/openssl/doc/man3/ |
H A D | PKCS7_sign.pod | 38 If B<PKCS7_NOCERTS> is set the signer's certificate will not be included in the 39 PKCS7 structure, the signer's certificate must still be supplied in the 82 If a signer is specified it will use the default digest for the signing
|
H A D | CMS_sign.pod | 44 If B<CMS_NOCERTS> is set the signer's certificate will not be included in the 45 CMS_ContentInfo structure, the signer's certificate must still be supplied in 98 If a signer is specified it will use the default digest for the signing
|
H A D | OSSL_CMP_CTX_new.pod | 307 Ignore key usage restrictions in the signer's certificate when 309 Else, 'digitalSignature' must be allowed by CMP signer certificates. 425 CMP message signer, and attackers are not able to use arbitrary certificates 459 this CMP signer certificate will be included first in the extraCerts field. 468 OSSL_CMP_CTX_build_cert_chain() builds a certificate chain for the CMP signer 474 ignores any verification errors. Else the CMP signer certificate must be 483 CMP signer certificate set via OSSL_CMP_CTX_set1_cert(). 499 CMP message headers can be determined (i.e., no CMP signer certificate 504 the subjectKeyIdentifier of the CMP signer certificate as far as present. 516 the issuer of the CMP signer certificate, [all …]
|
H A D | DSA_do_sign.pod | 35 message digest B<dgst> of size B<len>. B<dsa> is the signer's public
|
H A D | RSA_sign_ASN1_OCTET_STRING.pod | 43 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
H A D | RSA_sign.pod | 45 B<rsa> is the signer's public key.
|
H A D | CMS_add0_cert.pod | 25 For signed data, such a certificate can be used to fill in the signer
|
H A D | RSA_private_encrypt.pod | 55 bytes long signature at B<from> using the signer's public key
|
H A D | DSA_sign.pod | 43 B<dsa> is the signer's public key.
|
H A D | OSSL_ESS_check_signing_certs.pod | 48 I<chain>, i.e. the signer certificate.
|
H A D | SSL_alert_type_string.pod | 115 A certificate was revoked by its signer.
|
/openssl/include/openssl/ |
H A D | ocsp.h.in | 219 X509 *signer, 230 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer, 282 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, 285 X509 *signer, EVP_MD_CTX *ctx,
|
H A D | cms.h.in | 280 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, 286 void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); 294 X509 **signer, X509_ALGOR **pdig,
|
H A D | ts.h | 275 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer);
|
H A D | cmp.h.in | 93 * -- signer of the message unknown or not trusted
|
/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 34 [B<-signer> I<tsa_cert.pem>] 230 =item B<-signer> I<tsa_cert.pem> 232 The signer certificate of the TSA in PEM format. The TSA signing 240 The signer private key of the TSA in PEM format. Overrides the 251 be included in the response in addition to the signer certificate if 253 contain the certificate chain for the signer certificate from its 417 TSA signing certificate in PEM format. The same as the B<-signer> 523 of F<design2.txt>, requests the signer certificate and nonce, and 547 -signer tsacert.pem -out design1.tsr
|
H A D | openssl-ocsp.pod.in | 19 [B<-signer> I<file>] 127 =item B<-signer> I<filename>, B<-signkey> I<filename> 129 Sign the OCSP request using the certificate specified in the B<-signer> 210 the OCSP response signing certificate. Some responders omit the actual signer's 368 Identify the signer certificate using the key ID, default is to use the
|
H A D | openssl-cmp.pod.in | 533 server-side CMP signer certificate is not pinned but may be any certificate 577 CMP message signer, and attackers are not able to use arbitrary certificates 588 Ignore key usage restrictions in CMP signer certificates when validating 590 else C<digitalSignature> must be allowed for signer certificate. 668 The client's current CMP signer certificate. 688 the client-side CMP signer certificate given with the B<-cert> option 735 They can be used as the default CMP signer certificate chain to include.
|
H A D | openssl-dgst.pod.in | 252 itself, not the related data to identify the signer and algorithm used in
|
/openssl/apps/ |
H A D | ocsp.c | 235 X509 *signer = NULL, *rsigner = NULL; in ocsp_main() local 694 signer = load_cert(signfile, FORMAT_UNDEF, "signer certificate"); in ocsp_main() 695 if (signer == NULL) { in ocsp_main() 709 if (!OCSP_request_sign(req, signer, key, NULL, in ocsp_main() 853 X509_free(signer); in ocsp_main()
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_protect.pod | 32 If signature-based message protection is used it adds first the CMP signer cert
|
/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 160 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) in TS_RESP_CTX_set_signer_cert() argument 162 if (X509_check_purpose(signer, X509_PURPOSE_TIMESTAMP_SIGN, 0) != 1) { in TS_RESP_CTX_set_signer_cert() 167 ctx->signer_cert = signer; in TS_RESP_CTX_set_signer_cert()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 281 CMS_R_ADD_SIGNER_ERROR:99:add signer error 323 CMS_R_NEED_ONE_SIGNER:164:need one signer 354 CMS_R_SIGNER_CERTIFICATE_NOT_FOUND:138:signer certificate not found 823 OCSP_R_NO_SIGNER_KEY:130:no signer key 831 OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND:118:signer certificate not found 947 PKCS7_R_PKCS7_ADD_SIGNER_ERROR:153:pkcs7 add signer error 952 PKCS7_R_SIGNER_CERTIFICATE_NOT_FOUND:128:signer certificate not found 1570 TS_R_INVALID_SIGNER_CERTIFICATE_PURPOSE:117:invalid signer certificate purpose 1584 TS_R_THERE_MUST_BE_ONE_SIGNER:110:there must be one signer
|
/openssl/crypto/cms/ |
H A D | cms_local.h | 97 X509 *signer; member
|
H A D | cms_asn1.c | 52 X509_free(si->signer);
|