/freebsd-10-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 97 if (akeyid->issuer) 98 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 110 * an error if the issuer certificate doesn't have a key id. 111 * issuer: use the issuers cert issuer and serial number. The default is 120 char keyid = 0, issuer = 0; local 138 } else if (!strcmp(cnf->name, "issuer")) { 139 issuer = 1; 141 issuer = 2; 170 if ((issuer [all...] |
H A D | v3_akeya.c | 69 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
H A D | v3_purp.c | 398 /* Does subject name match issuer ? */ 766 * This can be used to prune a set of possible issuer certificates 770 * 1. Check issuer_name(subject) == subject_name(issuer) 771 * 2. If akid(subject) exists check it matches issuer 772 * 3. If key_usage(issuer) exists check it supports certificate signing 777 int X509_check_issued(X509 *issuer, X509 *subject) argument 779 if (X509_NAME_cmp(X509_get_subject_name(issuer), 782 x509v3_cache_extensions(issuer); 786 int ret = X509_check_akid(issuer, subject->akid); 792 if (ku_reject(issuer, KU_DIGITAL_SIGNATUR 799 X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) argument [all...] |
/freebsd-10-stable/crypto/openssl/crypto/x509/ |
H A D | x509_cmp.c | 77 return (X509_NAME_cmp(ai->issuer, bi->issuer)); 89 f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0); 112 return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); 122 return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); 134 return (a->cert_info->issuer); 139 return (X509_NAME_hash(x->cert_info->issuer)); 145 return (X509_NAME_hash_old(x->cert_info->issuer)); [all...] |
H A D | x509_vfy.c | 95 /* CRL issuer is certificate issuer */ 99 /* CRL issuer is on certificate path */ 103 /* CRL issuer matches CRL AKID */ 112 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 457 * Given a STACK_OF(X509) find the issuer of cert (if any) 463 X509 *issuer; local 465 issuer = sk_X509_value(sk, i); 466 if (ctx->check_issued(ctx, x, issuer)) 467 return issuer; 474 check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) argument 493 get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) argument 1403 X509 *issuer = NULL; local 1446 X509 *issuer = NULL; local [all...] |
H A D | x509_set.c | 98 return (X509_NAME_set(&x->cert_info->issuer, name));
|
H A D | x509cset.c | 82 return (X509_NAME_set(&x->crl->issuer, name));
|
H A D | x509_vfy.h | 196 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 198 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 253 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 255 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 283 /* cert currently being tested as valid issuer */ 342 /* These are 'informational' when looking for issuer cert */ 398 /* Send issuer+subject checks to verify_cb */ 470 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
|
/freebsd-10-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | x509.h | 95 x509_name issuer; member in struct:_x509_cert 122 apr_array_header_t *issuer; member in struct:svn_x509_certinfo_t
|
H A D | x509info.c | 118 result->issuer = deep_copy_name_attrs(certinfo->issuer, result_pool); 302 return get_dn(certinfo->issuer, result_pool); 308 return certinfo->issuer;
|
/freebsd-10-stable/contrib/wpa/src/tls/ |
H A D | x509v3.h | 53 struct x509_name issuer; member in struct:x509_certificate 113 int x509_certificate_check_signature(struct x509_certificate *issuer,
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | x_crl.c | 79 X509_NAME *issuer); 118 ASN1_SIMPLE(X509_CRL_INFO, issuer, X509_NAME), 126 * Set CRL entry issuer according to CRL certificate issuer extension. Check 162 rev->issuer = gens; 406 if (!rev->issuer) { 417 for (i = 0; i < sk_GENERAL_NAME_num(rev->issuer); i++) { 418 GENERAL_NAME *gen = sk_GENERAL_NAME_value(rev->issuer, i); 430 X509_NAME *issuer) 452 if (crl_revoked_issuer_match(crl, issuer, re [all...] |
H A D | asn1_locl.h | 130 ASN1_INTEGER *ser, X509_NAME *issuer);
|
/freebsd-10-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 77 /* Convert a certificate and its issuer to an OCSP_CERTID */ 79 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer) argument 92 iname = X509_get_subject_name(issuer); 95 ikey = X509_get0_pubkey_bitstr(issuer);
|
H A D | ocsp_ext.c | 531 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME *issuer, char **urls) argument 540 if (!(sloc->issuer = X509_NAME_dup(issuer)))
