/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | ts.c | 100 char *signer, char *chain, const char *policy, 106 char *signer, char *chain, 149 char *signer = NULL; local 235 } else if (strcmp(*argv, "-signer") == 0) { 238 signer = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 650 char *signer, char *chain, const char *policy, 678 passin, inkey, signer, chain, policy); 774 char *signer, cha 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | cms.c | 128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 381 } else if (!strcmp(*args, "-signer")) { 384 /* If previous -signer argument add signer to list */ 427 /* If previous -inkey arument add signer to list */ 430 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 539 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 542 /* Check to see if any final signer needs to be appended */ 554 BIO_printf(bio_err, "No signer certificate specified\n"); 609 "-nointern don't search certificates in message for signer\ [all...] |
H A D | ocsp.c | 148 X509 *signer = NULL, *rsigner = NULL; local 292 } else if (!strcmp(*args, "-signer")) { 505 "-signer file certificate to sign OCSP request with\n"); 550 "-verify_other file additional certificates to search for signer\n"); 554 "-no_intern don't search certificates contained in response for signer\n"); 677 signer = load_cert(bio_err, signfile, FORMAT_PEM, 678 NULL, e, "signer certificate"); 679 if (!signer) { 680 BIO_printf(bio_err, "Error loading signer certificate\n"); 685 NULL, e, "signer certificate [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | ts.c | 100 char *signer, char *chain, const char *policy, 106 char *signer, char *chain, 149 char *signer = NULL; local 235 } else if (strcmp(*argv, "-signer") == 0) { 238 signer = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 650 char *signer, char *chain, const char *policy, 678 passin, inkey, signer, chain, policy); 774 char *signer, cha 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | cms.c | 128 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 381 } else if (!strcmp(*args, "-signer")) { 384 /* If previous -signer argument add signer to list */ 427 /* If previous -inkey arument add signer to list */ 430 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 539 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 542 /* Check to see if any final signer needs to be appended */ 554 BIO_printf(bio_err, "No signer certificate specified\n"); 609 "-nointern don't search certificates in message for signer\ [all...] |
H A D | ocsp.c | 148 X509 *signer = NULL, *rsigner = NULL; local 292 } else if (!strcmp(*args, "-signer")) { 505 "-signer file certificate to sign OCSP request with\n"); 550 "-verify_other file additional certificates to search for signer\n"); 554 "-no_intern don't search certificates contained in response for signer\n"); 677 signer = load_cert(bio_err, signfile, FORMAT_PEM, 678 NULL, e, "signer certificate"); 679 if (!signer) { 680 BIO_printf(bio_err, "Error loading signer certificate\n"); 685 NULL, e, "signer certificate [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | rsa.cpp | 133 RSASS<PKCS1v15, SHA>::Signer signer(*this); 134 RSASS<PKCS1v15, SHA>::Verifier verifier(signer); 135 SignaturePairwiseConsistencyTest_FIPS_140_Only(signer, verifier);
|
H A D | validat2.cpp | 744 ESIGN<SHA>::Signer signer(keys); 745 ESIGN<SHA>::Verifier verifier(signer); 747 fail = !SignatureValidate(signer, verifier); 757 signer.AccessKey().GenerateRandom(GlobalRNG(), MakeParameters("Seed", ConstByteArrayParameter((const byte *)"test", 4))("KeySize", 3*512)); 758 verifier = signer; 760 fail = !SignatureValidate(signer, verifier);
|
H A D | datatest.cpp | 190 std::auto_ptr<PK_Signer> signer(ObjectFactoryRegistry<PK_Signer>::Registry().CreateObject(name.c_str())); 222 signer->AccessMaterial().Load(StringStore(GetDecodedDatum(v, "PrivateKey")).Ref()); 224 signer->AccessMaterial().AssignFrom(pairs); 228 TestKeyPairValidAndConsistent(verifier->AccessMaterial(), signer->GetMaterial()); 232 SignerFilter f(GlobalRNG(), *signer, new HexEncoder(new FileSink(cout))); local
|
