Lines Matching defs:signer

30 static int ocsp_verify_signer(X509 *signer, int response,
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) {
51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0)
77 X509 *signer, unsigned long flags)
83 if ((skey = X509_get0_pubkey(signer)) == NULL) {
88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq);
90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq);
101 X509 *signer, *x;
104 int ret = ocsp_find_signer(&signer, bs, certs, flags);
113 if ((ret = ocsp_verify(NULL, bs, signer, flags)) <= 0)
123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain);
162 int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer,
165 return ocsp_find_signer(signer, bs, extra_certs, 0) > 0;
171 X509 *signer;
174 if ((signer = ocsp_find_signer_sk(certs, rid)) != NULL) {
175 *psigner = signer;
179 (signer = ocsp_find_signer_sk(bs->certs, rid))) {
180 *psigner = signer;
225 X509 *signer, *sca;
241 signer = sk_X509_value(chain, 0);
250 if (ocsp_check_delegated(signer))
257 return ocsp_match_issuerid(signer, caid, sresp);
382 * Just find the signer's certificate and verify it against a given trust value.
388 X509 *signer;
403 ret = ocsp_req_find_signer(&signer, req, nm, certs, flags);
411 if ((ret = ocsp_verify(req, NULL, signer, flags)) <= 0)
415 return ocsp_verify_signer(signer, 0, store, flags,
425 X509 *signer;
428 signer = X509_find_by_subject(req->optionalSignature->certs, nm);
429 if (signer != NULL) {
430 *psigner = signer;
435 if ((signer = X509_find_by_subject(certs, nm)) != NULL) {
436 *psigner = signer;