/openssl/test/certs/ |
H A D | setup.sh | 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert.pem -trustout \ 28 openssl x509 -in root-cert2.pem -trustout \ 90 openssl x509 -in ca-cert.pem -trustout \ 92 openssl x509 -in ca-cert.pem -trustout \ 94 openssl x509 -in ca-cert.pem -trustout \ [all …]
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 12 CN="OpenSSL Test Root CA" opensslcmd req -config apps.cnf -x509 -nodes \ 18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 24 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 opensslcmd x509 -nameopt oneline -subject -issuer >client.pem 31 opensslcmd x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 33 opensslcmd x509 -nameopt oneline -subject -issuer >server.pem 38 opensslcmd x509 -req -in sreq2.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 40 opensslcmd x509 -nameopt oneline -subject -issuer >server2.pem
|
H A D | mkxcerts.sh | 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 16 -config apps.cnf -extensions usr_cert -x509 -nodes \ 19 -config apps.cnf -extensions usr_cert -x509 -nodes \ 28 -config apps.cnf -extensions ec_cert -x509 -nodes \ 33 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
/openssl/apps/ |
H A D | nseq.c | 41 X509 *x509 = NULL; in nseq_main() local 93 while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in nseq_main() 94 if (!sk_X509_push(seq->certs, x509)) in nseq_main() 118 x509 = sk_X509_value(seq->certs, i); in nseq_main() 119 dump_cert_text(out, x509); in nseq_main() 120 PEM_write_bio_X509(out, x509); in nseq_main()
|
H A D | ca.c | 94 EVP_PKEY *pkey, X509 *x509, 117 X509 *x509, const char *dgst, 306 X509 *x509 = NULL, *x509p = NULL, *x = NULL; in ca_main() local 608 if (x509 == NULL) in ca_main() 611 if (!X509_check_private_key(x509, pkey)) { in ca_main() 618 x509p = x509; in ca_main() 1318 X509_free(x509); in ca_main() 1335 EVP_PKEY *pkey, X509 *x509, in certify() argument 1690 X509V3_set_ctx(&ext_ctx, selfsign ? ret : x509, in do_body() 1960 X509 *x509, const char *dgst, in certify_spkac() argument [all …]
|
H A D | crl2pkcs7.c | 218 if (xi->x509 != NULL) { in add_certs_from_file() 219 sk_X509_push(stack, xi->x509); in add_certs_from_file() 220 xi->x509 = NULL; in add_certs_from_file()
|
/openssl/test/ |
H A D | x509_check_cert_pkey_test.c | 31 X509 *x509 = NULL; in test_x509_check_cert_pkey() local 73 x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL); in test_x509_check_cert_pkey() 74 if (x509 == NULL) { in test_x509_check_cert_pkey() 79 result = X509_check_private_key(x509, pkey); in test_x509_check_cert_pkey() 103 X509_free(x509); in test_x509_check_cert_pkey() 125 if (it->x509 != NULL) in test_PEM_X509_INFO_read_bio()
|
H A D | x509_test.c | 128 X509 *x509 = NULL; in test_asn1_item_verify() local 139 || !TEST_ptr(x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL)) in test_asn1_item_verify() 140 || !TEST_ptr(pkey = X509_get0_pubkey(x509))) in test_asn1_item_verify() 152 X509_get0_signature(&sig, &alg, x509); in test_asn1_item_verify() 156 &x509->cert_info, pkey), 0)) in test_asn1_item_verify() 174 X509_free(x509); in test_asn1_item_verify()
|
H A D | algorithmid_test.c | 279 int n, x509 = 0, spki = 0, testcount = 0; in setup_tests() local 284 x509 = 1; in setup_tests() 298 testcount = x509 + spki; in setup_tests() 310 } else if (x509 && n == 2) { in setup_tests() 318 } else if (x509 && (eecert_filename == NULL || cacert_filename == NULL)) { in setup_tests() 323 if (x509) in setup_tests()
|
