Home
last modified time | relevance | path

Searched refs:issuer (Results 1 - 25 of 683) sorted by relevance

12345678910>>...28

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_ocsp.c112 struct x509_certificate *issuer, in tls_process_ocsp_single_response()
180 issuer->subject_dn, issuer->subject_dn_len); in tls_process_ocsp_single_response()
181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response()
182 issuer->subject_dn_len, hash); in tls_process_ocsp_single_response()
205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response()
206 issuer->public_key_len, hash); in tls_process_ocsp_single_response()
320 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses()
339 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses()
365 struct x509_certificate *issuer, *signe in tls_process_basic_ocsp_response() local
110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument
318 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_ocsp.c112 struct x509_certificate *issuer, in tls_process_ocsp_single_response()
174 issuer->subject_dn, issuer->subject_dn_len); in tls_process_ocsp_single_response()
175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response()
176 issuer->subject_dn_len, hash); in tls_process_ocsp_single_response()
197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response()
198 issuer->public_key_len, hash); in tls_process_ocsp_single_response()
313 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses()
330 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses()
356 struct x509_certificate *issuer, *signe in tls_process_basic_ocsp_response() local
110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument
311 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-peer-certificate.js96 const issuer = peerCert.issuerCertificate;
97 assert.strictEqual(issuer.issuerCertificate, issuer);
98 assert.strictEqual(issuer.serialNumber, '4AB16C8DFD6A7D0D2DFCABDF9C4B0E92C6AD0229');
147 const issuer = peerCert.issuerCertificate;
148 assert.strictEqual(issuer.issuerCertificate, issuer);
149 assert.strictEqual(issuer.serialNumber, '32E8197681DA33185867B52885F678BFDBA51727');
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/
H A Dcertificate.js84 const issuer = issuers[i];
85 // Base case - issuer is self
86 if (issuer.equals(certificate)) {
90 // Recursively build path for the issuer
91 const subPaths = this.buildPaths(issuer);
92 // Construct paths by appending the issuer to each subpath
94 paths.push([issuer, ...subPaths[j]]);
104 if (certificate.subject.equals(certificate.issuer)) {
110 // to find the issuer
117 // or issuer/subjec
[all...]
H A Dindex.js56 let issuer;
59 issuer = issuerExtension.valueObj.subs?.[0]?.value.toString('ascii');
62 issuer = cert.extension(OID_FULCIO_ISSUER_V1)?.value.toString('ascii');
65 extensions: { issuer },
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dv3_akid.c52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF()
60 if (akeyid->issuer) { in STACK_OF()
61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF()
90 * an error if the issuer certificate doesn't have a key id.
91 * issuer: use the issuers cert issuer and serial number. The default is
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
126 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID()
127 issuer = 1; in v2i_AUTHORITY_KEYID()
129 issuer in v2i_AUTHORITY_KEYID()
[all...]
H A Dv3_purp.c366 /* Check that issuer public key algorithm matches subject signature algorithm */
545 /* Handle subject key identifier and issuer/authority key identifier */ in ossl_x509v3_cache_extensions()
554 /* Check if subject name matches issuer */ in ossl_x509v3_cache_extensions()
894 * This can be used to prune a set of possible issuer certificates which
897 * 1. issuer_name(subject) == subject_name(issuer)
898 * 2. If akid(subject) exists, it matches the respective issuer fields.
899 * 3. subject signature algorithm == issuer public key algorithm
900 * 4. If key_usage(issuer) exists, it allows for signing subject.
905 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument
909 if ((ret = ossl_x509_likely_issued(issuer, subjec in X509_check_issued()
915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) ossl_x509_likely_issued() argument
943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) ossl_x509_signing_allowed() argument
953 X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) X509_check_akid() argument
[all...]
