Home
last modified time | relevance | path

Searched refs:token (Results 1 – 17 of 17) sorted by relevance

/openssl-master/crypto/ts/
A Dts_rsp_verify.c102 if (!token) { in TS_RESP_verify_signature()
106 if (!PKCS7_type_is_signed(token)) { in TS_RESP_verify_signature()
110 sinfos = PKCS7_get_signer_info(token); in TS_RESP_verify_signature()
116 if (PKCS7_get_detached(token)) { in TS_RESP_verify_signature()
125 signers = PKCS7_get0_signers(token, certs, 0); in TS_RESP_verify_signature()
140 p7bio = PKCS7_dataInit(token, NULL); in TS_RESP_verify_signature()
146 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature()
251 PKCS7 *token = response->token; in TS_RESP_verify_response() local
257 if (!int_ts_RESP_verify_token(ctx, token, tst_info)) in TS_RESP_verify_response()
269 int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token) in TS_RESP_verify_token() argument
[all …]
A Dts_asn1.c139 if (a->token) {
145 a->tst_info = PKCS7_to_TS_TST_INFO(a->token);
175 ASN1_OPT(TS_RESP, token, PKCS7),
204 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token) in PKCS7_to_TS_TST_INFO() argument
212 if (!PKCS7_type_is_signed(token)) { in PKCS7_to_TS_TST_INFO()
216 if (PKCS7_get_detached(token)) { in PKCS7_to_TS_TST_INFO()
220 pkcs7_signed = token->d.sign; in PKCS7_to_TS_TST_INFO()
A Dts_rsp_utils.c42 PKCS7_free(a->token); in TS_RESP_set_tst_info()
43 a->token = p7; in TS_RESP_set_tst_info()
50 return a->token; in TS_RESP_get_token()
A Dts_local.h27 PKCS7 *token; member
/openssl-master/doc/man1/
A Dopenssl-ts.pod.in78 signs them and sends the timestamp token back to the client. By
84 The TSA client receives the timestamp token and verifies the
199 and the timestamp token itself (ContentInfo), if the token generation was
201 response or timestamp token based on a request and printing the
204 otherwise it is a timestamp token (ContentInfo).
270 token or you want to extract the timestamp token from a response. If
272 'granted' status info is added to the token. (Optional)
557 To create a timestamp token instead of timestamp response:
565 To extract the timestamp token from a response:
586 To verify a timestamp token against the original data file:
[all …]
/openssl-master/apps/
A Dts.c633 PKCS7 *token = TS_RESP_get_token(response); in reply_command() local
634 if (!i2d_PKCS7_bio(out_bio, token)) in reply_command()
659 PKCS7 *token = NULL; in read_PKCS7() local
664 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7()
666 if ((tst_info = PKCS7_to_TS_TST_INFO(token)) == NULL) in read_PKCS7()
676 TS_RESP_set_tst_info(resp, token, tst_info); in read_PKCS7()
677 token = NULL; /* Ownership is lost. */ in read_PKCS7()
682 PKCS7_free(token); in read_PKCS7()
853 PKCS7 *token = NULL; in verify_command() local
874 ? TS_RESP_verify_token(verify_ctx, token) in verify_command()
[all …]
A Dspeed.c3385 char *token = *string; in sstrsep() local
3406 return token; in sstrsep()
/openssl-master/crypto/perlasm/
A Dx86_64-xlate.pl661 foreach my $token (split(/,\s*/,$line)) {
662 if ($token =~ /^%r/) {
663 push @ret,reg($token);
664 } elsif ($token =~ /((?:0x)?[0-9a-f]+)\((%r\w+)\)/) {
666 } elsif ($token =~ /(\w+):(\-?(?:0x)?[0-9a-f]+)(U?)/i) {
669 } elsif (my $i = 1*eval($token) or $token eq "0") {
670 if ($token =~ /^\+/) {
676 push @ret,$DW_OP_simple{$token};
A Ds390x.pm133 my $token;
135 $token=lc(".$1") if (/^.*::([A-Z_]+)$/);# uppercase: directive
136 $token="\t$1" if (/^.*::([a-z]+)$/); # lowercase: mnemonic
137 confess(err("PARSE")) if (!defined($token));
139 $token.="\t" if ($#_>=0);
140 $out.=$token.join(',',@_)."\n";
/openssl-master/test/
A DREADME.md80 first token in the list, the current set of tests is first
82 this token equivalent to TESTS="alltests -xxx".
88 If this is the first token in the list, the current set of
90 effectively making this token equivalent to
A Dsslapitest.c218 char *token = NULL; in test_keylog_output() local
233 for (token = strtok(buffer, " \n"); token != NULL; in test_keylog_output()
234 token = strtok(NULL, " \n")) { in test_keylog_output()
235 if (strcmp(token, "RSA") == 0) { in test_keylog_output()
241 if (!TEST_ptr(token = strtok(NULL, " \n"))) in test_keylog_output()
243 if (!TEST_size_t_eq(strlen(token), 16)) in test_keylog_output()
245 if (!TEST_ptr(token = strtok(NULL, " \n"))) in test_keylog_output()
266 if (!TEST_size_t_eq(strlen(token), 64)) in test_keylog_output()
280 if (!TEST_false(compare_hex_encoded_buffer(token, strlen(token), in test_keylog_output()
321 if (!TEST_size_t_eq(strlen(token), 64)) in test_keylog_output()
[all …]
/openssl-master/include/openssl/
A Dts.h108 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token);
360 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs,
408 int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token);
A Dcmp.h.in60 * -- one creating the response token
/openssl-master/
A DConfigure3574 my $token = "";
3577 $token .= $1;
3581 $token .= $1;
3585 $token .= $1;
3589 push @result, $token;
A DCHANGES.md1671 2) When verifying that a timestamp response token signer matches the
/openssl-master/crypto/err/
A Dopenssl.txt1548 TS_R_NO_TIME_STAMP_TOKEN:107:no time stamp token
1559 TS_R_TOKEN_NOT_PRESENT:130:token not present
1560 TS_R_TOKEN_PRESENT:131:token present
/openssl-master/crypto/objects/
A Dobjects.txt1260 setAttr-IssCap-Sig 1 : setAttr-TokICCsig : ICC or token signature

Completed in 83 milliseconds