/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 112 struct x509_certificate *issuer, in tls_process_ocsp_single_response() 180 issuer->subject_dn, issuer->subject_dn_len); in tls_process_ocsp_single_response() 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 182 issuer->subject_dn_len, hash); in tls_process_ocsp_single_response() 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 206 issuer->public_key_len, hash); in tls_process_ocsp_single_response() 320 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses() 339 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses() 365 struct x509_certificate *issuer, *signe in tls_process_basic_ocsp_response() local 110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument 318 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 112 struct x509_certificate *issuer, in tls_process_ocsp_single_response() 174 issuer->subject_dn, issuer->subject_dn_len); in tls_process_ocsp_single_response() 175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 176 issuer->subject_dn_len, hash); in tls_process_ocsp_single_response() 197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 198 issuer->public_key_len, hash); in tls_process_ocsp_single_response() 313 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses() 330 if (tls_process_ocsp_single_response(conn, cert, issuer, in tls_process_ocsp_responses() 356 struct x509_certificate *issuer, *signe in tls_process_basic_ocsp_response() local 110 tls_process_ocsp_single_response(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len, enum tls_ocsp_result *res) tls_process_ocsp_single_response() argument 311 tls_process_ocsp_responses(struct tlsv1_client *conn, struct x509_certificate *cert, struct x509_certificate *issuer, const u8 *resp, size_t len) tls_process_ocsp_responses() argument [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-peer-certificate.js | 96 const issuer = peerCert.issuerCertificate; 97 assert.strictEqual(issuer.issuerCertificate, issuer); 98 assert.strictEqual(issuer.serialNumber, '4AB16C8DFD6A7D0D2DFCABDF9C4B0E92C6AD0229'); 147 const issuer = peerCert.issuerCertificate; 148 assert.strictEqual(issuer.issuerCertificate, issuer); 149 assert.strictEqual(issuer.serialNumber, '32E8197681DA33185867B52885F678BFDBA51727');
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
H A D | certificate.js | 84 const issuer = issuers[i]; 85 // Base case - issuer is self 86 if (issuer.equals(certificate)) { 90 // Recursively build path for the issuer 91 const subPaths = this.buildPaths(issuer); 92 // Construct paths by appending the issuer to each subpath 94 paths.push([issuer, ...subPaths[j]]); 104 if (certificate.subject.equals(certificate.issuer)) { 110 // to find the issuer 117 // or issuer/subjec [all...] |
H A D | index.js | 56 let issuer; 59 issuer = issuerExtension.valueObj.subs?.[0]?.value.toString('ascii'); 62 issuer = cert.extension(OID_FULCIO_ISSUER_V1)?.value.toString('ascii'); 65 extensions: { issuer },
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_akid.c | 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 60 if (akeyid->issuer) { in STACK_OF() 61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF() 90 * an error if the issuer certificate doesn't have a key id. 91 * issuer: use the issuers cert issuer and serial number. The default is 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 126 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID() 127 issuer = 1; in v2i_AUTHORITY_KEYID() 129 issuer in v2i_AUTHORITY_KEYID() [all...] |
H A D | v3_purp.c | 366 /* Check that issuer public key algorithm matches subject signature algorithm */ 545 /* Handle subject key identifier and issuer/authority key identifier */ in ossl_x509v3_cache_extensions() 554 /* Check if subject name matches issuer */ in ossl_x509v3_cache_extensions() 894 * This can be used to prune a set of possible issuer certificates which 897 * 1. issuer_name(subject) == subject_name(issuer) 898 * 2. If akid(subject) exists, it matches the respective issuer fields. 899 * 3. subject signature algorithm == issuer public key algorithm 900 * 4. If key_usage(issuer) exists, it allows for signing subject. 905 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 909 if ((ret = ossl_x509_likely_issued(issuer, subjec in X509_check_issued() 915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) ossl_x509_likely_issued() argument 943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) ossl_x509_signing_allowed() argument 953 X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) X509_check_akid() argument [all...] |
