| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_cert.c | 61 CERT *ssl_cert_new(void) 63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); 85 CERT *ssl_cert_dup(CERT *cert) 87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; 104 if (cert->dh_tmp != NULL) { 105 ret->dh_tmp = cert->dh_tmp [all...] |
| ssl_local.h | 165 /* tmp DH key no DH cert */ 586 /* This is the cert and type for the other end. */ 924 /* get client cert callback */ 958 * (ClientHello and CertificateRequest) or just client cert requests for 960 * for client cert requests, and in preference to ca_names. 976 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st 1350 CERT_PKEY *cert; member in struct:ssl_st::__anon1657::__anon1658 1482 /* client cert? */ 1484 struct cert_st /* CERT */ *cert member in struct:ssl_st [all...] |
| ssl_rsa.c | 20 static int ssl_set_cert(CERT *c, X509 *x509); 21 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey); 42 return ssl_set_cert(ssl->cert, x); 50 X509 *cert = NULL, *x = NULL; local 74 cert = d2i_X509_bio(in, &x); 77 cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback, 84 if (cert == NULL) { 118 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey) 146 ret = ssl_set_pkey(ssl->cert, pkey); 224 return ssl_set_cert(ctx->cert, x) 282 X509 *x = NULL, *cert = NULL; local [all...] |
| ssl_conf.c | 432 CERT *c = NULL; 435 c = cctx->ctx->cert; 439 c = cctx->ssl->cert; 476 CERT *cert; local 483 cert = cctx->ctx->cert; 486 cert = cctx->ssl->cert; 495 st = verify_store ? &cert->verify_store : &cert->chain_store [all...] |
| ssl_ciph.c | 998 const SSL_CIPHER **ca_list, CERT *c) 1256 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, 1447 CERT *c)
|
| t1_lib.c | 930 * Check cert parameters compatible with extensions: currently just checks EC 1314 if (s->cert->pkeys[real_idx].privatekey != NULL) { 1329 if (s->cert->pkeys[real_idx].privatekey != NULL) { 1336 idx = s->cert->key - s->cert->pkeys; 1395 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { 1396 *psigs = s->cert->client_sigalgs; 1397 return s->cert->client_sigalgslen; 1398 } else if (s->cert->conf_sigalgs) { 1399 *psigs = s->cert->conf_sigalgs [all...] |
| s3_lib.c | 3420 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 3469 s->cert->dh_tmp_auto = larg; 3576 *(STACK_OF(X509) **)parg = s->cert->key->chain; 3581 return ssl_cert_select_current(s->cert, (X509 *)parg); 3597 if (s->s3.tmp.cert == NULL) 3599 s->cert->key = s->s3.tmp.cert; 3602 return ssl_cert_set_current(s->cert, larg); 3658 return tls1_set_sigalgs(s->cert, parg, larg, 0); 3661 return tls1_set_sigalgs_list(s->cert, parg, 0) [all...] |
| ssl_lib.c | 337 X509 *cert = NULL; local 342 if (!d2i_X509(&cert, &p, ilen) || p < data || 344 X509_free(cert); 349 if (X509_get0_pubkey(cert) == NULL) { 350 X509_free(cert); 369 X509_free(cert); 382 !sk_X509_push(dane->certs, cert)) { 384 X509_free(cert); 678 OSSL_default_cipher_list(), ctx->cert); 731 * Earlier library versions used to copy the pointer to the CERT, no 5126 X509 *cert = s->session != NULL ? s->session->peer : NULL; local 5244 X509 *cert = s->session != NULL ? s->session->peer : NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_cert.c | 50 CERT *ssl_cert_new(void) 52 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); 74 CERT *ssl_cert_dup(CERT *cert) 76 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); 85 ret->key = &ret->pkeys[cert->key - cert->pkeys]; 93 if (cert->dh_tmp != NULL) { 94 ret->dh_tmp = cert->dh_tmp [all...] |
