| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 30 dns_name_t signer; member in struct:dns_rdata_rrsig
|
| sig_24.h | 31 dns_name_t signer; member in struct:dns_rdata_sig_t
|
| rrsig_46.c | 146 * Signer. 268 * Signer. 330 * Signer. 378 * Signer. 485 * Signer name. 487 RETERR(name_tobuffer(&sig->signer, target)); 499 dns_name_t signer; local 551 dns_name_init(&signer, NULL); 552 dns_name_fromregion(&signer, &sr); 553 dns_name_init(&sig->signer, NULL) [all...] |
| sig_24.c | 110 * Signer. 234 * Signer. 294 * Signer. 342 * Signer. 449 * Signer name. 451 RETERR(name_tobuffer(&sig->signer, target)); 463 dns_name_t signer; local 515 dns_name_init(&signer, NULL); 516 dns_name_fromregion(&signer, &sr); 517 dns_name_init(&sig->signer, NULL) [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 31 dns_name_t signer; member in struct:dns_rdata_rrsig
|
| sig_24.h | 32 dns_name_t signer; member in struct:dns_rdata_sig_t
|
| rrsig_46.c | 145 * Signer. 250 * Signer. 309 * Signer. 349 * Signer. 427 * Signer name. 429 RETERR(name_tobuffer(&sig->signer, target)); 441 dns_name_t signer; local 495 dns_name_init(&signer, NULL); 496 dns_name_fromregion(&signer, &sr); 497 dns_name_init(&sig->signer, NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_smime.c | 217 X509 *signer; local 284 signer = sk_X509_value(signers, k); 285 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) { 340 signer = sk_X509_value(signers, i); 341 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 370 X509 *signer; local 401 signer = NULL; 403 signer = X509_find_by_issuer_and_serial(certs, 405 if (signer == NULL && (flags & PKCS7_NOINTERN) == 0) 406 signer = X509_find_by_issuer_and_serial(included_certs [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 30 static int ocsp_verify_signer(X509 *signer, int response, 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { 51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) 77 X509 *signer, unsigned long flags) 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); 101 X509 *signer, *x local 171 X509 *signer; local 224 X509 *signer, *sca; local 386 X509 *signer; local 423 X509 *signer; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| ocspapitest.c | 115 X509 *signer = NULL, *tmp; local 121 * Test a response with no certs at all; get the signer from the 128 || !TEST_true(get_cert_and_key(&signer, &key)) 129 || !TEST_true(sk_X509_push(extra_certs, signer)) 130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 134 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 138 /* Do it again but include the signer cert */ 142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 146 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 152 X509_free(signer); [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 30 static int ocsp_verify_signer(X509 *signer, int response, 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { 51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) 77 X509 *signer, unsigned long flags) 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); 101 X509 *signer, *x local 171 X509 *signer; local 225 X509 *signer, *sca; local 388 X509 *signer; local 425 X509 *signer; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_smime.c | 217 X509 *signer; local 276 signer = sk_X509_value(signers, k); 278 if (!X509_STORE_CTX_init(cert_ctx, store, signer, 285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { 360 signer = sk_X509_value(signers, i); 361 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 389 X509 *signer; local 419 signer = NULL; 422 signer = X509_find_by_issuer_and_serial(certs, 424 if (!signer && !(flags & PKCS7_NOINTERN [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| ocspapitest.c | 115 X509 *signer = NULL, *tmp; local 121 * Test a response with no certs at all; get the signer from the 128 || !TEST_true(get_cert_and_key(&signer, &key)) 129 || !TEST_true(sk_X509_push(extra_certs, signer)) 130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 134 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 138 /* Do it again but include the signer cert */ 142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 146 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 152 X509_free(signer); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
| ocsp_vfy.c | 33 X509 *signer, *x; local 37 int i, ret = ocsp_find_signer(&signer, bs, certs, flags); 53 skey = X509_get0_pubkey(signer); 81 init_res = X509_STORE_CTX_init(ctx, st, signer, untrusted); 141 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer, 146 ret = ocsp_find_signer(signer, bs, extra_certs, 0); 153 X509 *signer; local 155 if ((signer = ocsp_find_signer_sk(certs, rid))) { 156 *psigner = signer; 160 (signer = ocsp_find_signer_sk(bs->certs, rid))) 199 X509 *signer, *sca; local 342 X509 *signer; local 420 X509 *signer; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_smime.c | 208 X509 *signer; local 265 signer = sk_X509_value(signers, k); 267 if (!X509_STORE_CTX_init(cert_ctx, store, signer, 273 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { 350 signer = sk_X509_value(signers, i); 351 j = PKCS7_signatureVerify(p7bio, p7, si, signer); 379 X509 *signer; local 409 signer = NULL; 412 signer = X509_find_by_issuer_and_serial(certs, 414 if (!signer && !(flags & PKCS7_NOINTERN [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ocspapitest.c | 111 X509 *signer = NULL, *tmp; local 117 * Test a response with no certs at all; get the signer from the 124 || !TEST_true(get_cert_and_key(&signer, &key)) 125 || !TEST_true(sk_X509_push(extra_certs, signer)) 126 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 130 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 134 /* Do it again but include the signer cert */ 138 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), 142 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) 148 X509_free(signer); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ts/ |
| ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 77 * - Checks if there is one and only one signer. 79 * - Check the extended key usage and key usage fields of the signer 85 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 94 X509 *signer; local 121 * Get hold of the signer certificate, search only internal certificates 127 signer = sk_X509_value(signers, 0) 294 X509 *signer = NULL; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kx509.c | 177 hx509_cert signer = NULL; local 240 ret = hx509_certs_find(context->hx509ctx, certs, q, &signer); 322 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert); 323 hx509_cert_free(signer); 345 if (signer) 346 hx509_cert_free(signer);
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| validate.c | 182 const pgp_pubkey_t *signer) 232 return pgp_check_sig(hashout, n, sig, signer); 239 const pgp_key_t *signer; local 302 signer = pgp_getkeybyid(io, key->keyring, 305 if (!signer) { 315 if (sigkey == &signer->enckey) { 329 pgp_get_pubkey(signer), 335 pgp_get_pubkey(signer), 342 * XXX: we should also check that the signer is the 348 pgp_get_pubkey(signer), 429 const pgp_key_t *signer; local [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/librsa/ |
| rsa.h | 130 pubkey_t *signer; /* pubkey of signer */ member in struct:signature_t
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| rsa.h | 130 pubkey_t *signer; /* pubkey of signer */ member in struct:signature_t
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_smime.c | 269 X509 *signer; local 278 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 279 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) { 313 X509 *signer; local 328 /* Attempt to find all signer certificates */ 339 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 340 if (signer)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ts/ |
| ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 78 * - Checks if there is one and only one signer. 80 * - Check the extended key usage and key usage fields of the signer 86 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 95 X509 *signer; local 122 * Get hold of the signer certificate, search only internal certificates 128 signer = sk_X509_value(signers, 0) 295 X509 *signer = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_smime.c | 233 X509 *signer; local 240 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 241 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) { 272 X509 *signer; local 284 /* Attempt to find all signer certificates */ 295 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); 296 if (signer)
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_ocsp.c | 50 static int ocsp_responder_id_match(struct x509_certificate *signer, 55 const u8 *addr[1] = { signer->public_key }; 56 size_t len[1] = { signer->public_key_len }; 63 return x509_name_compare(&signer->subject, name) == 0; 356 struct x509_certificate *issuer, *signer; local 595 signer = issuer; 597 for (signer = certs; signer; signer = signer->next) [all...] |