Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 25 of 114) sorted by relevance

12345

/openssl/test/
H A Ddanetest.in54 subject=
69 subject=
84 subject=
99 subject=
114 subject=
129 subject=
144 subject=
159 subject=
174 subject=
189 subject=
[all …]
H A Ddane-cross.in25 subject=CN = server.example
48 subject=CN = CA
70 subject=CN = Root CA
92 subject=CN = Cross Root
H A Dcmp_hdr_test.c464 X509_NAME *subject = NULL; in test_HDR_init_with_subject() local
468 if (!TEST_ptr(subject = X509_NAME_new()) in test_HDR_init_with_subject()
469 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name")) in test_HDR_init_with_subject()
471 subject))) { in test_HDR_init_with_subject()
475 X509_NAME_free(subject); in test_HDR_init_with_subject()
H A Ddanetest.pem1 subject= /CN=Root CA
/openssl/doc/man3/
H A DX509V3_set_ctx.pod12 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject,
20 These may make use of fields of the certificate I<subject>, the certification
23 When constructing the subject key identifier of a certificate by computing a
24 hash value of its public key, the public key is taken from I<subject> or I<req>.
25 Similarly, when constructing subject alternative names from any email addresses
26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>.
27 If I<subject> or I<crl> is provided, I<issuer> should point to its issuer, for
29 I<issuer> may be the same pointer value as I<subject> (which usually is an
30 indication that the I<subject> certificate is self-issued or even self-signed).
41 the subject certificate that has been provided in I<ctx>.
[all …]
H A DX509_check_issued.pod12 int X509_check_issued(X509 *issuer, X509 *subject);
17 X509_check_issued() checks if certificate I<subject> was apparently issued
19 matching of the issuer field of I<subject> with the subject field of I<issuer>,
21 I<subject>, as far as present, with the respective B<subjectKeyIdentifier>,
25 if the I<issuer> or the I<subject> are incomplete certificates.
H A DSSL_load_client_CA_file.pod30 a STACK_OF(X509_NAME) with the subject names found. The library context I<libctx>
37 and adds their subject name to the already existing I<stack>.
40 file in the directory I<dir>, and adds their subject name to the
44 I<store> URI, and adds their subject name to the already existing
68 Pointer to the subject names of the successfully read certificates.
H A DX509_check_host.pod91 to consider the subject DN even if the certificate contains at least
92 one subject alternative name of the right type (DNS name or email
93 address as appropriate); the default is to ignore the subject DN
94 when at least one corresponding subject alternative names is present.
97 consider the subject DN even if the certificate contains no subject alternative
99 is to use the subject DN when no corresponding subject alternative names are
103 precedence and the subject DN is not checked for matching names.
H A DX509_get_subject_name.pod11 get X509_NAME hashes or get and set issuer or subject names
56 X509_get_subject_name() returns the subject name of certificate I<x>. The
63 X509_subject_name_hash() returns a hash value of the subject name of
73 X509_CRL_get_issuer() and X509_CRL_set_issuer_name() get or set the subject
76 Since attribute certificates do not have a subject name, only the issuer name
H A DOSSL_CMP_MSG_get0_header.pod55 The subject DN included in the certificate template is
60 =item any subject name in I<ctx> set via L<OSSL_CMP_CTX_set1_subjectName(3)> -
61 if it is the NULL-DN (i.e., any empty sequence of RDNs), no subject is included,
63 =item the subject field of any PKCS#10 CSR set in I<ctx>
66 =item the subject field of any reference certificate given in I<ctx>
H A DX509_get0_uids.pod20 X509_get0_uids() sets B<*piuid> and B<*psuid> to the issuer and subject unique
28 The issuer and subject unique identifier fields are very rarely encountered in
H A DOSSL_CRMF_MSG_set0_validity.pod25 const X509_NAME *subject,
52 for which non-NULL values are provided: I<pubkey>, I<subject>, I<issuer>,
56 while the I<subject>, I<issuer>, and I<serial> structures (if given) are copied.
H A DOSSL_STORE_SEARCH.pod70 are used to create an B<OSSL_STORE_SEARCH> from a subject name, an issuer name
100 This criterion supports a search by exact match of subject name.
101 The subject name itself is a B<X509_NAME> pointer.
103 and the actual subject name is retrieved with OSSL_STORE_SEARCH_get0_name().
/openssl/providers/implementations/storemgmt/
H A Dwinstore_store.c41 unsigned char *subject; member
