/dragonfly/crypto/libressl/tls/ |
H A D | tls_signer.c | 44 struct tls_signer *signer; in tls_signer_new() local 46 if ((signer = calloc(1, sizeof(*signer))) == NULL) in tls_signer_new() 49 return (signer); in tls_signer_new() 57 if (signer == NULL) in tls_signer_free() 62 while (signer->keys) { in tls_signer_free() 63 skey = signer->keys; in tls_signer_free() 64 signer->keys = skey->next; in tls_signer_free() 71 free(signer); in tls_signer_free() 77 return (signer->error.msg); in tls_signer_error() 139 skey->next = signer->keys; in tls_signer_add_keypair_mem() [all …]
|
/dragonfly/crypto/libressl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 84 X509 *signer, *x; in OCSP_basic_verify() local 198 X509 *signer; in ocsp_find_signer() local 202 *psigner = signer; in ocsp_find_signer() 207 *psigner = signer; in ocsp_find_signer() 248 X509 *signer, *sca; in ocsp_check_issuer() local 384 X509 *signer; in OCSP_request_verify() local 456 X509 *signer; in ocsp_req_find_signer() local 460 if (signer) { in ocsp_req_find_signer() 461 *psigner = signer; in ocsp_req_find_signer() 467 if (signer) { in ocsp_req_find_signer() [all …]
|
H A D | ocsp_srv.c | 223 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, in OCSP_basic_sign() argument 229 if (!X509_check_private_key(signer, key)) { in OCSP_basic_sign() 235 if (!OCSP_basic_add1_cert(brsp, signer)) in OCSP_basic_sign() 248 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); in OCSP_basic_sign() 257 X509_get_subject_name(signer))) in OCSP_basic_sign()
|
H A D | ocsp_cl.c | 151 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, in OCSP_request_sign() argument 158 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign() 164 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign() 173 if (!OCSP_request_add1_cert(req, signer)) in OCSP_request_sign()
|
/dragonfly/crypto/libressl/crypto/ts/ |
H A D | ts_rsp_verify.c | 74 X509 *signer, STACK_OF(X509) **chain); 156 X509 *signer; in TS_RESP_verify_signature() local 193 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature() 196 if (!TS_verify_cert(store, certs, signer, &chain)) in TS_RESP_verify_signature() 212 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature() 220 *signer_out = signer; in TS_RESP_verify_signature() 221 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); in TS_RESP_verify_signature() 522 X509 *signer = NULL; in int_TS_RESP_verify_token() local 573 !TS_check_signer_name(ctx->tsa_name, signer)) { in int_TS_RESP_verify_token() 581 X509_free(signer); in int_TS_RESP_verify_token() [all …]
|
H A D | ts_rsp_sign.c | 192 TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) in TS_RESP_CTX_set_signer_cert() argument 194 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { in TS_RESP_CTX_set_signer_cert() 199 ctx->signer_cert = signer; in TS_RESP_CTX_set_signer_cert()
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_sd.c | 297 X509_up_ref(signer); in CMS_add1_signer() 301 si->signer = signer; in CMS_add1_signer() 395 if (!CMS_add1_cert(cms, signer)) in CMS_add1_signer() 492 if (si->signer) { in STACK_OF() 511 if (signer) { in CMS_SignerInfo_set1_signer_cert() 512 X509_up_ref(signer); in CMS_SignerInfo_set1_signer_cert() 516 X509_free(si->signer); in CMS_SignerInfo_set1_signer_cert() 517 si->signer = signer; in CMS_SignerInfo_set1_signer_cert() 551 if (si->signer) in CMS_set1_signers_certs() 587 if (signer) in CMS_SignerInfo_get0_algs() [all …]
|
H A D | cms_smime.c | 297 X509 *signer; in cms_signerinfo_verify_cert() local 304 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); in cms_signerinfo_verify_cert() 305 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) { in cms_signerinfo_verify_cert() 337 X509 *signer; in CMS_verify() local 359 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); in CMS_verify() 360 if (signer) in CMS_verify()
|
H A D | cms_lcl.h | 135 X509 *signer; member
|
H A D | cms_asn1.c | 225 X509_free(si->signer); in cms_si_cb()
|
/dragonfly/crypto/libressl/crypto/pkcs7/ |
H A D | pk7_smime.c | 264 X509 *signer; in PKCS7_verify() local 316 signer = sk_X509_value (signers, k); in PKCS7_verify() 319 signer, p7->d.sign->cert)) { in PKCS7_verify() 330 signer, NULL)) { in PKCS7_verify() 406 signer = sk_X509_value (signers, i); in PKCS7_verify() 434 X509 *signer; in STACK_OF() local 462 signer = NULL; in STACK_OF() 465 signer = X509_find_by_issuer_and_serial (certs, in STACK_OF() 468 signer = in STACK_OF() 471 if (!signer) { in STACK_OF() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_ocsp.c | 50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument 55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match() 56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match() 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 365 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local 626 signer = issuer; in tls_process_basic_ocsp_response() 628 for (signer = certs; signer; signer = signer->next) { in tls_process_basic_ocsp_response() 629 if (!ocsp_responder_id_match(signer, &name, key_hash) || in tls_process_basic_ocsp_response() 632 !