H A D | x509_cmp.c | 33 return X509_NAME_cmp(ai->issuer, bi->issuer); in X509_issuer_and_serial_cmp() 47 f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0); in X509_issuer_and_serial_hash() 77 return X509_NAME_cmp(a->cert_info.issuer, b->cert_info.issuer); in X509_issuer_name_cmp() 87 return X509_NAME_cmp(a->crl.issuer, b->crl.issuer); in X509_CRL_cmp() 105 return a->cert_info.issuer; in X509_get_issuer_name() 110 return X509_NAME_hash_ex(x->cert_info.issuer, NULL, NULL, NULL); in X509_issuer_name_hash() 116 return X509_NAME_hash_old(x->cert_info.issuer); in X509_issuer_name_hash_old() [all...] |
H A D | x509_vfy.c | 39 #define CRL_SCORE_ISSUER_CERT 0x018 /* CRL issuer is certificate issuer */ 40 #define CRL_SCORE_SAME_PATH 0x008 /* CRL issuer is on certificate path */ 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */ 48 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 57 static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 90 * to match issuer and subject names (i.e., the cert being self-issued) and any 196 * check the security of issuer keys. in check_auth_level() 318 * Find in given STACK_OF(X509) |sk| an issuer cert (if any) of given cert |x|. 319 * The issuer mus 326 X509 *issuer, *rv = NULL; find_issuer() local 344 check_issued(ossl_unused X509_STORE_CTX *ctx, X509 *x, X509 *issuer) check_issued() argument 361 get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) get_issuer_sk() argument 1488 X509 *issuer = NULL; get_crl_delta() local 1528 X509 *issuer = NULL; check_crl() local 2975 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument 3061 X509 *curr, *issuer = NULL; build_chain() local [all...] |
H A D | x509_local.h | 70 const ASN1_INTEGER *ser, const X509_NAME *issuer); 127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
H A D | x_crl.c | 31 const X509_NAME *issuer); 70 ASN1_SIMPLE(X509_CRL_INFO, issuer, X509_NAME), 78 * Set CRL entry issuer according to CRL certificate issuer extension. Check 118 rev->issuer = gens; 410 if (!rev->issuer) { 421 for (i = 0; i < sk_GENERAL_NAME_num(rev->issuer); i++) { 422 GENERAL_NAME *gen = sk_GENERAL_NAME_value(rev->issuer, i); 434 const X509_NAME *issuer) 461 if (crl_revoked_issuer_match(crl, issuer, re [all...] |
/third_party/openssl/crypto/x509/ |
H A D | v3_akid.c | 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL, in STACK_OF() 60 if (akeyid->issuer) { in STACK_OF() 61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); in STACK_OF() 90 * an error if the issuer certificate doesn't have a key id. 91 * issuer: use the issuers cert issuer and serial number. The default is 100 char keyid = 0, issuer = 0; in v2i_AUTHORITY_KEYID() local 126 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID() 127 issuer = 1; in v2i_AUTHORITY_KEYID() 129 issuer in v2i_AUTHORITY_KEYID() [all...] |
H A D | v3_purp.c | 366 /* Check that issuer public key algorithm matches subject signature algorithm */ 545 /* Handle subject key identifier and issuer/authority key identifier */ in ossl_x509v3_cache_extensions() 554 /* Check if subject name matches issuer */ in ossl_x509v3_cache_extensions() 894 * This can be used to prune a set of possible issuer certificates which 897 * 1. issuer_name(subject) == subject_name(issuer) 898 * 2. If akid(subject) exists, it matches the respective issuer fields. 899 * 3. subject signature algorithm == issuer public key algorithm 900 * 4. If key_usage(issuer) exists, it allows for signing subject. 905 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 909 if ((ret = ossl_x509_likely_issued(issuer, subjec in X509_check_issued() 915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) ossl_x509_likely_issued() argument 943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) ossl_x509_signing_allowed() argument 953 X509_check_akid(const X509 *issuer, const AUTHORITY_KEYID *akid) X509_check_akid() argument [all...] |
