Home
last modified time | relevance | path

Searched refs:subj (Results 1 - 23 of 23) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dest.c394 X509_NAME *subj = NULL; in generate_csr() local
463 subj = X509_NAME_new(); in generate_csr()
464 if (subj == NULL || in generate_csr()
465 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, in generate_csr()
468 !X509_REQ_set_subject_name(req, subj)) in generate_csr()
470 X509_NAME_free(subj); in generate_csr()
471 subj = NULL; in generate_csr()
590 if (subj) in generate_csr()
591 X509_NAME_free(subj); in generate_csr()
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dest.c394 X509_NAME *subj = NULL; in generate_csr() local
463 subj = X509_NAME_new(); in generate_csr()
464 if (subj == NULL || in generate_csr()
465 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, in generate_csr()
468 !X509_REQ_set_subject_name(req, subj)) in generate_csr()
470 X509_NAME_free(subj); in generate_csr()
471 subj = NULL; in generate_csr()
590 if (subj) in generate_csr()
591 X509_NAME_free(subj); in generate_csr()
/third_party/node/deps/openssl/openssl/apps/
H A Dreq.c124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"},
255 char *req_exts = NULL, *subj = NULL; in req_main() local
436 subj = opt_arg(); in req_main()
742 * subj is expected to be in the format /type0=value0/type1=value1/type2=... in req_main()
745 if (subj != NULL in req_main()
746 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in req_main()
798 /* Note that -x509 can take over -key and -subj option values. */ in req_main()
909 if (subj != NULL && !newreq && !gen_x509) { in req_main()
1139 X509_NAME *subj = X509_REQ_get_subject_name(req); in prompt_info() local
1218 if (!add_DN_object(subj, in prompt_info()
1301 X509_NAME *subj; auto_info() local
[all...]
H A Dca.c97 BIGNUM *serial, const char *subj, unsigned long chtype,
109 BIGNUM *serial, const char *subj, unsigned long chtype,
118 BIGNUM *serial, const char *subj, unsigned long chtype,
126 const char *subj, unsigned long chtype, int multirdn,
193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"},
284 const char *serialfile = NULL, *subj = NULL; in ca_main() local
342 subj = opt_arg(); in ca_main()
968 attribs, db, serial, subj, chtype, multirdn, in ca_main()
989 db, serial, subj, chtype, multirdn, email_dn, in ca_main()
1010 serial, subj, chtyp in ca_main()
1377 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument
1435 certify_cert(X509 **xret, const char *infile, int certformat, const char *passin, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_cert() argument
1492 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument
1993 certify_spkac(X509 **xret, const char *infile, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_spkac() argument
[all...]
H A Dx509.c140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"},
264 char *subj = NULL, *digest = NULL; in x509_main() local
427 subj = opt_arg(); in x509_main()
641 if (subj == NULL) { in x509_main()
643 "The -new option requires a subject to be set using -subj\n"); in x509_main()
652 if (subj != NULL in x509_main()
653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in x509_main()
/third_party/openssl/apps/
H A Dreq.c124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"},
255 char *req_exts = NULL, *subj = NULL; in req_main() local
436 subj = opt_arg(); in req_main()
740 * subj is expected to be in the format /type0=value0/type1=value1/type2=... in req_main()
743 if (subj != NULL in req_main()
744 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in req_main()
796 /* Note that -x509 can take over -key and -subj option values. */ in req_main()
907 if (subj != NULL && !newreq && !gen_x509) { in req_main()
1137 X509_NAME *subj = X509_REQ_get_subject_name(req); in prompt_info() local
1216 if (!add_DN_object(subj, in prompt_info()
1299 X509_NAME *subj; auto_info() local
[all...]
H A Dca.c97 BIGNUM *serial, const char *subj, unsigned long chtype,
109 BIGNUM *serial, const char *subj, unsigned long chtype,
118 BIGNUM *serial, const char *subj, unsigned long chtype,
126 const char *subj, unsigned long chtype, int multirdn,
193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"},
284 const char *serialfile = NULL, *subj = NULL; in ca_main() local
342 subj = opt_arg(); in ca_main()
954 attribs, db, serial, subj, chtype, multirdn, in ca_main()
975 db, serial, subj, chtype, multirdn, email_dn, in ca_main()
996 serial, subj, chtyp in ca_main()
1357 certify(X509 **xret, const char *infile, int informat, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) certify() argument
1415 certify_cert(X509 **xret, const char *infile, int certformat, const char *passin, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(OPENSSL_STRING) *vfyopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_cert() argument
1472 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, int batch, int verbose, X509_REQ *req, const char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign, unsigned long dateopt) do_body() argument
1973 certify_spkac(X509 **xret, const char *infile, EVP_PKEY *pkey, X509 *x509, const char *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, const char *subj, unsigned long chtype, int multirdn, int email_dn, const char *startdate, const char *enddate, long days, const char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, unsigned long dateopt) certify_spkac() argument
[all...]