H A Dx509_cmp.c33 return X509_NAME_cmp(ai->issuer, bi->issuer); in X509_issuer_and_serial_cmp()
47 f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0); in X509_issuer_and_serial_hash()
77 return X509_NAME_cmp(a->cert_info.issuer, b->cert_info.issuer); in X509_issuer_name_cmp()
87 return X509_NAME_cmp(a->crl.issuer, b->crl.issuer); in X509_CRL_cmp()
105 return a->cert_info.issuer; in X509_get_issuer_name()
110 return X509_NAME_hash_ex(x->cert_info.issuer, NULL, NULL, NULL); in X509_issuer_name_hash()
116 return X509_NAME_hash_old(x->cert_info.issuer); in X509_issuer_name_hash_old()
[all...]
H A Dx509_vfy.c39 #define CRL_SCORE_ISSUER_CERT 0x018 /* CRL issuer is certificate issuer */
40 #define CRL_SCORE_SAME_PATH 0x008 /* CRL issuer is on certificate path */
41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */
48 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
57 static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
90 * to match issuer and subject names (i.e., the cert being self-issued) and any
196 * check the security of issuer keys. in check_auth_level()
318 * Find in given STACK_OF(X509) |sk| an issuer cert (if any) of given cert |x|.
319 * The issuer mus
326 X509 *issuer, *rv = NULL; find_issuer() local
344 check_issued(ossl_unused X509_STORE_CTX *ctx, X509 *x, X509 *issuer) check_issued() argument
361 get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) get_issuer_sk() argument
1488 X509 *issuer = NULL; get_crl_delta() local
1528 X509 *issuer = NULL; check_crl() local
2975 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument
3061 X509 *curr, *issuer = NULL; build_chain() local
[all...]
H A Dx509_local.h70 const ASN1_INTEGER *ser, const X509_NAME *issuer);
127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
H A Dx_crl.c31 const X509_NAME *issuer);
70 ASN1_SIMPLE(X509_CRL_INFO, issuer, X509_NAME),
78 * Set CRL entry issuer according to CRL certificate issuer extension. Check
118 rev->issuer = gens;
410 if (!rev->issuer) {
421 for (i = 0; i < sk_GENERAL_NAME_num(rev->issuer); i++) {
422 GENERAL_NAME *gen = sk_GENERAL_NAME_value(rev->issuer, i);
434 const X509_NAME *issuer)
461 if (crl_revoked_issuer_match(crl, issuer, re
[all...]
/third_party/openssl/crypto/x509/
H A Dv3_akid.c52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF()
60 if (akeyid->issuer) { in STACK_OF()
61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF()
90 * an error if the issuer certificate doesn't have a key id.
91 * issuer: use the issuers cert issuer and serial number. The default is
100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local
126 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID()
127 issuer = 1; in v2i_AUTHORITY_KEYID()
129 issuer in v2i_AUTHORITY_KEYID()
[all...]
H A Dv3_purp.c366 /* Check that issuer public key algorithm matches subject signature algorithm */
545 /* Handle subject key identifier and issuer/authority key identifier */ in ossl_x509v3_cache_extensions()
554 /* Check if subject name matches issuer */ in ossl_x509v3_cache_extensions()
894 * This can be used to prune a set of possible issuer certificates which
897 * 1. issuer_name(subject) == subject_name(issuer)
898 * 2. If akid(subject) exists, it matches the respective issuer fields.
899 * 3. subject signature algorithm == issuer public key algorithm
900 * 4. If key_usage(issuer) exists, it allows for signing subject.
905 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument
909 if ((ret = ossl_x509_likely_issued(issuer, subjec in X509_check_issued()
915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) ossl_x509_likely_issued() argument
943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) ossl_x509_signing_allowed() argument
953 X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) X509_check_akid() argument
[all...]
H A Dx509_vfy.c39 #define CRL_SCORE_ISSUER_CERT 0x018 /* CRL issuer is certificate issuer */
40 #define CRL_SCORE_SAME_PATH 0x008 /* CRL issuer is on certificate path */
41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */
48 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
57 static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
90 * to match issuer and subject names (i.e., the cert being self-issued) and any
196 * check the security of issuer keys. in check_auth_level()
318 * Find in given STACK_OF(X509) |sk| an issuer cert (if any) of given cert |x|.
