Searched refs:signer (Results 1 - 25 of 54) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ocsp/
H A Docsp_vfy.c84 X509 *signer, *x; local
89 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
99 skey = X509_get_pubkey(signer);
124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted);
184 X509 *signer; local
186 if ((signer = ocsp_find_signer_sk(certs, rid))) {
187 *psigner = signer;
191 (signer = ocsp_find_signer_sk(bs->certs, rid))) {
192 *psigner = signer;
231 X509 *signer, *sc local
373 X509 *signer; local
439 X509 *signer; local
[all...]
H A Docsp_srv.c219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
225 if (!X509_check_private_key(signer, key)) {
232 if (!OCSP_basic_add1_cert(brsp, signer))
244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer)))
218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_cl.c151 X509 *signer,
160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
166 if (!X509_check_private_key(signer, key)) {
176 if (!OCSP_request_add1_cert(req, signer))
150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/
H A Docsp_vfy.c78 X509 *signer, *x; local
82 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
93 skey = X509_get_pubkey(signer);
106 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL);
108 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs);
165 X509 *signer; local
167 if ((signer = ocsp_find_signer_sk(certs, rid)))
169 *psigner = signer;
173 (signer = ocsp_find_signer_sk(bs->certs, rid)))
175 *psigner = signer;
215 X509 *signer, *sca; local
359 X509 *signer; local
429 X509 *signer; local
[all...]
H A Docsp_srv.c209 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
215 if (!X509_check_private_key(signer, key))
223 if(!OCSP_basic_add1_cert(brsp, signer))
237 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
247 X509_get_subject_name(signer)))
208 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_cl.c144 X509 *signer,
154 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
161 if (!X509_check_private_key(signer, key))
171 if(!OCSP_request_add1_cert(req, signer)) goto err;
143 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ocsp/
H A Docsp_vfy.c84 X509 *signer, *x; local
89 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
99 skey = X509_get_pubkey(signer);
124 init_res = X509_STORE_CTX_init(&ctx, st, signer, untrusted);
184 X509 *signer; local
186 if ((signer = ocsp_find_signer_sk(certs, rid))) {
187 *psigner = signer;
191 (signer = ocsp_find_signer_sk(bs->certs, rid))) {
192 *psigner = signer;
231 X509 *signer, *sc local
373 X509 *signer; local
439 X509 *signer; local
[all...]
H A Docsp_srv.c219 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
225 if (!X509_check_private_key(signer, key)) {
232 if (!OCSP_basic_add1_cert(brsp, signer))
244 X509_pubkey_digest(signer, EVP_sha1(), md, NULL);
251 if (!X509_NAME_set(&rid->value.byName, X509_get_subject_name(signer)))
218 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
H A Docsp_cl.c151 X509 *signer,
160 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer)))
166 if (!X509_check_private_key(signer, key)) {
176 if (!OCSP_request_add1_cert(req, signer))
150 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dfips140.cpp75 void SignaturePairwiseConsistencyTest_FIPS_140_Only(const PK_Signer &signer, const PK_Verifier &verifier) argument
78 SignaturePairwiseConsistencyTest(signer, verifier);
H A Dfips140.h49 void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier);
52 void SignaturePairwiseConsistencyTest_FIPS_140_Only(const PK_Signer &signer, const PK_Verifier &verifier);
H A Ddlltest.cpp134 DSA::Signer signer(dsaPrivateKey);
135 assert(signer.SignatureLength() == 40);
136 signer.SignMessage(rng, message, 3, signature);
H A Dfipstest.cpp163 typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
164 typename SCHEME::Verifier verifier(signer);
168 StringSource(message, true, new SignerFilter(rng, signer, new ChannelSwitch(comparison, "0")));
219 void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier) argument
234 signer,
240 throw SelfTestFailure(signer.AlgorithmName() + ": pairwise consistency test failed");
247 typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
248 typename SCHEME::Verifier verifier(signer);
250 SignaturePairwiseConsistencyTest(signer, verifier);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_rsp_verify.c69 X509 *signer, STACK_OF(X509) **chain);
87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
149 * - Checks if there is one and only one signer.
151 * - Check the extended key usage and key usage fields of the signer
157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
165 X509 *signer; local
183 /* Check if there is one and only one signer. */
198 * Get hold of the signer certificat
249 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument
431 X509 *signer = NULL; local
699 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_rsp_verify.c69 X509 *signer, STACK_OF(X509) **chain);
87 static int TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
149 * - Checks if there is one and only one signer.
