/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 165 X509 *signer; local 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 169 *psigner = signer; 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 175 *psigner = signer; 215 X509 *signer, *sca; local 361 X509 *signer; local 431 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer))) 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 160 if (!X509_check_private_key(signer, key)) 170 if(!OCSP_request_add1_cert(req, signer)) goto err; 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp.h | 431 X509 *signer, 478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_rsp_verify.c | 68 X509 *signer, STACK_OF(X509) **chain); 85 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 130 * - Checks if there is one and only one signer. 132 * - Check the extended key usage and key usage fields of the signer 138 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 146 X509 *signer; local 166 /* Check if there is one and only one signer. */ 183 /* Get hold of the signer certificat 231 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument 411 X509 *signer = NULL; local 686 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument [all...] |
H A D | ts_rsp_sign.c | 201 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument 203 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) 210 ctx->signer_cert = signer; 654 /* Setting TSA name to subject of signer certificate. */ 736 /* Add signer certificate and optional certificate chain. */ 750 /* Add a new signer info. */ 758 /* Add content type signed attribute to the signer info. */ 768 the signer certificate id and optionally the certificate chain. */ 773 /* Add SigningCertificate signed attribute to the signer info. */ 796 /* Create the signature and add it to the signer inf [all...] |
H A D | ts.h | 479 * Include the signer certificate and the other specified certificates in 481 * Only the signer certificates is included by default. 542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer); 619 /* Verify the signer's certificate and the signature of the response. */ 634 /* Verify if the TSA name field matches the signer certificate. */
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_smime.c | 270 X509 *signer; local 321 signer = sk_X509_value (signers, k); 323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 407 signer = sk_X509_value (signers, i); 408 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 436 X509 *signer; local 467 signer = NULL; 469 if (certs) signer = X509_find_by_issuer_and_serial (certs, 471 if (!signer [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_sd.c | 301 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 308 if(!X509_check_private_key(signer, pk)) 320 X509_check_purpose(signer, -1, -1); 323 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 326 si->signer = signer; 341 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 441 if (!CMS_add1_cert(cms, signer)) 511 if (si->signer) 519 if (!sk_X509_push(signers, si->signer)) 300 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 529 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 606 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 286 X509 *signer; local 288 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) 323 X509 *signer; local 330 /* Attempt to find all signer certificates */ 343 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 344 if (signer)
|
H A D | cms.h | 243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 247 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 254 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
|
H A D | cms_asn1.c | 89 /* Minor tweak to operation: free up signer key, cert */ 98 if (si->signer) 99 X509_free(si->signer);
|
H A D | cms_lcl.h | 141 X509 *signer; member in struct:CMS_SignerInfo_st
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | smime.c | 101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 254 else if (!strcmp (*args, "-signer")) 258 /* If previous -signer argument add signer to list */ 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 383 /* Check to see if any final signer needs to be appended */ 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 402 BIO_printf(bio_err, "No signer certificate specified\n"); 459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |
H A D | cms.c | 117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 381 else if (!strcmp (*args, "-signer")) 385 /* If previous -signer argument add signer to list */ 429 /* If previous -inkey arument add signer to list */ 434 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 535 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 538 /* Check to see if any final signer needs to be appended */ 552 BIO_printf(bio_err, "No signer certificate specified\n"); 610 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\ [all...] |
H A D | ts.c | 99 char *signer, char *chain, const char *policy, 105 char *signer, char *chain, const char *policy); 147 char *signer = NULL; local 258 else if (strcmp(*argv, "-signer") == 0) 261 signer = *++argv; 351 password, inkey, signer, chain, policy, 378 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 675 char *signer, char *chain, const char *policy, 706 passin, inkey, signer, chain, 802 char *signer, cha 673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | ocsp.c | 141 X509 *signer = NULL, *rsigner = NULL; local 301 else if (!strcmp(*args, "-signer")) 580 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n"); 602 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n"); 604 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n"); 710 signer = load_cert(bio_err, signfile, FORMAT_PEM, 711 NULL, e, "signer certificate"); 712 if (!signer) 714 BIO_printf(bio_err, "Error loading signer certificate\n"); 720 NULL, e, "signer certificate [all...] |
/barrelfish-master/include/openssl/ |
H A D | cms.h | 243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 247 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 254 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
|
H A D | ocsp.h | 431 X509 *signer, 478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
|
H A D | ts.h | 479 * Include the signer certificate and the other specified certificates in 481 * Only the signer certificates is included by default. 542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer); 619 /* Verify the signer's certificate and the signature of the response. */ 634 /* Verify if the TSA name field matches the signer certificate. */
|