/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 84 X509 *signer, *x; local 89 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 99 skey = X509_get_pubkey(signer); 124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted); 184 X509 *signer; local 186 if ((signer = ocsp_find_signer_sk(certs, rid))) { 187 *psigner = signer; 191 (signer = ocsp_find_signer_sk(bs->certs, rid))) { 192 *psigner = signer; 231 X509 *signer, *sc local 371 X509 *signer; local 437 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 225 if (!X509_check_private_key(signer, key)) { 232 if (!OCSP_basic_add1_cert(brsp, signer)) 244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer))) 218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 151 X509 *signer, 160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 168 if (!X509_check_private_key(signer, key)) { 178 if (!OCSP_request_add1_cert(req, signer)) 150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 35 dns_name_t signer; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 36 dns_name_t signer; member in struct:dns_rdata_sig_t
|
H A D | sig_24.c | 414 RETERR(name_tobuffer(&sig->signer, target)); 426 dns_name_t signer; local 480 dns_name_init(&signer, NULL); 481 dns_name_fromregion(&signer, &sr); 482 dns_name_init(&sig->signer, NULL); 483 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 484 isc_region_consume(&sr, name_length(&sig->signer)); 500 dns_name_free(&sig->signer, mctx); 514 dns_name_free(&sig->signer, si [all...] |
H A D | rrsig_46.c | 409 RETERR(name_tobuffer(&sig->signer, target)); 421 dns_name_t signer; local 475 dns_name_init(&signer, NULL); 476 dns_name_fromregion(&signer, &sr); 477 dns_name_init(&sig->signer, NULL); 478 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 479 isc_region_consume(&sr, name_length(&sig->signer)); 495 dns_name_free(&sig->signer, mctx); 509 dns_name_free(&sig->signer, si [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | ssu.h | 134 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, 162 *\li 'signer' is NULL or a valid absolute name 205 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
|
H A D | dlz.h | 181 typedef isc_boolean_t (*dns_dlzssumatch_t)(dns_name_t *signer, 338 dns_name_t *signer, dns_name_t *name, isc_netaddr_t *tcpaddr,
|
H A D | dlz_dlopen.h | 133 typedef isc_boolean_t dlz_dlopen_ssumatch_t (const char *signer,
|
H A D | sdlz.h | 240 typedef isc_boolean_t (*dns_sdlzssumatch_t)(const char *signer,
|
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dst/ |
H A D | gssapi.h | 193 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, 196 * Compare a "signer" (in the format of a Kerberos-format Kerberos5 203 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, 206 * Compare a "signer" (in the format of a Kerberos-format Kerberos5
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 174 X509 *signer; local 227 signer = sk_X509_value(signers, k); 229 if (!X509_STORE_CTX_init(&cert_ctx, store, signer, 236 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) { 311 signer = sk_X509_value(signers, i); 312 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 341 X509 *signer; local 371 signer = NULL; 374 signer = X509_find_by_issuer_and_serial(certs, 376 if (!signer [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | ssu.c | 350 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, argument 364 REQUIRE(signer == NULL || dns_name_isabsolute(signer)); 367 if (signer == NULL && tcpaddr == NULL) 381 if (signer == NULL) 384 if (!dns_name_matcheswildcard(signer, 388 if (!dns_name_equal(signer, rule->identity)) 396 if (signer == NULL) 420 if (!dns_name_equal(signer, name)) 424 if (!dns_name_issubdomain(name, signer)) [all...] |
H A D | ssu_external.c | 121 dns_name_t *signer, dns_name_t *name, 169 if (signer != NULL) 170 dns_name_format(signer, b_signer, sizeof(b_signer)); 120 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer, dns_name_t *name, isc_netaddr_t *tcpaddr, dns_rdatatype_t type, const dst_key_t *key, isc_mem_t *mctx) argument
|
H A D | gssapictx.c | 353 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, argument 370 result = dns_name_toprincipal(signer, &buffer); 389 * Find the host portion of the signer's name. We do this by 418 UNUSED(signer); 426 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, argument 444 result = dns_name_toprincipal(signer, &buffer); 470 * Find the host portion of the signer's name. Zero out the $ so 471 * it terminates the signer's name, and skip past the @ for 509 UNUSED(signer);
