Home
last modified time | relevance | path

Searched refs:sender (Results 1 – 23 of 23) sorted by relevance

/openssl-master/test/recipes/80-test_cmp_http_data/
A Dtest_verification.csv12 1,config default with expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLAN…
13 0,expected sender missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trust…
14 0,wrong expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=Sample Cert/OU=R&D/O=Comp…
15 1,unknown attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/ABC…
16 0,extra attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN/seria…
17 0,double attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuing…
18 0,missing attribute in expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=ECC Issuin…
19 0,bad syntax in expected sender name: leading double '/', -section,, -recipient,_CA_DN, -expect_sen…
20 0,bad syntax in expected sender name: trailing double '/', -section,, -recipient,_CA_DN, -expect_se…
21 0,bad syntax in expected sender name: missing '=', -section,, -recipient,_CA_DN, -expect_sender,/C=…
[all …]
/openssl-master/test/
A Dcmp_hdr_test.c74 X509_NAME *sender = X509_NAME_new(); in execute_HDR_get0_senderNonce_test() local
77 if (!TEST_ptr(sender)) in execute_HDR_get0_senderNonce_test()
80 X509_NAME_ADD(sender, "CN", "A common sender name"); in execute_HDR_get0_senderNonce_test()
81 if (!TEST_int_eq(OSSL_CMP_CTX_set1_subjectName(fixture->cmp_ctx, sender), in execute_HDR_get0_senderNonce_test()
91 X509_NAME_free(sender); in execute_HDR_get0_senderNonce_test()
113 if (!TEST_int_eq(fixture->hdr->sender->type, GEN_DIRNAME)) in execute_HDR_set1_sender_test()
116 if (!TEST_int_eq(X509_NAME_cmp(fixture->hdr->sender->d.directoryName, in execute_HDR_set1_sender_test()
/openssl-master/doc/internal/man3/
A Dossl_cmp_hdr_init.pod62 ossl_cmp_hdr_get0_sendernonce() returns the sender nonce of the given PKIHeader.
67 ossl_cmp_hdr_set1_sender() sets the sender field in the given PKIHeader
76 The messageTime field contains the time at which the sender created the message.
82 else the subject key ID of the sender's protecting certificate.
110 The sender name is copied from the subject of the client cert, if any,
112 As required by RFC 4210 section 5.1.1., if the sender name is not known
A Dossl_cmp_msg_check_update.pod30 =item its sender is of appropriate type (currently only B<X509_NAME>)
31 and matches any expected sender or srvCert subject given in B<ctx>,
/openssl-master/crypto/cmp/
A Dcmp_vfy.c265 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable()
452 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() local
459 if (sender == NULL || msg->body == NULL) in check_msg_find_cert()
461 if (sender->type != GEN_DIRNAME) { in check_msg_find_cert()
502 sname = X509_NAME_oneline(sender->d.directoryName, NULL, 0); in check_msg_find_cert()
675 if (hdr->sender->type != GEN_DIRNAME) { in ossl_cmp_msg_check_update()
687 if (!check_name(ctx, 0, "sender DN field", hdr->sender->d.directoryName, in ossl_cmp_msg_check_update()
A Dcmp_hdr.c119 return set1_general_name(&hdr->sender, nm); in ossl_cmp_hdr_set1_sender()
294 const X509_NAME *sender; in ossl_cmp_hdr_init() local
308 sender = ctx->cert != NULL ? X509_get_subject_name(ctx->cert) : in ossl_cmp_hdr_init()
311 if (!ossl_cmp_hdr_set1_sender(hdr, sender)) in ossl_cmp_hdr_init()
A Dcmp_server.c465 if (hdr->sender->type != GEN_DIRNAME) { in OSSL_CMP_SRV_process_request()
469 if (!OSSL_CMP_CTX_set1_recipient(ctx, hdr->sender->d.directoryName)) in OSSL_CMP_SRV_process_request()
A Dcmp_protect.c324 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect()
