Home
last modified time | relevance | path

Searched refs:issuer (Results 1 – 25 of 158) sorted by relevance

1234567

/openssl/test/
H A Ddanetest.in55 issuer=
70 issuer=
85 issuer=
100 issuer=
115 issuer=
130 issuer=
145 issuer=
160 issuer=
175 issuer=
190 issuer=
[all …]
H A Ddane-cross.in26 issuer=CN = CA
49 issuer=CN = Root CA
71 issuer=CN = Cross Root
93 issuer=CN = Cross Root
H A Dca-and-certs.cnf38 authorityKeyIdentifier = keyid,issuer:always
88 authorityKeyIdentifier = keyid:always,issuer:always
91 issuerAltName = issuer:copy
/openssl/doc/man3/
H A DX509_check_issued.pod12 int X509_check_issued(X509 *issuer, X509 *subject);
18 using (CA) certificate I<issuer>. This function takes into account not only
19 matching of the issuer field of I<subject> with the subject field of I<issuer>,
22 serial number, and issuer fields of I<issuer>, as far as present. It also checks
23 if the B<keyUsage> field (if present) of I<issuer> allows certificate signing.
25 if the I<issuer> or the I<subject> are incomplete certificates.
H A DOCSP_cert_to_id.pod13 X509 *subject, X509 *issuer);
33 message digest B<dgst> for certificate B<subject> with issuer B<issuer>. If
37 issuer name B<issuerName>, issuer key hash B<issuerKey> and serial number
45 OCSP_id_issuer_cmp() compares only the issuer name of B<OCSP_CERTID> B<a> and B<b>.
47 OCSP_id_get0_info() returns the issuer name hash, hash OID, issuer key hash and
H A DX509_STORE_set_verify_cb_func.pod43 typedef int (*X509_STORE_CTX_get_issuer_fn)(X509 **issuer,
46 X509 *x, X509 *issuer);
152 to I<*issuer> and then return 1.
158 certificate I<x> is issued by the issuer certificate I<issuer>.
160 been issued with I<issuer>) and 1 on success.
161 I<If no function to get the issuer is provided, the internal default
169 I<If no function to get the issuer is provided, the internal default
176 I<If no function to get the issuer is provided, the internal default
182 I<If no function to get the issuer is provided, the internal default
188 I<If no function to get the issuer is provided, the internal default
[all …]
H A DX509V3_set_ctx.pod12 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject,
27 If I<subject> or I<crl> is provided, I<issuer> should point to its issuer, for
29 I<issuer> may be the same pointer value as I<subject> (which usually is an
40 X509V3_set_issuer_pkey() explicitly sets the issuer private key of
42 This should be done in case the I<issuer> and I<subject> arguments to
H A DOSSL_CMP_ITAV_new_caCerts.pod40 const GENERAL_NAMES *issuer,
45 DIST_POINT_NAME **dpn, GENERAL_NAMES **issuer,
99 or a copy of the certificate issuer I<issuer>, while giving both is an error.
106 Any available distribution point name is preferred over issuer names.
109 candidate issuer names are taken from following sources, as far as present:
137 =item the issuer field of the authority key identifier of I<cert>,
139 =item the issuer DN of I<cert>,
141 =item the issuer field of the authority key identifier of I<crl>, and
143 =item the issuer DN of I<crl>.
147 If <only_DN> is set, a candidate issuer name of type B<GENERAL_NAMES> is
[all …]
H A DX509_STORE_CTX_get_error.pod138 unable to decode issuer public key>
206 unable to get local issuer certificate>
208 The issuer certificate could not be found: this occurs if the issuer certificate
226 issuer certificate doesn't have a public key>
228 The issuer certificate does not have a public key.
249 did not match the issuer name of the current certificate.
259 authority and issuer serial number mismatch>
261 The current candidate issuer certificate was rejected because its issuer name
272 unable to get CRL issuer certificate>
274 Unable to get CRL issuer certificate.
[all …]
/openssl/crypto/ct/
H A Dct_policy.c63 X509_free(ctx->issuer); in CT_POLICY_EVAL_CTX_free()
