/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
H A D | est.c | 394 X509_NAME *subj = NULL; in generate_csr() local 463 subj = X509_NAME_new(); in generate_csr() 464 if (subj == NULL || in generate_csr() 465 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, in generate_csr() 468 !X509_REQ_set_subject_name(req, subj)) in generate_csr() 470 X509_NAME_free(subj); in generate_csr() 471 subj = NULL; in generate_csr() 590 if (subj) in generate_csr() 591 X509_NAME_free(subj); in generate_csr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
H A D | est.c | 394 X509_NAME *subj = NULL; in generate_csr() local 463 subj = X509_NAME_new(); in generate_csr() 464 if (subj == NULL || in generate_csr() 465 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, in generate_csr() 468 !X509_REQ_set_subject_name(req, subj)) in generate_csr() 470 X509_NAME_free(subj); in generate_csr() 471 subj = NULL; in generate_csr() 590 if (subj) in generate_csr() 591 X509_NAME_free(subj); in generate_csr()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | req.c | 124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"}, 255 char *req_exts = NULL, *subj = NULL; in req_main() local 436 subj = opt_arg(); in req_main() 742 * subj is expected to be in the format /type0=value0/type1=value1/type2=... in req_main() 745 if (subj != NULL in req_main() 746 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in req_main() 798 /* Note that -x509 can take over -key and -subj option values. */ in req_main() 909 if (subj != NULL && !newreq && !gen_x509) { in req_main() 1139 X509_NAME *subj = X509_REQ_get_subject_name(req); in prompt_info() local 1218 if (!add_DN_object(subj, in prompt_info() 1301 X509_NAME *subj; auto_info() local [all...] |
H A D | ca.c | 97 BIGNUM *serial, const char *subj, unsigned long chtype, 109 BIGNUM *serial, const char *subj, unsigned long chtype, 118 BIGNUM *serial, const char *subj, unsigned long chtype, 126 const char *subj, unsigned long chtype, int multirdn, 193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"}, 284 const char *serialfile = NULL, *subj = NULL; in ca_main() local 342 subj = opt_arg(); in ca_main() 968 attribs, db, serial, subj, chtype, multirdn, in ca_main() 989 db, serial, subj, chtype, multirdn, email_dn, in ca_main() 1010 serial, subj, chtyp in ca_main() 1377 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument 1435 certify_cert(X509 **xret, const char *infile, int certformat, const char *passin, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_cert() argument 1492 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument 1993 certify_spkac(X509 **xret, const char *infile, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_spkac() argument [all...] |
H A D | x509.c | 140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"}, 264 char *subj = NULL, *digest = NULL; in x509_main() local 427 subj = opt_arg(); in x509_main() 641 if (subj == NULL) { in x509_main() 643 "The -new option requires a subject to be set using -subj\n"); in x509_main() 652 if (subj != NULL in x509_main() 653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in x509_main()
|
/third_party/openssl/apps/ |
H A D | req.c | 124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"}, 255 char *req_exts = NULL, *subj = NULL; in req_main() local 436 subj = opt_arg(); in req_main() 740 * subj is expected to be in the format /type0=value0/type1=value1/type2=... in req_main() 743 if (subj != NULL in req_main() 744 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in req_main() 796 /* Note that -x509 can take over -key and -subj option values. */ in req_main() 907 if (subj != NULL && !newreq && !gen_x509) { in req_main() 1137 X509_NAME *subj = X509_REQ_get_subject_name(req); in prompt_info() local 1216 if (!add_DN_object(subj, in prompt_info() 1299 X509_NAME *subj; auto_info() local [all...] |
H A D | ca.c | 97 BIGNUM *serial, const char *subj, unsigned long chtype, 109 BIGNUM *serial, const char *subj, unsigned long chtype, 118 BIGNUM *serial, const char *subj, unsigned long chtype, 126 const char *subj, unsigned long chtype, int multirdn, 193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"}, 284 const char *serialfile = NULL, *subj = NULL; in ca_main() local 342 subj = opt_arg(); in ca_main() 954 attribs, db, serial, subj, chtype, multirdn, in ca_main() 975 db, serial, subj, chtype, multirdn, email_dn, in ca_main() 996 serial, subj, chtyp in ca_main() 1357 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument 1415 certify_cert(X509 **xret, const char *infile, int certformat, const char *passin, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_cert() argument 1472 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument 1973 certify_spkac(X509 **xret, const char *infile, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_spkac() argument [all...] |
