/third_party/mbedtls/library/ |
H A D | pkcs7.c | 198 * This is to verify that there is only one signer certificate. It seems it is in pkcs7_get_certificates() 199 * not easy to differentiate between the chain vs different signer's certificate. in pkcs7_get_certificates() 200 * So, we support only the root certificate and the single signer. in pkcs7_get_certificates() 201 * The behaviour would be improved with addition of multiple signer support. in pkcs7_get_certificates() 243 static void pkcs7_free_signer_info(mbedtls_pkcs7_signer_info *signer) in pkcs7_free_signer_info() argument 248 if (signer == NULL) { in pkcs7_free_signer_info() 252 name_cur = signer->issuer.next; in pkcs7_free_signer_info() 258 signer->issuer.next = NULL; in pkcs7_free_signer_info() 278 mbedtls_pkcs7_signer_info *signer, in pkcs7_get_signer_info() 293 ret = pkcs7_get_version(p, end_signer, &signer in pkcs7_get_signer_info() 277 pkcs7_get_signer_info(unsigned char **p, unsigned char *end, mbedtls_pkcs7_signer_info *signer, mbedtls_x509_buf *alg) pkcs7_get_signer_info() argument 407 mbedtls_pkcs7_signer_info *signer = pkcs7_get_signers_info_set() local 428 mbedtls_pkcs7_signer_info *signer = signers_set->next; pkcs7_get_signers_info_set() local 653 mbedtls_pkcs7_signer_info *signer; mbedtls_pkcs7_data_or_hash_verify() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 30 static int ocsp_verify_signer(X509 *signer, int response, in ocsp_verify_signer() argument 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer() 51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) in ocsp_verify_signer() 77 X509 *signer, unsigned long flags) in ocsp_verify() 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify() 101 X509 *signer, * in OCSP_basic_verify() local 76 ocsp_verify(OCSP_REQUEST *req, OCSP_BASICRESP *bs, X509 *signer, unsigned long flags) ocsp_verify() argument 162 OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer, STACK_OF(X509) *extra_certs) OCSP_resp_get0_signer() argument 171 X509 *signer; ocsp_find_signer() local 225 X509 *signer, *sca; ocsp_check_issuer() local 388 X509 *signer; OCSP_request_verify() local 425 X509 *signer; ocsp_req_find_signer() local [all...] |
H A D | ocsp_srv.c | 164 * set the responderID to the subject name in the signer's certificate, and 168 X509 *signer, EVP_MD_CTX *ctx, in OCSP_basic_sign_ctx() 180 if (pkey == NULL || !X509_check_private_key(signer, pkey)) { in OCSP_basic_sign_ctx() 186 if (!OCSP_basic_add1_cert(brsp, signer) in OCSP_basic_sign_ctx() 193 if (!OCSP_RESPID_set_by_key(rid, signer)) in OCSP_basic_sign_ctx() 195 } else if (!OCSP_RESPID_set_by_name(rid, signer)) { in OCSP_basic_sign_ctx() 216 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, in OCSP_basic_sign() 227 signer->libctx, signer->propq, key, NULL)) { in OCSP_basic_sign() 231 i = OCSP_basic_sign_ctx(brsp, signer, ct in OCSP_basic_sign() 167 OCSP_basic_sign_ctx(OCSP_BASICRESP *brsp, X509 *signer, EVP_MD_CTX *ctx, STACK_OF(X509) *certs, unsigned long flags) OCSP_basic_sign_ctx() argument 215 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) OCSP_basic_sign() argument [all...] |
H A D | ocsp_cl.c | 81 X509 *signer, in OCSP_request_sign() 86 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign() 92 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign() 97 if (!OCSP_REQUEST_sign(req, key, dgst, signer->libctx, signer->propq)) in OCSP_request_sign() 102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign() 80 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) OCSP_request_sign() argument
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 30 static int ocsp_verify_signer(X509 *signer, int response, in ocsp_verify_signer() argument 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer() 51 && X509_get_ext_by_NID(signer, NID_id_pkix_OCSP_noCheck, -1) >= 0) in ocsp_verify_signer() 77 X509 *signer, unsigned long flags) in ocsp_verify() 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify() 101 X509 *signer, * in OCSP_basic_verify() local 76 ocsp_verify(OCSP_REQUEST *req, OCSP_BASICRESP *bs, X509 *signer, unsigned long flags) ocsp_verify() argument 162 OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer, STACK_OF(X509) *extra_certs) OCSP_resp_get0_signer() argument 171 X509 *signer; ocsp_find_signer() local 225 X509 *signer, *sca; ocsp_check_issuer() local 388 X509 *signer; OCSP_request_verify() local 425 X509 *signer; ocsp_req_find_signer() local [all...] |
