/freebsd/crypto/openssl/doc/man3/ |
H A D | PKCS7_sign.pod | 12 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 15 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 21 I<signcert> is the certificate to sign with, I<pkey> is the corresponding 40 The signer's certificate must still be supplied in the I<signcert> parameter 85 The I<certs>, I<signcert> and I<pkey> parameters can all be 91 If I<signcert> and I<pkey> are NULL then a certificates only 94 In versions of OpenSSL before 1.0.0 the I<signcert> and I<pkey> parameters must 118 The B<PKCS7_PARTIAL> flag, and the ability for I<certs>, I<signcert>,
|
H A D | OSSL_ESS_check_signing_certs.pod | 14 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert, 18 const X509 *signcert, 30 referencing the given I<signcert> and any given further I<certs> 33 of I<signcert> are included in the B<ESS_CERT_ID> as the B<issuerSerial> field.
|
H A D | CMS_sign.pod | 11 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey, 15 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 21 I<signcert> is the certificate to sign with, I<pkey> is the corresponding 46 the B<signcert> parameter though. This can reduce the size of the signature if 101 If B<signcert> and B<pkey> are NULL then a certificates only CMS structure is 106 B<certs>, B<signcert> and B<pkey> parameters can all be B<NULL> and the
|
H A D | CMS_sign_receipt.pod | 11 CMS_ContentInfo *CMS_sign_receipt(CMS_SignerInfo *si, X509 *signcert, 19 B<signcert> is the certificate to sign with, B<pkey> is the corresponding
|
H A D | CMS_add1_signer.pod | 11 CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, X509 *signcert, 19 CMS_add1_signer() adds a signer with certificate B<signcert> and private 63 the B<signcert> parameter though. This can reduce the size of the signature if
|
H A D | PKCS7_sign_add_signer.pod | 12 PKCS7_SIGNER_INFO *PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert, 19 PKCS7_sign_add_signer() adds a signer with certificate I<signcert> and private 56 I<signcert> parameter though. This can reduce the size of the signature if the
|
/freebsd/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 23 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign_ex() argument 41 if (pkey && !PKCS7_sign_add_signer(p7, signcert, pkey, NULL, flags)) { in PKCS7_sign_ex() 67 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign() argument 70 return PKCS7_sign_ex(signcert, pkey, certs, data, flags, NULL, NULL); in PKCS7_sign() 117 PKCS7_SIGNER_INFO *PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert, in PKCS7_sign_add_signer() argument 124 if (!X509_check_private_key(signcert, pkey)) { in PKCS7_sign_add_signer() 130 if ((si = PKCS7_add_signature(p7, signcert, pkey, md)) == NULL) { in PKCS7_sign_add_signer() 137 if (!PKCS7_add_certificate(p7, signcert)) in PKCS7_sign_add_signer()
|
/freebsd/crypto/openssl/crypto/ess/ |
H A D | ess_lib.c | 24 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert, in OSSL_ESS_signing_cert_new_init() argument 38 if ((cid = ESS_CERT_ID_new_init(signcert, set_issuer_serial)) == NULL in OSSL_ESS_signing_cert_new_init() 100 const X509 *signcert, in OSSL_ESS_signing_cert_v2_new_init() argument 111 cid = ESS_CERT_ID_V2_new_init(hash_alg, signcert, set_issuer_serial); in OSSL_ESS_signing_cert_v2_new_init()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ess.h.in | 65 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert, 69 const X509 *signcert,
|
H A D | ess.h | 112 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert, 116 const X509 *signcert,
|
H A D | pkcs7.h.in | 314 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 316 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 321 X509 *signcert, EVP_PKEY *pkey,
|
H A D | pkcs7.h | 385 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 387 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 392 X509 *signcert, EVP_PKEY *pkey,
|
H A D | cms.h.in | 123 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, 126 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey, 132 X509 *signcert, EVP_PKEY *pkey,
|
H A D | cms.h | 221 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, 224 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey, 230 X509 *signcert, EVP_PKEY *pkey,
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_smime.c | 505 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey, in CMS_sign_ex() argument 521 if (pkey != NULL && !CMS_add1_signer(cms, signcert, pkey, NULL, flags)) { in CMS_sign_ex() 550 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in CMS_sign() argument 553 return CMS_sign_ex(signcert, pkey, certs, data, flags, NULL, NULL); in CMS_sign() 557 X509 *signcert, EVP_PKEY *pkey, in CMS_sign_receipt() argument 570 if (pkey == NULL || signcert == NULL) { in CMS_sign_receipt() 587 rct_si = CMS_add1_signer(cms, signcert, pkey, NULL, flags); in CMS_sign_receipt()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | CA.pl.pod | 21 B<-signcert> | 83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert> 107 =item B<-sign>, B<-signcert>, B<-xsign> 121 =item B<-signcert>
|
/freebsd/crypto/openssl/apps/ |
H A D | CA.pl.in | 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
|