/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 12 1,config default with expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLAN… 13 0,expected sender missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trust… 14 0,wrong expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=Sample Cert/OU=R&D/O=Comp… 15 1,unknown attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/ABC… 16 0,extra attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/seria… 17 0,double attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuing… 18 0,missing attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuin… 19 0,bad syntax in expected sender name: leading double '/', -section,, -recipient,_CA_DN, -expect_sen… 20 0,bad syntax in expected sender name: trailing double '/', -section,, -recipient,_CA_DN, -expect_se… 21 0,bad syntax in expected sender name: missing '=', -section,, -recipient,_CA_DN, -expect_sender,/C=… [all …]
|
/openssl/test/ |
H A D | cmp_hdr_test.c | 74 X509_NAME *sender = X509_NAME_new(); in execute_HDR_get0_senderNonce_test() local 77 if (!TEST_ptr(sender)) in execute_HDR_get0_senderNonce_test() 80 X509_NAME_ADD(sender, "CN", "A common sender name"); in execute_HDR_get0_senderNonce_test() 81 if (!TEST_int_eq(OSSL_CMP_CTX_set1_subjectName(fixture->cmp_ctx, sender), in execute_HDR_get0_senderNonce_test() 91 X509_NAME_free(sender); in execute_HDR_get0_senderNonce_test() 113 if (!TEST_int_eq(fixture->hdr->sender->type, GEN_DIRNAME)) in execute_HDR_set1_sender_test() 116 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->sender->d.directoryName, in execute_HDR_set1_sender_test()
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_hdr_init.pod | 62 ossl_cmp_hdr_get0_sendernonce() returns the sender nonce of the given PKIHeader. 67 ossl_cmp_hdr_set1_sender() sets the sender field in the given PKIHeader 76 The messageTime field contains the time at which the sender created the message. 82 else the subject key ID of the sender's protecting certificate. 110 The sender name is copied from the subject of the client cert, if any, 112 As required by RFC 4210 section 5.1.1., if the sender name is not known
|
H A D | ossl_cmp_msg_check_update.pod | 30 =item its sender is of appropriate type (currently only B<X509_NAME>) 31 and matches any expected sender or srvCert subject given in B<ctx>,
|
/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 266 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 447 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() local 454 if (sender == NULL || msg->body == NULL) in check_msg_find_cert() 456 if (sender->type != GEN_DIRNAME) { in check_msg_find_cert() 497 sname = X509_NAME_oneline(sender->d.directoryName, NULL, 0); in check_msg_find_cert() 693 if (hdr->sender->type != GEN_DIRNAME) { in ossl_cmp_msg_check_update() 705 if (!check_name(ctx, 0, "sender DN field", hdr->sender->d.directoryName, in ossl_cmp_msg_check_update()
|
H A D | cmp_hdr.c | 119 return set1_general_name(&hdr->sender, nm); in ossl_cmp_hdr_set1_sender() 293 const X509_NAME *sender; in ossl_cmp_hdr_init() local 307 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init() 311 if (!ossl_cmp_hdr_set1_sender(hdr, sender)) in ossl_cmp_hdr_init()
|
H A D | cmp_server.c | 468 if (hdr->sender->type != GEN_DIRNAME) { in OSSL_CMP_SRV_process_request() 472 if (!OSSL_CMP_CTX_set1_recipient(ctx, hdr->sender->d.directoryName)) in OSSL_CMP_SRV_process_request()
|
H A D | cmp_protect.c | 308 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect()
|
H A D | cmp_asn.c | 423 ASN1_SIMPLE(OSSL_CMP_PKIHEADER, sender, GENERAL_NAME),
|
H A D | cmp_local.h | 486 GENERAL_NAME *sender; member
|
/openssl/doc/man3/ |
H A D | OSSL_CMP_validate_msg.pod | 19 which includes validating CMP message sender certificates and their paths 27 If no such sender cert has been pinned then candidate sender certificates are 32 the I<msg> sender DN (as far as present), and its subject key identifier
|
H A D | OSSL_CMP_CTX_new.pod | 419 and as default value for the expected sender of CMP responses. 422 expected in the sender field of CMP response messages. 429 expected sender name will continue to match after updates of the server cert. 461 The subject of this I<cert> will be used as the sender field of outgoing 498 According to RFC 4210 section 5.1.1, if no value for the sender field in 501 then the sender field will contain the NULL-DN 545 The I<subjectName> is also used as fallback for the sender field 576 The subject of the reference certificate is used as the sender field value 667 OSSL_CMP_CTX_set1_senderNonce() stores the last sent sender I<nonce> in
|
H A D | SSL_alert_type_string.pod | 96 sender was unable to negotiate an acceptable set of security 153 applied, the sender decided not to proceed with negotiation.
|
H A D | SSL_CTX_set_msg_callback.pod | 97 necessarily the protocol version used by the sender of the message: If
|
/openssl/ssl/ |
H A D | s3_enc.c | 387 size_t ssl3_final_finish_mac(SSL_CONNECTION *s, const char *sender, size_t len, in ssl3_final_finish_mac() argument 421 if (sender != NULL) { in ssl3_final_finish_mac() 426 if (EVP_DigestUpdate(ctx, sender, len) <= 0 in ssl3_final_finish_mac()
|
H A D | ssl_local.h | 2581 __owur size_t ssl3_final_finish_mac(SSL_CONNECTION *s, const char *sender,
|
/openssl/crypto/crmf/ |
H A D | crmf_local.h | 233 /* 0 */ GENERAL_NAME *sender; member
|
H A D | crmf_asn.c | 106 ASN1_EXP(OSSL_CRMF_POPOSIGNINGKEYINPUT_AUTHINFO, value.sender,
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 574 const char *sender; in tls_construct_finished() local 596 sender = ssl->method->ssl3_enc->server_finished_label; in tls_construct_finished() 599 sender = ssl->method->ssl3_enc->client_finished_label; in tls_construct_finished() 604 sender, slen, in tls_construct_finished() 711 const char *sender; in ssl3_take_mac() local 716 sender = ssl->method->ssl3_enc->server_finished_label; in ssl3_take_mac() 719 sender = ssl->method->ssl3_enc->client_finished_label; in ssl3_take_mac() 724 ssl->method->ssl3_enc->final_finish_mac(s, sender, slen, in ssl3_take_mac()
|
/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 278 the subject DN is used as fallback sender of outgoing CMP messages. 365 Its subject is used as fallback sender in CMP message headers 416 Its subject is used as sender of outgoing messages if B<-cert> is not given. 569 and as default value for the expected sender of incoming CMP messages. 573 Distinguished Name (DN) expected in the sender field of incoming CMP messages. 581 expected sender name will continue to match after updates of the server cert. 652 if no sender name can be determined from the B<-cert> or <-subject> options and 670 The subject of this certificate will be used as sender of outgoing CMP messages,
|
/openssl/include/openssl/ |
H A D | cmp.h.in | 89 * -- invalid sender nonce, either missing or wrong size 99 * -- the sender was not authorized to make the preceding
|
/openssl/doc/man7/ |
H A D | provider-kdf.pod | 218 Sets an optional random string that is provided by the sender called
|
/openssl/crypto/err/ |
H A D | openssl.txt | 241 CMP_R_MISSING_SENDER_IDENTIFICATION:111:missing sender identification 247 CMP_R_NO_SUITABLE_SENDER_CERT:145:no suitable sender cert 258 sender generalname type not supported
|