Home
last modified time | relevance | path

Searched refs:signcert (Results 1 – 17 of 17) sorted by relevance

/freebsd/crypto/openssl/doc/man3/
H A DPKCS7_sign.pod12 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
15 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
21 I<signcert> is the certificate to sign with, I<pkey> is the corresponding
40 The signer's certificate must still be supplied in the I<signcert> parameter
85 The I<certs>, I<signcert> and I<pkey> parameters can all be
91 If I<signcert> and I<pkey> are NULL then a certificates only
94 In versions of OpenSSL before 1.0.0 the I<signcert> and I<pkey> parameters must
118 The B<PKCS7_PARTIAL> flag, and the ability for I<certs>, I<signcert>,
H A DOSSL_ESS_check_signing_certs.pod14 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert,
18 const X509 *signcert,
30 referencing the given I<signcert> and any given further I<certs>
33 of I<signcert> are included in the B<ESS_CERT_ID> as the B<issuerSerial> field.
H A DCMS_sign.pod11 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey,
15 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
21 I<signcert> is the certificate to sign with, I<pkey> is the corresponding
46 the B<signcert> parameter though. This can reduce the size of the signature if
101 If B<signcert> and B<pkey> are NULL then a certificates only CMS structure is
106 B<certs>, B<signcert> and B<pkey> parameters can all be B<NULL> and the
H A DCMS_sign_receipt.pod11 CMS_ContentInfo *CMS_sign_receipt(CMS_SignerInfo *si, X509 *signcert,
19 B<signcert> is the certificate to sign with, B<pkey> is the corresponding
H A DCMS_add1_signer.pod11 CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, X509 *signcert,
19 CMS_add1_signer() adds a signer with certificate B<signcert> and private
63 the B<signcert> parameter though. This can reduce the size of the signature if
H A DPKCS7_sign_add_signer.pod12 PKCS7_SIGNER_INFO *PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert,
19 PKCS7_sign_add_signer() adds a signer with certificate I<signcert> and private
56 I<signcert> parameter though. This can reduce the size of the signature if the
/freebsd/crypto/openssl/crypto/pkcs7/
H A Dpk7_smime.c23 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign_ex() argument
41 if (pkey && !PKCS7_sign_add_signer(p7, signcert, pkey, NULL, flags)) { in PKCS7_sign_ex()
67 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in PKCS7_sign() argument
70 return PKCS7_sign_ex(signcert, pkey, certs, data, flags, NULL, NULL); in PKCS7_sign()
117 PKCS7_SIGNER_INFO *PKCS7_sign_add_signer(PKCS7 *p7, X509 *signcert, in PKCS7_sign_add_signer() argument
124 if (!X509_check_private_key(signcert, pkey)) { in PKCS7_sign_add_signer()
130 if ((si = PKCS7_add_signature(p7, signcert, pkey, md)) == NULL) { in PKCS7_sign_add_signer()
137 if (!PKCS7_add_certificate(p7, signcert)) in PKCS7_sign_add_signer()
/freebsd/crypto/openssl/crypto/ess/
H A Dess_lib.c24 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert, in OSSL_ESS_signing_cert_new_init() argument
38 if ((cid = ESS_CERT_ID_new_init(signcert, set_issuer_serial)) == NULL in OSSL_ESS_signing_cert_new_init()
100 const X509 *signcert, in OSSL_ESS_signing_cert_v2_new_init() argument
111 cid = ESS_CERT_ID_V2_new_init(hash_alg, signcert, set_issuer_serial); in OSSL_ESS_signing_cert_v2_new_init()
/freebsd/crypto/openssl/include/openssl/
H A Dess.h.in65 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert,
69 const X509 *signcert,
H A Dess.h112 ESS_SIGNING_CERT *OSSL_ESS_signing_cert_new_init(const X509 *signcert,
116 const X509 *signcert,
H A Dpkcs7.h.in314 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
316 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
321 X509 *signcert, EVP_PKEY *pkey,
H A Dpkcs7.h385 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
387 PKCS7 *PKCS7_sign_ex(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
392 X509 *signcert, EVP_PKEY *pkey,
H A Dcms.h.in123 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey,
126 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey,
132 X509 *signcert, EVP_PKEY *pkey,
H A Dcms.h221 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey,
224 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey,
230 X509 *signcert, EVP_PKEY *pkey,
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_smime.c505 CMS_ContentInfo *CMS_sign_ex(X509 *signcert, EVP_PKEY *pkey, in CMS_sign_ex() argument
521 if (pkey != NULL && !CMS_add1_signer(cms, signcert, pkey, NULL, flags)) { in CMS_sign_ex()
550 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, in CMS_sign() argument
553 return CMS_sign_ex(signcert, pkey, certs, data, flags, NULL, NULL); in CMS_sign()
557 X509 *signcert, EVP_PKEY *pkey, in CMS_sign_receipt() argument
570 if (pkey == NULL || signcert == NULL) { in CMS_sign_receipt()
587 rct_si = CMS_add1_signer(cms, signcert, pkey, NULL, flags); in CMS_sign_receipt()
/freebsd/crypto/openssl/doc/man1/
H A DCA.pl.pod21 B<-signcert> |
83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert>
107 =item B<-sign>, B<-signcert>, B<-xsign>
121 =item B<-signcert>
/freebsd/crypto/openssl/apps/
H A DCA.pl.in124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…