H A D | ocsp_srv.c | 164 * set the responderID to the subject name in the signer's certificate, and 168 X509 *signer, EVP_MD_CTX *ctx, in OCSP_basic_sign_ctx() 180 if (pkey == NULL || !X509_check_private_key(signer, pkey)) { in OCSP_basic_sign_ctx() 186 if (!OCSP_basic_add1_cert(brsp, signer) in OCSP_basic_sign_ctx() 193 if (!OCSP_RESPID_set_by_key(rid, signer)) in OCSP_basic_sign_ctx() 195 } else if (!OCSP_RESPID_set_by_name(rid, signer)) { in OCSP_basic_sign_ctx() 216 X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, in OCSP_basic_sign() 227 signer->libctx, signer->propq, key, NULL)) { in OCSP_basic_sign() 231 i = OCSP_basic_sign_ctx(brsp, signer, ct in OCSP_basic_sign() 167 OCSP_basic_sign_ctx(OCSP_BASICRESP *brsp, X509 *signer, EVP_MD_CTX *ctx, STACK_OF(X509) *certs, unsigned long flags) OCSP_basic_sign_ctx() argument 215 OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) OCSP_basic_sign() argument [all...] |
H A D | ocsp_cl.c | 81 X509 *signer, in OCSP_request_sign() 86 if (!OCSP_request_set1_name(req, X509_get_subject_name(signer))) in OCSP_request_sign() 92 if (!X509_check_private_key(signer, key)) { in OCSP_request_sign() 97 if (!OCSP_REQUEST_sign(req, key, dgst, signer->libctx, signer->propq)) in OCSP_request_sign() 102 if (!OCSP_request_add1_cert(req, signer) in OCSP_request_sign() 80 OCSP_request_sign(OCSP_REQUEST *req, X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, STACK_OF(X509) *certs, unsigned long flags) OCSP_request_sign() argument
|
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 78 * - Checks if there is one and only one signer. 80 * - Check the extended key usage and key usage fields of the signer 86 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 95 X509 *signer; in TS_RESP_verify_signature() local 122 * Get hold of the signer certificate, search only internal certificates in TS_RESP_verify_signature() 128 signer in TS_RESP_verify_signature() 171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument 295 X509 *signer = NULL; int_ts_RESP_verify_token() local 538 ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) ts_check_signer_name() argument [all...] |
/third_party/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 37 static int ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer); 78 * - Checks if there is one and only one signer. 80 * - Check the extended key usage and key usage fields of the signer 86 * - Returns the signer certificate in 'signer', if 'signer' is not NULL. 95 X509 *signer; in TS_RESP_verify_signature() local 122 * Get hold of the signer certificate, search only internal certificates in TS_RESP_verify_signature() 128 signer in TS_RESP_verify_signature() 171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument 295 X509 *signer = NULL; int_ts_RESP_verify_token() local 538 ts_check_signer_name(GENERAL_NAME *tsa_name, X509 *signer) ts_check_signer_name() argument [all...] |
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | sign.rs | 26 //! let mut signer = Signer::new(MessageDigest::sha256(), &keypair).unwrap(); 27 //! signer.update(data).unwrap(); 28 //! signer.update(data2).unwrap(); 29 //! let signature = signer.sign_to_vec().unwrap(); 57 let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); variables 58 signer.update(data).unwrap(); 59 signer.update(data2).unwrap(); 60 let hmac = signer.sign_to_vec().unwrap(); 679 let mut signer = Signer::new(MessageDigest::sha256(), &pkey).unwrap(); in rsa_sign() variables 680 assert_eq!(signer in rsa_sign() 716 let mut signer = Signer::new(ty, &pkey).unwrap(); test_hmac() variables 822 let mut signer = Signer::new_without_digest(&pkey).unwrap(); test_cmac() variables 839 let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); ec() variables 853 let mut signer = Signer::new_without_digest(&key).unwrap(); eddsa() variables 867 let mut signer = Signer::new(MessageDigest::sha256(), &pkey).unwrap(); rsa_sign_verify() variables [all...] |
H A D | dsa.rs | 404 /// let mut signer = if let Ok(signer) = Signer::new(MessageDigest::sha256(), &priv_key) { 405 /// signer 411 /// signer.update(TEST_DATA).unwrap(); 413 /// let signature = signer.sign_to_vec().unwrap(); 641 let mut signer = Signer::new(MessageDigest::sha256(), &priv_key).unwrap(); in test_signature() variables 642 signer.update(TEST_DATA).unwrap(); in test_signature() 644 let signature = signer.sign_to_vec().unwrap(); in test_signature() 661 let mut signer = Signer::new(MessageDigest::sha256(), &priv_key).unwrap(); in test_signature_der() variables 662 signer in test_signature_der() [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/ |