A Dcmp_asn.c422 ASN1_SIMPLE(OSSL_CMP_PKIHEADER, sender, GENERAL_NAME),
A Dcmp_local.h484 GENERAL_NAME *sender; member
/openssl-master/doc/man3/
A DOSSL_CMP_validate_msg.pod19 which includes validating CMP message sender certificates and their paths
27 If no such sender cert has been pinned then candidate sender certificates are
32 the I<msg> sender DN (as far as present), and its subject key identifier
A DOSSL_CMP_CTX_new.pod413 and as default value for the expected sender of CMP responses.
416 expected in the sender field of CMP response messages.
423 expected sender name will continue to match after updates of the server cert.
451 The subject of this I<cert> will be used as the sender field of outgoing
487 According to RFC 4210 section 5.1.1, if no value for the sender field in
490 then the sender field will contain the NULL-DN
534 The I<subjectName> is also used as fallback for the sender field
565 The subject of the reference certificate is used as the sender field value
647 OSSL_CMP_CTX_set1_senderNonce() stores the last sent sender I<nonce> in
A DSSL_alert_type_string.pod96 sender was unable to negotiate an acceptable set of security
153 applied, the sender decided not to proceed with negotiation.
A DSSL_CTX_set_msg_callback.pod97 necessarily the protocol version used by the sender of the message: If
/openssl-master/ssl/
A Ds3_enc.c416 size_t ssl3_final_finish_mac(SSL *s, const char *sender, size_t len, in ssl3_final_finish_mac() argument
450 if (sender != NULL) { in ssl3_final_finish_mac()
455 if (EVP_DigestUpdate(ctx, sender, len) <= 0 in ssl3_final_finish_mac()
A Dssl_local.h2493 __owur size_t ssl3_final_finish_mac(SSL *s, const char *sender, size_t slen,
/openssl-master/ssl/statem/
A Dstatem_lib.c566 const char *sender; in tls_construct_finished() local
587 sender = s->method->ssl3_enc->server_finished_label; in tls_construct_finished()
590 sender = s->method->ssl3_enc->client_finished_label; in tls_construct_finished()
595 sender, slen, in tls_construct_finished()
702 const char *sender; in ssl3_take_mac() local
706 sender = s->method->ssl3_enc->server_finished_label; in ssl3_take_mac()
709 sender = s->method->ssl3_enc->client_finished_label; in ssl3_take_mac()
714 s->method->ssl3_enc->final_finish_mac(s, sender, slen, in ssl3_take_mac()
/openssl-master/crypto/crmf/
A Dcrmf_local.h233 /* 0 */ GENERAL_NAME *sender; member
A Dcrmf_asn.c106 ASN1_EXP(OSSL_CRMF_POPOSIGNINGKEYINPUT_AUTHINFO, value.sender,
/openssl-master/include/openssl/
A Dcmp.h.in87 * -- invalid sender nonce, either missing or wrong size
97 * -- the sender was not authorized to make the preceding
/openssl-master/doc/man1/
A Dopenssl-cmp.pod.in276 the subject DN is used as fallback sender of outgoing CMP messages.
411 Its subject is used as sender of outgoing messages if B<-cert> is not given.
560 and as default value for the expected sender of incoming CMP messages.
564 Distinguished Name (DN) expected in the sender field of incoming CMP messages.
572 expected sender name will continue to match after updates of the server cert.
638 if no sender name can be determined from the B<-cert> or <-subject> options and
656 The subject of this certificate will be used as sender of outgoing CMP messages,
/openssl-master/doc/man7/
A Dprovider-kdf.pod218 Sets an optional random string that is provided by the sender called
/openssl-master/crypto/err/
A Dopenssl.txt237 CMP_R_MISSING_SENDER_IDENTIFICATION:111:missing sender identification
243 CMP_R_NO_SUITABLE_SENDER_CERT:145:no suitable sender cert
254 sender generalname type not supported

Completed in 44 milliseconds