319 * The issuer mus
326 X509 *issuer, *rv = NULL; find_issuer() local
344 check_issued(ossl_unused X509_STORE_CTX *ctx, X509 *x, X509 *issuer) check_issued() argument
361 get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) get_issuer_sk() argument
1488 X509 *issuer = NULL; get_crl_delta() local
1528 X509 *issuer = NULL; check_crl() local
2977 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument
3063 X509 *curr, *issuer = NULL; build_chain() local
[all...]
H A Dx509_cmp.c33 return X509_NAME_cmp(ai->issuer, bi->issuer); in X509_issuer_and_serial_cmp()
47 f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0); in X509_issuer_and_serial_hash()
77 return X509_NAME_cmp(a->cert_info.issuer, b->cert_info.issuer); in X509_issuer_name_cmp()
87 return X509_NAME_cmp(a->crl.issuer, b->crl.issuer); in X509_CRL_cmp()
105 return a->cert_info.issuer; in X509_get_issuer_name()
110 return X509_NAME_hash_ex(x->cert_info.issuer, NULL, NULL, NULL); in X509_issuer_name_hash()
116 return X509_NAME_hash_old(x->cert_info.issuer); in X509_issuer_name_hash_old()
[all...]
H A Dx509_local.h70 const ASN1_INTEGER *ser, const X509_NAME *issuer);
127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
/third_party/curl/tests/libtest/
H A Dlib3102.c30 * subject and issuer attributes of each certificate.
44 char *issuer = NULL; in is_chain_in_order() local
47 /* Find the certificate issuer and subject by enumerating each field */ in is_chain_in_order()
48 for(; slist && (!issuer || !subject); slist = slist->next) { in is_chain_in_order()
53 issuer = slist->data + sizeof(issuer_prefix)-1; in is_chain_in_order()
60 if(subject && issuer) { in is_chain_in_order()
63 printf(" issuer: %s\n", issuer); in is_chain_in_order()
66 /* If the last certificate's issuer matches the current certificate's in is_chain_in_order()
69 fprintf(stderr, "cert %d issuer doe in is_chain_in_order()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ct/
H A Dct_policy.c65 X509_free(ctx->issuer); in CT_POLICY_EVAL_CTX_free()
78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) in CT_POLICY_EVAL_CTX_set1_issuer() argument
80 if (!X509_up_ref(issuer)) in CT_POLICY_EVAL_CTX_set1_issuer()
82 ctx->issuer = issuer; in CT_POLICY_EVAL_CTX_set1_issuer()
104 return ctx->issuer; in CT_POLICY_EVAL_CTX_get0_issuer()
/third_party/openssl/crypto/ct/
H A Dct_policy.c65 X509_free(ctx->issuer); in CT_POLICY_EVAL_CTX_free()
78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) in CT_POLICY_EVAL_CTX_set1_issuer() argument
80 if (!X509_up_ref(issuer)) in CT_POLICY_EVAL_CTX_set1_issuer()
82 ctx->issuer = issuer; in CT_POLICY_EVAL_CTX_set1_issuer()
104 return ctx->issuer; in CT_POLICY_EVAL_CTX_get0_issuer()
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_kari.c59 X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id()
69 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
70 *issuer = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
80 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
81 *issuer = oik->d.issuerAndSerialNumber->issuer; in CMS_RecipientInfo_kari_get0_orig_id()
117 X509_NAME **issuer, ASN1_INTEGER **sno) in CMS_RecipientEncryptedKey_get0_id()
122 if (issuer) in CMS_RecipientEncryptedKey_get0_id()
123 *issuer = rid->d.issuerAndSerialNumber->issuer; in CMS_RecipientEncryptedKey_get0_id()
55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument
113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_kari.c59 X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id()
69 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
