HomeSort by: relevance | last modified time | path
    Searched defs:signer (Results 1 - 25 of 67) sorted by relevancy

1 2 3

  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 30 dns_name_t signer; member in struct:dns_rdata_rrsig
sig_24.h 31 dns_name_t signer; member in struct:dns_rdata_sig_t
rrsig_46.c 146 * Signer.
268 * Signer.
330 * Signer.
378 * Signer.
485 * Signer name.
487 RETERR(name_tobuffer(&sig->signer, target));
499 dns_name_t signer; local
551 dns_name_init(&signer, NULL);
552 dns_name_fromregion(&signer, &sr);
553 dns_name_init(&sig->signer, NULL)
    [all...]
sig_24.c 110 * Signer.
234 * Signer.
294 * Signer.
342 * Signer.
449 * Signer name.
451 RETERR(name_tobuffer(&sig->signer, target));
463 dns_name_t signer; local
515 dns_name_init(&signer, NULL);
516 dns_name_fromregion(&signer, &sr);
517 dns_name_init(&sig->signer, NULL)
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
rrsig_46.h 31 dns_name_t signer; member in struct:dns_rdata_rrsig
sig_24.h 32 dns_name_t signer; member in struct:dns_rdata_sig_t
rrsig_46.c 145 * Signer.
250 * Signer.
309 * Signer.
349 * Signer.
427 * Signer name.
429 RETERR(name_tobuffer(&sig->signer, target));
441 dns_name_t signer; local
495 dns_name_init(&signer, NULL);
496 dns_name_fromregion(&signer, &sr);
497 dns_name_init(&sig->signer, NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/
pk7_smime.c 217 X509 *signer; local
284 signer = sk_X509_value(signers, k);
285 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) {
340 signer = sk_X509_value(signers, i);
341 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
370 X509 *signer; local
401 signer = NULL;
403 signer = X509_find_by_issuer_and_serial(certs,
405 if (signer == NULL && (flags & PKCS7_NOINTERN) == 0)
406 signer = X509_find_by_issuer_and_serial(included_certs
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ocsp/
ocsp_vfy.c 30 static int ocsp_verify_signer(X509 *signer, int response,
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) {
51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0)
77 X509 *signer, unsigned long flags)
83 if ((skey = X509_get0_pubkey(signer)) == NULL) {
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq);
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq);
101 X509 *signer, *x local
171 X509 *signer; local
224 X509 *signer, *sca; local
386 X509 *signer; local
423 X509 *signer; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
ocspapitest.c 115 X509 *signer = NULL, *tmp; local
121 * Test a response with no certs at all; get the signer from the
128 || !TEST_true(get_cert_and_key(&signer, &key))
129 || !TEST_true(sk_X509_push(extra_certs, signer))
130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
134 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
138 /* Do it again but include the signer cert */
142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
146 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
152 X509_free(signer);
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ocsp/
ocsp_vfy.c 30 static int ocsp_verify_signer(X509 *signer, int response,
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) {
51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0)
77 X509 *signer, unsigned long flags)
83 if ((skey = X509_get0_pubkey(signer)) == NULL) {
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq);
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq);
101 X509 *signer, *x local
171 X509 *signer; local
225 X509 *signer, *sca; local
388 X509 *signer; local
425 X509 *signer; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/
pk7_smime.c 217 X509 *signer; local
276 signer = sk_X509_value(signers, k);
278 if (!X509_STORE_CTX_init(cert_ctx, store, signer,
285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) {
360 signer = sk_X509_value(signers, i);
361 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
389 X509 *signer; local
419 signer = NULL;
422 signer = X509_find_by_issuer_and_serial(certs,
424 if (!signer && !(flags & PKCS7_NOINTERN
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
ocspapitest.c 115 X509 *signer = NULL, *tmp; local
121 * Test a response with no certs at all; get the signer from the
128 || !TEST_true(get_cert_and_key(&signer, &key))
129 || !TEST_true(sk_X509_push(extra_certs, signer))
130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
134 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
138 /* Do it again but include the signer cert */
142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
146 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
152 X509_free(signer);
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/
ocsp_vfy.c 33 X509 *signer, *x; local
37 int i, ret = ocsp_find_signer(&signer, bs, certs, flags);
