Home
last modified time | relevance | path

Searched refs:extensions (Results 1 – 25 of 132) sorted by relevance

123456

/openssl/crypto/x509/
H A Dx509_ext.c21 return X509v3_get_ext_count(x->crl.extensions); in X509_CRL_get_ext_count()
42 return X509v3_get_ext(x->crl.extensions, loc); in X509_CRL_get_ext()
47 return X509v3_delete_ext(x->crl.extensions, loc); in X509_CRL_delete_ext()
68 return X509v3_get_ext_count(x->cert_info.extensions); in X509_get_ext_count()
84 (x->cert_info.extensions, crit, lastpos)); in X509_get_ext_by_critical()
89 return X509v3_get_ext(x->cert_info.extensions, loc); in X509_get_ext()
94 return X509v3_delete_ext(x->cert_info.extensions, loc); in X509_delete_ext()
116 return X509v3_get_ext_count(x->extensions); in X509_REVOKED_get_ext_count()
137 return X509v3_get_ext(x->extensions, loc); in X509_REVOKED_get_ext()
142 return X509v3_delete_ext(x->extensions, loc); in X509_REVOKED_delete_ext()
[all …]
/openssl/util/perl/
H A Dcheckhandshake.pm17 our @EXPORT = qw(@handmessages @extensions checkhandshake);
66 our @extensions = ();
133 $extensions[$extloop][3] != 0;
143 next if ($message->mt() != $extensions[$extloop][0]);
144 next if ($message->server() != $extensions[$extloop][2]);
221 next if ($message->mt() != $extensions[$extloop][0]);
222 next if ($message->server() != $extensions[$extloop][2]);
223 ok (($extensions[$extloop][3] & $exttype) == 0
224 || defined ($msgexts->{$extensions[$extloop][1]}),
226 ." Extension: ".($extensions[$extloop][3] & $exttype).", "
[all …]
/openssl/util/perl/TLSProxy/
H A DEncryptedExtensions.pm67 my %extensions = ();
72 $extensions{$type} = $extdata;
75 $self->extension_data(\%extensions);
85 my $extensions = "";
89 $extensions .= pack("n", $key);
90 $extensions .= pack("n", length($extdata));
91 $extensions .= $extdata;
94 $data = pack('n', length($extensions));
95 $data .= $extensions;
H A DCertificateRequest.pm61 my %extensions = ();
66 $extensions{$type} = $extdata;
68 $self->extension_data(\%extensions);
80 my $extensions = "";
84 $extensions .= pack("n", $key);
85 $extensions .= pack("n", length($extdata));
86 $extensions .= $extdata;
89 $data = pack('n', length($extensions));
90 $data .= $extensions;
H A DServerHello.pm101 my %extensions = ();
106 $extensions{$type} = $extdata;
128 $self->extension_data(\%extensions);
153 my $extensions = "";
164 $extensions .= pack("n", $key);
165 $extensions .= pack("n", length($extdata));
166 $extensions .= $extdata;
168 $extensions .= pack("n", $key);
170 $extensions .= $extdata;
174 $data .= pack('n', length($extensions));
[all …]
H A DCertificate.pm90 my %extensions = ();
95 $extensions{$type} = $extdata;
101 $self->extension_data(\%extensions);
141 my $extensions = "";
146 $extensions .= pack("n", $key);
147 $extensions .= pack("n", length($extdata));
148 $extensions .= $extdata;
153 my $certlistlen = $certlen + length($extensions)
161 $data .= pack('n', length($extensions));
162 $data .= $extensions;
H A DClientHello.pm96 my %extensions = ();
101 $extensions{$type} = $extdata;
115 $self->extension_data(\%extensions);
133 my %extensions = %{$self->extension_data};
138 if (exists $extensions{TLSProxy::Message::EXT_ENCRYPT_THEN_MAC}) {
161 my $extensions = "";
180 $extensions .= $self->extension_contents($key);
182 $extensions .= $self->extension_contents($key) if ($key == $self->dupext);
186 $extensions .= $self->extension_contents(TLSProxy::Message::EXT_PSK);
193 $data .= pack('n', length($extensions));
[all …]
/openssl/crypto/ts/
H A Dts_req_utils.c134 return a->extensions; in STACK_OF()
141 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_REQ_ext_free()
142 a->extensions = NULL; in TS_REQ_ext_free()
147 return X509v3_get_ext_count(a->extensions); in TS_REQ_get_ext_count()
152 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_REQ_get_ext_by_NID()
157 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_REQ_get_ext_by_OBJ()
