HomeSort by: relevance | last modified time | path
    Searched refs:issuer (Results 1 - 25 of 253) sorted by relevancy

1 2 3 4 5 6 7 8 91011

  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_platform/
test_join.c 29 #define DEFAULT_FILENAME "issuer.txt"
51 } Issuer;
101 static int init_key_chain(int length_key_chain, Issuer *issuer) {
121 issuer->length_key_chain = length_key_chain;
122 issuer->key_chain = (RSA **)malloc(sizeof(RSA *) * length_key_chain);
123 issuer->pk_signatures = (BYTE **)malloc(sizeof(BYTE *) * length_key_chain);
130 issuer->key_chain[i] = rsa;
134 // signature algorithm from Issuer.java - "SHA1withRSA"
148 signature, &len_sign, issuer->key_chain[i-1])
175 Issuer *issuer = (Issuer *)malloc(sizeof( Issuer)); local
311 Issuer* issuer; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/demos/certs/
ocspquery.sh 18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
26 opensslcmd ocsp -issuer intca.pem \
  /src/external/bsd/wpa/dist/src/crypto/
tls_openssl.h 17 X509 *issuer, X509 *issuer_issuer);
  /src/crypto/external/bsd/openssl/dist/demos/certs/
ocspquery.sh 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
19 $OPENSSL ocsp -issuer intca.pem \
  /src/crypto/external/bsd/openssl.old/dist/demos/certs/
ocspquery.sh 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
19 $OPENSSL ocsp -issuer intca.pem \
  /src/crypto/external/bsd/openssl.old/dist/crypto/ct/
ct_policy.c 49 X509_free(ctx->issuer);
61 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer)
63 if (!X509_up_ref(issuer))
65 ctx->issuer = issuer;
87 return ctx->issuer;
  /src/crypto/external/apache2/openssl/dist/crypto/ct/
ct_policy.c 63 X509_free(ctx->issuer);
76 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer)
78 if (!X509_up_ref(issuer))
80 ctx->issuer = issuer;
102 return ctx->issuer;
  /src/crypto/external/bsd/openssl/dist/crypto/ct/
ct_policy.c 65 X509_free(ctx->issuer);
78 int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer)
80 if (!X509_up_ref(issuer))
82 ctx->issuer = issuer;
104 return ctx->issuer;
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
v3_akeya.c 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
v3_akid.c 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL,
60 if (akeyid->issuer) {
61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
88 * Three explicit tags may be given, where 'keyid' and 'issuer' may be combined:
90 * 'keyid': use the issuer's subject keyid; the option 'always' means its is
91 * an error if the issuer certificate doesn't have a subject key id.
92 * 'issuer': use the issuer's cert issuer and serial number. The default is
100 char keyid = 0, issuer = 0 local
    [all...]
x509aset.c 96 const X509_NAME *issuer)
98 return replace_dirName(&isss->issuer, issuer);
148 v2Form = x->acinfo->issuer.u.v2Form;
157 x->acinfo->issuer.u.v2Form = v2Form;
158 x->acinfo->issuer.type = X509_ACERT_ISSUER_V2;
v3_authattid.c 28 if (iss->issuer != NULL) {
30 OSSL_GENERAL_NAMES_print(out, iss->issuer, indent);
x509_local.h 70 const ASN1_INTEGER *ser, const X509_NAME *issuer);
127 int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
129 int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
  /src/crypto/external/apache2/openssl/dist/include/crypto/
x509_acert.h 28 STACK_OF(GENERAL_NAME) *issuer; member in struct:ossl_issuer_serial_st
56 X509_ACERT_ISSUER issuer; member in struct:X509_acert_info_st
ess.h 16 * issuer GeneralNames,
22 STACK_OF(GENERAL_NAME) *issuer; member in struct:ESS_issuer_serial
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
v3_akeya.c 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
v3_akid.c 52 if (!X509V3_add_value((akeyid->issuer || akeyid->serial) ? "keyid" : NULL,
60 if (akeyid->issuer) {
61 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
90 * an error if the issuer certificate doesn't have a key id.
91 * issuer: use the issuers cert issuer and serial number. The default is
100 char keyid = 0, issuer = 0; local
126 } else if (strcmp(cnf->name, "issuer") == 0) {
127 issuer = 1;
129 issuer = 2
    [all...]
x509_local.h 70 const ASN1_INTEGER *ser, const X509_NAME *issuer);
127 int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
129 int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/
v3_akey.c 58 if (akeyid->issuer) {
59 tmpextlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
89 * an error if the issuer certificate doesn't have a key id.
90 * issuer: use the issuers cert issuer and serial number. The default is
99 char keyid = 0, issuer = 0; local
117 } else if (strcmp(cnf->name, "issuer") == 0) {
118 issuer = 1;
120 issuer = 2;
149 if ((issuer && !ikeyid) || (issuer == 2))
    [all...]
v3_akeya.c 19 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
  /src/crypto/external/bsd/openssl/dist/include/crypto/
ess.h 16 * issuer GeneralNames,
22 STACK_OF(GENERAL_NAME) *issuer; member in struct:ESS_issuer_serial
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
25-test_x509.t 55 # extracts issuer from a -text formatted-output
58 my $issuer = "";
61 if ($line =~ /Issuer:/) {
62 $issuer = $line;
66 return $issuer;
91 # verify issuer is CA
107 # Verify issuer is CA
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client_ocsp.c 112 struct x509_certificate *issuer,
173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN",
174 issuer->subject_dn, issuer->subject_dn_len);
175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn,
176 issuer->subject_dn_len, hash);
197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key,
198 issuer->public_key_len, hash);
313 struct x509_certificate *issuer, const u8 *resp,
330 if (tls_process_ocsp_single_response(conn, cert, issuer,
356 struct x509_certificate *issuer, *signer; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/90-test_store_data/
ca.cnf 54 authorityKeyIdentifier=keyid,issuer
55 issuerAltName=issuer:copy
  /src/crypto/external/bsd/openssl.old/dist/test/
Uss.cnf 26 authorityKeyIdentifier=keyid,issuer:always

Completed in 30 milliseconds

1 2 3 4 5 6 7 8 91011