/external/openssl/crypto/x509v3/ |
D | v3_akey.c | 92 if(akeyid->issuer) in STACK_OF() 93 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF() 114 char keyid=0, issuer=0; in v2i_AUTHORITY_KEYID() local 137 issuer = 1; in v2i_AUTHORITY_KEYID() 139 issuer = 2; in v2i_AUTHORITY_KEYID() 171 if((issuer && !ikeyid) || (issuer == 2)) in v2i_AUTHORITY_KEYID() 197 akeyid->issuer = gens; in v2i_AUTHORITY_KEYID()
|
D | v3_purp.c | 612 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 614 if(X509_NAME_cmp(X509_get_subject_name(issuer), in X509_check_issued() 617 x509v3_cache_extensions(issuer); in X509_check_issued() 621 if(subject->akid->keyid && issuer->skid && in X509_check_issued() 622 ASN1_OCTET_STRING_cmp(subject->akid->keyid, issuer->skid) ) in X509_check_issued() 626 ASN1_INTEGER_cmp(X509_get_serialNumber(issuer), in X509_check_issued() 630 if(subject->akid->issuer) { in X509_check_issued() 640 gens = subject->akid->issuer; in X509_check_issued() 648 if(nm && X509_NAME_cmp(nm, X509_get_issuer_name(issuer))) in X509_check_issued() 654 if(ku_reject(issuer, KU_DIGITAL_SIGNATURE)) in X509_check_issued() [all …]
|
D | v3_akeya.c | 68 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
/external/openssl/crypto/x509/ |
D | x509_cmp.c | 76 return(X509_NAME_cmp(ai->issuer,bi->issuer)); in X509_issuer_and_serial_cmp() 88 f=X509_NAME_oneline(a->cert_info->issuer,NULL,0); in X509_issuer_and_serial_hash() 106 return(X509_NAME_cmp(a->cert_info->issuer,b->cert_info->issuer)); in X509_issuer_name_cmp() 116 return(X509_NAME_cmp(a->crl->issuer,b->crl->issuer)); in X509_CRL_cmp() 121 return(a->cert_info->issuer); in X509_get_issuer_name() 126 return(X509_NAME_hash(x->cert_info->issuer)); in X509_issuer_name_hash() 349 cinf.issuer=name; in X509_find_by_issuer_and_serial()
|
D | x509_vfy.c | 74 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 344 X509 *issuer; in find_issuer() local 347 issuer = sk_X509_value(sk, i); in find_issuer() 348 if (ctx->check_issued(ctx, x, issuer)) in find_issuer() 349 return issuer; in find_issuer() 356 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) in check_issued() argument 359 ret = X509_check_issued(issuer, x); in check_issued() 368 ctx->current_issuer = issuer; in check_issued() 375 static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) in get_issuer_sk() argument 377 *issuer = find_issuer(ctx, ctx->other_ctx, x); in get_issuer_sk() [all …]
|
D | x509_vfy.h | 195 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 196 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ 242 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 243 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ 394 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
|
D | x509_lu.c | 437 crl_info_s.issuer=name; in X509_OBJECT_idx_by_subject() 488 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) in X509_STORE_CTX_get1_issuer() argument 514 *issuer = obj.data.x509; in X509_STORE_CTX_get1_issuer() 532 *issuer = pobj->data.x509; in X509_STORE_CTX_get1_issuer()
|
D | x509cset.c | 80 return(X509_NAME_set(&x->crl->issuer,name)); in X509_CRL_set_issuer_name()
|
/external/openssl/apps/ |
D | server.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 26 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 43 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit) 148 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit) 180 issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority 199 issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority 220 issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc 308 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber 339 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority 355 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
|
D | server2.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 33 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 50 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit) 155 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test PCA (1024 bit) 187 issuer= /C=US/O=RSA Data Security, Inc./OU=Commercial Certification Authority 206 issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority 227 issuer= /C=ZA/SP=Western Cape/L=Cape Town/O=Thawte Consulting cc 315 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber 346 issuer= /C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority 362 issuer= /C=US/O=VeriSign, Inc./OU=Class 4 Public Primary Certification Authority
