HomeSort by: relevance | last modified time | path
    Searched refs:CERT (Results 1 - 25 of 30) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssl/dist/ssl/
ssl_cert.c 61 CERT *ssl_cert_new(void)
63 CERT *ret = OPENSSL_zalloc(sizeof(*ret));
85 CERT *ssl_cert_dup(CERT *cert)
87 CERT *ret = OPENSSL_zalloc(sizeof(*ret));
96 ret->key = &ret->pkeys[cert->key - cert->pkeys];
104 if (cert->dh_tmp != NULL) {
105 ret->dh_tmp = cert->dh_tmp
    [all...]
ssl_local.h 165 /* tmp DH key no DH cert */
586 /* This is the cert and type for the other end. */
924 /* get client cert callback */
958 * (ClientHello and CertificateRequest) or just client cert requests for
960 * for client cert requests, and in preference to ca_names.
976 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st
1350 CERT_PKEY *cert; member in struct:ssl_st::__anon1657::__anon1658
1482 /* client cert? */
1484 struct cert_st /* CERT */ *cert member in struct:ssl_st
    [all...]
ssl_rsa.c 20 static int ssl_set_cert(CERT *c, X509 *x509);
21 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
42 return ssl_set_cert(ssl->cert, x);
50 X509 *cert = NULL, *x = NULL; local
74 cert = d2i_X509_bio(in, &x);
77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback,
84 if (cert == NULL) {
118 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
146 ret = ssl_set_pkey(ssl->cert, pkey);
224 return ssl_set_cert(ctx->cert, x)
282 X509 *x = NULL, *cert = NULL; local
    [all...]
ssl_conf.c 432 CERT *c = NULL;
435 c = cctx->ctx->cert;
439 c = cctx->ssl->cert;
476 CERT *cert; local
483 cert = cctx->ctx->cert;
486 cert = cctx->ssl->cert;
495 st = verify_store ? &cert->verify_store : &cert->chain_store
    [all...]
ssl_ciph.c 998 const SSL_CIPHER **ca_list, CERT *c)
1256 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c,
1447 CERT *c)
t1_lib.c 930 * Check cert parameters compatible with extensions: currently just checks EC
1314 if (s->cert->pkeys[real_idx].privatekey != NULL) {
1329 if (s->cert->pkeys[real_idx].privatekey != NULL) {
1336 idx = s->cert->key - s->cert->pkeys;
1395 if ((s->server == sent) && s->cert->client_sigalgs != NULL) {
1396 *psigs = s->cert->client_sigalgs;
1397 return s->cert->client_sigalgslen;
1398 } else if (s->cert->conf_sigalgs) {
1399 *psigs = s->cert->conf_sigalgs
    [all...]
s3_lib.c 3420 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
3469 s->cert->dh_tmp_auto = larg;
3576 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3581 return ssl_cert_select_current(s->cert, (X509 *)parg);
3597 if (s->s3.tmp.cert == NULL)
3599 s->cert->key = s->s3.tmp.cert;
3602 return ssl_cert_set_current(s->cert, larg);
3658 return tls1_set_sigalgs(s->cert, parg, larg, 0);
3661 return tls1_set_sigalgs_list(s->cert, parg, 0)
    [all...]
ssl_lib.c 337 X509 *cert = NULL; local
342 if (!d2i_X509(&cert, &p, ilen) || p < data ||
344 X509_free(cert);
349 if (X509_get0_pubkey(cert) == NULL) {
350 X509_free(cert);
369 X509_free(cert);
382 !sk_X509_push(dane->certs, cert)) {
384 X509_free(cert);
678 OSSL_default_cipher_list(), ctx->cert);
731 * Earlier library versions used to copy the pointer to the CERT, no
5126 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
5244 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
ssl_cert.c 50 CERT *ssl_cert_new(void)
52 CERT *ret = OPENSSL_zalloc(sizeof(*ret));
74 CERT *ssl_cert_dup(CERT *cert)
76 CERT *ret = OPENSSL_zalloc(sizeof(*ret));
85 ret->key = &ret->pkeys[cert->key - cert->pkeys];
93 if (cert->dh_tmp != NULL) {
94 ret->dh_tmp = cert->dh_tmp
    [all...]
ssl_local.h 161 /* tmp DH key no DH cert */
538 /* This is the cert and type for the other end. */
813 /* get client cert callback */
847 * (ClientHello and CertificateRequest) or just client cert requests for
849 * for client cert requests, and in preference to ca_names.