H A D | fipsalgt.cpp | 323 typename ECDSA<EC, SHA1>::Signer signer(priv); 324 SecByteBlock sig(signer.SignatureLength()); 325 StringSource(m_data["Msg"], true, new HexDecoder(new SignerFilter(m_rng, signer, new ArraySink(sig, sig.size())))); 499 DSA::Signer signer(priv); 500 DSA::Verifier pub(signer); 504 SecByteBlock sig(signer.SignatureLength()); 505 StringSource(m_data["Msg"], true, new HexDecoder(new SignerFilter(m_rng, signer, new ArraySink(sig, sig.size()))));
|
H A D | filters.h | 388 SignerFilter(RandomNumberGenerator &rng, const PK_Signer &signer, BufferedTransformation *attachment = NULL, bool putMessage=false) argument 389 : m_rng(rng), m_signer(signer), m_messageAccumulator(signer.NewSignatureAccumulator(rng)), m_putMessage(putMessage) {Detach(attachment);}
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | smime.c | 97 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 257 else if (!strcmp (*args, "-signer")) 388 BIO_printf(bio_err, "No signer certificate specified\n"); 439 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\n"); 447 BIO_printf (bio_err, "-signer file signer certificate file\n"); 451 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n"); 462 BIO_printf (bio_err, "-crl_check check revocation status of signer's certificate using CRLs\n"); 463 BIO_printf (bio_err, "-crl_check_all check revocation status of signer's certificate chain using CRLs\n"); 543 if (!(signer [all...] |
H A D | ocsp.c | 110 X509 *signer = NULL, *rsigner = NULL; local 243 else if (!strcmp(*args, "-signer")) 517 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n"); 539 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n"); 541 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n"); 646 signer = load_cert(bio_err, signfile, FORMAT_PEM, 647 NULL, e, "signer certificate"); 648 if (!signer) 650 BIO_printf(bio_err, "Error loading signer certificate\n"); 656 NULL, e, "signer certificate [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms.h | 264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 278 X509 **signer, X509_ALGOR **pdig,
|
H A D | cms_asn1.c | 90 /* Minor tweak to operation: free up signer key, cert */ 98 if (si->signer) 99 X509_free(si->signer);
|
H A D | cms_lcl.h | 137 X509 *signer; member in struct:CMS_SignerInfo_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms.h | 264 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 270 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 278 X509 **signer, X509_ALGOR **pdig,
|
H A D | cms_asn1.c | 90 /* Minor tweak to operation: free up signer key, cert */ 98 if (si->signer) 99 X509_free(si->signer);
|
H A D | cms_lcl.h | 137 X509 *signer; member in struct:CMS_SignerInfo_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ocsp/ |
H A D | ocsp.h | 435 X509 *signer, 483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ocsp.h | 419 X509 *signer, 466 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/ |
H A D | ocsp.h | 419 X509 *signer, 466 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ocsp/ |
H A D | ocsp.h | 435 X509 *signer, 483 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_rsp_sign.c | 203 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument 205 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { 212 ctx->signer_cert = signer; 652 /* Setting TSA name to subject of signer certificate. */ 734 /* Add signer certificate and optional certificate chain. */ 745 /* Add a new signer info. */ 752 /* Add content type signed attribute to the signer info. */ 761 * Create the ESS SigningCertificate attribute which contains the signer 768 /* Add SigningCertificate signed attribute to the signer info. */ 790 /* Create the signature and add it to the signer inf [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 203 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument 205 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { 212 ctx->signer_cert = signer; 652 /* Setting TSA name to subject of signer certificate. */ 734 /* Add signer certificate and optional certificate chain. */ 745 /* Add a new signer info. */ 752 /* Add content type signed attribute to the signer info. */ 761 * Create the ESS SigningCertificate attribute which contains the signer 768 /* Add SigningCertificate signed attribute to the signer info. */ 790 /* Create the signature and add it to the signer inf [all...] |