A Dx_req.c165 X509_REQ *req = NULL; in X509_REQ_new_ex() local
167 req = (X509_REQ *)ASN1_item_new((X509_REQ_it())); in X509_REQ_new_ex()
168 if (!ossl_x509_req_set0_libctx(req, libctx, propq)) { in X509_REQ_new_ex()
169 X509_REQ_free(req); in X509_REQ_new_ex()
170 req = NULL; in X509_REQ_new_ex()
172 return req; in X509_REQ_new_ex()
/openssl/crypto/cmp/
H A Dcmp_server.c228 switch (OSSL_CMP_MSG_get_bodytype(req)) { in process_cert_request()
246 p10cr = req->body->value.p10cr; in process_cert_request()
363 if (!srv_ctx->process_genm(srv_ctx, req, req->body->value.genm, &itavs)) in process_genm()
379 errorContent = req->body->value.error; in process_error()
401 ccc = req->body->value.certConf; in process_certConf()
453 && req->body != NULL)) in process_non_polling_request()
456 switch (OSSL_CMP_MSG_get_bodytype(req)) { in process_non_polling_request()
470 rsp = process_rr(srv_ctx, req); in process_non_polling_request()
520 prc = req->body->value.pollReq; in process_pollReq()
583 || req == NULL || req->body == NULL in OSSL_CMP_SRV_process_request()
[all …]
H A Dcmp_genm.c92 if (!OSSL_CMP_CTX_push0_genm_ITAV(ctx, req)) in get_genm_itav()
94 req = NULL; in get_genm_itav()
137 OSSL_CMP_ITAV_free(req); in get_genm_itav()
143 OSSL_CMP_ITAV *req, *itav; in OSSL_CMP_get1_caCerts() local
153 if ((req = OSSL_CMP_ITAV_new_caCerts(NULL)) == NULL) in OSSL_CMP_get1_caCerts()
292 OSSL_CMP_ITAV *req, *itav; in OSSL_CMP_get1_rootCaKeyUpdate() local
301 if ((req = OSSL_CMP_ITAV_new_rootCaCert(oldWithOld)) == NULL) in OSSL_CMP_get1_rootCaKeyUpdate()
356 OSSL_CMP_ITAV *req = NULL, *itav = NULL; in OSSL_CMP_get1_crlUpdate() local
376 if ((req = OSSL_CMP_ITAV_new0_crlStatusList(list)) == NULL) in OSSL_CMP_get1_crlUpdate()
414 OSSL_CMP_ITAV *req, *itav = NULL; in OSSL_CMP_get1_certReqTemplate() local
[all …]
/openssl/test/quic-openssl-docker/
H A Drun_endpoint.sh47 for req in $REQUESTS
49 OUTFILE=$(basename $req)
52 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p')
61 for req in $REQUESTS
63 OUTFILE=$(basename $req)
65 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p')
66 HOSTPORT=$(printf "%s\n" "$req" | sed -ne 's,^https://[^:/]*:\([^/]*\).*,\1,p')
72 for req in $REQUESTS
74 OUTFILE=$(basename $req)
76 HOSTNAME=$(printf "%s\n" "$req" | sed -ne 's,^https://\([^/:]*\).*,\1,p')
[all …]
/openssl/doc/man3/
H A DOCSP_REQUEST_new.pod14 void OCSP_REQUEST_free(OCSP_REQUEST *req);
18 int OCSP_request_sign(OCSP_REQUEST *req,
24 int OCSP_request_onereq_count(OCSP_REQUEST *req);
48 structures in B<req>.
52 OCSP_request_onereq_count(req) - 1.
66 structures in B<req> and -1 on error.
84 OCSP_REQUEST *req;
87 req = OCSP_REQUEST_new();
88 if (req == NULL)
94 if (OCSP_REQUEST_add0_id(req, cid) == NULL)
[all …]
H A DX509_REQ_get_attr.pod16 int X509_REQ_get_attr_count(const X509_REQ *req);
17 int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos);
20 X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc);
21 X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc);
22 int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr);
23 int X509_REQ_add1_attr_by_OBJ(X509_REQ *req,
26 int X509_REQ_add1_attr_by_NID(X509_REQ *req,
29 int X509_REQ_add1_attr_by_txt(X509_REQ *req,
47 I<req> attribute list. I<loc> should be in the range from 0 to
51 the I<req> objects list of attributes. An error occurs if I<req> is NULL.
[all …]
H A DX509_REQ_get_extensions.pod13 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(const X509_REQ *req);
14 int X509_REQ_add_extensions(X509_REQ *req, const STACK_OF(X509_EXTENSION) *exts);
15 int X509_REQ_add_extensions_nid(X509_REQ *req,
21 found in the attributes of I<req>.
22 The returned list is empty if there are no such extensions in I<req>.
25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>,
27 I<req> is unchanged if I<exts> is NULL or an empty list.
28 This function may be called more than once on the same I<req> and I<nid>.
H A DOCSP_sendreq_new.pod21 const OCSP_REQUEST *req, int buf_size);
22 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *io, const char *path, OCSP_REQUEST *req);
30 int OCSP_REQ_CTX_i2d(OCSP_REQ_CT *rctx, const ASN1_ITEM *it, ASN1_VALUE *req);
35 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, const OCSP_REQUEST *req);
44 optionally the OCSP request I<req>, and a response header maximum line length
46 The I<req> may be set to NULL and provided later using OCSP_REQ_CTX_set1_req()
69 OCSP_REQ_CTX_i2d(rctx, it, req) is equivalent to the following:
71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req)
73 OCSP_REQ_CTX_set1_req(rctx, req) is equivalent to the following:
77 (const ASN1_VALUE *)req)
H A DOCSP_request_add1_nonce.pod11 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
13 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
14 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *resp);
19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len>
25 OCSP_check_nonce() compares the nonce value in B<req> and B<resp>.
27 OCSP_copy_nonce() copies any nonce value present in B<req> to B<resp>.
35 was present in B<req> and 0 if an error occurred.
37 OCSP_check_nonce() returns the result of the nonce comparison between B<req>
/openssl/demos/certs/
H A Dmkcerts.sh13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \
16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \
19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \
23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \
24 -keyout skey.pem -out req.pem -newkey rsa:1024
26 opensslcmd x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \
37 CN="Test Revoked Cert" opensslcmd req -config ca.cnf -nodes \
62 CN="Test Server DH Cert" opensslcmd req -config ca.cnf -new \
65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \
[all …]
/openssl/crypto/ocsp/
H A Docsp_cl.c38 if (req && !sk_OCSP_ONEREQ_push(req->tbsRequest.requestList, one)) { in OCSP_request_add0_id()
47 int OCSP_request_set1_name(OCSP_REQUEST *req, const X509_NAME *nm) in OCSP_request_set1_name() argument
58 GENERAL_NAME_free(req->tbsRequest.requestorName); in OCSP_request_set1_name()
59 req->tbsRequest.requestorName = gen; in OCSP_request_set1_name()
64 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert) in OCSP_request_add1_cert() argument
66 if (req->optionalSignature == NULL in OCSP_request_add1_cert()
80 int OCSP_request_sign(OCSP_REQUEST *req, in OCSP_request_sign() argument
89 if ((req->optionalSignature = OCSP_SIGNATURE_new()) == NULL) in OCSP_request_sign()
102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign()
110 OCSP_SIGNATURE_free(req->optionalSignature); in OCSP_request_sign()
[all …]
H A Docsp_http.c16 const OCSP_REQUEST *req, int buf_size) in OCSP_sendreq_new() argument
39 if (req != NULL in OCSP_sendreq_new()
42 (const ASN1_VALUE *)req)) in OCSP_sendreq_new()
51 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, const char *path, OCSP_REQUEST *req) in OCSP_sendreq_bio() argument
57 ctx = OCSP_sendreq_new(b, path, req, 0 /* default buf_size */); in OCSP_sendreq_bio()
H A Docsp_vfy.c25 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req,
76 static int ocsp_verify(OCSP_REQUEST *req, OCSP_BASICRESP *bs, in ocsp_verify() argument
87 if (req != NULL) in ocsp_verify()
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify()
385 int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, in OCSP_request_verify() argument
393 if (!req->optionalSignature) { in OCSP_request_verify()
397 gen = req->tbsRequest.requestorName; in OCSP_request_verify()
403 ret = ocsp_req_find_signer(&signer, req, nm, certs, flags); in OCSP_request_verify()
411 if ((ret = ocsp_verify(req, NULL, signer, flags)) <= 0) in OCSP_request_verify()
421 static int ocsp_req_find_signer(X509 **psigner, OCSP_REQUEST *req, in ocsp_req_find_signer() argument
[all …]
/openssl/apps/
H A Docsp.c565 if (req == NULL) { in ocsp_main()
655 req = NULL; in ocsp_main()
660 if (req == NULL) { in ocsp_main()
671 if (req == NULL in ocsp_main()
788 req = NULL; in ocsp_main()
821 if (req != NULL && ((i = OCSP_check_nonce(req, bs)) <= 0)) { in ocsp_main()
868 OCSP_REQUEST_free(req); in ocsp_main()
913 if (*req == NULL) in add_ocsp_cert()
915 if (*req == NULL) in add_ocsp_cert()
942 if (*req == NULL) in add_ocsp_serial()
[all …]