H A Dx509.c140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"},
264 char *subj = NULL, *digest = NULL; in x509_main() local
427 subj = opt_arg(); in x509_main()
641 if (subj == NULL) { in x509_main()
643 "The -new option requires a subject to be set using -subj\n"); in x509_main()
652 if (subj != NULL in x509_main()
653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) in x509_main()
/third_party/mbedtls/tests/data_files/
H A DMakefile91 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -utf8 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@
95 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@
99 $(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -set_serial 3 -config $(test_ca_config_file) -sha1 -days 3653 -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@
105 $(OPENSSL) req -new -subj "/C=NL/O=PolarSSL/CN=www.example.com" -set_serial 17 -config $(test_ca_config_file) -extensions dns_alt_names -days 3650 -key rsa_pkcs1_1024_clear.pem -out $@
124 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_keyUsage
126 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_subjectAltName
128 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_nsCertType
130 $(OPENSSL) req -new -subj '/CN=etcd' -config $(test_ca_config_file) -key rsa_pkcs1_1024_clear.pem -outform DER -out $@ -reqexts csr_ext_v3_all
176 $(OPENSSL) req -new -config $(test_ca_config_file) -key $(test_ca_key_file_rsa_alt) -subj "/C=NL/O=PolarSSL/CN=PolarSSL Test CA" -out $@
286 $(OPENSSL) req -new -config $(test_ca_config_file) -key test-int-ca.key -subj "/
[all...]
/third_party/skia/tools/skqp/
H A Dmake_apk_list.py105 commit, date, subj = line.split(';', 2)
115 (url, nowrap(apk_name), nowrap(date), commit_url, subj))
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dt_x509.c230 const X509_NAME *subj; in X509_ocspid_print() local
240 subj = X509_get_subject_name(x); in X509_ocspid_print()
241 derlen = i2d_X509_NAME(subj, NULL); in X509_ocspid_print()
246 i2d_X509_NAME(subj, &dertmp); in X509_ocspid_print()
H A Dv3_conf.c446 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, in X509V3_set_ctx() argument
455 ctx->subject_cert = subj; in X509V3_set_ctx()
/third_party/openssl/crypto/x509/
H A Dt_x509.c232 const X509_NAME *subj; in X509_ocspid_print() local
242 subj = X509_get_subject_name(x); in X509_ocspid_print()
243 derlen = i2d_X509_NAME(subj, NULL); in X509_ocspid_print()
248 i2d_X509_NAME(subj, &dertmp); in X509_ocspid_print()
H A Dv3_conf.c446 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, in X509V3_set_ctx() argument
455 ctx->subject_cert = subj; in X509V3_set_ctx()
/third_party/typescript/tests/baselines/reference/
H A DarrayConcat3.js3 type Fn<T extends object> = <U extends T>(subj: U) => U
/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-server.c982 X509_NAME *subj; local
1004 subj = X509_NAME_new();
1005 if (!subj)
1010 lws_tls_openssl_add_nid(subj, nid_list[n],
1017 if (X509_REQ_set_subject_name(req, subj) != 1)
1124 X509_NAME_free(subj);
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_client.c568 char *subj = NULL; in cert_response() local
622 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in cert_response()
648 "rejecting newly enrolled cert with subject: %s", subj); in cert_response()
659 subj, txt); in cert_response()
663 OPENSSL_free(subj); in cert_response()
/third_party/openssl/crypto/cmp/
H A Dcmp_client.c571 char *subj = NULL; in cert_response() local
625 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in cert_response()
651 "rejecting newly enrolled cert with subject: %s", subj); in cert_response()
662 subj, txt); in cert_response()
666 OPENSSL_free(subj); in cert_response()
/third_party/openssl/test/certs/
H A Dmkcert.sh85 openssl req -new -"${OPENSSL_SIGALG}" -subj / -key "${key}.pem" \
/third_party/node/test/fixtures/x509-escaping/
H A Dcreate-certs.js642 writeFileSync(`./subj-${i}-cert.pem`, `${pem}\n`);
/third_party/node/deps/openssl/openssl/apps/lib/
H A Dapps.c655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() local
658 uri, subj, msg); in warn_cert_msg()
659 OPENSSL_free(subj); in warn_cert_msg()
/third_party/openssl/apps/lib/
H A Dapps.c655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); in warn_cert_msg() local
658 uri, subj, msg); in warn_cert_msg()
659 OPENSSL_free(subj); in warn_cert_msg()
/third_party/python/Lib/test/
H A Dtest_mailbox.py105 subj = self._nonascii_msg.splitlines()[1]
106 key = self._box.add(subj.encode('latin-1'))

Completed in 34 milliseconds