865 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st
1166 /* client cert? */
1168 struct cert_st /* CERT */ *cert; member in struct:ssl_st
1616 CERT_PKEY *cert; member in struct:ssl3_state_st::__anon2197
    [all...]
ssl_rsa.c 19 static int ssl_set_cert(CERT *c, X509 *x509);
20 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
40 return ssl_set_cert(ssl->cert, x);
122 ret = ssl_set_pkey(ssl->cert, pkey);
128 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
231 ret = ssl_set_pkey(ssl->cert, pkey);
304 return ssl_set_cert(ctx->cert, x);
307 static int ssl_set_cert(CERT *c, X509 *x)
338 * don't fail for a cert/key mismatch, just free current private
339 * key (when switching to a different cert & key, first thi
    [all...]
ssl_conf.c 427 CERT *c = NULL;
430 c = cctx->ctx->cert;
434 c = cctx->ssl->cert;
470 CERT *cert; local
473 cert = cctx->ctx->cert;
475 cert = cctx->ssl->cert;
478 st = verify_store ? &cert->verify_store : &cert->chain_store
    [all...]
t1_lib.c 554 * Check cert parameters compatible with extensions: currently just checks EC
883 if (s->cert->pkeys[real_idx].privatekey != NULL) {
890 idx = s->cert->key - s->cert->pkeys;
949 if ((s->server == sent) && s->cert->client_sigalgs != NULL) {
950 *psigs = s->cert->client_sigalgs;
951 return s->cert->client_sigalgslen;
952 } else if (s->cert->conf_sigalgs) {
953 *psigs = s->cert->conf_sigalgs;
954 return s->cert->conf_sigalgslen
    [all...]
ssl_ciph.c 960 const SSL_CIPHER **ca_list, CERT *c)
1220 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c,
1406 CERT *c)
s3_lib.c 3388 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
3430 EVP_PKEY_free(s->cert->dh_tmp);
3431 s->cert->dh_tmp = pkdh;
3441 s->cert->dh_tmp_auto = larg;
3569 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3574 return ssl_cert_select_current(s->cert, (X509 *)parg);
3590 if (s->s3->tmp.cert == NULL)
3592 s->cert->key = s->s3->tmp.cert;
3595 return ssl_cert_set_current(s->cert, larg)
    [all...]
ssl_lib.c 358 X509 *cert = NULL; local
363 if (!d2i_X509(&cert, &p, ilen) || p < data ||
369 if (X509_get0_pubkey(cert) == NULL) {
376 X509_free(cert);
389 !sk_X509_push(dane->certs, cert)) {
391 X509_free(cert);
670 SSL_DEFAULT_CIPHER_LIST, ctx->cert);
722 * Earlier library versions used to copy the pointer to the CERT, not
728 * SSL_CTX's CERT after having duplicated it once.
730 s->cert = ssl_cert_dup(ctx->cert)
4858 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
4978 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/
ssl_cert.c 63 CERT *ssl_cert_new(size_t ssl_pkey_num)
65 CERT *ret = NULL;
95 CERT *ssl_cert_dup(CERT *cert)
97 CERT *ret = OPENSSL_zalloc(sizeof(*ret));
106 ret->ssl_pkey_num = cert->ssl_pkey_num;
113 ret->key = &ret->pkeys[cert->key - cert->pkeys];
120 if (cert->dh_tmp != NULL)
    [all...]
ssl_local.h 82 /* tmp DH key no DH cert */
510 /* This is the cert and type for the other end. */
876 /* get client cert callback */
910 * (ClientHello and CertificateRequest) or just client cert requests for
912 * for client cert requests, and in preference to ca_names.
