/openssl/crypto/cms/ |
H A D | cms_kari.c | 119 CMS_KeyAgreeRecipientIdentifier *rid = rek->rid; in CMS_RecipientEncryptedKey_get0_id() local 121 if (rid->type == CMS_REK_ISSUER_SERIAL) { in CMS_RecipientEncryptedKey_get0_id() 132 } else if (rid->type == CMS_REK_KEYIDENTIFIER) { in CMS_RecipientEncryptedKey_get0_id() 136 *tm = rid->d.rKeyId->date; in CMS_RecipientEncryptedKey_get0_id() 138 *other = rid->d.rKeyId->other; in CMS_RecipientEncryptedKey_get0_id() 151 CMS_KeyAgreeRecipientIdentifier *rid = rek->rid; in CMS_RecipientEncryptedKey_cert_cmp() local 153 if (rid->type == CMS_REK_ISSUER_SERIAL) in CMS_RecipientEncryptedKey_cert_cmp() 155 else if (rid->type == CMS_REK_KEYIDENTIFIER) in CMS_RecipientEncryptedKey_cert_cmp() 368 rek->rid->type = CMS_REK_KEYIDENTIFIER; in ossl_cms_RecipientInfo_kari_init() 370 if (rek->rid->d.rKeyId == NULL) in ossl_cms_RecipientInfo_kari_init() [all …]
|
H A D | cms_local.h | 157 CMS_RecipientIdentifier *rid; member 196 CMS_KeyAgreeRecipientIdentifier *rid; member
|
H A D | cms_asn1.c | 112 ASN1_SIMPLE(CMS_KeyTransRecipientInfo, rid, CMS_SignerIdentifier), 144 ASN1_SIMPLE(CMS_RecipientEncryptedKey, rid, CMS_KeyAgreeRecipientIdentifier),
|
H A D | cms_env.c | 357 if (!ossl_cms_set1_SignerIdentifier(ktri->rid, recip, idtype, ctx)) in cms_RecipientInfo_ktri_init() 480 return ossl_cms_SignerIdentifier_get0_signer_id(ktri->rid, keyid, issuer, in CMS_RecipientInfo_ktri_get0_signer_id() 490 return ossl_cms_SignerIdentifier_cert_cmp(ri->d.ktri->rid, cert); in CMS_RecipientInfo_ktri_cert_cmp()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 187 const OCSP_RESPID *rid = &bs->tbsResponseData.responderId; in OCSP_resp_get0_id() local 189 if (rid->type == V_OCSP_RESPID_NAME) { in OCSP_resp_get0_id() 190 *pname = rid->value.byName; in OCSP_resp_get0_id() 192 } else if (rid->type == V_OCSP_RESPID_KEY) { in OCSP_resp_get0_id() 193 *pid = rid->value.byKey; in OCSP_resp_get0_id() 205 const OCSP_RESPID *rid = &bs->tbsResponseData.responderId; in OCSP_resp_get1_id() local 207 if (rid->type == V_OCSP_RESPID_NAME) { in OCSP_resp_get1_id() 208 *pname = X509_NAME_dup(rid->value.byName); in OCSP_resp_get1_id() 210 } else if (rid->type == V_OCSP_RESPID_KEY) { in OCSP_resp_get1_id() 211 *pid = ASN1_OCTET_STRING_dup(rid->value.byKey); in OCSP_resp_get1_id()
|
H A D | ocsp_prn.c | 140 OCSP_RESPID *rid = NULL; in OCSP_RESPONSE_print() local 173 rid = &rd->responderId; in OCSP_RESPONSE_print() 174 switch (rid->type) { in OCSP_RESPONSE_print() 176 X509_NAME_print_ex(bp, rid->value.byName, 0, XN_FLAG_ONELINE); in OCSP_RESPONSE_print() 179 i2a_ASN1_STRING(bp, rid->value.byKey, 0); in OCSP_RESPONSE_print()
|
H A D | ocsp_srv.c | 171 OCSP_RESPID *rid; in OCSP_basic_sign_ctx() local 191 rid = &brsp->tbsResponseData.responderId; in OCSP_basic_sign_ctx() 193 if (!OCSP_RESPID_set_by_key(rid, signer)) in OCSP_basic_sign_ctx() 195 } else if (!OCSP_RESPID_set_by_name(rid, signer)) { in OCSP_basic_sign_ctx()
|
H A D | ocsp_vfy.c | 172 OCSP_RESPID *rid = &bs->tbsResponseData.responderId; in ocsp_find_signer() local 174 if ((signer = ocsp_find_signer_sk(certs, rid)) != NULL) { in ocsp_find_signer() 179 (signer = ocsp_find_signer_sk(bs->certs, rid))) { in ocsp_find_signer()
|
/openssl/crypto/cmp/ |
