Home
last modified time | relevance | path

Searched refs:signer (Results 1 – 25 of 213) sorted by relevance

123456789

/third_party/openssl/test/recipes/80-test_cmp_http_data/
Dtest_credentials.csv3 …red, -section,, -ref,_PBM_REF, -secret,_PBM_SECRET, -cert,root.crt, -key,signer.p12, -keypass,pass…
6 0,wrong secret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.…
9 1,empty ref but correct cert, -section,, -ref,"""",BLANK,, -cert,signer.crt, -key,signer.p12, -keyp…
10 1,wrong ref but correct cert, -section,, -ref,wrong,BLANK,, -cert,signer.crt, -key,signer.p12, -key…
12 1,valid cert and key and keypass, -section,,BLANK,,-secret,"""", -cert,signer.crt, -key,signer.p12,…
13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL…
14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA…
15 0,keypass missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,,BLANK,…
16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,…
17 1,keypass no prefix, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,12345,BLA…
[all …]
Dtest_commands.csv50 1,geninfo, -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12345,BLANK,, -gen…
51 0,geninfo missing argument, -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass,pass:1…
52 0,geninfo bad syntax: leading '.', -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass…
53 0,geninfo bad syntax: missing ':', -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass…
54 0,geninfo bad syntax: double ':', -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keypass,…
55 0,geninfo bad syntax: missing ':int', -section,, -cmd,cr,, -cert,signer.crt, -key,signer.p12, -keyp…
/third_party/openssl/crypto/ocsp/
Docsp_vfy.c30 static int ocsp_verify_signer(X509 *signer, int response, in ocsp_verify_signer() argument
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer()
51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) in ocsp_verify_signer()
77 X509 *signer, unsigned long flags) in ocsp_verify() argument
83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify()
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify()
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
101 X509 *signer, *x; in OCSP_basic_verify() local
104 int ret = ocsp_find_signer(&signer, bs, certs, flags); in OCSP_basic_verify()
113 if ((ret = ocsp_verify(NULL, bs, signer, flags)) <= 0) in OCSP_basic_verify()
[all …]
Docsp_srv.c168 X509 *signer, EVP_MD_CTX *ctx, in OCSP_basic_sign_ctx() argument
180 if (pkey == NULL || !X509_check_private_key(signer, pkey)) { in OCSP_basic_sign_ctx()
186 if (!OCSP_basic_add1_cert(brsp, signer) in OCSP_basic_sign_ctx()
193 if (!OCSP_RESPID_set_by_key(rid, signer)) in OCSP_basic_sign_ctx()
195 } else if (!OCSP_RESPID_set_by_name(rid, signer)) { in OCSP_basic_sign_ctx()
216 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, in OCSP_basic_sign() argument
227 signer->libctx, signer->propq, key, NULL)) { in OCSP_basic_sign()
231 i = OCSP_basic_sign_ctx(brsp, signer, ctx, certs, flags); in OCSP_basic_sign()
Docsp_cl.c81 X509 *signer, in OCSP_request_sign() argument
86 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign()
92 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign()
97 if (!OCSP_REQUEST_sign(req, key, dgst, signer->libctx, signer->propq)) in OCSP_request_sign()
102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign()
/third_party/node/deps/openssl/openssl/crypto/ocsp/
Docsp_vfy.c30 static int ocsp_verify_signer(X509 *signer, int response, in ocsp_verify_signer() argument
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer()
51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) in ocsp_verify_signer()
77 X509 *signer, unsigned long flags) in ocsp_verify() argument
83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify()
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify()
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
101 X509 *signer, *x; in OCSP_basic_verify() local
104 int ret = ocsp_find_signer(&signer, bs, certs, flags); in OCSP_basic_verify()
