Home
last modified time | relevance | path

Searched refs:selfsign (Results 1 - 4 of 4) sorted by relevance

/third_party/mbedtls/programs/x509/
H A Dcert_write.c98 " selfsign=%%d default: 0 (false)\n" \
99 " If selfsign is enabled, issuer_name and\n" \
193 int selfsign; /* selfsign the certificate */ member
360 opt.selfsign = DFL_SELFSIGN; in main()
454 } else if (strcmp(p, "selfsign") == 0) { in main()
455 opt.selfsign = atoi(q); in main()
456 if (opt.selfsign < 0 || opt.selfsign > 1) { in main()
712 if (!opt.selfsign in main()
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dca.c102 int default_op, int ext_copy, int selfsign, unsigned long dateopt);
130 int default_op, int ext_copy, int selfsign, unsigned long dateopt);
223 {"selfsign", OPT_SELFSIGN, '-',
296 int rand_ser = 0, i, j, selfsign = 0, def_ret; in ca_main() local
401 selfsign = 1; in ca_main()
600 if (!selfsign || spkac_file || ss_cert_file || gencrl) { in ca_main()
615 if (!selfsign) in ca_main()
1012 certopt, get_nameopt(), default_op, ext_copy, selfsign, dateopt); in ca_main()
1033 certopt, get_nameopt(), default_op, ext_copy, selfsign, dateopt); in ca_main()
1388 int default_op, int ext_copy, int selfsign, unsigne in certify()
1377 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument
1492 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument
[all...]
/third_party/openssl/apps/
H A Dca.c102 int default_op, int ext_copy, int selfsign, unsigned long dateopt);
130 int default_op, int ext_copy, int selfsign, unsigned long dateopt);
223 {"selfsign", OPT_SELFSIGN, '-',
296 int rand_ser = 0, i, j, selfsign = 0, def_ret; in ca_main() local
401 selfsign = 1; in ca_main()
600 if (!selfsign || spkac_file || ss_cert_file || gencrl) { in ca_main()
615 if (!selfsign) in ca_main()
998 certopt, get_nameopt(), default_op, ext_copy, selfsign, dateopt); in ca_main()
1019 certopt, get_nameopt(), default_op, ext_copy, selfsign, dateopt); in ca_main()
1368 int default_op, int ext_copy, int selfsign, unsigne in certify()
1357 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument
1472 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument
[all...]
/third_party/mbedtls/tests/data_files/
H A DMakefile56 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@
68 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 selfsign=1 \
75 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@
83 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test CA" issuer_key=$(test_ca_key_file_rsa) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@
197 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=13926223505202072808 selfsign=1 \
213 $(MBEDTLS_CERT_WRITE) is_ca=1 serial=13926223505202072808 request_file=test-ca2.req.sha256 selfsign=1 \
424 $(MBEDTLS_CERT_WRITE) request_file=cli2.req.sha256 serial=13 selfsign=0 issuer_name="C=NL,O=PolarSSL,CN=PolarSSL Test EC CA" issuer_key=$(test_ca_key_file_ec) issuer_pwd=$(test_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@
2050 selfsign=1 issuer_name="CN=PolarSSL Test CA v1,OU=testing,O=PolarSSL,C=NL" \

Completed in 10 milliseconds