/openssl-master/crypto/ts/ |
A D | ts_rsp_verify.c | 102 if (!token) { in TS_RESP_verify_signature() 106 if (!PKCS7_type_is_signed(token)) { in TS_RESP_verify_signature() 110 sinfos = PKCS7_get_signer_info(token); in TS_RESP_verify_signature() 116 if (PKCS7_get_detached(token)) { in TS_RESP_verify_signature() 125 signers = PKCS7_get0_signers(token, certs, 0); in TS_RESP_verify_signature() 140 p7bio = PKCS7_dataInit(token, NULL); in TS_RESP_verify_signature() 146 j = PKCS7_signatureVerify(p7bio, token, si, signer); in TS_RESP_verify_signature() 251 PKCS7 *token = response->token; in TS_RESP_verify_response() local 257 if (!int_ts_RESP_verify_token(ctx, token, tst_info)) in TS_RESP_verify_response() 269 int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token) in TS_RESP_verify_token() argument [all …]
|
A D | ts_asn1.c | 139 if (a->token) { 145 a->tst_info = PKCS7_to_TS_TST_INFO(a->token); 175 ASN1_OPT(TS_RESP, token, PKCS7), 204 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token) in PKCS7_to_TS_TST_INFO() argument 212 if (!PKCS7_type_is_signed(token)) { in PKCS7_to_TS_TST_INFO() 216 if (PKCS7_get_detached(token)) { in PKCS7_to_TS_TST_INFO() 220 pkcs7_signed = token->d.sign; in PKCS7_to_TS_TST_INFO()
|
A D | ts_rsp_utils.c | 42 PKCS7_free(a->token); in TS_RESP_set_tst_info() 43 a->token = p7; in TS_RESP_set_tst_info() 50 return a->token; in TS_RESP_get_token()
|
A D | ts_local.h | 27 PKCS7 *token; member
|
/openssl-master/doc/man1/ |
A D | openssl-ts.pod.in | 78 signs them and sends the timestamp token back to the client. By 84 The TSA client receives the timestamp token and verifies the 199 and the timestamp token itself (ContentInfo), if the token generation was 201 response or timestamp token based on a request and printing the 204 otherwise it is a timestamp token (ContentInfo). 270 token or you want to extract the timestamp token from a response. If 272 'granted' status info is added to the token. (Optional) 557 To create a timestamp token instead of timestamp response: 565 To extract the timestamp token from a response: 586 To verify a timestamp token against the original data file: [all …]
|
/openssl-master/apps/ |
A D | ts.c | 633 PKCS7 *token = TS_RESP_get_token(response); in reply_command() local 634 if (!i2d_PKCS7_bio(out_bio, token)) in reply_command() 659 PKCS7 *token = NULL; in read_PKCS7() local 664 if ((token = d2i_PKCS7_bio(in_bio, NULL)) == NULL) in read_PKCS7() 666 if ((tst_info = PKCS7_to_TS_TST_INFO(token)) == NULL) in read_PKCS7() 676 TS_RESP_set_tst_info(resp, token, tst_info); in read_PKCS7() 677 token = NULL; /* Ownership is lost. */ in read_PKCS7() 682 PKCS7_free(token); in read_PKCS7() 853 PKCS7 *token = NULL; in verify_command() local 874 ? TS_RESP_verify_token(verify_ctx, token) in verify_command() [all …]
|
A D | speed.c | 3385 char *token = *string; in sstrsep() local 3406 return token; in sstrsep()
|
/openssl-master/crypto/perlasm/ |
A D | x86_64-xlate.pl | 661 foreach my $token (split(/,\s*/,$line)) { 662 if ($token =~ /^%r/) { 663 push @ret,reg($token); 664 } elsif ($token =~ /((?:0x)?[0-9a-f]+)\((%r\w+)\)/) { 666 } elsif ($token =~ /(\w+):(\-?(?:0x)?[0-9a-f]+)(U?)/i) { 669 } elsif (my $i = 1*eval($token) or $token eq "0") { 670 if ($token =~ /^\+/) { 676 push @ret,$DW_OP_simple{$token};
|
A D | s390x.pm | 133 my $token; 135 $token=lc(".$1") if (/^.*::([A-Z_]+)$/);# uppercase: directive 136 $token="\t$1" if (/^.*::([a-z]+)$/); # lowercase: mnemonic 137 confess(err("PARSE")) if (!defined($token)); 139 $token.="\t" if ($#_>=0); 140 $out.=$token.join(',',@_)."\n";
|
/openssl-master/test/ |
A D | README.md | 80 first token in the list, the current set of tests is first 82 this token equivalent to TESTS="alltests -xxx". 88 If this is the first token in the list, the current set of 90 effectively making this token equivalent to
|
A D | sslapitest.c | 218 char *token = NULL; in test_keylog_output() local 233 for (token = strtok(buffer, " \n"); token != NULL; in test_keylog_output() 234 token = strtok(NULL, " \n")) { in test_keylog_output() 235 if (strcmp(token, "RSA") == 0) { in test_keylog_output() 241 if (!TEST_ptr(token = strtok(NULL, " \n"))) in test_keylog_output() 243 if (!TEST_size_t_eq(strlen(token), 16)) in test_keylog_output() 245 if (!TEST_ptr(token = strtok(NULL, " \n"))) in test_keylog_output() 266 if (!TEST_size_t_eq(strlen(token), 64)) in test_keylog_output() 280 if (!TEST_false(compare_hex_encoded_buffer(token, strlen(token), in test_keylog_output() 321 if (!TEST_size_t_eq(strlen(token), 64)) in test_keylog_output() [all …]
|
/openssl-master/include/openssl/ |
A D | ts.h | 108 TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token); 360 int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, 408 int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token);
|
A D | cmp.h.in | 60 * -- one creating the response token
|
/openssl-master/ |
A D | Configure | 3574 my $token = ""; 3577 $token .= $1; 3581 $token .= $1; 3585 $token .= $1; 3589 push @result, $token;
|
A D | CHANGES.md | 1671 2) When verifying that a timestamp response token signer matches the
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 1548 TS_R_NO_TIME_STAMP_TOKEN:107:no time stamp token 1559 TS_R_TOKEN_NOT_PRESENT:130:token not present 1560 TS_R_TOKEN_PRESENT:131:token present
|
/openssl-master/crypto/objects/ |
A D | objects.txt | 1260 setAttr-IssCap-Sig 1 : setAttr-TokICCsig : ICC or token signature
|