Home
last modified time | relevance | path

Searched refs:recipient (Results 1 – 25 of 37) sorted by relevance

12

/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_verification.csv4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp…
6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -…
7 1,unknown attribute in recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted…
8 0,wrong syntax in recipient name: trailing double '/' after value, -section,, -recipient,_CA_DN//,B…
9 0,wrong syntax in recipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,t…
10 0,wrong syntax in recipient name: C too long, -section,, -recipient,/CN=ECC Issuing CA v10/OU=For t…
36 0,no -trusted and no -srvcert, -section,, -recipient,_CA_DN,BLANK,,BLANK,,BLANK,,BLANK,,BLANK, -unp…
37 0,trusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,,BLANK,,BLANK, -unprote…
39 0,trusted empty file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,empty.txt,BLANK,,BLANK, …
40 0,trusted random file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,random.bin,BLANK,,BLANK…
[all …]
/openssl/doc/man3/
H A DCMS_add1_recipient_cert.pod27 CMS_add1_recipient() adds recipient B<recip> and provides the originator pkey
32 CMS_add1_recipient_cert() adds recipient B<recip> to CMS_ContentInfo enveloped
51 OpenSSL will by default identify recipient certificates using issuer name
53 identifier value instead. An error occurs if all recipient certificates do not
H A DCMS_decrypt.pod26 with the recipient private key I<pkey> if I<pkey> is not NULL.
62 not. If no recipient succeeds then a random symmetric key is used to decrypt
65 error when all recipient encrypted keys failed to decrypt an attacker could
68 recipient encrypted key can be decrypted B<without> generating a random
73 It is possible to determine the correct recipient key by other means (for
76 or use CMS_decrypt_set1_password() if the recipient has a symmetric key.
H A DPKCS7_decrypt.pod16 structure. B<pkey> is the private key of the recipient, B<cert> is the
38 PKCS7_decrypt() must be passed the correct recipient key and certificate. It would
H A DCMS_get0_RecipientInfos.pod52 CMS_RecipientInfo_ktri_get0_signer_id() retrieves the certificate recipient
103 recipient keys using any appropriate technique when the simpler method
115 The CMS_RecipientInfo_encrypt() can be used to add a new recipient to an
118 available, it will then add a new recipient using a function such as
H A DCMS_encrypt.pod20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates.
53 OpenSSL will by default identify recipient certificates using issuer name
55 identifier value instead. An error occurs if all recipient certificates do not
H A DPKCS7_encrypt.pod21 I<certs> is a list of recipient certificates. I<in> is the content to be
26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient
H A DOSSL_CMP_HDR_get0_transactionID.pod26 OSSL_CMP_HDR_get0_recipNonce returns the recipient nonce of the given PKIHeader.
H A DOSSL_DISPATCH.pod49 Any function identity not recognised by the recipient of this type
H A DCMS_EncryptedData_decrypt.pod37 is not NULL, otherwise the private key of the recipient I<pkey>.
H A DOSSL_HPKE_CTX_new.pod250 OSSL_HPKE_encap()) the sender's public value using the recipient's public key,
252 (I<enc>) to be sent to the recipient in whatever protocol is using HPKE. Having done the
256 OSSL_HPKE_encap() uses the HPKE context I<ctx>, the recipient public value
289 In order to enable encapsulation, the recipient needs to make it's public value
313 produced by OSSL_HPKE_encap() (I<enc>) and the recipient's L<EVP_PKEY(3)>
319 OSSL_HPKE_open() is used by the recipient to decrypt the ciphertext I<ct> of
H A DOSSL_CMP_CTX_new.pod455 as default value for the recipient of CMP requests
549 OSSL_CMP_CTX_set1_recipient() sets the recipient name that will be used in the
552 The recipient field in the header of a CMP message is mandatory.
553 If not given explicitly the recipient is determined in the following order:
633 Its issuer is used as default recipient in CMP message headers.
H A DBF_encrypt.pod67 recipient needs to know what it was initialized with, or it won't be able
/openssl/crypto/cmp/
H A Dcmp_hdr.c108 return GENERAL_NAME_set1_X509_NAME(&hdr->recipient, nm); in ossl_cmp_hdr_set1_recipient()
297 if (ctx->recipient != NULL) in ossl_cmp_hdr_init()
298 rcp = ctx->recipient; in ossl_cmp_hdr_init()
H A Dcmp_local.h94 X509_NAME *recipient; /* to set in recipient in pkiheader */ member
541 GENERAL_NAME *recipient; member
H A Dcmp_ctx.c225 X509_NAME_free(ctx->recipient); in OSSL_CMP_CTX_free()
616 DEFINE_OSSL_CMP_CTX_set1(recipient, X509_NAME)
/openssl/doc/man7/
H A DEVP_KEM-EC.pod28 recipient public key. A HKDF operation using the keymaterial and a kem context
31 The decapsulate function uses the recipient private key and the
H A DEVP_KEM-X25519.pod29 supplied recipient public key. A HKDF operation using the keymaterial and a kem
32 The decapsulate function uses the recipient private key and the
/openssl/doc/man1/
H A Dopenssl-cms.pod.in67 [I<recipient-cert> ...]
171 Encrypt data for the given recipient certificates. Input file is the message
175 Note that no revocation check is done for the recipient cert, so if that
330 Specify password for recipient.
392 When decrypting a message this specifies the certificate of the recipient.
396 each recipient. This form B<must> be used if customised parameters are
402 =item I<recipient-cert> ...
496 be provided by all recipient or first tier recipients (those mailed directly
676 If the B<-decrypt> option is used without a recipient certificate then an
677 attempt is made to locate the recipient by trying each potential recipient
[all …]
H A Dopenssl-cmp.pod.in57 [B<-recipient> I<name>]
464 Its issuer is used as default recipient in CMP message headers
465 if neither B<-recipient>, B<-srvcert>, nor B<-issuer> is given.
473 If provided and neither B<-recipient> nor B<-srvcert> is given,
474 the issuer DN is used as fallback recipient of outgoing CMP messages.
548 =item B<-recipient> I<name>
553 The recipient field in the header of a CMP message is mandatory.
554 If not given explicitly the recipient is determined in the following order:
642 as default value for the recipient of CMP requests
1410 so we specify the name of the CA with the B<-recipient> option
[all …]
/openssl/test/smime-eml/
H A DSignedInvalidMappingFromanyPolicyTest7.eml1 To: recipient@testcertificates.gov
/openssl/doc/internal/man3/
H A Dossl_cmp_hdr_init.pod70 ossl_cmp_hdr_set1_recipient() sets the recipient field in the given
72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
H A Dossl_cmp_ctx_set1_caPubs.pod53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
/openssl/test/
H A Dcmp_hdr_test.c154 if (!TEST_int_eq(fixture->hdr->recipient->type, GEN_DIRNAME)) in execute_HDR_set1_recipient_test()
157 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->recipient->d.directoryName, in execute_HDR_set1_recipient_test()
/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dtest.cnf28 recipient = $ca_dn

Completed in 58 milliseconds

12