113 if ((ret = ocsp_verify(NULL, bs, signer, flags)) <= 0) in OCSP_basic_verify()
[all …]
Docsp_srv.c168 X509 *signer, EVP_MD_CTX *ctx, in OCSP_basic_sign_ctx() argument
180 if (pkey == NULL || !X509_check_private_key(signer, pkey)) { in OCSP_basic_sign_ctx()
186 if (!OCSP_basic_add1_cert(brsp, signer) in OCSP_basic_sign_ctx()
193 if (!OCSP_RESPID_set_by_key(rid, signer)) in OCSP_basic_sign_ctx()
195 } else if (!OCSP_RESPID_set_by_name(rid, signer)) { in OCSP_basic_sign_ctx()
216 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, in OCSP_basic_sign() argument
227 signer->libctx, signer->propq, key, NULL)) { in OCSP_basic_sign()
231 i = OCSP_basic_sign_ctx(brsp, signer, ctx, certs, flags); in OCSP_basic_sign()
Docsp_cl.c81 X509 *signer, in OCSP_request_sign() argument
86 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign()
92 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign()
97 if (!OCSP_REQUEST_sign(req, key, dgst, signer->libctx, signer->propq)) in OCSP_request_sign()
102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign()
/third_party/mbedtls/library/
Dpkcs7.c255 static void pkcs7_free_signer_info(mbedtls_pkcs7_signer_info *signer) in pkcs7_free_signer_info() argument
260 if (signer == NULL) { in pkcs7_free_signer_info()
264 name_cur = signer->issuer.next; in pkcs7_free_signer_info()
270 signer->issuer.next = NULL; in pkcs7_free_signer_info()
290 mbedtls_pkcs7_signer_info *signer, in pkcs7_get_signer_info() argument
305 ret = pkcs7_get_version(p, end_signer, &signer->version); in pkcs7_get_signer_info()
318 signer->issuer_raw.p = *p; in pkcs7_get_signer_info()
326 ret = mbedtls_x509_get_name(p, *p + len, &signer->issuer); in pkcs7_get_signer_info()
331 signer->issuer_raw.len = *p - signer->issuer_raw.p; in pkcs7_get_signer_info()
333 ret = mbedtls_x509_get_serial(p, end_issuer_and_sn, &signer->serial); in pkcs7_get_signer_info()
[all …]
/third_party/openssl/crypto/ts/
Dts_rsp_verify.c20 X509 *signer, STACK_OF(X509) **chain);
37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
95 X509 *signer; in TS_RESP_verify_signature() local
128 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
146 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature()
153 *signer_out = signer; in TS_RESP_verify_signature()
154 X509_up_ref(signer); in TS_RESP_verify_signature()
172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert() argument
184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert()
[all …]
/third_party/node/deps/openssl/openssl/crypto/ts/
Dts_rsp_verify.c20 X509 *signer, STACK_OF(X509) **chain);
37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
95 X509 *signer; in TS_RESP_verify_signature() local
128 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
146 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature()
153 *signer_out = signer; in TS_RESP_verify_signature()
154 X509_up_ref(signer); in TS_RESP_verify_signature()
172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert() argument
184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert()
[all …]
/third_party/rust/crates/rust-openssl/openssl/src/
Dsign.rs679 let mut signer = Signer::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_sign() localVariable
680 assert_eq!(signer.rsa_padding().unwrap(), Padding::PKCS1); in rsa_sign()
681 signer.set_rsa_padding(Padding::PKCS1).unwrap(); in rsa_sign()
682 signer.update(&Vec::from_hex(INPUT).unwrap()).unwrap(); in rsa_sign()
683 let result = signer.sign_to_vec().unwrap(); in rsa_sign()
716 let mut signer = Signer::new(ty, &pkey).unwrap(); in test_hmac() localVariable
717 signer.update(data).unwrap(); in test_hmac()
718 assert_eq!(signer.sign_to_vec().unwrap(), *res); in test_hmac()
822 let mut signer = Signer::new_without_digest(&pkey).unwrap(); in test_cmac() localVariable
825 signer.update(data as &[u8]).unwrap(); in test_cmac()
[all …]
/third_party/openssl/test/
Docspapitest.c115 X509 *signer = NULL, *tmp; in test_resp_signer() local
128 || !TEST_true(get_cert_and_key(&signer, &key)) in test_resp_signer()