(signer->ext_key_usage & in tls_process_basic_ocsp_response() 634 x509_certificate_check_signature(issuer, signer) < in tls_process_basic_ocsp_response() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_openssl_ocsp.c | 506 X509 *signer, *tmp_cert; in check_ocsp_resp() local 616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp() 617 if (!signer) in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 621 if (!signer) { in check_ocsp_resp() 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 664 X509_check_purpose(signer, -1, 0); in check_ocsp_resp() 665 if ((signer->ex_flags & EXFLAG_XKUSAGE) && in check_ocsp_resp() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | sshsig.h | 40 sshsig_signer *signer, void *signer_ctx); 61 struct sshbuf **out, sshsig_signer *signer, void *signer_ctx);
|
H A D | sshsig.c | 156 sshsig_signer *signer, void *signer_ctx) in sshsig_wrap_sign() argument 185 if (signer != NULL) { in sshsig_wrap_sign() 186 if ((r = signer(key, &sig, &slen, in sshsig_wrap_sign() 435 struct sshbuf **out, sshsig_signer *signer, void *signer_ctx) in sshsig_signb() argument 449 sig_namespace, out, signer, signer_ctx)) != 0) in sshsig_signb() 563 sshsig_signer *signer, void *signer_ctx) in sshsig_sign_fd() argument 577 sig_namespace, out, signer, signer_ctx)) != 0) in sshsig_sign_fd()
|
H A D | ssh-keygen.c | 2553 const char *sig_namespace, const char *hashalg, sshsig_signer *signer, in sign_one() argument 2567 if (signer == NULL && sshkey_is_sk(signkey)) { in sign_one() 2585 fd, sig_namespace, &sigbuf, signer, signer_ctx)) != 0) { in sign_one() 2694 sshsig_signer *signer = NULL; in sig_sign() local 2719 signer = agent_signer; in sig_sign() 2727 if (signer == NULL) { in sig_sign() 2739 sig_namespace, hashalg, signer, &agent_fd)) != 0) in sig_sign() 2751 hashalg, signer, &agent_fd)) != 0) in sig_sign()
|
H A D | PROTOCOL | 367 signer. OpenSSH uses this binding via signed data to implement per-key
|
H A D | sshkey.c | 2944 sshkey_certify_signer *signer, void *signer_ctx) in sshkey_certify_custom() argument 3081 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify_custom()
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | ts.c | 96 char *passin, char *inkey, char *signer, char *chain, const char *policy, 100 char *queryfile, char *passin, char *inkey, char *signer, char *chain, 136 char *signer; member 306 .opt.arg = &ts_config.signer, 437 ts_config.signer, ts_config.chain, ts_config.policy, in ts_main() 773 char *inkey, char *signer, char *chain, const char *policy, char *in, in reply_command() argument 800 inkey, signer, chain, policy); in reply_command() 897 char *inkey, char *signer, char *chain, const char *policy) in create_response() argument 920 if (!TS_CONF_set_signer_cert(conf, section, signer, resp_ctx)) in create_response()
|
H A D | smime.c | 718 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 977 signer = load_cert(bio_err, smime_config.signerfile, in smime_main() 979 if (signer == NULL) in smime_main() 986 if (PKCS7_sign_add_signer(p7, signer, key, in smime_main() 989 X509_free(signer); in smime_main() 990 signer = NULL; in smime_main() 1080 X509_free(signer); in smime_main()
|
H A D | cms.c | 1159 X509 *recip = NULL, *signer = NULL; in cms_main() local 1331 if ((signer = load_cert(bio_err, cms_config.signerfile, in cms_main() 1535 srcms = CMS_sign_receipt(si, signer, key, other, in cms_main() 1586 signer = load_cert(bio_err, cms_config.signerfile, in cms_main() 1588 if (signer == NULL) in cms_main() 1601 si = CMS_add1_signer(cms, signer, key, in cms_main() 1615 X509_free(signer); in cms_main() 1616 signer = NULL; in cms_main() 1779 X509_free(signer); in cms_main()
|
H A D | ocsp.c | 740 X509 *signer = NULL, *rsigner = NULL; in ocsp_main() local 872 signer = load_cert(bio_err, ocsp_config.signfile, FORMAT_PEM, in ocsp_main() 874 if (!signer) { in ocsp_main() 891 if (!OCSP_request_sign(ocsp_config.req, signer, key, NULL, in ocsp_main() 1043 X509_free(signer); in ocsp_main()
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | cms.h | 257 CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, 263 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 269 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
|
H A D | ocsp.h | 217 int OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, 226 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer, 267 int OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key,
|
H A D | ts.h | 365 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
|