76 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) in CT_POLICY_EVAL_CTX_set1_issuer() argument
78 if (!X509_up_ref(issuer)) in CT_POLICY_EVAL_CTX_set1_issuer()
80 ctx->issuer = issuer; in CT_POLICY_EVAL_CTX_set1_issuer()
102 return ctx->issuer; in CT_POLICY_EVAL_CTX_get0_issuer()
/openssl/crypto/x509/
H A Dv3_akid.c52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF()
60 if (akeyid->issuer) { in STACK_OF()
61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF()
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
131 } else if (strcmp(cnf->name, "issuer") == 0 && issuer == 0) { in v2i_AUTHORITY_KEYID()
132 issuer = 1; in v2i_AUTHORITY_KEYID()
134 issuer = 2; in v2i_AUTHORITY_KEYID()
196 if (issuer == 2 || (issuer == 1 && !ss && ikeyid == NULL)) { in v2i_AUTHORITY_KEYID()
219 akeyid->issuer = gens; in v2i_AUTHORITY_KEYID()
H A Dx509aset.c96 const X509_NAME *issuer) in OSSL_ISSUER_SERIAL_set1_issuer() argument
98 return replace_dirName(&isss->issuer, issuer); in OSSL_ISSUER_SERIAL_set1_issuer()
148 v2Form = x->acinfo->issuer.u.v2Form; in X509_ACERT_set1_issuerName()
157 x->acinfo->issuer.u.v2Form = v2Form; in X509_ACERT_set1_issuerName()
158 x->acinfo->issuer.type = X509_ACERT_ISSUER_V2; in X509_ACERT_set1_issuerName()
H A Dv3_purp.c953 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument
959 return ossl_x509_signing_allowed(issuer, subject); in X509_check_issued()
967 if (X509_NAME_cmp(X509_get_subject_name(issuer), in ossl_x509_likely_issued()
972 if (!ossl_x509v3_cache_extensions(issuer) in ossl_x509_likely_issued()
976 ret = X509_check_akid(issuer, subject->akid); in ossl_x509_likely_issued()
994 if (ku_reject(issuer, KU_DIGITAL_SIGNATURE)) in ossl_x509_signing_allowed()
996 } else if (ku_reject(issuer, KU_KEY_CERT_SIGN)) { in ossl_x509_signing_allowed()
1008 if (akid->keyid && issuer->skid && in X509_check_akid()
1016 if (akid->issuer) { in X509_check_akid()
1022 GENERAL_NAMES *gens = akid->issuer; in X509_check_akid()
[all …]
H A Dx509_local.h70 const ASN1_INTEGER *ser, const X509_NAME *issuer);
127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
H A Dx509_cmp.c33 return X509_NAME_cmp(ai->issuer, bi->issuer); in X509_issuer_and_serial_cmp()
47 f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0); in X509_issuer_and_serial_hash()
77 return X509_NAME_cmp(a->cert_info.issuer, b->cert_info.issuer); in X509_issuer_name_cmp()
87 return X509_NAME_cmp(a->crl.issuer, b->crl.issuer); in X509_CRL_cmp()
105 return a->cert_info.issuer; in X509_get_issuer_name()
110 return X509_NAME_hash_ex(x->cert_info.issuer, NULL, NULL, NULL); in X509_issuer_name_hash()
116 return X509_NAME_hash_old(x->cert_info.issuer); in X509_issuer_name_hash_old()
358 x.cert_info.issuer = (X509_NAME *)name; /* won't modify it */ in X509_find_by_issuer_and_serial()
H A Dx509_vfy.c388 X509 *candidate, *issuer = NULL; in get0_best_issuer_sk() local
407 if (issuer == NULL in get0_best_issuer_sk()
410 issuer = candidate; in get0_best_issuer_sk()
413 return issuer; in get0_best_issuer_sk()
432 if (*issuer != NULL) in X509_STORE_CTX_get1_issuer()
460 if (*issuer == NULL) in get1_best_issuer_other_sk()
1586 X509 *issuer = NULL; in get_crl_delta() local
1626 X509 *issuer = NULL; in check_crl() local
1645 if (!ctx->check_issued(ctx, issuer, issuer) && in check_crl()
1650 if (issuer == NULL) in check_crl()
[all …]
H A Dx_crl.c31 const X509_NAME *issuer);
70 ASN1_SIMPLE(X509_CRL_INFO, issuer, X509_NAME),
119 rev->issuer = gens;
412 if (!rev->issuer) { in crl_revoked_issuer_match()
423 for (i = 0; i < sk_GENERAL_NAME_num(rev->issuer); i++) { in crl_revoked_issuer_match()
424 GENERAL_NAME *gen = sk_GENERAL_NAME_value(rev->issuer, i); in crl_revoked_issuer_match()
436 const X509_NAME *issuer) in def_crl_lookup() argument
463 if (crl_revoked_issuer_match(crl, issuer, rev)) { in def_crl_lookup()
