/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ocsp/ |
H A D | ocsp_vfy.c | 84 X509 *signer, *x; local 89 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 99 skey = X509_get_pubkey(signer); 124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted); 184 X509 *signer; local 186 if ((signer = ocsp_find_signer_sk(certs, rid))) { 187 *psigner = signer; 191 (signer = ocsp_find_signer_sk(bs->certs, rid))) { 192 *psigner = signer; 231 X509 *signer, *sc local 373 X509 *signer; local 439 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 225 if (!X509_check_private_key(signer, key)) { 232 if (!OCSP_basic_add1_cert(brsp, signer)) 244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer))) 218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 151 X509 *signer, 160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 166 if (!X509_check_private_key(signer, key)) { 176 if (!OCSP_request_add1_cert(req, signer)) 150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/ |
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 165 X509 *signer; local 167 if ((signer = ocsp_find_signer_sk(certs, rid))) 169 *psigner = signer; 173 (signer = ocsp_find_signer_sk(bs->certs, rid))) 175 *psigner = signer; 215 X509 *signer, *sca; local 359 X509 *signer; local 429 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 215 if (!X509_check_private_key(signer, key)) 223 if(!OCSP_basic_add1_cert(brsp, signer)) 237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 247 X509_get_subject_name(signer))) 208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 144 X509 *signer, 154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 161 if (!X509_check_private_key(signer, key)) 171 if(!OCSP_request_add1_cert(req, signer)) goto err; 143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 84 X509 *signer, *x; local 89 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 99 skey = X509_get_pubkey(signer); 124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted); 184 X509 *signer; local 186 if ((signer = ocsp_find_signer_sk(certs, rid))) { 187 *psigner = signer; 191 (signer = ocsp_find_signer_sk(bs->certs, rid))) { 192 *psigner = signer; 231 X509 *signer, *sc local 373 X509 *signer; local 439 X509 *signer; local [all...] |
H A D | ocsp_srv.c | 219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 225 if (!X509_check_private_key(signer, key)) { 232 if (!OCSP_basic_add1_cert(brsp, signer)) 244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); 251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer))) 218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
H A D | ocsp_cl.c | 151 X509 *signer, 160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) 166 if (!X509_check_private_key(signer, key)) { 176 if (!OCSP_request_add1_cert(req, signer)) 150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | fips140.cpp | 75 void SignaturePairwiseConsistencyTest_FIPS_140_Only(const PK_Signer &signer, const PK_Verifier &verifier) argument 78 SignaturePairwiseConsistencyTest(signer, verifier);
|
H A D | fips140.h | 49 void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier); 52 void SignaturePairwiseConsistencyTest_FIPS_140_Only(const PK_Signer &signer, const PK_Verifier &verifier);
|
H A D | dlltest.cpp | 134 DSA::Signer signer(dsaPrivateKey); 135 assert(signer.SignatureLength() == 40); 136 signer.SignMessage(rng, message, 3, signature);
|
H A D | fipstest.cpp | 163 typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref()); 164 typename SCHEME::Verifier verifier(signer); 168 StringSource(message, true, new SignerFilter(rng, signer, new ChannelSwitch(comparison, "0"))); 219 void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier) argument 234 signer, 240 throw SelfTestFailure(signer.AlgorithmName() + ": pairwise consistency test failed"); 247 typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref()); 248 typename SCHEME::Verifier verifier(signer); 250 SignaturePairwiseConsistencyTest(signer, verifier);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_rsp_verify.c | 69 X509 *signer, STACK_OF(X509) **chain); 87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 149 * - Checks if there is one and only one signer. 151 * - Check the extended key usage and key usage fields of the signer 157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 165 X509 *signer; local 183 /* Check if there is one and only one signer. */ 198 * Get hold of the signer certificat 249 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument 431 X509 *signer = NULL; local 699 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 69 X509 *signer, STACK_OF(X509) **chain); 87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 149 * - Checks if there is one and only one signer. 