H A D | http_test.c | 19 static X509 *x509 = NULL; variable 114 (ASN1_VALUE *)x509, x509_it); in http_bio_cb_ex() 146 req = ASN1_item_i2d_mem_bio(x509_it, (ASN1_VALUE *)x509); in test_http_method() 191 res = TEST_ptr(rcert) && TEST_int_eq(X509_cmp(x509, rcert), 0); in test_http_method() 484 X509_free(x509); in cleanup_tests() 495 if (!TEST_ptr((x509 = load_cert_pem(test_get_argument(0), NULL)))) in setup_tests()
|
/openssl/test/recipes/ |
H A D | 25-test_verify_store.t | 42 x509( 'convert request into self-signed cert', 51 x509( 'convert cert into a cert request', 83 x509( 'sign user cert request', 96 x509( 'Certificate details', 113 sub x509 {
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \ 19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \ 26 opensslcmd x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 33 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 40 opensslcmd x509 -req -in rreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 47 opensslcmd x509 -req -in respreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ 75 opensslcmd x509 -req -in dhcreq.pem -CA root.pem -days 3600 \
|
/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 195 X509 *x509; in parse_bag() local 232 if ((x509 = PKCS12_SAFEBAG_get1_cert_ex(bag, libctx, propq)) == NULL) in parse_bag() 234 if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { in parse_bag() 235 X509_free(x509); in parse_bag() 244 r = X509_alias_set1(x509, data, len); in parse_bag() 247 X509_free(x509); in parse_bag() 253 if (!sk_X509_push(ocerts, x509)) { in parse_bag() 254 X509_free(x509); in parse_bag()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 251 int PKCS7_add_certificate(PKCS7 *p7, X509 *x509) in PKCS7_add_certificate() argument 348 X509_get_issuer_name(x509))) in PKCS7_SIGNER_INFO_set() 357 ASN1_INTEGER_dup(X509_get0_serialNumber(x509)))) in PKCS7_SIGNER_INFO_set() 406 if (PKCS7_SIGNER_INFO_set(si, x509, pkey, dgst) <= 0) in PKCS7_add_signature() 570 if (PKCS7_RECIP_INFO_set(ri, x509) <= 0) in PKCS7_add_recipient() 617 int PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) in PKCS7_RECIP_INFO_set() argument 624 X509_get_issuer_name(x509))) in PKCS7_RECIP_INFO_set() 629 ASN1_INTEGER_dup(X509_get0_serialNumber(x509)))) in PKCS7_RECIP_INFO_set() 632 pkey = X509_get0_pubkey(x509); in PKCS7_RECIP_INFO_set() 661 X509_up_ref(x509); in PKCS7_RECIP_INFO_set() [all …]
|
/openssl/crypto/pem/ |
H A D | pem_info.c | 97 if (xi->x509 != NULL) { in STACK_OF() 108 xi->x509 = X509_new_ex(libctx, propq); in STACK_OF() 109 if (xi->x509 == NULL) in STACK_OF() 111 pp = &(xi->x509); in STACK_OF() 192 if ((xi->x509 != NULL) || (xi->crl != NULL) || in STACK_OF() 297 if ((xi->x509 != NULL) && (PEM_write_bio_X509(bp, xi->x509) <= 0)) in PEM_X509_INFO_write_bio()
|
/openssl/ssl/ |
H A D | ssl_rsa.c | 20 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx); 141 if (c->pkeys[i].x509 != NULL in ssl_set_pkey() 142 && !X509_check_private_key(c->pkeys[i].x509, pkey)) in ssl_set_pkey() 298 X509_free(c->pkeys[i].x509); in ssl_set_cert() 300 c->pkeys[i].x509 = x; in ssl_set_cert() 988 rv = ssl_security_cert(sc, ctx, x509, 0, 1); in ssl_set_cert_and_key() 1001 pubkey = X509_get_pubkey(x509); /* bumps reference */ in ssl_set_cert_and_key() 1039 if (!override && (c->pkeys[i].x509 != NULL in ssl_set_cert_and_key() 1058 X509_free(c->pkeys[i].x509); in ssl_set_cert_and_key() 1059 X509_up_ref(x509); in ssl_set_cert_and_key() [all …]
|