|
D | ocsp.c | 71 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer, 73 static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer, 110 X509 *issuer = NULL, *cert = NULL; in MAIN() local 388 X509_free(issuer); in MAIN() 389 issuer = load_cert(bio_err, *args, FORMAT_PEM, in MAIN() 391 if(!issuer) goto end; in MAIN() 404 if(!add_ocsp_cert(&req, cert, issuer, ids)) in MAIN() 416 if(!add_ocsp_serial(&req, *args, issuer, ids)) in MAIN() 858 X509_free(issuer); in MAIN() 884 static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer, in add_ocsp_cert() argument [all …]
|
D | openssl-vms.cnf | 191 authorityKeyIdentifier=keyid,issuer 201 # issuerAltName=issuer:copy 227 authorityKeyIdentifier=keyid:always,issuer:always 245 # Copy issuer details 246 # issuerAltName=issuer:copy 259 # issuerAltName=issuer:copy 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always 303 # issuerAltName=issuer:copy
|
D | openssl.cnf | 191 authorityKeyIdentifier=keyid,issuer 201 # issuerAltName=issuer:copy 227 authorityKeyIdentifier=keyid:always,issuer:always 245 # Copy issuer details 246 # issuerAltName=issuer:copy 259 # issuerAltName=issuer:copy 260 authorityKeyIdentifier=keyid:always,issuer:always 293 authorityKeyIdentifier=keyid,issuer:always 303 # issuerAltName=issuer:copy
|
D | crl.c | 109 int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0; in MAIN() local 200 issuer= ++num; in MAIN() 280 if (issuer == i) in MAIN()
|
D | client.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
|
/external/openssl/crypto/ocsp/ |
D | ocsp_lib.c | 75 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer) in OCSP_cert_to_id() argument 90 iname = X509_get_subject_name(issuer); in OCSP_cert_to_id() 93 ikey = X509_get0_pubkey_bitstr(issuer); in OCSP_cert_to_id()
|
D | ocsp_ext.c | 511 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls) in OCSP_url_svcloc_new() argument 519 if (!(sloc->issuer = X509_NAME_dup(issuer))) goto err; in OCSP_url_svcloc_new()
|
D | ocsp.h | 349 X509_NAME* issuer; member 409 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); 488 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
|
/external/wpa_supplicant/ |
D | x509v3.h | 39 struct x509_name issuer; member 99 int x509_certificate_check_signature(struct x509_certificate *issuer,
|
D | x509v3.c | 53 x509_free_name(&cert->issuer); in x509_certificate_free() 1050 if (x509_parse_name(pos, end - pos, &cert->issuer, &pos)) in x509_parse_tbs_certificate() 1052 x509_name_string(&cert->issuer, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate() 1303 int x509_certificate_check_signature(struct x509_certificate *issuer, in x509_certificate_check_signature() argument 1323 pk = crypto_public_key_import(issuer->public_key, in x509_certificate_check_signature() 1324 issuer->public_key_len); in x509_certificate_check_signature() 1566 if (x509_name_compare(&cert->issuer, in x509_certificate_chain_validate() 1601 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate() 1673 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
|
/external/openssl/include/openssl/ |
D | x509_vfy.h | 195 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 196 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ 242 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ 243 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ 394 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
|
D | ocsp.h | 349 X509_NAME* issuer; member 409 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); 488 X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
|
/external/openssl/crypto/pkcs7/ |
D | server.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
|
D | pk7_lib.c | 378 if (!X509_NAME_set(&p7i->issuer_and_serial->issuer, in PKCS7_SIGNER_INFO_set() 529 if (!X509_NAME_set(&p7i->issuer_and_serial->issuer, in PKCS7_RECIP_INFO_set() 552 si->issuer_and_serial->issuer, in PKCS7_cert_from_signer_info()
|
/external/openssl/crypto/asn1/ |
D | x_crl.c | 97 ASN1_SIMPLE(X509_CRL_INFO, issuer, X509_NAME),
|