162 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_REQ_get_ext_by_critical()
167 return X509v3_get_ext(a->extensions, loc); in TS_REQ_get_ext()
172 return X509v3_delete_ext(a->extensions, loc); in TS_REQ_delete_ext()
177 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_REQ_add_ext()
[all …]
H A Dts_rsp_utils.c295 return a->extensions; in STACK_OF()
302 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); in TS_TST_INFO_ext_free()
303 a->extensions = NULL; in TS_TST_INFO_ext_free()
308 return X509v3_get_ext_count(a->extensions); in TS_TST_INFO_get_ext_count()
313 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); in TS_TST_INFO_get_ext_by_NID()
318 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); in TS_TST_INFO_get_ext_by_OBJ()
323 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); in TS_TST_INFO_get_ext_by_critical()
328 return X509v3_get_ext(a->extensions, loc); in TS_TST_INFO_get_ext()
333 return X509v3_delete_ext(a->extensions, loc); in TS_TST_INFO_delete_ext()
338 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; in TS_TST_INFO_add_ext()
[all …]
H A Dts_lib.c48 int TS_ext_print_bio(BIO *bio, const STACK_OF(X509_EXTENSION) *extensions) in TS_ext_print_bio() argument
55 n = X509v3_get_ext_count(extensions); in TS_ext_print_bio()
57 ex = X509v3_get_ext(extensions, i); in TS_ext_print_bio()
/openssl/demos/certs/apps/
H A Dmkxcerts.sh13 -config apps.cnf -extensions usr_cert -x509 -nodes \
16 -config apps.cnf -extensions usr_cert -x509 -nodes \
19 -config apps.cnf -extensions usr_cert -x509 -nodes \
28 -config apps.cnf -extensions ec_cert -x509 -nodes \
33 -config apps.cnf -extensions ec_cert -x509 -nodes \
H A Dapps.cnf21 x509_extensions = v3_ca # The extensions to add to the self signed cert
24 # req_extensions = v3_req # The extensions to add to a certificate request
36 # These extensions are added when 'ca' signs a request for an end entity
44 # These extensions are added when 'ca' signs a request for an end entity
H A Dmkacerts.sh19 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem
25 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
32 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
39 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
/openssl/doc/man3/
H A DX509V3_get_d2i.pod48 X509V3_get_d2i() looks for an extension with OID I<nid> in the extensions
69 X509_get_ext_d2i() and X509_add1_ext_i2d() operate on the extensions of
82 extensions of B<X509_REVOKED> structure I<r> (i.e for CRL entry extensions).
87 STACK of all the extensions of a certificate, an attribute certificate,
130 The following sections contain a list of all supported extensions
135 The following certificate extensions are defined in PKIX standards such as
164 The following are (largely obsolete) Netscape certificate extensions.
182 The following are CRL extensions from PKIX standards such as RFC5280.
208 The following extensions are used by certificate transparency, RFC6962
227 X509_REVOKED_get0_extensions() return a stack of extensions. They return
[all …]
H A DX509_REQ_get_extensions.pod20 X509_REQ_get_extensions() returns the first list of X.509 extensions
22 The returned list is empty if there are no such extensions in I<req>.
25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>,
26 using I<nid> to identify the extensions attribute.
29 In such case any previous extensions are augmented, where an extension to be
H A DSSL_CTX_use_serverinfo.pod25 These functions load "serverinfo" TLS extensions into the SSL_CTX. A
29 SSL_CTX_use_serverinfo_ex() loads one or more serverinfo extensions from
33 If B<version> is B<SSL_SERVERINFOV2> then the extensions in the array must
37 extensions to be added to a Certificate message, then the extension will only
41 If B<version> is B<SSL_SERVERINFOV1> then the extensions in the array must
54 SSL_CTX_use_serverinfo_file() loads one or more serverinfo extensions from