H A D | x509_vfy.c | 39 #define CRL_SCORE_ISSUER_CERT 0x018 /* CRL issuer is certificate issuer */ 40 #define CRL_SCORE_SAME_PATH 0x008 /* CRL issuer is on certificate path */ 41 #define CRL_SCORE_AKID 0x004 /* CRL issuer matches CRL AKID */ 48 static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 57 static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 90 * to match issuer and subject names (i.e., the cert being self-issued) and any 196 * check the security of issuer keys. in check_auth_level() 318 * Find in given STACK_OF(X509) |sk| an issuer cert (if any) of given cert |x|. 319 * The issuer mus 326 X509 *issuer, *rv = NULL; find_issuer() local 344 check_issued(ossl_unused X509_STORE_CTX *ctx, X509 *x, X509 *issuer) check_issued() argument 361 get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) get_issuer_sk() argument 1488 X509 *issuer = NULL; get_crl_delta() local 1528 X509 *issuer = NULL; check_crl() local 2977 get1_trusted_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *cert) get1_trusted_issuer() argument 3063 X509 *curr, *issuer = NULL; build_chain() local [all...] |
H A D | x509_cmp.c | 33 return X509_NAME_cmp(ai->issuer, bi->issuer); in X509_issuer_and_serial_cmp() 47 f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0); in X509_issuer_and_serial_hash() 77 return X509_NAME_cmp(a->cert_info.issuer, b->cert_info.issuer); in X509_issuer_name_cmp() 87 return X509_NAME_cmp(a->crl.issuer, b->crl.issuer); in X509_CRL_cmp() 105 return a->cert_info.issuer; in X509_get_issuer_name() 110 return X509_NAME_hash_ex(x->cert_info.issuer, NULL, NULL, NULL); in X509_issuer_name_hash() 116 return X509_NAME_hash_old(x->cert_info.issuer); in X509_issuer_name_hash_old() [all...] |
H A D | x509_local.h | 70 const ASN1_INTEGER *ser, const X509_NAME *issuer); 127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
/third_party/curl/tests/libtest/ |
H A D | lib3102.c | 30 * subject and issuer attributes of each certificate. 44 char *issuer = NULL; in is_chain_in_order() local 47 /* Find the certificate issuer and subject by enumerating each field */ in is_chain_in_order() 48 for(; slist && (!issuer || !subject); slist = slist->next) { in is_chain_in_order() 53 issuer = slist->data + sizeof(issuer_prefix)-1; in is_chain_in_order() 60 if(subject && issuer) { in is_chain_in_order() 63 printf(" issuer: %s\n", issuer); in is_chain_in_order() 66 /* If the last certificate's issuer matches the current certificate's in is_chain_in_order() 69 fprintf(stderr, "cert %d issuer doe in is_chain_in_order() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_policy.c | 65 X509_free(ctx->issuer); in CT_POLICY_EVAL_CTX_free() 78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) in CT_POLICY_EVAL_CTX_set1_issuer() argument 80 if (!X509_up_ref(issuer)) in CT_POLICY_EVAL_CTX_set1_issuer() 82 ctx->issuer = issuer; in CT_POLICY_EVAL_CTX_set1_issuer() 104 return ctx->issuer; in CT_POLICY_EVAL_CTX_get0_issuer()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_policy.c | 65 X509_free(ctx->issuer); in CT_POLICY_EVAL_CTX_free() 78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) in CT_POLICY_EVAL_CTX_set1_issuer() argument 80 if (!X509_up_ref(issuer)) in CT_POLICY_EVAL_CTX_set1_issuer() 82 ctx->issuer = issuer; in CT_POLICY_EVAL_CTX_set1_issuer() 104 return ctx->issuer; in CT_POLICY_EVAL_CTX_get0_issuer()