69 name.pbData = ctx->subject; in winstore_win_advance()
145 OPENSSL_free(ctx->subject); in winstore_set_ctx_params()
147 ctx->subject = OPENSSL_malloc(der_len); in winstore_set_ctx_params()
148 if (ctx->subject == NULL) { in winstore_set_ctx_params()
154 memcpy(ctx->subject, der, der_len); in winstore_set_ctx_params()
316 OPENSSL_free(ctx->subject); in winstore_close()
/openssl/crypto/ocsp/
H A Docsp_lib.c22 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, in OCSP_cert_to_id() argument
31 if (subject) { in OCSP_cert_to_id()
32 iname = X509_get_issuer_name(subject); in OCSP_cert_to_id()
33 serial = X509_get0_serialNumber(subject); in OCSP_cert_to_id()
/openssl/demos/certs/apps/
H A Dmkacerts.sh26 opensslcmd x509 -nameopt oneline -subject -issuer >client.pem
33 opensslcmd x509 -nameopt oneline -subject -issuer >server.pem
40 opensslcmd x509 -nameopt oneline -subject -issuer >server2.pem
/openssl/crypto/x509/
H A Dv3_purp.c370 static int check_sig_alg_match(const EVP_PKEY *issuer_key, const X509 *subject) in check_sig_alg_match() argument
953 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument
957 if ((ret = ossl_x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued()
959 return ossl_x509_signing_allowed(issuer, subject); in X509_check_issued()
963 int ossl_x509_likely_issued(X509 *issuer, X509 *subject) in ossl_x509_likely_issued() argument
968 X509_get_issuer_name(subject)) != 0) in ossl_x509_likely_issued()
973 || !ossl_x509v3_cache_extensions(subject)) in ossl_x509_likely_issued()
976 ret = X509_check_akid(issuer, subject->akid); in ossl_x509_likely_issued()
981 return check_sig_alg_match(X509_get0_pubkey(issuer), subject); in ossl_x509_likely_issued()
991 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) in ossl_x509_signing_allowed() argument
[all …]
H A Dv3_utl.c613 const unsigned char *subject, size_t subject_len, in equal_nocase() argument
621 unsigned char r = *subject; in equal_nocase()
635 ++subject; in equal_nocase()
643 const unsigned char *subject, size_t subject_len, in equal_case() argument
649 return !memcmp(pattern, subject, pattern_len); in equal_case()
699 if (!equal_nocase(prefix, prefix_len, subject, prefix_len, flags)) in wildcard_match()
701 wildcard_start = subject + prefix_len; in wildcard_match()
702 wildcard_end = subject + (subject_len - suffix_len); in wildcard_match()
816 if (!(subject_len > 1 && subject[0] == '.')) in equal_wildcard()
820 subject, subject_len, flags); in equal_wildcard()
[all …]
H A Dx509_cmp.c82 return X509_NAME_cmp(a->cert_info.subject, b->cert_info.subject); in X509_subject_name_cmp()
122 return a->cert_info.subject; in X509_get_subject_name()
137 return X509_NAME_hash_ex(x->cert_info.subject, NULL, NULL, NULL); in X509_subject_name_hash()
143 return X509_NAME_hash_old(x->cert_info.subject); in X509_subject_name_hash_old()
H A Dx509_local.h158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
/openssl/apps/
H A Dstoreutl.c82 X509_NAME *subject = NULL, *issuer = NULL; in storeutl_main() local
158 if (subject != NULL) { in storeutl_main()
163 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject"); in storeutl_main()
164 if (subject == NULL) in storeutl_main()
272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { in storeutl_main()
324 X509_NAME_free(subject); in storeutl_main()
/openssl/doc/man1/
H A Dopenssl-x509.pod.in36 [B<-subject>]
272 =item B<-subject>
274 Prints the subject name.
320 Prints the OCSP hash values for the subject name and public key.
679 Don't print out the subject name.
746 Print the certificate subject name:
748 openssl x509 -in cert.pem -noout -subject
750 Print the certificate subject name in RFC2253 form:
752 openssl x509 -in cert.pem -noout -subject -nameopt RFC2253
754 Print the certificate subject name in oneline form on a terminal
[all …]
/openssl/crypto/crmf/
H A Dcrmf_lib.c518 if (req->certReq->certTemplate->subject == NULL) { in OSSL_CRMF_MSGS_verify_popo()
560 return tmpl != NULL ? tmpl->subject : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_subject()
593 const X509_NAME *subject, in OSSL_CRMF_CERTTEMPLATE_fill() argument
601 if (subject != NULL && !X509_NAME_set((X509_NAME **)&tmpl->subject, subject)) in OSSL_CRMF_CERTTEMPLATE_fill()
/openssl/demos/bio/
H A Dserver.pem1 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert
26 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate …
/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dtest.cnf31 subject = "/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=leaf"
97 #subject =

Completed in 55 milliseconds

12345