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 277 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 284 if (!X509_check_private_key(signer, pk)) { 295 X509_check_purpose(signer, -1, -1); 298 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 301 si->signer = signer; 313 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 407 if (!CMS_add1_cert(cms, signer)) 475 if (si->signer) { 481 if (!sk_X509_push(signers, si->signer)) { 276 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 490 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 561 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 275 X509 *signer; local 277 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 278 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) { 309 X509 *signer; local 316 /* Attempt to find all signer certificates */ 327 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 328 if (signer)
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 68 hx509_cert signer; member in struct:revoke_ocsp 130 hx509_cert_free(ocsp->signer); 177 hx509_cert signer = NULL; local 203 ret = hx509_certs_find(context, certs, &q, &signer); 205 ret = hx509_certs_find(context, ocsp->certs, &q, &signer); 210 * If signer certificate isn't the CA certificate, lets check the 211 * it is the CA that signed the signer certificate and the OCSP EKU 214 if (hx509_cert_cmp(signer, parent) != 0) { 216 Certificate *s = _hx509_get_cert(signer); 221 hx509_set_error_string(context, 0, ret, "Revoke OSCP signer i 459 hx509_cert signer; local 960 hx509_ocsp_request(hx509_context context, hx509_certs reqcerts, hx509_certs pool, hx509_cert signer, const AlgorithmIdentifier *digest, heim_octet_string *request, heim_octet_string *nonce) argument 1412 hx509_crl_sign(hx509_context context, hx509_cert signer, hx509_crl crl, heim_octet_string *os) argument [all...] |
H A D | test_windows.in | 87 --signer=FILE:wca.pem || exit 1
|
H A D | crypto.c | 194 const Certificate *signer, 210 spi = &signer->tbsCertificate.subjectPublicKeyInfo; 315 const hx509_private_key signer, 330 sig_oid = signer->signature_alg; 386 sig->length = RSA_size(signer->private_key.rsa); 396 signer->private_key.rsa, 576 const Certificate *signer, 588 spi = &signer->tbsCertificate.subjectPublicKeyInfo; 685 const Certificate *signer, 715 const hx509_private_key signer, 192 rsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 313 rsa_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 574 dsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 683 sha1_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 713 sha256_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 749 sha256_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 779 sha1_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 815 md5_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 845 md2_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1047 _hx509_verify_signature(hx509_context context, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1081 _hx509_verify_signature_bitstring(hx509_context context, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_bit_string *sig) argument 1102 _hx509_create_signature(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 1136 _hx509_create_signature_bitstring(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_bit_string *sig) argument [all...] |
H A D | hxtool.c | 1075 hx509_private_key *signer) 1125 ret = read_private_key(fn, signer); 1136 hx509_private_key signer; local 1145 &signer); 1176 ret = _hx509_private_key2SPKI(context, signer, &key); 1189 signer, 1194 _hx509_private_key_free(&signer); 1506 hx509_cert signer = NULL, cert = NULL; local 1551 ret = hx509_certs_find(context, cacerts, q, &signer); 1730 ret = hx509_ca_sign(context, tbs, signer, 1074 get_key(const char *fn, const char *type, int optbits, hx509_private_key *signer) argument 1781 hx509_certs signer = NULL; local 1862 hx509_cert signer = NULL; local [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kx509.c | 149 hx509_cert signer = NULL; local 190 ret = hx509_certs_find(hxctx, certs, q, &signer); 259 ret = hx509_ca_sign(hxctx, tbs, signer, &cert); 260 hx509_cert_free(signer); 279 if (signer) 280 hx509_cert_free(signer);
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/data/ |
H A D | gen-req.sh | 149 -signer test.crt \ 159 -signer test.crt \ 170 -signer test.crt \
|
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | resolve-test.c | 133 printf ("type %u (%s), algorithm %u, labels %u, orig_ttl %u, sig_expiration %u, sig_inception %u, key_tag %u, signer %s\n", 137 sig->signer);
|