/openssl/test/ |
H A D | danetest.in | 54 subject= 69 subject= 84 subject= 99 subject= 114 subject= 129 subject= 144 subject= 159 subject= 174 subject= 189 subject= [all …]
|
H A D | dane-cross.in | 25 subject=CN = server.example 48 subject=CN = CA 70 subject=CN = Root CA 92 subject=CN = Cross Root
|
H A D | cmp_hdr_test.c | 464 X509_NAME *subject = NULL; in test_HDR_init_with_subject() local 468 if (!TEST_ptr(subject = X509_NAME_new()) in test_HDR_init_with_subject() 469 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name")) in test_HDR_init_with_subject() 471 subject))) { in test_HDR_init_with_subject() 475 X509_NAME_free(subject); in test_HDR_init_with_subject()
|
H A D | danetest.pem | 1 subject= /CN=Root CA
|
/openssl/doc/man3/ |
H A D | X509V3_set_ctx.pod | 12 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject, 20 These may make use of fields of the certificate I<subject>, the certification 23 When constructing the subject key identifier of a certificate by computing a 24 hash value of its public key, the public key is taken from I<subject> or I<req>. 25 Similarly, when constructing subject alternative names from any email addresses 26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>. 27 If I<subject> or I<crl> is provided, I<issuer> should point to its issuer, for 29 I<issuer> may be the same pointer value as I<subject> (which usually is an 30 indication that the I<subject> certificate is self-issued or even self-signed). 41 the subject certificate that has been provided in I<ctx>. [all …]
|
H A D | X509_check_issued.pod | 12 int X509_check_issued(X509 *issuer, X509 *subject); 17 X509_check_issued() checks if certificate I<subject> was apparently issued 19 matching of the issuer field of I<subject> with the subject field of I<issuer>, 21 I<subject>, as far as present, with the respective B<subjectKeyIdentifier>, 25 if the I<issuer> or the I<subject> are incomplete certificates.
|
H A D | SSL_load_client_CA_file.pod | 30 a STACK_OF(X509_NAME) with the subject names found. The library context I<libctx> 37 and adds their subject name to the already existing I<stack>. 40 file in the directory I<dir>, and adds their subject name to the 44 I<store> URI, and adds their subject name to the already existing 68 Pointer to the subject names of the successfully read certificates.
|
H A D | X509_check_host.pod | 91 to consider the subject DN even if the certificate contains at least 92 one subject alternative name of the right type (DNS name or email 93 address as appropriate); the default is to ignore the subject DN 94 when at least one corresponding subject alternative names is present. 97 consider the subject DN even if the certificate contains no subject alternative 99 is to use the subject DN when no corresponding subject alternative names are 103 precedence and the subject DN is not checked for matching names.
|
H A D | X509_get_subject_name.pod | 11 get X509_NAME hashes or get and set issuer or subject names 56 X509_get_subject_name() returns the subject name of certificate I<x>. The 63 X509_subject_name_hash() returns a hash value of the subject name of 73 X509_CRL_get_issuer() and X509_CRL_set_issuer_name() get or set the subject 76 Since attribute certificates do not have a subject name, only the issuer name
|
H A D | OSSL_CMP_MSG_get0_header.pod | 55 The subject DN included in the certificate template is 60 =item any subject name in I<ctx> set via L<OSSL_CMP_CTX_set1_subjectName(3)> - 61 if it is the NULL-DN (i.e., any empty sequence of RDNs), no subject is included, 63 =item the subject field of any PKCS#10 CSR set in I<ctx> 66 =item the subject field of any reference certificate given in I<ctx>
|
H A D | X509_get0_uids.pod | 20 X509_get0_uids() sets B<*piuid> and B<*psuid> to the issuer and subject unique 28 The issuer and subject unique identifier fields are very rarely encountered in
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 25 const X509_NAME *subject, 52 for which non-NULL values are provided: I<pubkey>, I<subject>, I<issuer>, 56 while the I<subject>, I<issuer>, and I<serial> structures (if given) are copied.
|
H A D | OSSL_STORE_SEARCH.pod | 70 are used to create an B<OSSL_STORE_SEARCH> from a subject name, an issuer name 100 This criterion supports a search by exact match of subject name. 101 The subject name itself is a B<X509_NAME> pointer. 103 and the actual subject name is retrieved with OSSL_STORE_SEARCH_get0_name().