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | ocsp.c | 101 const EVP_MD *cert_id_md, X509 *issuer, 104 const EVP_MD *cert_id_md, X509 *issuer, 146 X509 *issuer = NULL, *cert = NULL; local 368 } else if (!strcmp(*args, "-issuer")) { 371 X509_free(issuer); 372 issuer = load_cert(bio_err, *args, FORMAT_PEM, 373 NULL, e, "issuer certificate"); 374 if (!issuer) 388 if (!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids)) 399 if (!add_ocsp_serial(&req, *args, cert_id_md, issuer, id 862 add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer, STACK_OF(OCSP_CERTID) *ids) argument 887 add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD *cert_id_md, X509 *issuer, STACK_OF(OCSP_CERTID) *ids) argument [all...] |
H A D | crl.c | 88 " -issuer - print issuer DN\n", 113 int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout = local 205 } else if (strcmp(*argv, "-issuer") == 0) 206 issuer = ++num; 265 BIO_printf(bio_err, "Error getting CRL issuer certificate\n"); 271 BIO_printf(bio_err, "Error getting CRL issuer public key\n"); 286 if (issuer == i) { 287 print_name(bio_out, "issuer=", X509_CRL_get_issuer(x),
|
/freebsd-10-stable/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 346 /* Check the issuer/serial as well if specified. */ 358 GENERAL_NAME *issuer; local 360 if (!is || !cinfo || sk_GENERAL_NAME_num(is->issuer) != 1) 363 /* Check the issuer first. It must be a directory name. */ 364 issuer = sk_GENERAL_NAME_value(is->issuer, 0); 365 if (issuer->type != GEN_DIRNAME 366 || X509_NAME_cmp(issuer->d.dirn, cinfo->issuer))
|
/freebsd-10-stable/contrib/ntp/sntp/ |
H A D | networking.h | 73 char *issuer; /* certificate issuer name */ member in struct:speer 74 struct cert_info *xinfo; /* issuer certificate */
|
/freebsd-10-stable/contrib/ntp/include/ |
H A D | ntp_crypto.h | 167 char *issuer; /* issuer common name */ member in struct:cert_info
|
/freebsd-10-stable/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 204 if (!X509_NAME_set(&sid->d.issuerAndSerialNumber->issuer, 240 X509_NAME **issuer, 244 if (issuer) 245 *issuer = sid->d.issuerAndSerialNumber->issuer; 260 ret = X509_NAME_cmp(sid->d.issuerAndSerialNumber->issuer, 494 X509_NAME **issuer, ASN1_INTEGER **sno) 496 return cms_SignerIdentifier_get0_signer_id(si->sid, keyid, issuer, sno); 238 cms_SignerIdentifier_get0_signer_id(CMS_SignerIdentifier *sid, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 492 CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
|
/freebsd-10-stable/etc/rc.d/ |
H A D | sendmail | 118 authorityKeyIdentifier=keyid,issuer 124 authorityKeyIdentifier=keyid:always,issuer
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | tls_nss.c | 292 char *subject, *issuer; local 303 issuer = CERT_NameToAscii(&cert->issuer); 304 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'", 305 subject, issuer); 308 PR_Free(issuer);
|
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 183 * Need to match on issuer too in case there are two CA that have 189 q.issuer_name = &_hx509_get_cert(parent)->tbsCertificate.issuer; 498 q.subject_name = &crl->tbsCertList.issuer; 532 q.subject_name = &_hx509_get_cert(signer)->tbsCertificate.issuer; 722 /* verify issuer hashes hash */ 726 &c->tbsCertificate.issuer._save, 748 "Certificate revoked by issuer in OCSP"); 774 /* check if cert.issuer == crls.val[i].crl.issuer */ 775 ret = _hx509_name_cmp(&c->tbsCertificate.issuer, [all...] |
H A D | cert.c | 621 _hx509_find_extension_subject_key_id(const Certificate *issuer, argument 630 e = find_extension(issuer, &asn1_oid_id_x509_ce_subjectKeyIdentifier, &i); 911 const Certificate *issuer, 919 ret = _hx509_name_cmp(&issuer->tbsCertificate.subject, 920 &subject->tbsCertificate.issuer, 938 ret_si = _hx509_find_extension_subject_key_id(issuer, &si); 965 &issuer->tbsCertificate.serialNumber); 978 ret = _hx509_name_cmp(&issuer->tbsCertificate.subject, 1027 &cert->tbsCertificate.issuer, &diff); 1131 "Failed to find issuer fo 910 _hx509_cert_is_parent_cmp(const Certificate *subject, const Certificate *issuer, int allow_self_signed) argument 1551 hx509_cert_get_issuer_unique_id(hx509_context context, hx509_cert p, heim_bit_string *issuer) argument 2760 hx509_query_match_issuer_serial(hx509_query *q, const Name *issuer, const heim_integer *serialNumber) argument [all...] |