928 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st
1396 CERT_PKEY *cert; member in struct:ssl_connection_st::__anon626::__anon627
1522 /* client cert? */
1524 struct cert_st /* CERT */ *cert member in struct:ssl_connection_st
    [all...]
ssl_rsa.c 21 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx);
22 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx);
51 return ssl_set_cert(sc->cert, x, SSL_CONNECTION_GET_CTX(sc));
59 X509 *cert = NULL, *x = NULL; local
84 cert = d2i_X509_bio(in, &x);
92 cert = PEM_read_bio_X509(in, &x, sc->default_passwd_callback,
99 if (cert == NULL) {
133 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx)
166 ret = ssl_set_pkey(sc->cert, pkey, SSL_CONNECTION_GET_CTX(sc));
255 return ssl_set_cert(ctx->cert, x, ctx)
316 X509 *x = NULL, *cert = NULL; local
    [all...]
ssl_conf.c 440 CERT *c = NULL;
443 c = cctx->ctx->cert;
450 c = sc->cert;
497 CERT *cert; local
504 cert = cctx->ctx->cert;
512 cert = sc->cert;
521 st = verify_store ? &cert->verify_store : &cert->chain_store
    [all...]
ssl_cert_comp.c 281 /* No cert, move on */
288 /* if the cert expanded, set the value in the CERT_PKEY to NULL */
336 static int ossl_set1_compressed_cert(CERT *cert, int algorithm,
342 /* No explicit cert set */
343 if (cert == NULL || cert->key == NULL)
351 OSSL_COMP_CERT_free(cert->key->comp_cert[algorithm]);
352 cert->key->comp_cert[algorithm] = comp_cert;
388 if (sc == NULL || sc->cert == NULL
    [all...]
ssl_ciph.c 958 const SSL_CIPHER **ca_list, CERT *c)
1213 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c,
1412 CERT *c)
t1_lib.c 1855 * Check cert parameters compatible with extensions: currently just checks EC
2479 if (s->cert->pkeys[real_idx].privatekey != NULL) {
2494 if (s->cert->pkeys[real_idx].privatekey != NULL) {
2501 idx = s->cert->key - s->cert->pkeys;
2562 if ((s->server == sent) && s->cert->client_sigalgs != NULL) {
2563 *psigs = s->cert->client_sigalgs;
2564 return s->cert->client_sigalgslen;
2565 } else if (s->cert->conf_sigalgs) {
2566 *psigs = s->cert->conf_sigalgs
    [all...]
s3_lib.c 3952 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
4002 sc->cert->dh_tmp_auto = larg;
4112 *(STACK_OF(X509) **)parg = sc->cert->key->chain;
4117 return ssl_cert_select_current(sc->cert, (X509 *)parg);
4133 if (sc->s3.tmp.cert == NULL)
4135 sc->cert->key = sc->s3.tmp.cert;
4138 return ssl_cert_set_current(sc->cert, larg);
4202 return tls1_set_sigalgs(sc->cert, parg, larg, 0);
4205 return tls1_set_sigalgs_list(s->ctx, sc->cert, parg, 0)
    [all...]
ssl_lib.c 333 X509 *cert = NULL; local
338 if (!d2i_X509(&cert, &p, ilen) || p < data || dlen != (size_t)(p - data)) {
339 X509_free(cert);
344 if (X509_get0_pubkey(cert) == NULL) {
345 X509_free(cert);
364 X509_free(cert);
375 if ((dane->certs == NULL && (dane->certs = sk_X509_new_null()) == NULL) || !sk_X509_push(dane->certs, cert)) {
377 X509_free(cert);
681 OSSL_default_cipher_list(), ctx->cert);
775 * Earlier library versions used to copy the pointer to the CERT, no
6444 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
6569 X509 *cert = s->session != NULL ? s->session->peer : NULL; local
    [all...]

Completed in 79 milliseconds

1 2