Home
last modified time | relevance | path

Searched refs:GeneralName (Results 1 – 13 of 13) sorted by relevance

/third_party/rust/crates/rust-openssl/openssl/src/x509/
Dextension.rs24 use crate::x509::{GeneralName, Stack, X509Extension, X509v3Context};
532 RustGeneralName::Dns(s) => GeneralName::new_dns(s.as_bytes())?, in build()
533 RustGeneralName::Email(s) => GeneralName::new_email(s.as_bytes())?, in build()
534 RustGeneralName::Uri(s) => GeneralName::new_uri(s.as_bytes())?, in build()
536 GeneralName::new_ip(s.parse().map_err(|_| ErrorStack::get())?)? in build()
538 RustGeneralName::Rid(s) => GeneralName::new_rid(Asn1Object::from_str(s)?)?, in build()
540 GeneralName::new_other_name(oid.clone(), content)? in build()
Dmod.rs430 pub fn subject_alt_names(&self) -> Option<Stack<GeneralName>> { in subject_alt_names() argument
458 pub fn issuer_alt_names(&self) -> Option<Stack<GeneralName>> { in issuer_alt_names() argument
517 pub fn authority_issuer(&self) -> Option<&StackRef<GeneralName>> { in authority_issuer() argument
1746 type Output = Stack<GeneralName>;
1985 pub struct GeneralName;
1990 impl GeneralName { impl
1995 ) -> Result<GeneralName, ErrorStack> { in new() argument
1997 let gn = GeneralName::from_ptr(cvt_p(ffi::GENERAL_NAME_new())?); in new()
2014 pub(crate) fn new_email(email: &[u8]) -> Result<GeneralName, ErrorStack> { in new_email() argument
2015 unsafe { GeneralName::new(ffi::GEN_EMAIL, Asn1Type::IA5STRING, email) } in new_email()
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
Dconnector.rs426 GeneralName, X509NameRef, X509Ref, X509StoreContext, X509StoreContextRef,
468 fn verify_subject_alt_names(domain: &str, names: Stack<GeneralName>) -> bool {
/third_party/openssl/doc/man3/
DOSSL_CRMF_MSG_set1_regCtrl_regToken.pod70 the I<method> and publication location, in the form of a GeneralName, I<nm>.
/third_party/rust/crates/rust-openssl/openssl/
DCHANGELOG.md108 * Fixed debug formatting of `GeneralName`.
706 * Added `GeneralName` accessors for `rfc822Name` and `uri` variants.
/third_party/openssl/
DNEWS.md35 * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286])
DCHANGES.md126 * Fixed X.400 address type confusion in X.509 GeneralName.
129 inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
11284 * Support for directoryName in GeneralName related extensions
17247 * Code to support otherName option in GeneralName.
/third_party/node/deps/openssl/openssl/
DNEWS.md63 * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286])
DCHANGES.md304 * Fixed X.400 address type confusion in X.509 GeneralName.
307 inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
11462 * Support for directoryName in GeneralName related extensions
17425 * Code to support otherName option in GeneralName.
/third_party/node/doc/changelogs/
DCHANGELOG_V17.md970 …/nodejs/node/commit/2e2c45553d)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
DCHANGELOG_V16.md762 …/nodejs/node/commit/e52882da4c)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
DCHANGELOG_V14.md205 …/nodejs/node/commit/df1b2c33f6)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
DCHANGELOG_V12.md207 …/nodejs/node/commit/19873abfb2)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …