/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_verification.csv | 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 1,unknown attribute in recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted… 8 0,wrong syntax in recipient name: trailing double '/' after value, -section,, -recipient,_CA_DN//,B… 9 0,wrong syntax in recipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,t… 10 0,wrong syntax in recipient name: C too long, -section,, -recipient,/CN=ECC Issuing CA v10/OU=For t… 26 0,wrong srvcert, -section,, -recipient,"""",BLANK,, -srvcert,signer.crt, -trusted,"""",BLANK,,BLANK… 30 1,no -trusted but srvcert, -section,, -recipient,_CA_DN,BLANK,, -srvcert,_SERVER_CERT,BLANK,,BLANK,… 31 0,trusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,,BLANK,,BLANK, -unprote… 33 0,trusted empty file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,empty.txt,BLANK,,BLANK, … [all …]
|
/openssl-master/doc/man3/ |
A D | CMS_decrypt.pod | 21 or AuthEnvelopedData structure. B<pkey> is the private key of the recipient, 22 B<cert> is the recipient's certificate, B<out> is a BIO to write the content to 44 not. If no recipient succeeds then a random symmetric key is used to decrypt 47 error when all recipient encrypted keys failed to decrypt an attacker could 50 recipient encrypted key can be decrypted B<without> generating a random 55 It is possible to determine the correct recipient key by other means (for
|
A D | CMS_add1_recipient_cert.pod | 27 CMS_add1_recipient() adds recipient B<recip> and provides the originator pkey 32 CMS_add1_recipient_cert() adds recipient B<recip> to CMS_ContentInfo enveloped 51 OpenSSL will by default identify recipient certificates using issuer name 53 identifier value instead. An error occurs if all recipient certificates do not
|
A D | PKCS7_decrypt.pod | 16 structure. B<pkey> is the private key of the recipient, B<cert> is the 38 PKCS7_decrypt() must be passed the correct recipient key and certificate. It would
|
A D | CMS_get0_RecipientInfos.pod | 52 CMS_RecipientInfo_ktri_get0_signer_id() retrieves the certificate recipient 103 recipient keys using any appropriate technique when the simpler method 115 The CMS_RecipientInfo_encrypt() can be used to add a new recipient to an 118 available, it will then add a new recipient using a function such as
|
A D | CMS_encrypt.pod | 20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates. 53 OpenSSL will by default identify recipient certificates using issuer name 55 identifier value instead. An error occurs if all recipient certificates do not
|
A D | OSSL_CMP_HDR_get0_transactionID.pod | 23 OSSL_CMP_HDR_get0_recipNonce returns the recipient nonce of the given PKIHeader.
|
A D | PKCS7_encrypt.pod | 21 I<certs> is a list of recipient certificates. I<in> is the content to be 26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient
|
A D | OSSL_CMP_CTX_new.pod | 412 as default value for the recipient of CMP requests 497 OSSL_CMP_CTX_set1_recipient() sets the recipient name that will be used in the 500 The recipient field in the header of a CMP message is mandatory. 501 If not given explicitly the recipient is determined in the following order: 567 Its issuer is used as default recipient in CMP message headers.
|
A D | BF_encrypt.pod | 67 recipient needs to know what it was initialized with, or it won't be able
|
A D | SSL_alert_type_string.pod | 208 is not appropriate, the recipient should respond with this alert;
|
/openssl-master/crypto/cmp/ |
A D | cmp_hdr.c | 126 return set1_general_name(&hdr->recipient, nm); in ossl_cmp_hdr_set1_recipient() 315 if (ctx->recipient != NULL) in ossl_cmp_hdr_init() 316 rcp = ctx->recipient; in ossl_cmp_hdr_init()
|
A D | cmp_local.h | 90 X509_NAME *recipient; /* to set in recipient in pkiheader */ member 485 GENERAL_NAME *recipient; member
|
A D | cmp_ctx.c | 203 X509_NAME_free(ctx->recipient); in OSSL_CMP_CTX_free() 652 DEFINE_OSSL_CMP_CTX_set1(recipient, X509_NAME) in DEFINE_OSSL_CMP_CTX_set1_up_ref()
|
A D | cmp_asn.c | 423 ASN1_SIMPLE(OSSL_CMP_PKIHEADER, recipient, GENERAL_NAME),
|
/openssl-master/doc/man1/ |
A D | openssl-cms.pod.in | 66 [I<recipient-cert> ...] 170 Encrypt data for the given recipient certificates. Input file is the message 174 Note that no revocation check is done for the recipient cert, so if that 319 Specify password for recipient. 381 When decrypting a message this specifies the certificate of the recipient. 385 each recipient. This form B<must> be used if customised parameters are 391 =item I<recipient-cert> ... 484 be provided by all recipient or first tier recipients (those mailed directly 664 If the B<-decrypt> option is used without a recipient certificate then an 665 attempt is made to locate the recipient by trying each potential recipient [all …]
|
A D | openssl-cmp.pod.in | 54 [B<-recipient> I<name>] 294 If provided and neither B<-recipient> nor B<-srvcert> is given, 295 the issuer DN is used as fallback recipient of outgoing CMP messages. 412 Its issuer is used as default recipient in CMP message headers 413 if neither B<-recipient>, B<-srvcert>, nor B<-issuer> is given. 475 =item B<-recipient> I<name> 480 The recipient field in the header of a CMP message is mandatory. 481 If not given explicitly the recipient is determined in the following order: 559 as default value for the recipient of CMP requests 1135 so we specify the name of the CA with the B<-recipient> option [all …]
|
A D | openssl-smime.pod.in | 73 Encrypt mail for the given recipient certificates. Input file is the message 76 Note that no revocation check is done for the recipient cert, so if that
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_hdr_init.pod | 70 ossl_cmp_hdr_set1_recipient() sets the recipient field in the given 72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
|
A D | ossl_cmp_ctx_set1_caPubs.pod | 53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
|
/openssl-master/test/ |
A D | cmp_hdr_test.c | 143 if (!TEST_int_eq(fixture->hdr->recipient->type, GEN_DIRNAME)) in execute_HDR_set1_recipient_test() 146 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->recipient->d.directoryName, in execute_HDR_set1_recipient_test()
|
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/ |
A D | test.cnf | 28 recipient = $ca_dn
|
/openssl-master/doc/man7/ |
A D | openssl-core.h.pod | 35 Any function identity not recognised by the recipient of this type
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 335 CMS_R_NO_MATCHING_RECIPIENT:132:no matching recipient 347 CMS_R_RECIPIENT_ERROR:137:recipient error 370 CMS_R_UNSUPPORTED_RECIPIENT_TYPE:154:unsupported recipient type 913 PKCS7_R_ERROR_ADDING_RECIPIENT:120:error adding recipient 920 PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE:115:no recipient matches certificate
|
/openssl-master/apps/ |
A D | openssl-vms.cnf | 344 recipient = "/C=FI/O=Insta Demo/CN=Insta Demo CA" # or set srvcert or issuer
|