129 || !TEST_true(sk_X509_push(extra_certs, signer)) in test_resp_signer()
130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), in test_resp_signer()
134 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) in test_resp_signer()
142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), in test_resp_signer()
146 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) in test_resp_signer()
152 X509_free(signer); in test_resp_signer()
/third_party/openssl/crypto/cms/
Dcms_sd.c306 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, in CMS_add1_signer() argument
315 if (!X509_check_private_key(signer, pk)) { in CMS_add1_signer()
326 X509_check_purpose(signer, -1, -1); in CMS_add1_signer()
328 X509_up_ref(signer); in CMS_add1_signer()
333 si->signer = signer; in CMS_add1_signer()
352 if (!ossl_cms_set1_SignerIdentifier(si->sid, signer, type, ctx)) in CMS_add1_signer()
429 if ((sc = OSSL_ESS_signing_cert_new_init(signer, in CMS_add1_signer()
435 if ((sc2 = OSSL_ESS_signing_cert_v2_new_init(md, signer, in CMS_add1_signer()
457 if (!CMS_add1_cert(cms, signer)) in CMS_add1_signer()
570 if (si->signer != NULL) { in STACK_OF()
[all …]
/third_party/node/deps/openssl/openssl/crypto/cms/
Dcms_sd.c306 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, in CMS_add1_signer() argument
315 if (!X509_check_private_key(signer, pk)) { in CMS_add1_signer()
326 X509_check_purpose(signer, -1, -1); in CMS_add1_signer()
328 X509_up_ref(signer); in CMS_add1_signer()
333 si->signer = signer; in CMS_add1_signer()
352 if (!ossl_cms_set1_SignerIdentifier(si->sid, signer, type, ctx)) in CMS_add1_signer()
429 if ((sc = OSSL_ESS_signing_cert_new_init(signer, in CMS_add1_signer()
435 if ((sc2 = OSSL_ESS_signing_cert_v2_new_init(md, signer, in CMS_add1_signer()
457 if (!CMS_add1_cert(cms, signer)) in CMS_add1_signer()
570 if (si->signer != NULL) { in STACK_OF()
[all …]
/third_party/openssl/crypto/pkcs7/
Dpk7_smime.c217 X509 *signer; in PKCS7_verify() local
276 signer = sk_X509_value(signers, k); in PKCS7_verify()
278 if (!X509_STORE_CTX_init(cert_ctx, store, signer, in PKCS7_verify()
285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { in PKCS7_verify()
360 signer = sk_X509_value(signers, i); in PKCS7_verify()
361 j = PKCS7_signatureVerify(p7bio, p7, si, signer); in PKCS7_verify()
389 X509 *signer; in STACK_OF() local
419 signer = NULL; in STACK_OF()
422 signer = X509_find_by_issuer_and_serial(certs, in STACK_OF()
424 if (!signer && !(flags & PKCS7_NOINTERN) in STACK_OF()
[all …]
/third_party/node/deps/openssl/openssl/crypto/pkcs7/
Dpk7_smime.c217 X509 *signer; in PKCS7_verify() local
276 signer = sk_X509_value(signers, k); in PKCS7_verify()
278 if (!X509_STORE_CTX_init(cert_ctx, store, signer, in PKCS7_verify()
285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { in PKCS7_verify()
360 signer = sk_X509_value(signers, i); in PKCS7_verify()
361 j = PKCS7_signatureVerify(p7bio, p7, si, signer); in PKCS7_verify()
389 X509 *signer; in STACK_OF() local
419 signer = NULL; in STACK_OF()
422 signer = X509_find_by_issuer_and_serial(certs, in STACK_OF()
424 if (!signer && !(flags & PKCS7_NOINTERN) in STACK_OF()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_client_ocsp.c50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument
55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match()
56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match()
63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match()
356 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local
595 signer = issuer; in tls_process_basic_ocsp_response()
597 for (signer = certs; signer; signer = signer->next) { in tls_process_basic_ocsp_response()
598 if (!ocsp_responder_id_match(signer, &name, key_hash) || in tls_process_basic_ocsp_response()
601 !(signer->ext_key_usage & in tls_process_basic_ocsp_response()
603 x509_certificate_check_signature(issuer, signer) < in tls_process_basic_ocsp_response()
[all …]
/third_party/openssl/doc/man3/
DPKCS7_verify.pod21 in which to search for signer's certificates.
