/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 1,unknown attribute in recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted… 8 0,wrong syntax in recipient name: trailing double '/' after value, -section,, -recipient,_CA_DN//,B… 9 0,wrong syntax in recipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,t… 10 0,wrong syntax in recipient name: C too long, -section,, -recipient,/CN=ECC Issuing CA v10/OU=For t… 36 0,no -trusted and no -srvcert, -section,, -recipient,_CA_DN,BLANK,,BLANK,,BLANK,,BLANK,,BLANK, -unp… 37 0,trusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,,BLANK,,BLANK, -unprote… 39 0,trusted empty file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,empty.txt,BLANK,,BLANK, … 40 0,trusted random file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,random.bin,BLANK,,BLANK… [all …]
|
/openssl/doc/man3/ |
H A D | CMS_add1_recipient_cert.pod | 27 CMS_add1_recipient() adds recipient B<recip> and provides the originator pkey 32 CMS_add1_recipient_cert() adds recipient B<recip> to CMS_ContentInfo enveloped 51 OpenSSL will by default identify recipient certificates using issuer name 53 identifier value instead. An error occurs if all recipient certificates do not
|
H A D | CMS_decrypt.pod | 26 with the recipient private key I<pkey> if I<pkey> is not NULL. 62 not. If no recipient succeeds then a random symmetric key is used to decrypt 65 error when all recipient encrypted keys failed to decrypt an attacker could 68 recipient encrypted key can be decrypted B<without> generating a random 73 It is possible to determine the correct recipient key by other means (for 76 or use CMS_decrypt_set1_password() if the recipient has a symmetric key.
|
H A D | PKCS7_decrypt.pod | 16 structure. B<pkey> is the private key of the recipient, B<cert> is the 38 PKCS7_decrypt() must be passed the correct recipient key and certificate. It would
|
H A D | CMS_get0_RecipientInfos.pod | 52 CMS_RecipientInfo_ktri_get0_signer_id() retrieves the certificate recipient 103 recipient keys using any appropriate technique when the simpler method 115 The CMS_RecipientInfo_encrypt() can be used to add a new recipient to an 118 available, it will then add a new recipient using a function such as
|
H A D | CMS_encrypt.pod | 20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates. 53 OpenSSL will by default identify recipient certificates using issuer name 55 identifier value instead. An error occurs if all recipient certificates do not
|
H A D | PKCS7_encrypt.pod | 21 I<certs> is a list of recipient certificates. I<in> is the content to be 26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient
|
H A D | OSSL_CMP_HDR_get0_transactionID.pod | 26 OSSL_CMP_HDR_get0_recipNonce returns the recipient nonce of the given PKIHeader.
|
H A D | OSSL_DISPATCH.pod | 49 Any function identity not recognised by the recipient of this type
|
H A D | CMS_EncryptedData_decrypt.pod | 37 is not NULL, otherwise the private key of the recipient I<pkey>.
|
H A D | OSSL_HPKE_CTX_new.pod | 250 OSSL_HPKE_encap()) the sender's public value using the recipient's public key, 252 (I<enc>) to be sent to the recipient in whatever protocol is using HPKE. Having done the 256 OSSL_HPKE_encap() uses the HPKE context I<ctx>, the recipient public value 289 In order to enable encapsulation, the recipient needs to make it's public value 313 produced by OSSL_HPKE_encap() (I<enc>) and the recipient's L<EVP_PKEY(3)> 319 OSSL_HPKE_open() is used by the recipient to decrypt the ciphertext I<ct> of
|
H A D | OSSL_CMP_CTX_new.pod | 455 as default value for the recipient of CMP requests 549 OSSL_CMP_CTX_set1_recipient() sets the recipient name that will be used in the 552 The recipient field in the header of a CMP message is mandatory. 553 If not given explicitly the recipient is determined in the following order: 633 Its issuer is used as default recipient in CMP message headers.
|
H A D | BF_encrypt.pod | 67 recipient needs to know what it was initialized with, or it won't be able
|
/openssl/crypto/cmp/ |
H A D | cmp_hdr.c | 108 return GENERAL_NAME_set1_X509_NAME(&hdr->recipient, nm); in ossl_cmp_hdr_set1_recipient() 297 if (ctx->recipient != NULL) in ossl_cmp_hdr_init() 298 rcp = ctx->recipient; in ossl_cmp_hdr_init()
|
H A D | cmp_local.h | 94 X509_NAME *recipient; /* to set in recipient in pkiheader */ member 541 GENERAL_NAME *recipient; member
|
H A D | cmp_ctx.c | 225 X509_NAME_free(ctx->recipient); in OSSL_CMP_CTX_free() 616 DEFINE_OSSL_CMP_CTX_set1(recipient, X509_NAME)
|
/openssl/doc/man7/ |
H A D | EVP_KEM-EC.pod | 28 recipient public key. A HKDF operation using the keymaterial and a kem context 31 The decapsulate function uses the recipient private key and the
|
H A D | EVP_KEM-X25519.pod | 29 supplied recipient public key. A HKDF operation using the keymaterial and a kem 32 The decapsulate function uses the recipient private key and the
|
/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 67 [I<recipient-cert> ...] 171 Encrypt data for the given recipient certificates. Input file is the message 175 Note that no revocation check is done for the recipient cert, so if that 330 Specify password for recipient. 392 When decrypting a message this specifies the certificate of the recipient. 396 each recipient. This form B<must> be used if customised parameters are 402 =item I<recipient-cert> ... 496 be provided by all recipient or first tier recipients (those mailed directly 676 If the B<-decrypt> option is used without a recipient certificate then an 677 attempt is made to locate the recipient by trying each potential recipient [all …]
|
H A D | openssl-cmp.pod.in | 57 [B<-recipient> I<name>] 464 Its issuer is used as default recipient in CMP message headers 465 if neither B<-recipient>, B<-srvcert>, nor B<-issuer> is given. 473 If provided and neither B<-recipient> nor B<-srvcert> is given, 474 the issuer DN is used as fallback recipient of outgoing CMP messages. 548 =item B<-recipient> I<name> 553 The recipient field in the header of a CMP message is mandatory. 554 If not given explicitly the recipient is determined in the following order: 642 as default value for the recipient of CMP requests 1410 so we specify the name of the CA with the B<-recipient> option [all …]
|
/openssl/test/smime-eml/ |
H A D | SignedInvalidMappingFromanyPolicyTest7.eml | 1 To: recipient@testcertificates.gov
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_hdr_init.pod | 70 ossl_cmp_hdr_set1_recipient() sets the recipient field in the given 72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
|
H A D | ossl_cmp_ctx_set1_caPubs.pod | 53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
|
/openssl/test/ |
H A D | cmp_hdr_test.c | 154 if (!TEST_int_eq(fixture->hdr->recipient->type, GEN_DIRNAME)) in execute_HDR_set1_recipient_test() 157 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->recipient->d.directoryName, in execute_HDR_set1_recipient_test()
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 28 recipient = $ca_dn
|