Searched refs:signer (Results 1 - 20 of 20) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/
H A Docsp_vfy.c78 X509 *signer, *x; local
82 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
93 skey = X509_get_pubkey(signer);
106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL);
108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs);
165 X509 *signer; local
167 if ((signer = ocsp_find_signer_sk(certs, rid)))
169 *psigner = signer;
173 (signer = ocsp_find_signer_sk(bs->certs, rid)))
175 *psigner = signer;
215 X509 *signer, *sca; local
361 X509 *signer; local
431 X509 *signer; local
[all...]
H A Docsp_srv.c209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
215 if (!X509_check_private_key(signer, key))
223 if(!OCSP_basic_add1_cert(brsp, signer))
237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
247 X509_get_subject_name(signer)))
208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_cl.c144 X509 *signer,
154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
160 if (!X509_check_private_key(signer, key))
170 if(!OCSP_request_add1_cert(req, signer)) goto err;
143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp.h431 X509 *signer,
478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/
H A Dts_rsp_verify.c68 X509 *signer, STACK_OF(X509) **chain);
85 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
130 * - Checks if there is one and only one signer.
132 * - Check the extended key usage and key usage fields of the signer
138 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
146 X509 *signer; local
166 /* Check if there is one and only one signer. */
183 /* Get hold of the signer certificat
231 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument
411 X509 *signer = NULL; local
686 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument
[all...]
H A Dts_rsp_sign.c201 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) argument
203 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1)
210 ctx->signer_cert = signer;
654 /* Setting TSA name to subject of signer certificate. */
736 /* Add signer certificate and optional certificate chain. */
750 /* Add a new signer info. */
758 /* Add content type signed attribute to the signer info. */
768 the signer certificate id and optionally the certificate chain. */
773 /* Add SigningCertificate signed attribute to the signer info. */
796 /* Create the signature and add it to the signer inf
[all...]
H A Dts.h479 * Include the signer certificate and the other specified certificates in
481 * Only the signer certificates is included by default.
542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
619 /* Verify the signer's certificate and the signature of the response. */
634 /* Verify if the TSA name field matches the signer certificate. */
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/
H A Dpk7_smime.c270 X509 *signer; local
321 signer = sk_X509_value (signers, k);
323 if(!X509_STORE_CTX_init(&cert_ctx, store, signer,
331 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) {
407 signer = sk_X509_value (signers, i);
408 j=PKCS7_signatureVerify(p7bio,p7,si, signer);
436 X509 *signer; local
467 signer = NULL;
469 if (certs) signer = X509_find_by_issuer_and_serial (certs,
471 if (!signer
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_sd.c301 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
308 if(!X509_check_private_key(signer, pk))
320 X509_check_purpose(signer, -1, -1);
323 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509);
326 si->signer = signer;
341 if (!cms_set1_SignerIdentifier(si->sid, signer, type))
441 if (!CMS_add1_cert(cms, signer))
511 if (si->signer)
519 if (!sk_X509_push(signers, si->signer))
300 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument
529 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument
606 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument
[all...]
H A Dcms_smime.c286 X509 *signer; local
288 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
289 if (!X509_STORE_CTX_init(&ctx, store, signer, certs))
323 X509 *signer; local
330 /* Attempt to find all signer certificates */
343 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
344 if (signer)
H A Dcms.h243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
247 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
254 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
H A Dcms_asn1.c89 /* Minor tweak to operation: free up signer key, cert */
98 if (si->signer)
99 X509_free(si->signer);
H A Dcms_lcl.h141 X509 *signer; member in struct:CMS_SignerInfo_st
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dsmime.c101 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
254 else if (!strcmp (*args, "-signer"))
258 /* If previous -signer argument add signer to list */
296 /* If previous -inkey arument add signer to list */
301 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
383 /* Check to see if any final signer needs to be appended */
386 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
402 BIO_printf(bio_err, "No signer certificate specified\n");
459 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\
[all...]
H A Dcms.c117 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
381 else if (!strcmp (*args, "-signer"))
385 /* If previous -signer argument add signer to list */
429 /* If previous -inkey arument add signer to list */
434 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
535 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
538 /* Check to see if any final signer needs to be appended */
552 BIO_printf(bio_err, "No signer certificate specified\n");
610 BIO_printf (bio_err, "-nointern don't search certificates in message for signer\
[all...]
H A Dts.c99 char *signer, char *chain, const char *policy,
105 char *signer, char *chain, const char *policy);
147 char *signer = NULL; local
258 else if (strcmp(*argv, "-signer") == 0)
261 signer = *++argv;
351 password, inkey, signer, chain, policy,
378 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
675 char *signer, char *chain, const char *policy,
706 passin, inkey, signer, chain,
802 char *signer, cha
673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A Docsp.c141 X509 *signer = NULL, *rsigner = NULL; local
301 else if (!strcmp(*args, "-signer"))
580 BIO_printf (bio_err, "-signer file certificate to sign OCSP request with\n");
602 BIO_printf (bio_err, "-verify_other file additional certificates to search for signer\n");
604 BIO_printf (bio_err, "-no_intern don't search certificates contained in response for signer\n");
710 signer = load_cert(bio_err, signfile, FORMAT_PEM,
711 NULL, e, "signer certificate");
712 if (!signer)
714 BIO_printf(bio_err, "Error loading signer certificate\n");
720 NULL, e, "signer certificate
[all...]
/barrelfish-master/include/openssl/
H A Dcms.h243 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
247 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
254 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
H A Docsp.h431 X509 *signer,
478 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
H A Dts.h479 * Include the signer certificate and the other specified certificates in
481 * Only the signer certificates is included by default.
542 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
619 /* Verify the signer's certificate and the signature of the response. */
634 /* Verify if the TSA name field matches the signer certificate. */

Completed in 148 milliseconds