487 const X509_NAME *issuer), in X509_CRL_METHOD_new() argument
H A Dx509_acert.c30 ASN1_SEQUENCE_OF(OSSL_ISSUER_SERIAL, issuer, GENERAL_NAME),
55 ASN1_EMBED(X509_ACERT_INFO, issuer, X509_ACERT_ISSUER),
108 return get_dirName(isss->issuer); in OSSL_ISSUER_SERIAL_get0_issuer()
158 if (x->acinfo->issuer.type != X509_ACERT_ISSUER_V2 in X509_ACERT_get0_issuerName()
159 || x->acinfo->issuer.u.v2Form == NULL) in X509_ACERT_get0_issuerName()
162 return get_dirName(x->acinfo->issuer.u.v2Form->issuerName); in X509_ACERT_get0_issuerName()
/openssl/demos/certs/
H A Docspquery.sh18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
26 opensslcmd ocsp -issuer intca.pem \
/openssl/crypto/cms/
H A Dcms_kari.c59 X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument
69 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
70 *issuer = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
80 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
81 *issuer = oik->d.issuerAndSerialNumber->issuer; in CMS_RecipientInfo_kari_get0_orig_id()
117 X509_NAME **issuer, ASN1_INTEGER **sno) in CMS_RecipientEncryptedKey_get0_id() argument
122 if (issuer) in CMS_RecipientEncryptedKey_get0_id()
123 *issuer = rid->d.issuerAndSerialNumber->issuer; in CMS_RecipientEncryptedKey_get0_id()
139 if (issuer) in CMS_RecipientEncryptedKey_get0_id()
140 *issuer = NULL; in CMS_RecipientEncryptedKey_get0_id()
/openssl/crypto/ess/
H A Dess_lib.c105 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) { in ESS_CERT_ID_new_init()
230 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) { in ESS_CERT_ID_V2_new_init()
252 GENERAL_NAME *issuer; in ess_issuer_serial_cmp() local
254 if (is == NULL || cert == NULL || sk_GENERAL_NAME_num(is->issuer) != 1) in ess_issuer_serial_cmp()
257 issuer = sk_GENERAL_NAME_value(is->issuer, 0); in ess_issuer_serial_cmp()
258 if (issuer->type != GEN_DIRNAME in ess_issuer_serial_cmp()
259 || X509_NAME_cmp(issuer->d.dirn, X509_get_issuer_name(cert)) != 0) in ess_issuer_serial_cmp()
/openssl/crypto/crmf/
H A Dcrmf_lib.c177 OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer, in IMPLEMENT_CRMF_CTRL_FUNC()
182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC()
190 if (!X509_NAME_set(&cid->issuer->d.directoryName, issuer)) in IMPLEMENT_CRMF_CTRL_FUNC()
192 cid->issuer->type = GEN_DIRNAME; in IMPLEMENT_CRMF_CTRL_FUNC()
566 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer()
577 return cid != NULL && cid->issuer->type == GEN_DIRNAME ? in OSSL_CRMF_CERTID_get0_issuer()
578 cid->issuer->d.directoryName : NULL; in OSSL_CRMF_CERTID_get0_issuer()
594 const X509_NAME *issuer, in OSSL_CRMF_CERTTEMPLATE_fill() argument
603 if (issuer != NULL && !X509_NAME_set((X509_NAME **)&tmpl->issuer, issuer)) in OSSL_CRMF_CERTTEMPLATE_fill()
/openssl/doc/man1/
H A Dopenssl-crl.pod.in28 [B<-issuer>]
117 Output a hash of the issuer name. This can be use to lookup CRLs in
118 a directory by issuer name.
122 Outputs the "hash" of the CRL issuer name using the older algorithm
125 =item B<-issuer>
127 Output the issuer name.
/openssl/apps/
H A Dstoreutl.c82 X509_NAME *subject = NULL, *issuer = NULL; in storeutl_main() local
175 if (issuer != NULL) { in storeutl_main()
180 issuer = parse_name(opt_arg(), MBSTRING_UTF8, 1, "issuer"); in storeutl_main()
181 if (issuer == NULL) in storeutl_main()
278 if (issuer == NULL || serial == NULL) { in storeutl_main()
284 if ((search = OSSL_STORE_SEARCH_by_issuer_serial(issuer, serial)) in storeutl_main()
325 X509_NAME_free(issuer); in storeutl_main()
/openssl/crypto/ocsp/
H A Docsp_lib.c23 const X509 *issuer) in OCSP_cert_to_id() argument
35 iname = X509_get_subject_name(issuer); in OCSP_cert_to_id()
38 ikey = X509_get0_pubkey_bitstr(issuer); in OCSP_cert_to_id()

Completed in 208 milliseconds

1234567