Searched refs:GeneralName (Results 1 – 13 of 13) sorted by relevance
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
D | extension.rs | 24 use crate::x509::{GeneralName, Stack, X509Extension, X509v3Context}; 532 RustGeneralName::Dns(s) => GeneralName::new_dns(s.as_bytes())?, in build() 533 RustGeneralName::Email(s) => GeneralName::new_email(s.as_bytes())?, in build() 534 RustGeneralName::Uri(s) => GeneralName::new_uri(s.as_bytes())?, in build() 536 GeneralName::new_ip(s.parse().map_err(|_| ErrorStack::get())?)? in build() 538 RustGeneralName::Rid(s) => GeneralName::new_rid(Asn1Object::from_str(s)?)?, in build() 540 GeneralName::new_other_name(oid.clone(), content)? in build()
|
D | mod.rs | 430 pub fn subject_alt_names(&self) -> Option<Stack<GeneralName>> { in subject_alt_names() argument 458 pub fn issuer_alt_names(&self) -> Option<Stack<GeneralName>> { in issuer_alt_names() argument 517 pub fn authority_issuer(&self) -> Option<&StackRef<GeneralName>> { in authority_issuer() argument 1746 type Output = Stack<GeneralName>; 1985 pub struct GeneralName; 1990 impl GeneralName { impl 1995 ) -> Result<GeneralName, ErrorStack> { in new() argument 1997 let gn = GeneralName::from_ptr(cvt_p(ffi::GENERAL_NAME_new())?); in new() 2014 pub(crate) fn new_email(email: &[u8]) -> Result<GeneralName, ErrorStack> { in new_email() argument 2015 unsafe { GeneralName::new(ffi::GEN_EMAIL, Asn1Type::IA5STRING, email) } in new_email() [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | connector.rs | 426 GeneralName, X509NameRef, X509Ref, X509StoreContext, X509StoreContextRef, 468 fn verify_subject_alt_names(domain: &str, names: Stack<GeneralName>) -> bool {
|
/third_party/openssl/doc/man3/ |
D | OSSL_CRMF_MSG_set1_regCtrl_regToken.pod | 70 the I<method> and publication location, in the form of a GeneralName, I<nm>.
|
/third_party/rust/crates/rust-openssl/openssl/ |
D | CHANGELOG.md | 108 * Fixed debug formatting of `GeneralName`. 706 * Added `GeneralName` accessors for `rfc822Name` and `uri` variants.
|
/third_party/openssl/ |
D | NEWS.md | 35 * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286])
|
D | CHANGES.md | 126 * Fixed X.400 address type confusion in X.509 GeneralName. 129 inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING 11284 * Support for directoryName in GeneralName related extensions 17247 * Code to support otherName option in GeneralName.
|
/third_party/node/deps/openssl/openssl/ |
D | NEWS.md | 63 * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286])
|
D | CHANGES.md | 304 * Fixed X.400 address type confusion in X.509 GeneralName. 307 inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING 11462 * Support for directoryName in GeneralName related extensions 17425 * Code to support otherName option in GeneralName.
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V17.md | 970 …/nodejs/node/commit/2e2c45553d)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
|
D | CHANGELOG_V16.md | 762 …/nodejs/node/commit/e52882da4c)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
|
D | CHANGELOG_V14.md | 205 …/nodejs/node/commit/df1b2c33f6)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
|
D | CHANGELOG_V12.md | 207 …/nodejs/node/commit/19873abfb2)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias …
|