|
/openssl/providers/implementations/storemgmt/ |
H A D | winstore_store.c | 41 unsigned char *subject; member 69 name.pbData = ctx->subject; in winstore_win_advance() 145 OPENSSL_free(ctx->subject); in winstore_set_ctx_params() 147 ctx->subject = OPENSSL_malloc(der_len); in winstore_set_ctx_params() 148 if (ctx->subject == NULL) { in winstore_set_ctx_params() 154 memcpy(ctx->subject, der, der_len); in winstore_set_ctx_params() 316 OPENSSL_free(ctx->subject); in winstore_close()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 22 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, in OCSP_cert_to_id() argument 31 if (subject) { in OCSP_cert_to_id() 32 iname = X509_get_issuer_name(subject); in OCSP_cert_to_id() 33 serial = X509_get0_serialNumber(subject); in OCSP_cert_to_id()
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 26 opensslcmd x509 -nameopt oneline -subject -issuer >client.pem 33 opensslcmd x509 -nameopt oneline -subject -issuer >server.pem 40 opensslcmd x509 -nameopt oneline -subject -issuer >server2.pem
|
/openssl/crypto/x509/ |
H A D | v3_purp.c | 370 static int check_sig_alg_match(const EVP_PKEY *issuer_key, const X509 *subject) in check_sig_alg_match() argument 953 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 957 if ((ret = ossl_x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued() 959 return ossl_x509_signing_allowed(issuer, subject); in X509_check_issued() 963 int ossl_x509_likely_issued(X509 *issuer, X509 *subject) in ossl_x509_likely_issued() argument 968 X509_get_issuer_name(subject)) != 0) in ossl_x509_likely_issued() 973 || !ossl_x509v3_cache_extensions(subject)) in ossl_x509_likely_issued() 976 ret = X509_check_akid(issuer, subject->akid); in ossl_x509_likely_issued() 981 return check_sig_alg_match(X509_get0_pubkey(issuer), subject); in ossl_x509_likely_issued() 991 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) in ossl_x509_signing_allowed() argument [all …]
|
H A D | v3_utl.c | 613 const unsigned char *subject, size_t subject_len, in equal_nocase() argument 621 unsigned char r = *subject; in equal_nocase() 635 ++subject; in equal_nocase() 643 const unsigned char *subject, size_t subject_len, in equal_case() argument 649 return !memcmp(pattern, subject, pattern_len); in equal_case() 699 if (!equal_nocase(prefix, prefix_len, subject, prefix_len, flags)) in wildcard_match() 701 wildcard_start = subject + prefix_len; in wildcard_match() 702 wildcard_end = subject + (subject_len - suffix_len); in wildcard_match() 816 if (!(subject_len > 1 && subject[0] == '.')) in equal_wildcard() 820 subject, subject_len, flags); in equal_wildcard() [all …]
|
H A D | x509_cmp.c | 82 return X509_NAME_cmp(a->cert_info.subject, b->cert_info.subject); in X509_subject_name_cmp() 122 return a->cert_info.subject; in X509_get_subject_name() 137 return X509_NAME_hash_ex(x->cert_info.subject, NULL, NULL, NULL); in X509_subject_name_hash() 143 return X509_NAME_hash_old(x->cert_info.subject); in X509_subject_name_hash_old()
|
H A D | x509_local.h | 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
/openssl/apps/ |
H A D | storeutl.c | 82 X509_NAME *subject = NULL, *issuer = NULL; in storeutl_main() local 158 if (subject != NULL) { in storeutl_main() 163 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject"); in storeutl_main() 164 if (subject == NULL) in storeutl_main() 272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { in storeutl_main() 324 X509_NAME_free(subject); in storeutl_main()
|
/openssl/doc/man1/ |
H A D | openssl-x509.pod.in | 36 [B<-subject>] 272 =item B<-subject> 274 Prints the subject name. 320 Prints the OCSP hash values for the subject name and public key. 679 Don't print out the subject name. 746 Print the certificate subject name: 748 openssl x509 -in cert.pem -noout -subject 750 Print the certificate subject name in RFC2253 form: 752 openssl x509 -in cert.pem -noout -subject -nameopt RFC2253 754 Print the certificate subject name in oneline form on a terminal [all …]
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 518 if (req->certReq->certTemplate->subject == NULL) { in OSSL_CRMF_MSGS_verify_popo() 560 return tmpl != NULL ? tmpl->subject : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_subject() 593 const X509_NAME *subject, in OSSL_CRMF_CERTTEMPLATE_fill() argument 601 if (subject != NULL && !X509_NAME_set((X509_NAME **)&tmpl->subject, subject)) in OSSL_CRMF_CERTTEMPLATE_fill()
|
/openssl/demos/bio/ |
H A D | server.pem | 1 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert 26 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate …
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 31 subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf" 97 #subject =
|