Home
last modified time | relevance | path

Searched refs:signer (Results 26 – 50 of 55) sorted by relevance

123

/openssl/doc/man3/
H A DPKCS7_sign.pod38 If B<PKCS7_NOCERTS> is set the signer's certificate will not be included in the
39 PKCS7 structure, the signer's certificate must still be supplied in the
82 If a signer is specified it will use the default digest for the signing
H A DCMS_sign.pod44 If B<CMS_NOCERTS> is set the signer's certificate will not be included in the
45 CMS_ContentInfo structure, the signer's certificate must still be supplied in
98 If a signer is specified it will use the default digest for the signing
H A DOSSL_CMP_CTX_new.pod307 Ignore key usage restrictions in the signer's certificate when
309 Else, 'digitalSignature' must be allowed by CMP signer certificates.
425 CMP message signer, and attackers are not able to use arbitrary certificates
459 this CMP signer certificate will be included first in the extraCerts field.
468 OSSL_CMP_CTX_build_cert_chain() builds a certificate chain for the CMP signer
474 ignores any verification errors. Else the CMP signer certificate must be
483 CMP signer certificate set via OSSL_CMP_CTX_set1_cert().
499 CMP message headers can be determined (i.e., no CMP signer certificate
504 the subjectKeyIdentifier of the CMP signer certificate as far as present.
516 the issuer of the CMP signer certificate,
[all …]
H A DDSA_do_sign.pod35 message digest B<dgst> of size B<len>. B<dsa> is the signer's public
H A DRSA_sign_ASN1_OCTET_STRING.pod43 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
H A DRSA_sign.pod45 B<rsa> is the signer's public key.
H A DCMS_add0_cert.pod25 For signed data, such a certificate can be used to fill in the signer
H A DRSA_private_encrypt.pod55 bytes long signature at B<from> using the signer's public key
H A DDSA_sign.pod43 B<dsa> is the signer's public key.
H A DOSSL_ESS_check_signing_certs.pod48 I<chain>, i.e. the signer certificate.
H A DSSL_alert_type_string.pod115 A certificate was revoked by its signer.
/openssl/include/openssl/
H A Docsp.h.in219 X509 *signer,
230 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer,
282 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
285 X509 *signer, EVP_MD_CTX *ctx,
H A Dcms.h.in280 X509 *signer, EVP_PKEY *pk, const EVP_MD *md,
286 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer);
294 X509 **signer, X509_ALGOR **pdig,
H A Dts.h275 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
H A Dcmp.h.in93 * -- signer of the message unknown or not trusted
/openssl/doc/man1/
H A Dopenssl-ts.pod.in34 [B<-signer> I<tsa_cert.pem>]
230 =item B<-signer> I<tsa_cert.pem>
232 The signer certificate of the TSA in PEM format. The TSA signing
240 The signer private key of the TSA in PEM format. Overrides the
251 be included in the response in addition to the signer certificate if
253 contain the certificate chain for the signer certificate from its
417 TSA signing certificate in PEM format. The same as the B<-signer>
523 of F<design2.txt>, requests the signer certificate and nonce, and
547 -signer tsacert.pem -out design1.tsr
H A Dopenssl-ocsp.pod.in19 [B<-signer> I<file>]
127 =item B<-signer> I<filename>, B<-signkey> I<filename>
129 Sign the OCSP request using the certificate specified in the B<-signer>
210 the OCSP response signing certificate. Some responders omit the actual signer's
368 Identify the signer certificate using the key ID, default is to use the
H A Dopenssl-cmp.pod.in533 server-side CMP signer certificate is not pinned but may be any certificate
577 CMP message signer, and attackers are not able to use arbitrary certificates
588 Ignore key usage restrictions in CMP signer certificates when validating
590 else C<digitalSignature> must be allowed for signer certificate.
668 The client's current CMP signer certificate.
688 the client-side CMP signer certificate given with the B<-cert> option
735 They can be used as the default CMP signer certificate chain to include.
H A Dopenssl-dgst.pod.in252 itself, not the related data to identify the signer and algorithm used in
/openssl/apps/
H A Docsp.c235 X509 *signer = NULL, *rsigner = NULL; in ocsp_main() local
694 signer = load_cert(signfile, FORMAT_UNDEF, "signer certificate"); in ocsp_main()
695 if (signer == NULL) { in ocsp_main()
709 if (!OCSP_request_sign(req, signer, key, NULL, in ocsp_main()
853 X509_free(signer); in ocsp_main()
/openssl/doc/internal/man3/
H A Dossl_cmp_msg_protect.pod32 If signature-based message protection is used it adds first the CMP signer cert
/openssl/crypto/ts/
H A Dts_rsp_sign.c160 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) in TS_RESP_CTX_set_signer_cert() argument
162 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { in TS_RESP_CTX_set_signer_cert()
167 ctx->signer_cert = signer; in TS_RESP_CTX_set_signer_cert()
/openssl/crypto/err/
H A Dopenssl.txt281 CMS_R_ADD_SIGNER_ERROR:99:add signer error
323 CMS_R_NEED_ONE_SIGNER:164:need one signer
354 CMS_R_SIGNER_CERTIFICATE_NOT_FOUND:138:signer certificate not found
823 OCSP_R_NO_SIGNER_KEY:130:no signer key
831 OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND:118:signer certificate not found
947 PKCS7_R_PKCS7_ADD_SIGNER_ERROR:153:pkcs7 add signer error
952 PKCS7_R_SIGNER_CERTIFICATE_NOT_FOUND:128:signer certificate not found
1570 TS_R_INVALID_SIGNER_CERTIFICATE_PURPOSE:117:invalid signer certificate purpose
1584 TS_R_THERE_MUST_BE_ONE_SIGNER:110:there must be one signer
/openssl/crypto/cms/
H A Dcms_local.h97 X509 *signer; member
H A Dcms_asn1.c52 X509_free(si->signer);

Completed in 98 milliseconds

123