70 *issuer = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
80 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id()
81 *issuer = oik->d.issuerAndSerialNumber->issuer; in CMS_RecipientInfo_kari_get0_orig_id()
117 X509_NAME **issuer, ASN1_INTEGER **sno) in CMS_RecipientEncryptedKey_get0_id()
122 if (issuer) in CMS_RecipientEncryptedKey_get0_id()
123 *issuer = rid->d.issuerAndSerialNumber->issuer; in CMS_RecipientEncryptedKey_get0_id()
55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument
113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/ess/
H A Dess_lib.c71 /* Setting the issuer/serial if requested. */ in ESS_CERT_ID_new_init()
83 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_new_init()
180 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_V2_new_init()
199 GENERAL_NAME *issuer; in ess_issuer_serial_cmp() local
201 if (is == NULL || cert == NULL || sk_GENERAL_NAME_num(is->issuer) != 1) in ess_issuer_serial_cmp()
204 issuer = sk_GENERAL_NAME_value(is->issuer, 0); in ess_issuer_serial_cmp()
205 if (issuer->type != GEN_DIRNAME in ess_issuer_serial_cmp()
206 || X509_NAME_cmp(issuer->d.dirn, X509_get_issuer_name(cert)) != 0) in ess_issuer_serial_cmp()
/third_party/openssl/crypto/ess/
H A Dess_lib.c71 /* Setting the issuer/serial if requested. */ in ESS_CERT_ID_new_init()
83 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_new_init()
180 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_V2_new_init()
199 GENERAL_NAME *issuer; in ess_issuer_serial_cmp() local
201 if (is == NULL || cert == NULL || sk_GENERAL_NAME_num(is->issuer) != 1) in ess_issuer_serial_cmp()
204 issuer = sk_GENERAL_NAME_value(is->issuer, 0); in ess_issuer_serial_cmp()
205 if (issuer->type != GEN_DIRNAME in ess_issuer_serial_cmp()
206 || X509_NAME_cmp(issuer->d.dirn, X509_get_issuer_name(cert)) != 0) in ess_issuer_serial_cmp()
/third_party/node/deps/openssl/openssl/crypto/crmf/
H A Dcrmf_lib.c177 OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer, in IMPLEMENT_CRMF_CTRL_FUNC()
182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC()
190 if (!X509_NAME_set(&cid->issuer->d.directoryName, issuer)) in IMPLEMENT_CRMF_CTRL_FUNC()
192 cid->issuer->type = GEN_DIRNAME; in IMPLEMENT_CRMF_CTRL_FUNC()
546 /* retrieves the issuer name of the given cert template or NULL on error */
550 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer()
559 /* retrieves the issuer name of the given CertId or NULL on error */
562 return cid != NULL && cid->issuer->type == GEN_DIRNAME ? in OSSL_CRMF_CERTID_get0_issuer()
563 cid->issuer in OSSL_CRMF_CERTID_get0_issuer()
576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) OSSL_CRMF_CERTTEMPLATE_fill() argument
[all...]
/third_party/openssl/crypto/crmf/
H A Dcrmf_lib.c177 OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer, in IMPLEMENT_CRMF_CTRL_FUNC()
182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC()
190 if (!X509_NAME_set(&cid->issuer->d.directoryName, issuer)) in IMPLEMENT_CRMF_CTRL_FUNC()
192 cid->issuer->type = GEN_DIRNAME; in IMPLEMENT_CRMF_CTRL_FUNC()
546 /* retrieves the issuer name of the given cert template or NULL on error */
550 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer()
559 /* retrieves the issuer name of the given CertId or NULL on error */
562 return cid != NULL && cid->issuer->type == GEN_DIRNAME ? in OSSL_CRMF_CERTID_get0_issuer()
563 cid->issuer in OSSL_CRMF_CERTID_get0_issuer()
576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) OSSL_CRMF_CERTTEMPLATE_fill() argument
[all...]

Completed in 17 milliseconds

12345678910>>...28