| ssl_local.h | 161 /* tmp DH key no DH cert */ 538 /* This is the cert and type for the other end. */ 813 /* get client cert callback */ 847 * (ClientHello and CertificateRequest) or just client cert requests for 849 * for client cert requests, and in preference to ca_names. 865 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st 1166 /* client cert? */ 1168 struct cert_st /* CERT */ *cert; member in struct:ssl_st 1616 CERT_PKEY *cert; member in struct:ssl3_state_st::__anon2197 [all...] |
| ssl_rsa.c | 19 static int ssl_set_cert(CERT *c, X509 *x509); 20 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey); 40 return ssl_set_cert(ssl->cert, x); 122 ret = ssl_set_pkey(ssl->cert, pkey); 128 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey) 231 ret = ssl_set_pkey(ssl->cert, pkey); 304 return ssl_set_cert(ctx->cert, x); 307 static int ssl_set_cert(CERT *c, X509 *x) 338 * don't fail for a cert/key mismatch, just free current private 339 * key (when switching to a different cert & key, first thi [all...] |
| ssl_conf.c | 427 CERT *c = NULL; 430 c = cctx->ctx->cert; 434 c = cctx->ssl->cert; 470 CERT *cert; local 473 cert = cctx->ctx->cert; 475 cert = cctx->ssl->cert; 478 st = verify_store ? &cert->verify_store : &cert->chain_store [all...] |
| t1_lib.c | 554 * Check cert parameters compatible with extensions: currently just checks EC 883 if (s->cert->pkeys[real_idx].privatekey != NULL) { 890 idx = s->cert->key - s->cert->pkeys; 949 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { 950 *psigs = s->cert->client_sigalgs; 951 return s->cert->client_sigalgslen; 952 } else if (s->cert->conf_sigalgs) { 953 *psigs = s->cert->conf_sigalgs; 954 return s->cert->conf_sigalgslen [all...] |
| ssl_ciph.c | 960 const SSL_CIPHER **ca_list, CERT *c) 1220 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, 1406 CERT *c)
|
| s3_lib.c | 3388 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 3430 EVP_PKEY_free(s->cert->dh_tmp); 3431 s->cert->dh_tmp = pkdh; 3441 s->cert->dh_tmp_auto = larg; 3569 *(STACK_OF(X509) **)parg = s->cert->key->chain; 3574 return ssl_cert_select_current(s->cert, (X509 *)parg); 3590 if (s->s3->tmp.cert == NULL) 3592 s->cert->key = s->s3->tmp.cert; 3595 return ssl_cert_set_current(s->cert, larg) [all...] |
| ssl_lib.c | 358 X509 *cert = NULL; local 363 if (!d2i_X509(&cert, &p, ilen) || p < data || 369 if (X509_get0_pubkey(cert) == NULL) { 376 X509_free(cert); 389 !sk_X509_push(dane->certs, cert)) { 391 X509_free(cert); 670 SSL_DEFAULT_CIPHER_LIST, ctx->cert); 722 * Earlier library versions used to copy the pointer to the CERT, not 728 * SSL_CTX's CERT after having duplicated it once. 730 s->cert = ssl_cert_dup(ctx->cert) 4858 X509 *cert = s->session != NULL ? s->session->peer : NULL; local 4978 X509 *cert = s->session != NULL ? s->session->peer : NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_cert.c | 63 CERT *ssl_cert_new(size_t ssl_pkey_num) 65 CERT *ret = NULL; 95 CERT *ssl_cert_dup(CERT *cert) 97 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); 106 ret->ssl_pkey_num = cert->ssl_pkey_num; 113 ret->key = &ret->pkeys[cert->key - cert->pkeys]; 120 if (cert->dh_tmp != NULL) [all...] |