151 * - Check the extended key usage and key usage fields of the signer
157 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
165 X509 *signer; local
183 /* Check if there is one and only one signer. */
198 * Get hold of the signer certificat
249 TS_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) argument
431 X509 *signer = NULL; local
699 TS_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/
H A Dpk7_smime.c253 X509 *signer; local
316 signer = sk_X509_value(signers, k);
318 if (!X509_STORE_CTX_init(&cert_ctx, store, signer,
324 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) {
397 signer = sk_X509_value(signers, i);
398 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
424 X509 *signer; local
454 signer = NULL;
457 signer = X509_find_by_issuer_and_serial(certs,
459 if (!signer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/
H A Dpk7_smime.c172 X509 *signer; local
223 signer = sk_X509_value (signers, k);
225 if(!X509_STORE_CTX_init(&cert_ctx, store, signer,
234 } else if(!X509_STORE_CTX_init (&cert_ctx, store, signer, NULL)) {
309 signer = sk_X509_value (signers, i);
310 j=PKCS7_signatureVerify(p7bio,p7,si, signer);
338 X509 *signer; local
369 signer = NULL;
371 if (certs) signer = X509_find_by_issuer_and_serial (certs,
373 if (!signer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/
H A Dpk7_smime.c253 X509 *signer; local
316 signer = sk_X509_value(signers, k);
318 if (!X509_STORE_CTX_init(&cert_ctx, store, signer,
324 } else if (!X509_STORE_CTX_init(&cert_ctx, store, signer, NULL)) {
397 signer = sk_X509_value(signers, i);
398 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
424 X509 *signer; local
454 signer = NULL;
457 signer = X509_find_by_issuer_and_serial(certs,
459 if (!signer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/
H A Dcms_sd.c267 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
274 if (!X509_check_private_key(signer, pk)) {
285 X509_check_purpose(signer, -1, -1);
288 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509);
291 si->signer = signer;
305 if (!cms_set1_SignerIdentifier(si->sid, signer, type))
379 if (!CMS_add1_cert(cms, signer))
471 if (si->signer) {
477 if (!sk_X509_push(signers, si->signer)) {
266 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument
486 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument
557 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument
[all...]
H A Dcms_smime.c272 X509 *signer; local
274 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
275 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) {
306 X509 *signer; local
313 /* Attempt to find all signer certificates */
324 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
325 if (signer)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/
H A Dcms_sd.c267 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
274 if (!X509_check_private_key(signer, pk)) {
285 X509_check_purpose(signer, -1, -1);
288 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509);
291 si->signer = signer;
305 if (!cms_set1_SignerIdentifier(si->sid, signer, type))
379 if (!CMS_add1_cert(cms, signer))
471 if (si->signer) {
477 if (!sk_X509_push(signers, si->signer)) {
266 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) argument
486 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) argument
557 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) argument
[all...]
H A Dcms_smime.c272 X509 *signer; local
274 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
275 if (!X509_STORE_CTX_init(&ctx, store, signer, certs)) {
306 X509 *signer; local
313 /* Attempt to find all signer certificates */
324 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
325 if (signer)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/
H A DClientCreditsList.cpp331 CryptoPP::RSASSA_PKCS1v15_SHA_Signer* signer = local
333 // signer param is used for debug only
334 if (signer == NULL)
335 signer = static_cast<CryptoPP::RSASSA_PKCS1v15_SHA_Signer *>(m_pSignkey);
346 CryptoPP::SecByteBlock sbbSignature(signer->SignatureLength());
362 signer->SignMessage(rng, abyBuffer ,keylen+4+ChIpLen , sbbSignature.begin());
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dsmime.c102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
243 } else if (!strcmp(*args, "-signer")) {
246 /* If previous -signer argument add signer to list */
275 /* If previous -inkey arument add signer to list */
278 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
339 /* Check to see if any final signer needs to be appended */
341 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
355 BIO_printf(bio_err, "No signer certificate specified\n");
408 "-nointern don't search certificates in message for signer\
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dsmime.c102 X509 *cert = NULL, *recip = NULL, *signer = NULL; local
243 } else if (!strcmp(*args, "-signer")) {
246 /* If previous -signer argument add signer to list */
275 /* If previous -inkey arument add signer to list */
278 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
339 /* Check to see if any final signer needs to be appended */
341 BIO_puts(bio_err, "Illegal -inkey without -signer\n");
355 BIO_printf(bio_err, "No signer certificate specified\n");
408 "-nointern don't search certificates in message for signer\
[all...]

Completed in 135 milliseconds

123