151 * - Check the extended key usage and key usage fields of the signer 157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 165 X509 *signer; local 183 /* Check if there is one and only one signer. */ 198 * Get hold of the signer certificat 249 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument 431 X509 *signer = NULL; local 699 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_smime.c | 253 X509 *signer; local 316 signer = sk_X509_value(signers, k); 318 if (!X509_STORE_CTX_init(&cert_ctx, store, signer, 324 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) { 397 signer = sk_X509_value(signers, i); 398 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 424 X509 *signer; local 454 signer = NULL; 457 signer = X509_find_by_issuer_and_serial(certs, 459 if (!signer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | pk7_smime.c | 172 X509 *signer; local 223 signer = sk_X509_value (signers, k); 225 if(!X509_STORE_CTX_init(&cert_ctx, store, signer, 234 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) { 309 signer = sk_X509_value (signers, i); 310 j=PKCS7_signatureVerify(p7bio,p7,si, signer); 338 X509 *signer; local 369 signer = NULL; 371 if (certs) signer = X509_find_by_issuer_and_serial (certs, 373 if (!signer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 253 X509 *signer; local 316 signer = sk_X509_value(signers, k); 318 if (!X509_STORE_CTX_init(&cert_ctx, store, signer, 324 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) { 397 signer = sk_X509_value(signers, i); 398 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 424 X509 *signer; local 454 signer = NULL; 457 signer = X509_find_by_issuer_and_serial(certs, 459 if (!signer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_sd.c | 267 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 274 if (!X509_check_private_key(signer, pk)) { 285 X509_check_purpose(signer, -1, -1); 288 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 291 si->signer = signer; 305 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 379 if (!CMS_add1_cert(cms, signer)) 471 if (si->signer) { 477 if (!sk_X509_push(signers, si->signer)) { 266 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 486 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 557 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 272 X509 *signer; local 274 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 275 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) { 306 X509 *signer; local 313 /* Attempt to find all signer certificates */ 324 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 325 if (signer)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_sd.c | 267 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 274 if (!X509_check_private_key(signer, pk)) { 285 X509_check_purpose(signer, -1, -1); 288 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); 291 si->signer = signer; 305 if (!cms_set1_SignerIdentifier(si->sid, signer, type)) 379 if (!CMS_add1_cert(cms, signer)) 471 if (si->signer) { 477 if (!sk_X509_push(signers, si->signer)) { 266 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument 486 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument 557 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument [all...] |
H A D | cms_smime.c | 272 X509 *signer; local 274 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 275 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) { 306 X509 *signer; local 313 /* Attempt to find all signer certificates */ 324 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 325 if (signer)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/ |
H A D | ClientCreditsList.cpp | 331 CryptoPP::RSASSA_PKCS1v15_SHA_Signer* signer = local 333 // signer param is used for debug only 334 if (signer == NULL) 335 signer = static_cast<CryptoPP::RSASSA_PKCS1v15_SHA_Signer *>(m_pSignkey); 346 CryptoPP::SecByteBlock sbbSignature(signer->SignatureLength()); 362 signer->SignMessage(rng, abyBuffer ,keylen+4+ChIpLen , sbbSignature.begin());
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | smime.c | 102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 243 } else if (!strcmp(*args, "-signer")) { 246 /* If previous -signer argument add signer to list */ 275 /* If previous -inkey arument add signer to list */ 278 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 339 /* Check to see if any final signer needs to be appended */ 341 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 355 BIO_printf(bio_err, "No signer certificate specified\n"); 408 "-nointern don't search certificates in message for signer\ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | smime.c | 102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local 243 } else if (!strcmp(*args, "-signer")) { 246 /* If previous -signer argument add signer to list */ 275 /* If previous -inkey arument add signer to list */ 278 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 339 /* Check to see if any final signer needs to be appended */ 341 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 355 BIO_printf(bio_err, "No signer certificate specified\n"); 408 "-nointern don't search certificates in message for signer\ [all...] |