Home
last modified time | relevance | path

Searched refs:signer (Results 1 – 25 of 27) sorted by relevance

12

/dragonfly/crypto/libressl/tls/
H A Dtls_signer.c44 struct tls_signer *signer; in tls_signer_new() local
46 if ((signer = calloc(1, sizeof(*signer))) == NULL) in tls_signer_new()
49 return (signer); in tls_signer_new()
57 if (signer == NULL) in tls_signer_free()
62 while (signer->keys) { in tls_signer_free()
63 skey = signer->keys; in tls_signer_free()
64 signer->keys = skey->next; in tls_signer_free()
71 free(signer); in tls_signer_free()
77 return (signer->error.msg); in tls_signer_error()
139 skey->next = signer->keys; in tls_signer_add_keypair_mem()
[all …]
/dragonfly/crypto/libressl/crypto/ocsp/
H A Docsp_vfy.c84 X509 *signer, *x; in OCSP_basic_verify() local
198 X509 *signer; in ocsp_find_signer() local
202 *psigner = signer; in ocsp_find_signer()
207 *psigner = signer; in ocsp_find_signer()
248 X509 *signer, *sca; in ocsp_check_issuer() local
384 X509 *signer; in OCSP_request_verify() local
456 X509 *signer; in ocsp_req_find_signer() local
460 if (signer) { in ocsp_req_find_signer()
461 *psigner = signer; in ocsp_req_find_signer()
467 if (signer) { in ocsp_req_find_signer()
[all …]
H A Docsp_srv.c223 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, in OCSP_basic_sign() argument
229 if (!X509_check_private_key(signer, key)) { in OCSP_basic_sign()
235 if (!OCSP_basic_add1_cert(brsp, signer)) in OCSP_basic_sign()
248 X509_pubkey_digest(signer, EVP_sha1(), md, NULL); in OCSP_basic_sign()
257 X509_get_subject_name(signer))) in OCSP_basic_sign()
H A Docsp_cl.c151 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, in OCSP_request_sign() argument
158 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign()
164 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign()
173 if (!OCSP_request_add1_cert(req, signer)) in OCSP_request_sign()
/dragonfly/crypto/libressl/crypto/ts/
H A Dts_rsp_verify.c74 X509 *signer, STACK_OF(X509) **chain);
156 X509 *signer; in TS_RESP_verify_signature() local
193 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature()
196 if (!TS_verify_cert(store, certs, signer, &chain)) in TS_RESP_verify_signature()
212 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature()
220 *signer_out = signer; in TS_RESP_verify_signature()
221 CRYPTO_add(&signer->references, 1, CRYPTO_LOCK_X509); in TS_RESP_verify_signature()
522 X509 *signer = NULL; in int_TS_RESP_verify_token() local
573 !TS_check_signer_name(ctx->tsa_name, signer)) { in int_TS_RESP_verify_token()
581 X509_free(signer); in int_TS_RESP_verify_token()
[all …]
H A Dts_rsp_sign.c192 TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) in TS_RESP_CTX_set_signer_cert() argument
194 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { in TS_RESP_CTX_set_signer_cert()
199 ctx->signer_cert = signer; in TS_RESP_CTX_set_signer_cert()
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_sd.c297 X509_up_ref(signer); in CMS_add1_signer()
301 si->signer = signer; in CMS_add1_signer()
395 if (!CMS_add1_cert(cms, signer)) in CMS_add1_signer()
492 if (si->signer) { in STACK_OF()
511 if (signer) { in CMS_SignerInfo_set1_signer_cert()
512 X509_up_ref(signer); in CMS_SignerInfo_set1_signer_cert()
516 X509_free(si->signer); in CMS_SignerInfo_set1_signer_cert()
517 si->signer = signer; in CMS_SignerInfo_set1_signer_cert()
551 if (si->signer) in CMS_set1_signers_certs()
587 if (signer) in CMS_SignerInfo_get0_algs()
[all …]
H A Dcms_smime.c297 X509 *signer; in cms_signerinfo_verify_cert() local
304 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); in cms_signerinfo_verify_cert()
305 if (!X509_STORE_CTX_init(ctx, store, signer, certs)) { in cms_signerinfo_verify_cert()
337 X509 *signer; in CMS_verify() local
359 CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL); in CMS_verify()
360 if (signer) in CMS_verify()
H A Dcms_lcl.h135 X509 *signer; member
H A Dcms_asn1.c225 X509_free(si->signer); in cms_si_cb()
/dragonfly/crypto/libressl/crypto/pkcs7/
H A Dpk7_smime.c264 X509 *signer; in PKCS7_verify() local
316 signer = sk_X509_value (signers, k); in PKCS7_verify()
319 signer, p7->d.sign->cert)) { in PKCS7_verify()
330 signer, NULL)) { in PKCS7_verify()
406 signer = sk_X509_value (signers, i); in PKCS7_verify()
434 X509 *signer; in STACK_OF() local
462 signer = NULL; in STACK_OF()
465 signer = X509_find_by_issuer_and_serial (certs, in STACK_OF()
468 signer = in STACK_OF()
471 if (!signer) { in STACK_OF()
[all …]
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dtlsv1_client_ocsp.c50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument
55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match()
56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match()
63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match()