H A D | x509.c | 140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"}, 264 char *subj = NULL, *digest = NULL; in x509_main() local 427 subj = opt_arg(); in x509_main() 641 if (subj == NULL) { in x509_main() 643 "The -new option requires a subject to be set using -subj\n"); in x509_main() 652 if (subj != NULL in x509_main() 653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in x509_main()
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 91 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -utf8 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@ 95 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@ 99 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@ 105 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=www.example.com" -set_serial 17 -config $(test_ca_config_file) -extensions dns_alt_names -days 3650 -key rsa_pkcs1_1024_clear.pem -out $@ 124 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_keyUsage 126 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_subjectAltName 128 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_nsCertType 130 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_all 176 $(OPENSSL) req -new -config $(test_ca_config_file) -key $(test_ca_key_file_rsa_alt) -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@ 286 $(OPENSSL) req -new -config $(test_ca_config_file) -key test-int-ca.key -subj "/ [all...] |
/third_party/skia/tools/skqp/ |
H A D | make_apk_list.py | 105 commit, date, subj = line.split(';', 2) 115 (url, nowrap(apk_name), nowrap(date), commit_url, subj))
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | t_x509.c | 230 const X509_NAME *subj; in X509_ocspid_print() local 240 subj = X509_get_subject_name(x); in X509_ocspid_print() 241 derlen = i2d_X509_NAME(subj, NULL); in X509_ocspid_print() 246 i2d_X509_NAME(subj, &dertmp); in X509_ocspid_print()
|
H A D | v3_conf.c | 446 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, in X509V3_set_ctx() argument 455 ctx->subject_cert = subj; in X509V3_set_ctx()
|
/third_party/openssl/crypto/x509/ |
H A D | t_x509.c | 232 const X509_NAME *subj; in X509_ocspid_print() local 242 subj = X509_get_subject_name(x); in X509_ocspid_print() 243 derlen = i2d_X509_NAME(subj, NULL); in X509_ocspid_print() 248 i2d_X509_NAME(subj, &dertmp); in X509_ocspid_print()
|
H A D | v3_conf.c | 446 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, in X509V3_set_ctx() argument 455 ctx->subject_cert = subj; in X509V3_set_ctx()
|
/third_party/typescript/tests/baselines/reference/ |
H A D | arrayConcat3.js | 3 type Fn<T extends object> = <U extends T>(subj: U) => U
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-server.c | 982 X509_NAME *subj; local 1004 subj = X509_NAME_new(); 1005 if (!subj) 1010 lws_tls_openssl_add_nid(subj, nid_list[n], 1017 if (X509_REQ_set_subject_name(req, subj) != 1) 1124 X509_NAME_free(subj);
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_client.c | 568 char *subj = NULL; in cert_response() local 622 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in cert_response() 648 "rejecting newly enrolled cert with subject: %s", subj); in cert_response() 659 subj, txt); in cert_response() 663 OPENSSL_free(subj); in cert_response()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_client.c | 571 char *subj = NULL; in cert_response() local 625 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in cert_response() 651 "rejecting newly enrolled cert with subject: %s", subj); in cert_response() 662 subj, txt); in cert_response() 666 OPENSSL_free(subj); in cert_response()
|
/third_party/openssl/test/certs/ |
H A D | mkcert.sh | 85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \
|
/third_party/node/test/fixtures/x509-escaping/ |
H A D | create-certs.js | 642 writeFileSync(`./subj-${i}-cert.pem`, `${pem}\n`);
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | apps.c | 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() local 658 uri, subj, msg); in warn_cert_msg() 659 OPENSSL_free(subj); in warn_cert_msg()
|
/third_party/openssl/apps/lib/ |
H A D | apps.c | 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() local 658 uri, subj, msg); in warn_cert_msg() 659 OPENSSL_free(subj); in warn_cert_msg()
|
/third_party/python/Lib/test/ |
H A D | test_mailbox.py | 105 subj = self._nonascii_msg.splitlines()[1] 106 key = self._box.add(subj.encode('latin-1'))
|