H A D | verifier.js | 36 const signer = this.verifySigningKey(entity, timestamps); 38 this.verifySignature(entity, signer); 40 this.verifyPolicy(policy, signer.identity || {}); 42 return signer; 80 // and returns the signer. 101 return result.signer; 110 verifySignature(entity, signer) { 111 if (!entity.signature.verifySignature(signer.key)) { 119 // Check the subject alternative name of the signer matches the policy 123 // Check that the extensions of the signer matc [all...] |
/third_party/openssl/test/ |
H A D | ocspapitest.c | 115 X509 *signer = NULL, *tmp; in test_resp_signer() local 121 * Test a response with no certs at all; get the signer from the in test_resp_signer() 128 || !TEST_true(get_cert_and_key(&signer, &key)) in test_resp_signer() 129 || !TEST_true(sk_X509_push(extra_certs, signer)) in test_resp_signer() 130 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), in test_resp_signer() 134 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) in test_resp_signer() 138 /* Do it again but include the signer cert */ in test_resp_signer() 142 || !TEST_true(OCSP_basic_sign(bs, signer, key, EVP_sha1(), in test_resp_signer() 146 || !TEST_int_eq(X509_cmp(tmp, signer), 0)) in test_resp_signer() 152 X509_free(signer); in test_resp_signer() [all...] |
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 217 X509 *signer; in PKCS7_verify() local 276 signer = sk_X509_value(signers, k); in PKCS7_verify() 278 if (!X509_STORE_CTX_init(cert_ctx, store, signer, in PKCS7_verify() 285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { in PKCS7_verify() 360 signer = sk_X509_value(signers, i); in PKCS7_verify() 361 j = PKCS7_signatureVerify(p7bio, p7, si, signer); in PKCS7_verify() 389 X509 *signer; in STACK_OF() local 419 signer = NULL; in STACK_OF() 422 signer = X509_find_by_issuer_and_serial(certs, in STACK_OF() 424 if (!signer in STACK_OF() [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 217 X509 *signer; in PKCS7_verify() local 276 signer = sk_X509_value(signers, k); in PKCS7_verify() 278 if (!X509_STORE_CTX_init(cert_ctx, store, signer, in PKCS7_verify() 285 } else if (!X509_STORE_CTX_init(cert_ctx, store, signer, NULL)) { in PKCS7_verify() 360 signer = sk_X509_value(signers, i); in PKCS7_verify() 361 j = PKCS7_signatureVerify(p7bio, p7, si, signer); in PKCS7_verify() 389 X509 *signer; in STACK_OF() local 419 signer = NULL; in STACK_OF() 422 signer = X509_find_by_issuer_and_serial(certs, in STACK_OF() 424 if (!signer in STACK_OF() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument 55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match() 56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match() 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 365 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local 626 signer = issuer; in tls_process_basic_ocsp_response() 628 for (signer = certs; signer; signer = signer in tls_process_basic_ocsp_response() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 50 static int ocsp_responder_id_match(struct x509_certificate *signer, in ocsp_responder_id_match() argument 55 const u8 *addr[1] = { signer->public_key }; in ocsp_responder_id_match() 56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match() 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 356 struct x509_certificate *issuer, *signer; in tls_process_basic_ocsp_response() local 595 signer = issuer; in tls_process_basic_ocsp_response() 597 for (signer = certs; signer; signer = signer in tls_process_basic_ocsp_response() [all...] |
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_sd.c | 255 /* Add SigningCertificate signed attribute to the signer info. */ 280 /* Add SigningCertificateV2 signed attribute to the signer info. */ 306 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, in CMS_add1_signer() 315 if (!X509_check_private_key(signer, pk)) { in CMS_add1_signer() 326 X509_check_purpose(signer, -1, -1); in CMS_add1_signer() 328 X509_up_ref(signer); in CMS_add1_signer() 333 si->signer = signer; in CMS_add1_signer() 352 if (!ossl_cms_set1_SignerIdentifier(si->sid, signer, type, ctx)) in CMS_add1_signer() 437 if ((sc = OSSL_ESS_signing_cert_new_init(signer, in CMS_add1_signer() 305 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) CMS_add1_signer() argument 589 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) CMS_SignerInfo_set1_signer_cert() argument 659 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) CMS_SignerInfo_get0_algs() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_sd.c | 255 /* Add SigningCertificate signed attribute to the signer info. */ 280 /* Add SigningCertificateV2 signed attribute to the signer info. */ 306 X509 *signer, EVP_PKEY *pk, const EVP_MD *md, in CMS_add1_signer() 315 if (!X509_check_private_key(signer, pk)) { in CMS_add1_signer() 326 X509_check_purpose(signer, -1, -1); in CMS_add1_signer() 328 X509_up_ref(signer); in CMS_add1_signer() 333 si->signer = signer; in CMS_add1_signer() 352 if (!ossl_cms_set1_SignerIdentifier(si->sid, signer, type, ctx)) in CMS_add1_signer() 429 if ((sc = OSSL_ESS_signing_cert_new_init(signer, in CMS_add1_signer() 305 CMS_add1_signer(CMS_ContentInfo *cms, X509 *signer, EVP_PKEY *pk, const EVP_MD *md, unsigned int flags) CMS_add1_signer() argument 585 CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer) CMS_SignerInfo_set1_signer_cert() argument 655 CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, X509_ALGOR **pdig, X509_ALGOR **psig) CMS_SignerInfo_get0_algs() argument [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/bundler/ |
H A D | base.js | 10 this.signer = options.signer; 15 const signature = await this.prepare(artifact).then((blob) => this.signer.sign(blob)); 34 // artifact. The returned buffer will be signed by the signer. The default
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl_ocsp.c | 506 X509 *signer, *tmp_cert; in check_ocsp_resp() local 616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp() 617 if (!signer) in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 621 if (!signer) { in check_ocsp_resp() 623 "OpenSSL: Could not find OCSP signer certificate"); in check_ocsp_resp() 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 630 "OpenSSL: Could not get OCSP signer public key"); in check_ocsp_resp() 641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp() 643 "OpenSSL: Found OCSP signer certificat in check_ocsp_resp() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl_ocsp.c | 506 X509 *signer, *tmp_cert; in check_ocsp_resp() local 616 signer = ocsp_find_signer(certs, rd->responderID); in check_ocsp_resp() 617 if (!signer) in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 621 if (!signer) { in check_ocsp_resp() 623 "OpenSSL: Could not find OCSP signer certificate"); in check_ocsp_resp() 627 skey = X509_get_pubkey(signer); in check_ocsp_resp() 630 "OpenSSL: Could not get OCSP signer public key"); in check_ocsp_resp() 641 X509_NAME_oneline(X509_get_subject_name(signer), buf, sizeof(buf)); in check_ocsp_resp() 643 "OpenSSL: Found OCSP signer certificat in check_ocsp_resp() [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | smime.c | 62 "Input private key (if not signer or recipient)"}, 85 "Don't search certificates in message for signer"}, 89 {"signer", OPT_SIGNER, 's', "Signer certificate file"}, 140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 277 /* If previous -signer argument add signer to list */ in smime_main() 303 /* If previous -inkey argument add signer to list */ in smime_main() 307 "%s: Must have -signer before -inkey\n", prog); in smime_main() 384 /* Check to see if any final signer needs to be appended */ in smime_main() 386 BIO_puts(bio_err, "Illegal -inkey without -signer\ in smime_main() [all...] |
H A D | ts.c | 51 const EVP_MD *md, const char *signer, const char *chain, 57 const char *inkey, const EVP_MD *md, const char *signer, 98 {"signer", OPT_SIGNER, 's', "Signer certificate file"}, 99 {"chain", OPT_CHAIN, '<', "File with signer CA chain"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 259 signer = opt_arg(); in ts_main() 331 password, inkey, md, signer, chain, policy, in ts_main() 586 const EVP_MD *md, const char *signer, const char *chain, in reply_command() 608 passin, inkey, md, signer, chai in reply_command() 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument [all...] |
/third_party/openssl/apps/ |
H A D | smime.c | 62 "Input private key (if not signer or recipient)"}, 85 "Don't search certificates in message for signer"}, 89 {"signer", OPT_SIGNER, 's', "Signer certificate file"}, 140 X509 *cert = NULL, *recip = NULL, *signer = NULL; in smime_main() local 277 /* If previous -signer argument add signer to list */ in smime_main() 303 /* If previous -inkey argument add signer to list */ in smime_main() 307 "%s: Must have -signer before -inkey\n", prog); in smime_main() 384 /* Check to see if any final signer needs to be appended */ in smime_main() 386 BIO_puts(bio_err, "Illegal -inkey without -signer\ in smime_main() [all...] |