55 B<file> into B<ctx>. The extensions must be in PEM format. Each extension
H A DX509v3_get_ext_by_NID.pod64 X509v3_get_ext_count() retrieves the number of extensions in I<x>.
90 X509v3_add_extensions() adds the list of extensions I<exts> to STACK I<*target>.
98 and X509_add_ext() operate on the extensions of certificate I<x>. They are
103 X509_CRL_delete_ext() and X509_CRL_add_ext() operate on the extensions of
109 X509_REVOKED_add_ext() operate on the extensions of CRL entry I<x>.
114 These functions are used to examine stacks of extensions directly.
144 X509v3_add_ext() returns a STACK of extensions or NULL on error.
146 X509v3_add_extensions() returns a STACK of extensions
H A DSSL_CTX_set_client_hello_cb.pod45 cipher suite, and not allowing extensions. Additionally, the SSLv2 format
58 Similarly, SSL_client_hello_get0_ext() provides access to individual extensions
64 SSL_client_hello_get0_ext(), to determine which extensions are present in the
70 In situations when the ClientHello has no extensions, the function will return
75 When called with B<exts> set to NULL, returns the number of extensions
77 with the ExtensionType values in the order that the corresponding extensions
81 is smaller then the number of extensions in question, that is treated as an error.
83 A ClientHello that contained no extensions is treated as success, with B<*num_exts>
/openssl/demos/certs/
H A Dmkcerts.sh20 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem
27 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem
34 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem
41 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem
48 -extfile ca.cnf -extensions ocsp_cert -CAcreateserial -out resp.pem
67 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhserver.pem
77 -extfile ca.cnf -extensions dh_cert -CAcreateserial -out dhclient.pem
H A Dca.cnf21 x509_extensions = v3_ca # The extensions to add to the self signed cert
24 # req_extensions = v3_req # The extensions to add to a certificate request
35 # These extensions are added when 'ca' signs a request for an end entity
57 # These extensions are added when 'ca' signs a request for an end entity
/openssl/test/smime-certs/
H A Dca.cnf22 x509_extensions = v3_ca # The extensions to add to the self signed cert
25 # req_extensions = v3_req # The extensions to add to a certificate request
36 # These extensions are added when 'ca' signs a request for a normal end-entity
55 # These extensions are added when 'ca' signs a request for an end-entity
63 # These extensions are added when 'ca' signs a request for a code-signing
/openssl/doc/man1/
H A Dopenssl-x509.pod.in45 [B<-ext> I<extensions>]
67 [B<-extensions> I<section>]
155 Determines how to handle X.509 extensions
310 =item B<-ext> I<extensions>
476 =item B<-extensions> I<section>
699 Don't print out any X509V3 extensions.
704 certificate extensions.
712 ASN1 parse unsupported extensions.
716 Hex dump unsupported extensions.
772 extensions for a CA:
[all …]
/openssl/doc/man5/
H A Dx509v3_config.pod50 [extensions]
67 [extensions]
78 [extensions]
88 [extensions]
274 [extensions]
371 [extensions]
417 [extensions]
459 [extensions]
540 =head2 Netscape String extensions
544 Other extensions of this type are: B<nsBaseUrl>,
[all …]
/openssl/doc/internal/man3/
H A Dx509v3_cache_extensions.pod6 - cache info on various X.509v3 extensions and further derived certificate data
16 This function processes any X509v3 extensions present in an X509 object I<x>
28 This function returns 0 if the extensions or other portions of the certificate
/openssl/test/
H A Dasynciotest.c149 PACKET payload, wholebody, sessionid, extensions; in async_write() local
182 &extensions)) in async_write()
189 while (PACKET_remaining(&extensions)) { in async_write()
193 if (!PACKET_get_net_2(&extensions, &type) in async_write()
194 || !PACKET_get_length_prefixed_2(&extensions, in async_write()

Completed in 37 milliseconds

123456