| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_platform/ |
| test_join.c | 29 #define DEFAULT_FILENAME "issuer.txt" 51 } Issuer; 101 static int init_key_chain(int length_key_chain, Issuer *issuer) { 121 issuer->length_key_chain = length_key_chain; 122 issuer->key_chain = (RSA **)malloc(sizeof(RSA *) * length_key_chain); 123 issuer->pk_signatures = (BYTE **)malloc(sizeof(BYTE *) * length_key_chain); 130 issuer->key_chain[i] = rsa; 134 // signature algorithm from Issuer.java - "SHA1withRSA" 148 signature, &len_sign, issuer->key_chain[i-1]) 175 Issuer *issuer = (Issuer *)malloc(sizeof( Issuer)); local 311 Issuer* issuer; local [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/certs/ |
| ocspquery.sh | 18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 26 opensslcmd ocsp -issuer intca.pem \
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_openssl.h | 17 X509 *issuer, X509 *issuer_issuer);
|
| /src/crypto/external/bsd/openssl/dist/demos/certs/ |
| ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 19 $OPENSSL ocsp -issuer intca.pem \
|
| /src/crypto/external/bsd/openssl.old/dist/demos/certs/ |
| ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 19 $OPENSSL ocsp -issuer intca.pem \
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
| ct_policy.c | 49 X509_free(ctx->issuer); 61 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) 63 if (!X509_up_ref(issuer)) 65 ctx->issuer = issuer; 87 return ctx->issuer;
|
| /src/crypto/external/apache2/openssl/dist/crypto/ct/ |
| ct_policy.c | 63 X509_free(ctx->issuer); 76 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) 78 if (!X509_up_ref(issuer)) 80 ctx->issuer = issuer; 102 return ctx->issuer;
|
| /src/crypto/external/bsd/openssl/dist/crypto/ct/ |
| ct_policy.c | 65 X509_free(ctx->issuer); 78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) 80 if (!X509_up_ref(issuer)) 82 ctx->issuer = issuer; 104 return ctx->issuer;
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| v3_akeya.c | 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
| v3_akid.c | 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, 60 if (akeyid->issuer) { 61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 88 * Three explicit tags may be given, where 'keyid' and 'issuer' may be combined: 90 * 'keyid': use the issuer's subject keyid; the option 'always' means its is 91 * an error if the issuer certificate doesn't have a subject key id. 92 * 'issuer': use the issuer's cert issuer and serial number. The default is 100 char keyid = 0, issuer = 0 local [all...] |
| x509aset.c | 96 const X509_NAME *issuer) 98 return replace_dirName(&isss->issuer, issuer); 148 v2Form = x->acinfo->issuer.u.v2Form; 157 x->acinfo->issuer.u.v2Form = v2Form; 158 x->acinfo->issuer.type = X509_ACERT_ISSUER_V2;
|
| v3_authattid.c | 28 if (iss->issuer != NULL) { 30 OSSL_GENERAL_NAMES_print(out, iss->issuer, indent);
|
| x509_local.h | 70 const ASN1_INTEGER *ser, const X509_NAME *issuer); 127 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 129 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| x509_acert.h | 28 STACK_OF(GENERAL_NAME) *issuer; member in struct:ossl_issuer_serial_st 56 X509_ACERT_ISSUER issuer; member in struct:X509_acert_info_st
|
| ess.h | 16 * issuer GeneralNames, 22 STACK_OF(GENERAL_NAME) *issuer; member in struct:ESS_issuer_serial
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| v3_akeya.c | 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
| v3_akid.c | 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, 60 if (akeyid->issuer) { 61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 90 * an error if the issuer certificate doesn't have a key id. 91 * issuer: use the issuers cert issuer and serial number. The default is 100 char keyid = 0, issuer = 0; local 126 } else if (strcmp(cnf->name, "issuer") == 0) { 127 issuer = 1; 129 issuer = 2 [all...] |
| x509_local.h | 70 const ASN1_INTEGER *ser, const X509_NAME *issuer); 127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_akey.c | 58 if (akeyid->issuer) { 59 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 89 * an error if the issuer certificate doesn't have a key id. 90 * issuer: use the issuers cert issuer and serial number. The default is 99 char keyid = 0, issuer = 0; local 117 } else if (strcmp(cnf->name, "issuer") == 0) { 118 issuer = 1; 120 issuer = 2; 149 if ((issuer && !ikeyid) || (issuer == 2)) [all...] |
| v3_akeya.c | 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| ess.h | 16 * issuer GeneralNames, 22 STACK_OF(GENERAL_NAME) *issuer; member in struct:ESS_issuer_serial
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 25-test_x509.t | 55 # extracts issuer from a -text formatted-output 58 my $issuer = ""; 61 if ($line =~ /Issuer:/) { 62 $issuer = $line; 66 return $issuer; 91 # verify issuer is CA 107 # Verify issuer is CA
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_ocsp.c | 112 struct x509_certificate *issuer, 173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", 174 issuer->subject_dn, issuer->subject_dn_len); 175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, 176 issuer->subject_dn_len, hash); 197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, 198 issuer->public_key_len, hash); 313 struct x509_certificate *issuer, const u8 *resp, 330 if (tls_process_ocsp_single_response(conn, cert, issuer, 356 struct x509_certificate *issuer, *signer; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/90-test_store_data/ |
| ca.cnf | 54 authorityKeyIdentifier=keyid,issuer 55 issuerAltName=issuer:copy
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| Uss.cnf | 26 authorityKeyIdentifier=keyid,issuer:always
|