Lines Matching refs:sender
218 * Check if the given cert is acceptable as sender cert of the given message.
265 "sender field", msg->header->sender->d.directoryName))
299 * from extraCerts as trust anchor to validate sender cert -
347 return cert_acceptable(ctx, "previously validated", "sender cert",
384 /* store successful sender cert for further msgs in transaction */
451 X509 *scrt = ctx->validatedSrvCert; /* previous successful sender cert */
452 GENERAL_NAME *sender = msg->header->sender;
459 if (sender == NULL || msg->body == NULL)
461 if (sender->type != GEN_DIRNAME) {
469 /* enable clearing irrelevant errors in attempts to validate sender certs */
483 /* cached sender cert has shown to be no more successfully usable */
499 /* failed finding a sender cert that verifies the message signature */
502 sname = X509_NAME_oneline(sender->d.directoryName, NULL, 0);
508 ossl_cmp_log1(INFO, ctx, "matches msg sender = %s", sname);
520 ERR_add_error_txt(NULL, "for msg sender name = ");
537 * the sender certificate can have been pinned by providing it in ctx->srvCert,
629 } else { /* use pinned sender cert */
650 * its sender is of appropriate type (curently only X509_NAME) and
651 * matches any expected sender or srvCert subject given in the ctx
675 /* validate sender name of received msg */
676 if (hdr->sender->type != GEN_DIRNAME) {
681 * Compare actual sender name of response with expected sender name.
688 if (!check_name(ctx, 0, "sender DN field", hdr->sender->d.directoryName,
689 "expected sender", expected_sender))