Searched refs:signer (Results 1 - 25 of 35) sorted by relevance

12

/freebsd-10.2-release/crypto/openssl/crypto/ocsp/
H A Docsp_vfy.c84 X509 *signer, *x; local
89 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
99 skey = X509_get_pubkey(signer);
124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted);
184 X509 *signer; local
186 if ((signer = ocsp_find_signer_sk(certs, rid))) {
187 *psigner = signer;
191 (signer = ocsp_find_signer_sk(bs->certs, rid))) {
192 *psigner = signer;
231 X509 *signer, *sc local
373 X509 *signer; local
439 X509 *signer; local
[all...]
H A Docsp_srv.c219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
225 if (!X509_check_private_key(signer, key)) {
232 if (!OCSP_basic_add1_cert(brsp, signer))
244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer)))
218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_cl.c151 X509 *signer,
160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
166 if (!X509_check_private_key(signer, key)) {
176 if (!OCSP_request_add1_cert(req, signer))
150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
/freebsd-10.2-release/crypto/openssl/crypto/ts/
H A Dts_rsp_verify.c69 X509 *signer, STACK_OF(X509) **chain);
87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
149 * - Checks if there is one and only one signer.
151 * - Check the extended key usage and key usage fields of the signer
157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
165 X509 *signer; local
183 /* Check if there is one and only one signer. */
198 * Get hold of the signer certificat
249 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument
430 X509 *signer = NULL; local
698 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument
[all...]
/freebsd-10.2-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_smime.c253 X509 *signer; local
306 signer = sk_X509_value(signers, k);
308 if (!X509_STORE_CTX_init(&cert_ctx, store, signer,
315 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) {
390 signer = sk_X509_value(signers, i);
391 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
420 X509 *signer; local
450 signer = NULL;
453 signer = X509_find_by_issuer_and_serial(certs,
455 if (!signer
[all...]
/freebsd-10.2-release/crypto/openssl/crypto/cms/
H A Dcms_sd.c276 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
283 if (!X509_check_private_key(signer, pk)) {
294 X509_check_purpose(signer, -1, -1);
297 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509);
300 si->signer = signer;
312 if (!cms_set1_SignerIdentifier(si->sid, signer, type))
396 if (!CMS_add1_cert(cms, signer))
464 if (si->signer) {
470 if (!sk_X509_push(signers, si->signer)) {
275 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument
479 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument
550 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument
[all...]
H A Dcms_smime.c271 X509 *signer; local
273 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
274 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) {
305 X509 *signer; local
312 /* Attempt to find all signer certificates */
323 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
324 if (signer)
H A Dcms.h257 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
261 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
269 X509 **signer, X509_ALGOR **pdig,
/freebsd-10.2-release/crypto/heimdal/lib/hx509/
H A Drevoke.c67 hx509_cert signer; member in struct:revoke_ocsp
129 hx509_cert_free(ocsp->signer);
176 hx509_cert signer = NULL; local
202 ret = hx509_certs_find(context, certs, &q, &signer);
204 ret = hx509_certs_find(context, ocsp->certs, &q, &signer);
209 * If signer certificate isn't the CA certificate, lets check the
210 * it is the CA that signed the signer certificate and the OCSP EKU
213 if (hx509_cert_cmp(signer, parent) != 0) {
215 Certificate *s = _hx509_get_cert(signer);
220 hx509_set_error_string(context, 0, ret, "Revoke OCSP signer i
462 hx509_cert signer; local
967 hx509_ocsp_request(hx509_context context, hx509_certs reqcerts, hx509_certs pool, hx509_cert signer, const AlgorithmIdentifier *digest, heim_octet_string *request, heim_octet_string *nonce) argument
1425 hx509_crl_sign(hx509_context context, hx509_cert signer, hx509_crl crl, heim_octet_string *os) argument
[all...]
H A Dtest_windows.in87 --signer=FILE:wca.pem || exit 1
H A Dcrypto.c336 const Certificate *signer,
363 spi = &signer->tbsCertificate.subjectPublicKeyInfo;
414 const hx509_private_key signer,
426 if (signer->ops && der_heim_oid_cmp(signer->ops->key_oid, ASN1_OID_ID_ECPUBLICKEY) != 0)
452 sig->length = ECDSA_size(signer->private_key.ecdsa);
464 sig->data, &siglen, signer->private_key.ecdsa);
485 ecdsa_available(const hx509_private_key signer, argument
494 if (der_heim_oid_cmp(signer->ops->key_oid, &asn1_oid_id_ecPublicKey) != 0)
502 group = EC_KEY_get0_group(signer
334 ecdsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
412 ecdsa_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument
533 rsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
642 rsa_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument
1037 dsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
1145 evp_md_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument
1185 evp_md_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument
1591 const Certificate *signer = NULL; local
1622 _hx509_create_signature(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument
1649 _hx509_create_signature_bitstring(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_bit_string *sig) argument
[all...]
H A Dhxtool.c364 hx509_certs store, pool, anchors, signer = NULL; local
421 ret = hx509_certs_filter(context, store, q, &signer);
446 signer,
480 if (signer) {
481 ret = hx509_certs_iter_f(context, signer, print_signer, header);