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 59 X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() 69 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id() 70 *issuer = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 80 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id() 81 *issuer = oik->d.issuerAndSerialNumber->issuer; in CMS_RecipientInfo_kari_get0_orig_id() 117 X509_NAME **issuer, ASN1_INTEGER **sno) in CMS_RecipientEncryptedKey_get0_id() 122 if (issuer) in CMS_RecipientEncryptedKey_get0_id() 123 *issuer = rid->d.issuerAndSerialNumber->issuer; in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 59 X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() 69 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id() 70 *issuer = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 80 if (issuer) in CMS_RecipientInfo_kari_get0_orig_id() 81 *issuer = oik->d.issuerAndSerialNumber->issuer; in CMS_RecipientInfo_kari_get0_orig_id() 117 X509_NAME **issuer, ASN1_INTEGER **sno) in CMS_RecipientEncryptedKey_get0_id() 122 if (issuer) in CMS_RecipientEncryptedKey_get0_id() 123 *issuer = rid->d.issuerAndSerialNumber->issuer; in CMS_RecipientEncryptedKey_get0_id() 55 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientInfo_kari_get0_orig_id() argument 113 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) CMS_RecipientEncryptedKey_get0_id() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ess/ |
H A D | ess_lib.c | 71 /* Setting the issuer/serial if requested. */ in ESS_CERT_ID_new_init() 83 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_new_init() 180 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_V2_new_init() 199 GENERAL_NAME *issuer; in ess_issuer_serial_cmp() local 201 if (is == NULL || cert == NULL || sk_GENERAL_NAME_num(is->issuer) != 1) in ess_issuer_serial_cmp() 204 issuer = sk_GENERAL_NAME_value(is->issuer, 0); in ess_issuer_serial_cmp() 205 if (issuer->type != GEN_DIRNAME in ess_issuer_serial_cmp() 206 || X509_NAME_cmp(issuer->d.dirn, X509_get_issuer_name(cert)) != 0) in ess_issuer_serial_cmp()
|
/third_party/openssl/crypto/ess/ |
H A D | ess_lib.c | 71 /* Setting the issuer/serial if requested. */ in ESS_CERT_ID_new_init() 83 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_new_init() 180 if (!sk_GENERAL_NAME_push(cid->issuer_serial->issuer, name)) in ESS_CERT_ID_V2_new_init() 199 GENERAL_NAME *issuer; in ess_issuer_serial_cmp() local 201 if (is == NULL || cert == NULL || sk_GENERAL_NAME_num(is->issuer) != 1) in ess_issuer_serial_cmp() 204 issuer = sk_GENERAL_NAME_value(is->issuer, 0); in ess_issuer_serial_cmp() 205 if (issuer->type != GEN_DIRNAME in ess_issuer_serial_cmp() 206 || X509_NAME_cmp(issuer->d.dirn, X509_get_issuer_name(cert)) != 0) in ess_issuer_serial_cmp()
|
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 177 OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer, in IMPLEMENT_CRMF_CTRL_FUNC() 182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC() 190 if (!X509_NAME_set(&cid->issuer->d.directoryName, issuer)) in IMPLEMENT_CRMF_CTRL_FUNC() 192 cid->issuer->type = GEN_DIRNAME; in IMPLEMENT_CRMF_CTRL_FUNC() 546 /* retrieves the issuer name of the given cert template or NULL on error */ 550 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer() 559 /* retrieves the issuer name of the given CertId or NULL on error */ 562 return cid != NULL && cid->issuer->type == GEN_DIRNAME ? in OSSL_CRMF_CERTID_get0_issuer() 563 cid->issuer in OSSL_CRMF_CERTID_get0_issuer() 576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) OSSL_CRMF_CERTTEMPLATE_fill() argument [all...] |
/third_party/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 177 OSSL_CRMF_CERTID *OSSL_CRMF_CERTID_gen(const X509_NAME *issuer, in IMPLEMENT_CRMF_CTRL_FUNC() 182 if (issuer == NULL || serial == NULL) { in IMPLEMENT_CRMF_CTRL_FUNC() 190 if (!X509_NAME_set(&cid->issuer->d.directoryName, issuer)) in IMPLEMENT_CRMF_CTRL_FUNC() 192 cid->issuer->type = GEN_DIRNAME; in IMPLEMENT_CRMF_CTRL_FUNC() 546 /* retrieves the issuer name of the given cert template or NULL on error */ 550 return tmpl != NULL ? tmpl->issuer : NULL; in OSSL_CRMF_CERTTEMPLATE_get0_issuer() 559 /* retrieves the issuer name of the given CertId or NULL on error */ 562 return cid != NULL && cid->issuer->type == GEN_DIRNAME ? in OSSL_CRMF_CERTID_get0_issuer() 563 cid->issuer in OSSL_CRMF_CERTID_get0_issuer() 576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) OSSL_CRMF_CERTTEMPLATE_fill() argument [all...] |