Searched refs:signers (Results 1 – 19 of 19) sorted by relevance
/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 218 STACK_OF(X509) *signers; in PKCS7_verify() 269 if (signers == NULL) in PKCS7_verify() 288 signer = sk_X509_value(signers, k); in PKCS7_verify() 346 signer = sk_X509_value(signers, i); in PKCS7_verify() 362 sk_X509_free(signers); in PKCS7_verify() 370 STACK_OF(X509) *signers, *included_certs; in STACK_OF() 397 if ((signers = sk_X509_new_null()) == NULL) { in STACK_OF() 414 sk_X509_free(signers); in STACK_OF() 418 if (!sk_X509_push(signers, signer)) { in STACK_OF() 419 sk_X509_free(signers); in STACK_OF() [all …]
|
/openssl/doc/man3/ |
H A D | CMS_get0_SignerInfos.pod | 41 CMS_SignerInfo_set1_signer_cert() sets the signers certificate of B<si> to 47 signers certificates using any appropriate technique when the simpler method 59 there are no signers this is not a problem in practice because the only 66 are no signers or an error occurs.
|
H A D | CMS_sign.pod | 47 the signers certificate can be obtained by other means: for example a 85 output to which additional signers and capabilities can be added before 107 B<CMS_PARTIAL> flag set. Then one or more signers can be added using the
|
H A D | PKCS7_sign_add_signer.pod | 38 not appropriate. For example if multiple signers or non default digest 57 signers certificate can be obtained by other means: for example a previously
|
H A D | CMS_add1_signer.pod | 42 are not appropriate. For example if multiple signers or non default digest 64 the signers certificate can be obtained by other means: for example a
|
H A D | PKCS7_sign.pod | 71 which additional signers and capabilities can be added before finalization. 86 NULL if the B<PKCS7_PARTIAL> flag is set. One or more signers can be added
|
H A D | PKCS7_verify.pod | 116 PKCS7_get0_signers() returns all signers or NULL if an error occurred.
|
H A D | CMS_verify.pod | 140 CMS_get0_signers() returns all signers or NULL if an error occurred.
|
/openssl/apps/ |
H A D | smime.c | 22 static int save_certs(char *signerfile, STACK_OF(X509) *signers); 639 STACK_OF(X509) *signers; in smime_main() 646 signers = PKCS7_get0_signers(p7, other, flags); in smime_main() 647 if (!save_certs(signerfile, signers)) { in smime_main() 652 sk_X509_free(signers); in smime_main() 707 static int save_certs(char *signerfile, STACK_OF(X509) *signers) in save_certs() argument 717 for (i = 0; i < sk_X509_num(signers); i++) in save_certs() 718 PEM_write_bio_X509(tmp, sk_X509_value(signers, i)); in save_certs()
|
H A D | cms.c | 24 static int save_certs(char *signerfile, STACK_OF(X509) *signers); 1207 STACK_OF(X509) *signers = CMS_get0_signers(cms); in cms_main() 1209 if (!save_certs(signerfile, signers)) { in cms_main() 1215 sk_X509_free(signers); in cms_main() 1310 static int save_certs(char *signerfile, STACK_OF(X509) *signers) in save_certs() argument 1319 for (i = 0; i < sk_X509_num(signers); i++) in save_certs() 1320 PEM_write_bio_X509(tmp, sk_X509_value(signers, i)); in save_certs()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 94 STACK_OF(X509) *signers = NULL; in TS_RESP_verify_signature() 125 signers = PKCS7_get0_signers(token, certs, 0); in TS_RESP_verify_signature() 126 if (!signers || sk_X509_num(signers) != 1) in TS_RESP_verify_signature() 128 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature() 162 sk_X509_free(signers); in TS_RESP_verify_signature()
|
/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 95 Resign a message: take an existing message and one or more new signers. 187 Do not verify the signers certificate of a signed message. 191 Do not do chain verification of signers certificates; that is, do not 202 signed message, but the verifier must have a copy of the signers certificate 246 verified then the signers certificates will be written to this file if the 271 then many S/MIME mail clients check the signers certificate's email 312 will verify multiple signers on received messages. Some S/MIME clients 313 choke if a message contains multiple signers. It is possible to sign 361 the signers certificates. 383 Create a signed message with two signers:
|
H A D | openssl-cms.pod.in | 197 Resign a message: take an existing message and one or more new signers. 479 signed message but the verifier must have a copy of the signers certificate 517 If a message has been verified successfully then the signers certificate(s) 542 Do not verify the signers certificate of a signed message. 595 then many S/MIME mail clients check the signers certificate's email 655 will verify multiple signers on received messages. Some S/MIME clients 656 choke if a message contains multiple signers. It is possible to sign 751 the signers certificates. 795 Create a signed message with two signers, use key identifier:
|
H A D | openssl-ocsp.pod.in | 254 signers certificate. With this option the signers certificate must be specified 265 Don't verify the OCSP response signers certificate at all. Since this 280 Don't perform any additional checks on the OCSP response signers certificate. 281 That is do not make any checks to see if the signers certificate is authorised
|
H A D | openssl-crl2pkcs7.pod.in | 84 The output file is a PKCS#7 signed data structure containing no signers and
|
/openssl/doc/ |
H A D | README.md | 7 PGP fingerprints of authorised release signers
|
/openssl/crypto/cms/ |
H A D | cms_sd.c | 605 STACK_OF(X509) *signers = NULL; in STACK_OF() 614 if (!ossl_x509_add_cert_new(&signers, si->signer, in STACK_OF() 616 sk_X509_free(signers); in STACK_OF() 621 return signers; in STACK_OF()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 371 CMS_R_NO_SIGNERS:135:no signers 997 PKCS7_R_NO_SIGNERS:142:no signers
|
/openssl/ |
H A D | CHANGES.md | 10855 * New -resign option to smime utility. This adds one or more signers 10862 create PKCS7 structures containing multiple signers. Update smime 10863 application to support multiple signers.
|
Completed in 93 milliseconds