483 hx509_err(context, 1, ret, "print signer");
503 hx509_certs_free(&signer);
1225 hx509_private_key *signer)
1275 ret = read_private_key(fn, signer);
1286 hx509_private_key signer; local
1224 get_key(const char *fn, const char *type, int optbits, hx509_private_key *signer) argument
1750 hx509_cert signer = NULL, cert = NULL; local
2030 hx509_certs signer = NULL; local
2114 hx509_cert signer = NULL; local
[all...]
H A Dreq.c172 const hx509_private_key signer,
214 signer,
170 _hx509_request_to_pkcs10(hx509_context context, const hx509_request req, const hx509_private_key signer, heim_octet_string *request) argument
H A Dtest_cms.in81 echo "create signed data (no signer)"
83 --no-signer \
88 echo "verify signed data (no signer)"
91 --no-signer-allowed \
93 sd.data sd.data.out > signer.tmp || exit 1
95 grep "unsigned" signer.tmp > /dev/null || exit 1
97 echo "verify signed data (no signer) (test failure)"
101 sd.data sd.data.out 2> signer.tmp && exit 1
102 grep "No signers where found" signer.tmp > /dev/null || exit 1
217 --signer
[all...]
H A Dca.c985 hx509_private_key signer,
1402 signer,
1529 * @param signer the CA certificate object to sign with (need private key).
1540 hx509_cert signer,
1549 signer_cert = _hx509_get_cert(signer);
1557 _hx509_cert_private_key(signer),
1573 * @param signer private key to sign with.
1584 hx509_private_key signer,
1589 signer,
983 ca_sign(hx509_context context, hx509_ca_tbs tbs, hx509_private_key signer, const AuthorityKeyIdentifier *ai, const Name *issuername, hx509_cert *certificate) argument
1538 hx509_ca_sign(hx509_context context, hx509_ca_tbs tbs, hx509_cert signer, hx509_cert *certificate) argument
1582 hx509_ca_sign_self(hx509_context context, hx509_ca_tbs tbs, hx509_private_key signer, hx509_cert *certificate) argument
H A Dtest_ca.in72 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key || exit 1
83 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
96 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
/freebsd-10.2-release/crypto/heimdal/kdc/
H A Dkx509.c149 hx509_cert signer = NULL; local
182 ret = hx509_certs_find(context->hx509ctx, certs, q, &signer);
251 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert);
252 hx509_cert_free(signer);
269 if (signer)
270 hx509_cert_free(signer);
/freebsd-10.2-release/crypto/openssl/apps/
H A Dsmime.c102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
243 } else if (!strcmp(*args, "-signer")) {
246 /* If previous -signer argument add signer to list */
275 /* If previous -inkey arument add signer to list */
278 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
339 /* Check to see if any final signer needs to be appended */
341 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
355 BIO_printf(bio_err, "No signer certificate specified\n");
408 "-nointern don't search certificates in message for signer\
[all...]
H A Dcms.c118 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
361 } else if (!strcmp(*args, "-signer")) {
364 /* If previous -signer argument add signer to list */
397 /* If previous -inkey arument add signer to list */
400 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
475 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
478 /* Check to see if any final signer needs to be appended */
490 BIO_printf(bio_err, "No signer certificate specified\n");
545 "-nointern don't search certificates in message for signer\
[all...]
H A Dts.c100 char *signer, char *chain, const char *policy,
106 char *signer, char *chain,
149 char *signer = NULL; local
235 } else if (strcmp(*argv, "-signer") == 0) {
238 signer = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
650 char *signer, char *chain, const char *policy,
678 passin, inkey, signer, chain, policy);
774 char *signer, cha
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
/freebsd-10.2-release/crypto/heimdal/lib/roken/
H A Dresolve.h155 char *signer; member in struct:rk_sig_record
157 char sig_data[1]; /* also includes signer */
H A Dresolve-test.c137 printf ("type %u (%s), algorithm %u, labels %u, orig_ttl %u, sig_expiration %u, sig_inception %u, key_tag %u, signer %s\n",
141 sig->signer);
/freebsd-10.2-release/contrib/unbound/validator/
H A Dval_utils.h97 * Given a response, determine the name of the "signer". This is primarily
106 * @param signer_name: signer name, if the response is signed
283 * the answer section, NS and AR sections that are signed with same signer.
289 * @param name: the signer name to look for.
291 * @param signer: signer name or NULL if an unsigned RRset is considered.
295 size_t cname_skip, uint8_t* name, size_t len, uint8_t* signer);
347 * Find the signer name for an RRset.
349 * @param sname: signer name is returned or NULL if not signed.
H A Dval_neg.c1022 /** see if the reply has signed NSEC records and return the signer */
1034 /* return first signer name of first NSEC */
1053 uint8_t* signer; local
1057 /* no SOA in this message, find RRSIG over NSEC's signer name.
1059 signer = reply_nsec_signer(rep, &signer_len, &dclass);
1060 if(!signer)
1062 if(!dname_subdomain_c(signer, zone_name)) {
1063 /* the signer is not in the bailiwick, throw it out */
1068 signer, LDNS_RR_TYPE_NS, dclass);
1071 need = calc_data_need(rep) + calc_zone_need(signer, signer_le
[all...]
H A Dval_sigcrypt.c838 /* RRSIG signer name has to be downcased */
910 * @param sig: signature with signer name and label count.
1037 * from bind 9.4 signer, where it does not do so */
1117 * signer name length.
1149 /* canonicalize signer name */
1313 uint8_t* signer; /* rrsig signer name */ local
1321 /* min length of rdatalen, fixed rrsig, root signer, 1 byte sig */
1342 signer = sig+2+18;
1343 signer_len = dname_valid(signer, sigle
[all...]

Completed in 152 milliseconds

12