• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/

Lines Matching defs:signer

69                           X509 *signer, STACK_OF(X509) **chain);
87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
149 * - Checks if there is one and only one signer.
151 * - Check the extended key usage and key usage fields of the signer
157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
165 X509 *signer;
183 /* Check if there is one and only one signer. */
198 * Get hold of the signer certificate, search only internal certificates
204 signer = sk_X509_value(signers, 0);
207 if (!TS_verify_cert(store, certs, signer, &chain))
211 * Check if the signer certificate is consistent with the ESS extension.
223 j = PKCS7_signatureVerify(p7bio, token, si, signer);
229 /* Return the signer certificate if needed. */
231 *signer_out = signer;
232 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509);
250 X509 *signer, STACK_OF(X509) **chain)
258 if (!X509_STORE_CTX_init(&cert_ctx, store, signer, untrusted))
290 /* The signer certificate must be the first in cert_ids. */
425 * - Check if the TSA name matches the signer.
431 X509 *signer = NULL;
440 && !TS_RESP_verify_signature(token, ctx->certs, ctx->store, &signer))
473 /* Check whether TSA name and signer certificate match. */
475 && tsa_name && !TS_check_signer_name(tsa_name, signer)) {
482 && !TS_check_signer_name(ctx->tsa_name, signer)) {
489 X509_free(signer);
699 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer)
707 && X509_name_cmp(tsa_name->d.dirn, signer->cert_info->subject) == 0)
711 gen_names = X509_get_ext_d2i(signer, NID_subject_alt_name, NULL, &idx);
719 gen_names = X509_get_ext_d2i(signer, NID_subject_alt_name,