H A D | cmp_client.c | 119 static int is_crep_with_waiting(const OSSL_CMP_MSG *resp, int rid) in is_crep_with_waiting() argument 129 crep = ossl_cmp_certrepmessage_get0_certresponse(crepmsg, rid); in is_crep_with_waiting() 292 if ((preq = ossl_cmp_pollReq_new(ctx, rid)) == NULL) in poll_for_response() 369 } else if (is_crep_with_waiting(prep, rid) in poll_for_response() 407 if ((is_crep_with_waiting(rep, rid) in save_senderNonce_if_waiting() 654 static int cert_response(OSSL_CMP_CTX *ctx, int sleep, int rid, in cert_response() argument 687 if (rid == OSSL_CMP_CERTREQID_NONE) { in cert_response() 689 rid = ossl_cmp_asn1_get_int(crep->certReqId); in cert_response() 690 if (rid < OSSL_CMP_CERTREQID_NONE) { in cert_response() 838 if (!save_senderNonce_if_waiting(ctx, rep, rid)) in OSSL_CMP_try_certreq() [all …]
|
H A D | cmp_msg.c | 271 OSSL_CRMF_MSG *OSSL_CMP_CTX_setup_CRM(OSSL_CMP_CTX *ctx, int for_KUR, int rid) in OSSL_CMP_CTX_setup_CRM() argument 300 if (!OSSL_CRMF_MSG_set_certReqId(crm, rid) in OSSL_CMP_CTX_setup_CRM() 978 static int suitable_rid(const ASN1_INTEGER *certReqId, int rid) in suitable_rid() argument 982 if (rid == OSSL_CMP_CERTREQID_NONE) in suitable_rid() 990 return rid == trid; in suitable_rid() 1000 int rid) in ossl_cmp_pollrepcontent_get0_pollrep() argument 1010 if (suitable_rid(pollRep->certReqId, rid)) in ossl_cmp_pollrepcontent_get0_pollrep() 1015 "expected certReqId = %d", rid); in ossl_cmp_pollrepcontent_get0_pollrep() 1026 int rid) in ossl_cmp_certrepmessage_get0_certresponse() argument 1036 if (suitable_rid(crep->certReqId, rid)) in ossl_cmp_certrepmessage_get0_certresponse() [all …]
|
H A D | cmp_local.h | 987 int rid); 990 int rid);
|
/openssl/crypto/x509/ |
H A D | v3_genn.c | 156 result = OBJ_cmp(a->d.rid, b->d.rid); in GENERAL_NAME_cmp() 207 a->d.rid = value; in GENERAL_NAME_set0_value() 239 return a->d.rid; in GENERAL_NAME_get0_value()
|
H A D | v3_san.c | 199 i2t_ASN1_OBJECT(oline, 256, gen->d.rid); in STACK_OF() 295 i2a_ASN1_OBJECT(out, gen->d.rid); in GENERAL_NAME_print() 544 gen->d.rid = obj; in a2i_GENERAL_NAME()
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_MSG_set0_validity.pod | 21 int OSSL_CRMF_MSG_set_certReqId(OSSL_CRMF_MSG *crm, int rid); 38 int rid, int acceptRAVerified, 49 OSSL_CRMF_MSG_set_certReqId() sets I<rid> as the certReqId of I<crm>. 96 the given I<rid> in the list of I<reqs>. Optionally accepts RAVerified. It can
|
H A D | OSSL_CMP_MSG_get0_header.pod | 26 OSSL_CRMF_MSG *OSSL_CMP_CTX_setup_CRM(OSSL_CMP_CTX *ctx, int for_KUR, int rid); 53 The I<rid> argument defines the request identifier to use, which typically is 0.
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 275 int OSSL_CRMF_MSG_set_certReqId(OSSL_CRMF_MSG *crm, int rid) in OSSL_CRMF_MSG_set_certReqId() argument 282 return ASN1_INTEGER_set(crm->certReq->certReqId, rid); in OSSL_CRMF_MSG_set_certReqId() 462 int rid, int acceptRAVerified, in OSSL_CRMF_MSGS_verify_popo() argument 471 if (reqs == NULL || (req = sk_OSSL_CRMF_MSG_value(reqs, rid)) == NULL) { in OSSL_CRMF_MSGS_verify_popo()
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 144 int OSSL_CRMF_MSG_set_certReqId(OSSL_CRMF_MSG *crm, int rid); 158 int rid, int acceptRAVerified,
|
H A D | cmp.h.in | 471 OSSL_CRMF_MSG *OSSL_CMP_CTX_setup_CRM(OSSL_CMP_CTX *ctx, int for_KUR, int rid);
|
H A D | x509v3.h.in | 176 ASN1_OBJECT *rid; /* registeredID */ member
|
/openssl/ |
H A D | CHANGES.md | 4294 * Get rid of Makefile.shared, and in the process, make the processing 11471 * The fix in 0.9.8c that supposedly got rid of unsafe 19467 * Reorganise the PKCS#7 library and get rid of some of the more obvious 19866 * Got rid of old SSL2_CLIENT_VERSION (inconsistently used) and 19908 * Get rid of redundant BN file bn_mulw.c, and rename bn_div64 to 20162 * Get rid of remaining C++-style comments which strict C compilers hate.
|