53 skey = X509_get0_pubkey(signer);
81 init_res = X509_STORE_CTX_init(ctx, st, signer, untrusted);
141 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer,
146 ret = ocsp_find_signer(signer, bs, extra_certs, 0);
153 X509 *signer; local
155 if ((signer = ocsp_find_signer_sk(certs, rid))) {
156 *psigner = signer;
160 (signer = ocsp_find_signer_sk(bs->certs, rid)))
199 X509 *signer, *sca; local
342 X509 *signer; local
420 X509 *signer; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/
pk7_smime.c 208 X509 *signer; local
265 signer = sk_X509_value(signers, k);
267 if (!X509_STORE_CTX_init(cert_ctx, store, signer,
273 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) {
350 signer = sk_X509_value(signers, i);
351 j = PKCS7_signatureVerify(p7bio, p7, si, signer);
379 X509 *signer; local
409 signer = NULL;
412 signer = X509_find_by_issuer_and_serial(certs,
414 if (!signer && !(flags & PKCS7_NOINTERN
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
ocspapitest.c 111 X509 *signer = NULL, *tmp; local
117 * Test a response with no certs at all; get the signer from the
124 || !TEST_true(get_cert_and_key(&signer, &key))
125 || !TEST_true(sk_X509_push(extra_certs, signer))
126 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
130 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
134 /* Do it again but include the signer cert */
138 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(),
142 || !TEST_int_eq(X509_cmp(tmp, signer), 0))
148 X509_free(signer);
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ts/
ts_rsp_verify.c 20 X509 *signer, STACK_OF(X509) **chain);
37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
77 * - Checks if there is one and only one signer.
79 * - Check the extended key usage and key usage fields of the signer
85 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
94 X509 *signer; local
121 * Get hold of the signer certificate, search only internal certificates
127 signer = sk_X509_value(signers, 0)
294 X509 *signer = NULL; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
kx509.c 177 hx509_cert signer = NULL; local
240 ret = hx509_certs_find(context->hx509ctx, certs, q, &signer);
322 ret = hx509_ca_sign(context->hx509ctx, tbs, signer, &cert);
323 hx509_cert_free(signer);
345 if (signer)
346 hx509_cert_free(signer);
  /src/crypto/external/bsd/netpgp/dist/src/lib/
validate.c 182 const pgp_pubkey_t *signer)
232 return pgp_check_sig(hashout, n, sig, signer);
239 const pgp_key_t *signer; local
302 signer = pgp_getkeybyid(io, key->keyring,
305 if (!signer) {
315 if (sigkey == &signer->enckey) {
329 pgp_get_pubkey(signer),
335 pgp_get_pubkey(signer),
342 * XXX: we should also check that the signer is the
348 pgp_get_pubkey(signer),
429 const pgp_key_t *signer; local
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/librsa/
rsa.h 130 pubkey_t *signer; /* pubkey of signer */ member in struct:signature_t
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
rsa.h 130 pubkey_t *signer; /* pubkey of signer */ member in struct:signature_t
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_smime.c 269 X509 *signer; local
278 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
279 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) {
313 X509 *signer; local
328 /* Attempt to find all signer certificates */
339 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
340 if (signer)
  /src/crypto/external/bsd/openssl/dist/crypto/ts/
ts_rsp_verify.c 20 X509 *signer, STACK_OF(X509) **chain);
37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer);
78 * - Checks if there is one and only one signer.
80 * - Check the extended key usage and key usage fields of the signer
86 * - Returns the signer certificate in 'signer', if 'signer' is not NULL.
95 X509 *signer; local
122 * Get hold of the signer certificate, search only internal certificates
128 signer = sk_X509_value(signers, 0)
295 X509 *signer = NULL; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_smime.c 233 X509 *signer; local
240 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
241 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) {
272 X509 *signer; local
284 /* Attempt to find all signer certificates */
295 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
296 if (signer)
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client_ocsp.c 50 static int ocsp_responder_id_match(struct x509_certificate *signer,
55 const u8 *addr[1] = { signer->public_key };
56 size_t len[1] = { signer->public_key_len };
63 return x509_name_compare(&signer->subject, name) == 0;
356 struct x509_certificate *issuer, *signer; local
595 signer = issuer;
597 for (signer = certs; signer; signer = signer->next)
    [all...]

Completed in 41 milliseconds

1 2 3