H A Dreq.c53 static int prompt_info(X509_REQ *req,
254 X509_REQ *req = NULL; in req_main() local
749 if (req == NULL) in req_main()
789 if (req == NULL) { in req_main()
791 if (req == NULL) { in req_main()
1022 i = i2d_X509_REQ_bio(out, req); in req_main()
1062 X509_REQ_free(req); in req_main()
1120 if (!X509_REQ_set_pubkey(req, pkey)) in make_REQ()
1128 static int prompt_info(X509_REQ *req, in prompt_info() argument
1262 if (!add_attribute_object(req, in prompt_info()
[all …]
/openssl/test/
H A Dx509_req_test.c29 X509_REQ *req = NULL; in test_x509_req_detect_invalid_version() local
37 req = PEM_read_bio_X509_REQ(bio, NULL, 0, NULL); in test_x509_req_detect_invalid_version()
38 if (req == NULL) { in test_x509_req_detect_invalid_version()
42 if (!TEST_ptr(pkey = X509_REQ_get_pubkey(req))) in test_x509_req_detect_invalid_version()
45 if (!TEST_int_ne(X509_REQ_verify(req, pkey), 1)) in test_x509_req_detect_invalid_version()
50 X509_REQ_free(req); in test_x509_req_detect_invalid_version()
H A Dhttp_test.c41 const char *req, *path; in mock_http_server() local
42 long count = BIO_get_mem_data(in, (unsigned char **)&req); in mock_http_server()
43 const char *hdr = (char *)req; in mock_http_server()
65 count -= (hdr - req); in mock_http_server()
128 BIO *req, *rsp; in test_http_method() local
136 req = BIO_new(BIO_s_mem()); in test_http_method()
137 if (req == NULL in test_http_method()
140 BIO_free(req); in test_http_method()
141 req = NULL; in test_http_method()
149 if (wbio == NULL || rbio == NULL || req == NULL) in test_http_method()
[all …]
/openssl/demos/certs/apps/
H A Dmkacerts.sh12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \
15 CN="OpenSSL Test Intermediate CA" opensslcmd req -config apps.cnf -nodes \
18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \
21 CN="Test Client Cert" opensslcmd req -config apps.cnf -nodes \
24 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
28 CN="Test Server Cert" opensslcmd req -config apps.cnf -nodes \
31 opensslcmd x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
35 CN="Test Server Cert #2" opensslcmd req -config apps.cnf -nodes \
38 opensslcmd x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
H A Dmkxcerts.sh12 CN="OpenSSL Test RSA SHA-1 cert" opensslcmd req \
15 CN="OpenSSL Test RSA SHA-256 cert" opensslcmd req \
18 CN="OpenSSL Test RSA SHA-512 cert" opensslcmd req \
27 CN="OpenSSL Test P-256 SHA-256 cert" opensslcmd req \
32 CN="OpenSSL Test P-384 SHA-384 cert" opensslcmd req \
/openssl/apps/lib/
H A Dcmp_mock_srv.c46 OSSL_CMP_MSG_free(ctx->req); in mock_srv_ctx_free()
206 int req_type = OSSL_CMP_MSG_get_bodytype(req); in delayed_delivery()
208 if (ctx == NULL || req == NULL) { in delayed_delivery()
227 if ((ctx->req = OSSL_CMP_MSG_dup(req)) == NULL) in delayed_delivery()
261 OSSL_CMP_MSG_free(ctx->req); in clean_transaction()
262 ctx->req = NULL; in clean_transaction()
535 rsp = OSSL_CMP_ITAV_dup(req); in process_genm_itav()
659 if (req != NULL) in process_pollReq()
660 *req = NULL; in process_pollReq()
679 *req = ctx->req; in process_pollReq()
[all …]
/openssl/test/certs/
H A Dmkcert.sh67 req() { function
74 openssl req -new -"${OPENSSL_SIGALG}" -key "${key}.pem" \
85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \
95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \
113 csr=$(req "$key" "CN = $cn") || return 1
154 csr=$(req "$key" "CN = $cn") || return 1
175 csr=$(req "$key" "CN = $cn") || return 1
267 csr=$(req "$key" "CN = $cn") || return 1
301 csr=$(req "$key" "CN = $cn") || return 1
347 csr=$(req "$key" "CN = $cn") || return 1
[all …]
H A Dsetup.sh293 ./mkcert.sh req alt1-key "O = Good NC Test Certificate 1" \
302 ./mkcert.sh req goodcn1-key "O = Good NC Test Certificate 1" \
316 ./mkcert.sh req badcn1-key "O = Good NC Test Certificate 1" \
323 ./mkcert.sh req alt2-key "O = Good NC Test Certificate 2" | \
351 ./mkcert.sh req badalt4-key 'O = Bad NC Test Certificate 4' \
365 ./mkcert.sh req badalt6-key "O = Bad NC Test Certificate 6" \
380 ./mkcert.sh req alt3-key "O = Good NC Test Certificate 3" \
389 ./mkcert.sh req badalt8-key "O = Bad NC Test Certificate 8" \
398 ./mkcert.sh req badalt9-key "O = Bad NC Test Certificate 9" \
444 openssl req -new -noenc -subj "/CN=localhost" \
[all …]
/openssl/test/recipes/
H A D25-test_verify_store.t34 req( 'make cert request',
58 req( 'verify request 1',
64 req( 'verify request 2',
75 req( 'make a user cert request',
107 sub req {
/openssl/test/ocsp-tests/
H A Dmk-ocsp-cert-chain.sh22 opensslcmd req \
39 opensslcmd req \
47 opensslcmd req \
66 opensslcmd req \
75 opensslcmd req \

Completed in 36 milliseconds

12345