Searched refs:signer (Results 26 - 50 of 54) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dts.c100 char *signer, char *chain, const char *policy,
106 char *signer, char *chain,
149 char *signer = NULL; local
235 } else if (strcmp(*argv, "-signer") == 0) {
238 signer = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
650 char *signer, char *chain, const char *policy,
678 passin, inkey, signer, chain, policy);
774 char *signer, cha
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A Dcms.c128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
381 } else if (!strcmp(*args, "-signer")) {
384 /* If previous -signer argument add signer to list */
427 /* If previous -inkey arument add signer to list */
430 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
539 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
542 /* Check to see if any final signer needs to be appended */
554 BIO_printf(bio_err, "No signer certificate specified\n");
609 "-nointern don't search certificates in message for signer\
[all...]
H A Docsp.c148 X509 *signer = NULL, *rsigner = NULL; local
292 } else if (!strcmp(*args, "-signer")) {
505 "-signer file certificate to sign OCSP request with\n");
550 "-verify_other file additional certificates to search for signer\n");
554 "-no_intern don't search certificates contained in response for signer\n");
677 signer = load_cert(bio_err, signfile, FORMAT_PEM,
678 NULL, e, "signer certificate");
679 if (!signer) {
680 BIO_printf(bio_err, "Error loading signer certificate\n");
685 NULL, e, "signer certificate
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dts.c100 char *signer, char *chain, const char *policy,
106 char *signer, char *chain,
149 char *signer = NULL; local
235 } else if (strcmp(*argv, "-signer") == 0) {
238 signer = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
650 char *signer, char *chain, const char *policy,
678 passin, inkey, signer, chain, policy);
774 char *signer, cha
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A Dcms.c128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
381 } else if (!strcmp(*args, "-signer")) {
384 /* If previous -signer argument add signer to list */
427 /* If previous -inkey arument add signer to list */
430 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
539 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
542 /* Check to see if any final signer needs to be appended */
554 BIO_printf(bio_err, "No signer certificate specified\n");
609 "-nointern don't search certificates in message for signer\
[all...]
H A Docsp.c148 X509 *signer = NULL, *rsigner = NULL; local
292 } else if (!strcmp(*args, "-signer")) {
505 "-signer file certificate to sign OCSP request with\n");
550 "-verify_other file additional certificates to search for signer\n");
554 "-no_intern don't search certificates contained in response for signer\n");
677 signer = load_cert(bio_err, signfile, FORMAT_PEM,
678 NULL, e, "signer certificate");
679 if (!signer) {
680 BIO_printf(bio_err, "Error loading signer certificate\n");
685 NULL, e, "signer certificate
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Drsa.cpp133 RSASS<PKCS1v15, SHA>::Signer signer(*this);
134 RSASS<PKCS1v15, SHA>::Verifier verifier(signer);
135 SignaturePairwiseConsistencyTest_FIPS_140_Only(signer, verifier);
H A Dvalidat2.cpp744 ESIGN<SHA>::Signer signer(keys);
745 ESIGN<SHA>::Verifier verifier(signer);
747 fail = !SignatureValidate(signer, verifier);
757 signer.AccessKey().GenerateRandom(GlobalRNG(), MakeParameters("Seed", ConstByteArrayParameter((const byte *)"test", 4))("KeySize", 3*512));
758 verifier = signer;
760 fail = !SignatureValidate(signer, verifier);
H A Ddatatest.cpp190 std::auto_ptr<PK_Signer> signer(ObjectFactoryRegistry<PK_Signer>::Registry().CreateObject(name.c_str()));
222 signer->AccessMaterial().Load(StringStore(GetDecodedDatum(v, "PrivateKey")).Ref());
224 signer->AccessMaterial().AssignFrom(pairs);
228 TestKeyPairValidAndConsistent(verifier->AccessMaterial(), signer->GetMaterial());
232 SignerFilter f(GlobalRNG(), *signer, new HexEncoder(new FileSink(cout))); local
H A Dfipsalgt.cpp323 typename ECDSA<EC, SHA1>::Signer signer(priv);
