Lines Matching +full:pre +full:- +full:fetchable

2  * Copyright 1995-2024 The OpenSSL Project Authors. All Rights Reserved.
47 #define UNSET_DAYS -2 /* -1 may be used for testing expiration checks */
48 #define EXT_COPY_UNSET -1
100 {"help", OPT_HELP, '-', "Display this summary"},
107 {"inform", OPT_INFORM, 'F', "Input format - DER or PEM"},
108 {"verify", OPT_VERIFY, '-', "Verify self-signature on the request"},
111 {"new", OPT_NEW, '-', "New request"},
114 {"utf8", OPT_UTF8, '-', "Input characters are UTF8 (default ASCII)"},
117 {"text", OPT_TEXT, '-', "Text form of request"},
118 {"x509", OPT_X509, '-',
120 {"CA", OPT_CA, '<', "Issuer cert to use for signing a cert, implies -x509"},
122 "Issuer private key to use with -CA; default is -CA arg"},
125 {"subject", OPT_SUBJECT, '-',
127 {"multivalue-rdn", OPT_MULTIVALUE_RDN, '-',
128 "Deprecated; multi-valued RDNs support is always on."},
132 "copy extensions from request when using -x509"},
139 {"precert", OPT_PRECERT, '-',
140 "Add a poison extension to the generated cert (implies -new)"},
143 {"key", OPT_KEY, 's', "Key for signing, and to include unless -in given"},
145 {"pubkey", OPT_PUBKEY, '-', "Output public key"},
154 {"", OPT_MD, '-', "Any supported digest"},
158 {"outform", OPT_OUTFORM, 'F', "Output format - DER or PEM"},
159 {"batch", OPT_BATCH, '-',
161 {"verbose", OPT_VERBOSE, '-', "Verbose output"},
162 {"noenc", OPT_NOENC, '-', "Don't encrypt private keys"},
163 {"nodes", OPT_NODES, '-', "Don't encrypt private keys; deprecated"},
164 {"noout", OPT_NOOUT, '-', "Do not output REQ"},
165 {"newhdr", OPT_NEWHDR, '-', "Output \"NEW\" in the header lines"},
166 {"modulus", OPT_MODULUS, '-', "RSA modulus"},
193 * Return 0 if unique, -1 on runtime error; 1 if found or a syntax error.
207 off = p - kv;
209 return -1;
212 for (p = kv + off; p > kv; --p)
213 if (!isspace(_UC(p[-1])))
228 return -1;
265 long newkey_len = -1;
278 BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
417 if (days < -1) {
418 BIO_printf(bio_err, "%s: -days parameter arg must be >= -1\n",
489 BIO_printf(bio_err, "Ignoring -days without -x509; not generating a certificate\n");
491 BIO_printf(bio_err, "Ignoring -copy_extensions 'none' when -x509 is not given\n");
506 "Using additional configuration from -addext options\n");
533 /* Check that any specified digest is fetchable */
574 BIO_printf(bio_err, "Error checking extensions defined using -addext\n");
649 || EVP_PKEY_CTX_is_a(genctx, "RSA-PSS")
658 || EVP_PKEY_CTX_is_a(genctx, "RSA-PSS")))
738 BIO_printf(bio_err, "-----\n");
761 "Warning: Ignoring -CAkey option since no -CA option is given\n");
766 ? "issuer private key from -CAkey arg"
767 : "issuer private key from -CA arg")) == NULL)
773 "issuer cert from -CA arg")) == NULL)
783 BIO_printf(bio_err, "Must provide a signature key using -key or"
784 " provide -CA / -CAkey\n");
798 /* Note that -x509 can take over -key and -subj option values. */
834 BIO_printf(bio_err, "Warning: No -copy_extensions given; ignoring any extensions in the request\n");
866 BIO_printf(bio_err, "Error adding extensions defined via -addext\n");
870 /* If a pre-cert was requested, we need to add a poison extension */
900 BIO_printf(bio_err, "Error adding extensions defined via -addext\n");
939 BIO_printf(bio_err, "Certificate request self-signature verify failure\n");
941 BIO_printf(bio_err, "Certificate request self-signature verify OK\n");
999 if (EVP_PKEY_is_a(tpubkey, "RSA") || EVP_PKEY_is_a(tpubkey, "RSA-PSS")) {
1153 BIO_printf(bio_err, "-----\n");
1157 i = -1;
1166 type = v->name;
1174 for (p = v->name; *p; p++)
1182 mval = -1;
1190 if (!join(buf, sizeof(buf), v->name, "_default", "Name"))
1197 if (!join(buf, sizeof(buf), v->name, "_value", "Name"))
1204 if (!join(buf, sizeof(buf), v->name, "_min", "Name"))
1208 n_min = -1;
1211 if (!join(buf, sizeof(buf), v->name, "_max", "Name"))
1215 n_max = -1;
1218 if (!add_DN_object(subj, v->value, def, value, nid,
1236 i = -1;
1244 type = v->name;
1268 n_min = -1;
1275 n_max = -1;
1279 v->value, def, value, nid, n_min,
1309 type = v->name;
1313 for (p = v->name; *p; p++) {
1334 mval = -1;
1339 (unsigned char *)v->value, -1, -1,
1352 if (!X509_REQ_add1_attr_by_txt(req, v->name, chtype,
1353 (unsigned char *)v->value, -1))
1374 (unsigned char *)buf, -1, -1, mval))
1394 (unsigned char *)buf, -1)) {
1438 if (buf[i - 1] != '\n') {
1442 buf[--i] = '\0';
1479 tmp = str + slen - elen;
1507 long keylen = -1;
1531 len = p - gstr;
1649 if (keylen == -1 && (EVP_PKEY_CTX_is_a(gctx, "RSA")
1650 || EVP_PKEY_CTX_is_a(gctx, "RSA-PSS")))
1653 if (keylen != -1) {