/openssl/crypto/cms/ |
H A D | cms_env.c | 185 ossl_x509_set0_libctx(ri->d.ktri->recip, in ossl_cms_RecipientInfos_set_cmsctx() 344 if (!ossl_cms_set1_SignerIdentifier(ktri->rid, recip, idtype, ctx)) in cms_RecipientInfo_ktri_init() 347 X509_up_ref(recip); in cms_RecipientInfo_ktri_init() 351 ktri->recip = recip; in cms_RecipientInfo_ktri_init() 370 CMS_RecipientInfo *CMS_add1_recipient(CMS_ContentInfo *cms, X509 *recip, in CMS_add1_recipient() argument 388 pk = X509_get0_pubkey(recip); in CMS_add1_recipient() 397 if (!cms_RecipientInfo_ktri_init(ri, recip, pk, flags, ctx)) in CMS_add1_recipient() 429 return CMS_add1_recipient(cms, recip, NULL, NULL, flags); in CMS_add1_recipient_cert() 433 EVP_PKEY **pk, X509 **recip, in CMS_RecipientInfo_ktri_get0_algs() argument 446 if (recip) in CMS_RecipientInfo_ktri_get0_algs() [all …]
|
H A D | cms_kari.c | 341 int ossl_cms_RecipientInfo_kari_init(CMS_RecipientInfo *ri, X509 *recip, in ossl_cms_RecipientInfo_kari_init() argument 372 if (!ossl_cms_set1_keyid(&rek->rid->d.rKeyId->subjectKeyIdentifier, recip)) in ossl_cms_RecipientInfo_kari_init() 376 if (!ossl_cms_set1_ias(&rek->rid->d.issuerAndSerialNumber, recip)) in ossl_cms_RecipientInfo_kari_init()
|
H A D | cms_local.h | 161 X509 *recip; member 462 int ossl_cms_RecipientInfo_kari_init(CMS_RecipientInfo *ri, X509 *recip,
|
H A D | cms_smime.c | 633 X509 *recip; in CMS_encrypt_ex() local 642 recip = sk_X509_value(certs, i); in CMS_encrypt_ex() 643 if (!CMS_add1_recipient_cert(cms, recip, flags)) { in CMS_encrypt_ex()
|
H A D | cms_asn1.c | 207 X509_free(ktri->recip);
|
/openssl/doc/man3/ |
H A D | CMS_add1_recipient_cert.pod | 11 CMS_RecipientInfo *CMS_add1_recipient(CMS_ContentInfo *cms, X509 *recip, 16 X509 *recip, unsigned int flags); 27 CMS_add1_recipient() adds recipient B<recip> and provides the originator pkey 32 CMS_add1_recipient_cert() adds recipient B<recip> to CMS_ContentInfo enveloped
|
/openssl/apps/ |
H A D | smime.c | 140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 469 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in smime_main() 604 if (!PKCS7_decrypt(p7, key, recip, out, flags)) { in smime_main() 662 X509_free(recip); in smime_main()
|
H A D | cms.c | 290 X509 *cert = NULL, *recip = NULL, *signer = NULL, *originator = NULL; in cms_main() local 856 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in cms_main() 1165 if (!CMS_decrypt_set1_pkey_and_peer(cms, key, recip, originator)) { in cms_main() 1295 X509_free(recip); in cms_main()
|
/openssl/include/openssl/ |
H A D | cms.h.in | 214 X509 *recip, unsigned int flags); 215 CMS_RecipientInfo *CMS_add1_recipient(CMS_ContentInfo *cms, X509 *recip, 220 EVP_PKEY **pk, X509 **recip,
|
/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 66 [B<-recip> I<file>] 353 the B<-recip> or B<-signer> file. When signing this option can be used 390 =item B<-recip> I<file> 404 This is an alternative to using the B<-recip> option when encrypting a message. 827 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem 861 -recip cert.pem -keyopt rsa_padding_mode:oaep 866 -recip ecdhcert.pem -keyopt ecdh_kdf_md:sha256
|
H A D | openssl-smime.pod.in | 32 [B<-recip> I< file>] 254 =item B<-recip> I<file> 264 the B<-recip> or B<-signer> file. When signing this option can be used 421 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
/openssl/crypto/ec/ |
H A D | curve25519.c | 1833 fe recip; in ge_tobytes() local 1837 fe_invert(recip, h->Z); in ge_tobytes() 1838 fe_mul(x, h->X, recip); in ge_tobytes() 1839 fe_mul(y, h->Y, recip); in ge_tobytes() 1846 fe recip; in ge_p3_tobytes() local 1850 fe_invert(recip, h->Z); in ge_p3_tobytes() 1851 fe_mul(x, h->X, recip); in ge_p3_tobytes() 1852 fe_mul(y, h->Y, recip); in ge_p3_tobytes()
|