324 SecByteBlock sig(signer.SignatureLength());
325 StringSource(m_data["Msg"], true, new HexDecoder(new SignerFilter(m_rng, signer, new ArraySink(sig, sig.size()))));
499 DSA::Signer signer(priv);
500 DSA::Verifier pub(signer);
504 SecByteBlock sig(signer.SignatureLength());
505 StringSource(m_data["Msg"], true, new HexDecoder(new SignerFilter(m_rng, signer, new ArraySink(sig, sig.size()))));
H A Dfilters.h388 SignerFilter(RandomNumberGenerator &rng, const PK_Signer &signer, BufferedTransformation *attachment = NULL, bool putMessage=false) argument
389 : m_rng(rng), m_signer(signer), m_messageAccumulator(signer.NewSignatureAccumulator(rng)), m_putMessage(putMessage) {Detach(attachment);}
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dsmime.c97 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
257 else if (!strcmp (*args, "-signer"))
388 BIO_printf(bio_err, "No signer certificate specified\n");
439 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n");
447 BIO_printf (bio_err, "-signer file signer certificate file\n");
451 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
462 BIO_printf (bio_err, "-crl_check check revocation status of signer's certificate using CRLs\n");
463 BIO_printf (bio_err, "-crl_check_all check revocation status of signer's certificate chain using CRLs\n");
543 if (!(signer
[all...]
H A Docsp.c110 X509 *signer = NULL, *rsigner = NULL; local
243 else if (!strcmp(*args, "-signer"))
517 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n");
539 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n");
541 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n");
646 signer = load_cert(bio_err, signfile, FORMAT_PEM,
647 NULL, e, "signer certificate");
648 if (!signer)
650 BIO_printf(bio_err, "Error loading signer certificate\n");
656 NULL, e, "signer certificate
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/
H A Dcms.h264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
278 X509 **signer, X509_ALGOR **pdig,
H A Dcms_asn1.c90 /* Minor tweak to operation: free up signer key, cert */
98 if (si->signer)
99 X509_free(si->signer);
H A Dcms_lcl.h137 X509 *signer; member in struct:CMS_SignerInfo_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/
H A Dcms.h264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
278 X509 **signer, X509_ALGOR **pdig,
H A Dcms_asn1.c90 /* Minor tweak to operation: free up signer key, cert */
98 if (si->signer)
99 X509_free(si->signer);
H A Dcms_lcl.h137 X509 *signer; member in struct:CMS_SignerInfo_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ocsp/
H A Docsp.h435 X509 *signer,
483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Docsp.h419 X509 *signer,
466 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/
H A Docsp.h419 X509 *signer,
466 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ocsp/
H A Docsp.h435 X509 *signer,
483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_rsp_sign.c203 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument
205 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) {
212 ctx->signer_cert = signer;
652 /* Setting TSA name to subject of signer certificate. */
734 /* Add signer certificate and optional certificate chain. */
745 /* Add a new signer info. */
752 /* Add content type signed attribute to the signer info. */
761 * Create the ESS SigningCertificate attribute which contains the signer
768 /* Add SigningCertificate signed attribute to the signer info. */
790 /* Create the signature and add it to the signer inf
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_rsp_sign.c203 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument
205 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) {
212 ctx->signer_cert = signer;
652 /* Setting TSA name to subject of signer certificate. */
734 /* Add signer certificate and optional certificate chain. */
745 /* Add a new signer info. */
752 /* Add content type signed attribute to the signer info. */
761 * Create the ESS SigningCertificate attribute which contains the signer
768 /* Add SigningCertificate signed attribute to the signer info. */
790 /* Create the signature and add it to the signer inf
[all...]

Completed in 138 milliseconds

123