H A D | ssl_cert.c | 132 if (cpk->x509 != NULL) { in ssl_cert_dup() 133 rpk->x509 = cpk->x509; in ssl_cert_dup() 134 X509_up_ref(rpk->x509); in ssl_cert_dup() 246 X509_free(cpk->x509); in ssl_cert_clear_certs() 247 cpk->x509 = NULL; in ssl_cert_clear_certs() 366 if (cpk->x509 == x && cpk->privatekey) { in ssl_cert_select_current() 374 if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { in ssl_cert_select_current() 398 if (cpk->x509 && cpk->privatekey) { in ssl_cert_set_current() 1066 if (cpk->x509 == NULL) { in ssl_build_cert_chain() 1081 if (!X509_STORE_add_cert(chain_store, cpk->x509)) in ssl_build_cert_chain() [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_add1_chain_cert.pod | 19 int SSL_CTX_add0_chain_cert(SSL_CTX *ctx, X509 *x509); 20 int SSL_CTX_add1_chain_cert(SSL_CTX *ctx, X509 *x509); 26 int SSL_add0_chain_cert(SSL *ssl, X509 *x509); 27 int SSL_add1_chain_cert(SSL *ssl, X509 *x509); 34 int SSL_CTX_select_current_cert(SSL_CTX *ctx, X509 *x509); 35 int SSL_select_current_cert(SSL *ssl, X509 *x509); 45 certificate B<x509> to the chain associated with the current certificate of 74 SSL_CTX_select_current_cert() selects B<x509> as the current end entity 75 certificate, but only if B<x509> has already been loaded into B<ctx> using a
|
H A D | SSL_CTX_add_extra_chain_cert.pod | 15 long SSL_CTX_add_extra_chain_cert(SSL_CTX *ctx, X509 *x509); 22 SSL_CTX_add_extra_chain_cert() adds the certificate B<x509> to the extra chain 49 The B<x509> certificate provided to SSL_CTX_add_extra_chain_cert() will be 51 B<should not> free the B<x509> object.
|
/openssl/fuzz/ |
H A D | build.info | 30 PROGRAMS{noinst}=x509 137 SOURCE[x509]=x509.c driver.c fuzz_rand.c 138 INCLUDE[x509]=../include {- $ex_inc -} 139 DEPEND[x509]=../libcrypto {- $ex_lib -} 165 PROGRAMS{noinst}=x509-test 274 SOURCE[x509-test]=x509.c test-corpus.c fuzz_rand.c 275 INCLUDE[x509-test]=../include 276 DEPEND[x509-test]=../libcrypto
|
/openssl/crypto/x509/ |
H A D | x509_cmp.c | 352 X509 x, *x509 = NULL; in X509_find_by_issuer_and_serial() local 361 x509 = sk_X509_value(sk, i); in X509_find_by_issuer_and_serial() 362 if (X509_issuer_and_serial_cmp(x509, &x) == 0) in X509_find_by_issuer_and_serial() 363 return x509; in X509_find_by_issuer_and_serial() 370 X509 *x509; in X509_find_by_subject() local 374 x509 = sk_X509_value(sk, i); in X509_find_by_subject() 375 if (X509_NAME_cmp(X509_get_subject_name(x509), name) == 0) in X509_find_by_subject() 376 return x509; in X509_find_by_subject()
|
H A D | x509_lu.c | 170 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509); in x509_object_cmp() 334 stmp.data.x509 = NULL; in ossl_x509_store_ctx_get_by_subject() 404 obj->data.x509 = (X509 *)x; in x509_store_add() 456 return X509_up_ref(a->data.x509); in X509_OBJECT_up_ref_count() 467 return a->data.x509; in X509_OBJECT_get0_X509() 500 X509_free(a->data.x509); in x509_object_free_internal() 515 a->data.x509 = obj; in X509_OBJECT_set1_X509() 547 stmp.data.x509 = &x509_s; in x509_object_idx_cnt() 693 x = obj->data.x509; in STACK_OF() 769 if (!X509_cmp(obj->data.x509, x->data.x509)) in X509_OBJECT_retrieve_match()
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 24 -x509 \ 49 -x509 \ 78 -x509 \
|
/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 17 $OPENSSL x509 -CA smroot.pem -new -days 36524 -force_pubkey $1 -subj "$2" \ 22 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \ 33 $OPENSSL x509 -in smrsa3.pem > smrsa3-cert.pem
|
/openssl/test/recipes/25-test_eai_data/ |
H A D | kdc.sh | 11 -x509 -subj /CN=Root -days 36524 -out kdc-root-cert.pem 38 openssl x509 -req -out kdc-cert.pem \
|