31 PKCS7_get0_signers() retrieves the signer's certificates from I<p7>, it does
48 An attempt is made to locate all the signer's certificates, first looking in
51 If any signer's certificates cannot be located the operation fails.
53 Each signer's certificate is chain verified using the B<smimesign> purpose and
73 searched when locating the signer's certificates.
74 This means that all the signer's certificates must be in the I<certs> parameter.
83 If B<PKCS7_NOVERIFY> is set the signer's certificates are not chain verified.
87 the signer's certificates) must be contained in the trusted store.
95 in the I<certs> parameter. In this case if the signer's certificate is not one
[all …]
DCMS_get0_SignerInfos.pod8 - CMS signedData signer functions
20 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
27 CMS_SignerInfo_get0_signer_id() retrieves the certificate signer identifier
37 CMS_SignerInfo_cert_cmp() compares the certificate B<cert> against the signer
42 B<signer>.
52 CMS. It will then obtain the signer certificate by some unspecified means
56 Once all signer certificates have been set CMS_verify() can be used.
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_client_ocsp.c50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument
55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match()
56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match()
63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match()
365 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local
626 signer = issuer; in tls_process_basic_ocsp_response()
628 for (signer = certs; signer; signer = signer->next) { in tls_process_basic_ocsp_response()
629 if (!ocsp_responder_id_match(signer, &name, key_hash) || in tls_process_basic_ocsp_response()
632 !(signer->ext_key_usage & in tls_process_basic_ocsp_response()
634 x509_certificate_check_signature(issuer, signer) < in tls_process_basic_ocsp_response()
[all …]
/third_party/openssl/doc/man1/
Dopenssl-smime.pod.in23 [B<-signer> I<file>]
198 When signing a message the signer's certificate is normally included
239 =item B<-signer> I<file>
242 used multiple times if more than one signer is required. If a message is being
264 the B<-recip> or B<-signer> file. When signing this option can be used
316 This version of the program only allows one signer per message but it
326 signer. This means that attributes must be present in at least one existing
327 signer using the same message digest or this operation will fail.
375 -signer mycert.pem
380 -signer mycert.pem
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dtls_openssl_ocsp.c506 X509 *signer, *tmp_cert; in check_ocsp_resp() local
616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp()
617 if (!signer) in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
621 if (!signer) { in check_ocsp_resp()
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
664 X509_check_purpose(signer, -1, 0); in check_ocsp_resp()
665 if ((signer->ex_flags & EXFLAG_XKUSAGE) && in check_ocsp_resp()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dtls_openssl_ocsp.c506 X509 *signer, *tmp_cert; in check_ocsp_resp() local
616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp()
617 if (!signer) in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
621 if (!signer) { in check_ocsp_resp()
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
664 X509_check_purpose(signer, -1, 0); in check_ocsp_resp()
665 if ((signer->ex_flags & EXFLAG_XKUSAGE) && in check_ocsp_resp()
[all …]
/third_party/node/deps/npm/node_modules/sigstore/dist/
Dsign.js37 this.signer = options.signer || this.signWithEphemeralKey.bind(this);
41 const sigMaterial = await this.signer(payload);
61 const sigMaterial = await this.signer(paeBuffer);

123456789