| ssl_local.h | 82 /* tmp DH key no DH cert */ 510 /* This is the cert and type for the other end. */ 876 /* get client cert callback */ 910 * (ClientHello and CertificateRequest) or just client cert requests for 912 * for client cert requests, and in preference to ca_names. 928 struct cert_st /* CERT */ *cert; member in struct:ssl_ctx_st 1396 CERT_PKEY *cert; member in struct:ssl_connection_st::__anon626::__anon627 1522 /* client cert? */ 1524 struct cert_st /* CERT */ *cert member in struct:ssl_connection_st [all...] |
| ssl_rsa.c | 21 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx); 22 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx); 51 return ssl_set_cert(sc->cert, x, SSL_CONNECTION_GET_CTX(sc)); 59 X509 *cert = NULL, *x = NULL; local 84 cert = d2i_X509_bio(in, &x); 92 cert = PEM_read_bio_X509(in, &x, sc->default_passwd_callback, 99 if (cert == NULL) { 133 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx) 166 ret = ssl_set_pkey(sc->cert, pkey, SSL_CONNECTION_GET_CTX(sc)); 255 return ssl_set_cert(ctx->cert, x, ctx) 316 X509 *x = NULL, *cert = NULL; local [all...] |
| ssl_conf.c | 440 CERT *c = NULL; 443 c = cctx->ctx->cert; 450 c = sc->cert; 497 CERT *cert; local 504 cert = cctx->ctx->cert; 512 cert = sc->cert; 521 st = verify_store ? &cert->verify_store : &cert->chain_store [all...] |
| ssl_cert_comp.c | 281 /* No cert, move on */ 288 /* if the cert expanded, set the value in the CERT_PKEY to NULL */ 336 static int ossl_set1_compressed_cert(CERT *cert, int algorithm, 342 /* No explicit cert set */ 343 if (cert == NULL || cert->key == NULL) 351 OSSL_COMP_CERT_free(cert->key->comp_cert[algorithm]); 352 cert->key->comp_cert[algorithm] = comp_cert; 388 if (sc == NULL || sc->cert == NULL [all...] |
| ssl_ciph.c | 958 const SSL_CIPHER **ca_list, CERT *c) 1213 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, 1412 CERT *c)
|
| t1_lib.c | 1855 * Check cert parameters compatible with extensions: currently just checks EC 2479 if (s->cert->pkeys[real_idx].privatekey != NULL) { 2494 if (s->cert->pkeys[real_idx].privatekey != NULL) { 2501 idx = s->cert->key - s->cert->pkeys; 2562 if ((s->server == sent) && s->cert->client_sigalgs != NULL) { 2563 *psigs = s->cert->client_sigalgs; 2564 return s->cert->client_sigalgslen; 2565 } else if (s->cert->conf_sigalgs) { 2566 *psigs = s->cert->conf_sigalgs [all...] |
| s3_lib.c | 3952 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 4002 sc->cert->dh_tmp_auto = larg; 4112 *(STACK_OF(X509) **)parg = sc->cert->key->chain; 4117 return ssl_cert_select_current(sc->cert, (X509 *)parg); 4133 if (sc->s3.tmp.cert == NULL) 4135 sc->cert->key = sc->s3.tmp.cert; 4138 return ssl_cert_set_current(sc->cert, larg); 4202 return tls1_set_sigalgs(sc->cert, parg, larg, 0); 4205 return tls1_set_sigalgs_list(s->ctx, sc->cert, parg, 0) [all...] |
| ssl_lib.c | 333 X509 *cert = NULL; local 338 if (!d2i_X509(&cert, &p, ilen) || p < data || dlen != (size_t)(p - data)) { 339 X509_free(cert); 344 if (X509_get0_pubkey(cert) == NULL) { 345 X509_free(cert); 364 X509_free(cert); 375 if ((dane->certs == NULL && (dane->certs = sk_X509_new_null()) == NULL) || !sk_X509_push(dane->certs, cert)) { 377 X509_free(cert); 681 OSSL_default_cipher_list(), ctx->cert); 775 * Earlier library versions used to copy the pointer to the CERT, no 6444 X509 *cert = s->session != NULL ? s->session->peer : NULL; local 6569 X509 *cert = s->session != NULL ? s->session->peer : NULL; local [all...] |