365 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local
626 signer = issuer; in tls_process_basic_ocsp_response()
628 for (signer = certs; signer; signer = signer->next) { in tls_process_basic_ocsp_response()
629 if (!ocsp_responder_id_match(signer, &name, key_hash) || in tls_process_basic_ocsp_response()
632 !(signer->ext_key_usage & in tls_process_basic_ocsp_response()
634 x509_certificate_check_signature(issuer, signer) < in tls_process_basic_ocsp_response()
[all …]
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dtls_openssl_ocsp.c506 X509 *signer, *tmp_cert; in check_ocsp_resp() local
616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp()
617 if (!signer) in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
621 if (!signer) { in check_ocsp_resp()
627 skey = X509_get_pubkey(signer); in check_ocsp_resp()
641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
664 X509_check_purpose(signer, -1, 0); in check_ocsp_resp()
665 if ((signer->ex_flags & EXFLAG_XKUSAGE) && in check_ocsp_resp()
[all …]
/dragonfly/crypto/openssh/
H A Dsshsig.h40 sshsig_signer *signer, void *signer_ctx);
61 struct sshbuf **out, sshsig_signer *signer, void *signer_ctx);
H A Dsshsig.c156 sshsig_signer *signer, void *signer_ctx) in sshsig_wrap_sign() argument
185 if (signer != NULL) { in sshsig_wrap_sign()
186 if ((r = signer(key, &sig, &slen, in sshsig_wrap_sign()
435 struct sshbuf **out, sshsig_signer *signer, void *signer_ctx) in sshsig_signb() argument
449 sig_namespace, out, signer, signer_ctx)) != 0) in sshsig_signb()
563 sshsig_signer *signer, void *signer_ctx) in sshsig_sign_fd() argument
577 sig_namespace, out, signer, signer_ctx)) != 0) in sshsig_sign_fd()
H A Dssh-keygen.c2553 const char *sig_namespace, const char *hashalg, sshsig_signer *signer, in sign_one() argument
2567 if (signer == NULL && sshkey_is_sk(signkey)) { in sign_one()
2585 fd, sig_namespace, &sigbuf, signer, signer_ctx)) != 0) { in sign_one()
2694 sshsig_signer *signer = NULL; in sig_sign() local
2719 signer = agent_signer; in sig_sign()
2727 if (signer == NULL) { in sig_sign()
2739 sig_namespace, hashalg, signer, &agent_fd)) != 0) in sig_sign()
2751 hashalg, signer, &agent_fd)) != 0) in sig_sign()
H A DPROTOCOL367 signer. OpenSSH uses this binding via signed data to implement per-key
H A Dsshkey.c2944 sshkey_certify_signer *signer, void *signer_ctx) in sshkey_certify_custom() argument
3081 if ((ret = signer(ca, &sig_blob, &sig_len, sshbuf_ptr(cert), in sshkey_certify_custom()
/dragonfly/crypto/libressl/apps/openssl/
H A Dts.c96 char *passin, char *inkey, char *signer, char *chain, const char *policy,
100 char *queryfile, char *passin, char *inkey, char *signer, char *chain,
136 char *signer; member
306 .opt.arg = &ts_config.signer,
437 ts_config.signer, ts_config.chain, ts_config.policy, in ts_main()
773 char *inkey, char *signer, char *chain, const char *policy, char *in, in reply_command() argument
800 inkey, signer, chain, policy); in reply_command()
897 char *inkey, char *signer, char *chain, const char *policy) in create_response() argument
920 if (!TS_CONF_set_signer_cert(conf, section, signer, resp_ctx)) in create_response()
H A Dsmime.c718 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local
977 signer = load_cert(bio_err, smime_config.signerfile, in smime_main()
979 if (signer == NULL) in smime_main()
986 if (PKCS7_sign_add_signer(p7, signer, key, in smime_main()
989 X509_free(signer); in smime_main()
990 signer = NULL; in smime_main()
1080 X509_free(signer); in smime_main()
H A Dcms.c1159 X509 *recip = NULL, *signer = NULL; in cms_main() local
1331 if ((signer = load_cert(bio_err, cms_config.signerfile, in cms_main()
1535 srcms = CMS_sign_receipt(si, signer, key, other, in cms_main()
1586 signer = load_cert(bio_err, cms_config.signerfile, in cms_main()
1588 if (signer == NULL) in cms_main()
1601 si = CMS_add1_signer(cms, signer, key, in cms_main()
1615 X509_free(signer); in cms_main()
1616 signer = NULL; in cms_main()
1779 X509_free(signer); in cms_main()
H A Docsp.c740 X509 *signer = NULL, *rsigner = NULL; in ocsp_main() local
872 signer = load_cert(bio_err, ocsp_config.signfile, FORMAT_PEM, in ocsp_main()
874 if (!signer) { in ocsp_main()
891 if (!OCSP_request_sign(ocsp_config.req, signer, key, NULL, in ocsp_main()
1043 X509_free(signer); in ocsp_main()
/dragonfly/crypto/libressl/include/openssl/
H A Dcms.h257 CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer,
263 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
269 void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer,
H A Docsp.h217 int OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key,
226 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer,
267 int OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key,
H A Dts.h365 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);

12