| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_asn1.c | 48 ASN1_OCTET_STRING *peer_rpk; member in struct:__anon611 81 ASN1_EXP_OPT(SSL_SESSION_ASN1, peer_rpk, ASN1_OCTET_STRING, 20) 131 ASN1_OCTET_STRING peer_rpk; 177 as.peer_rpk = NULL; 178 peer_rpk.data = NULL; 179 if (in->peer_rpk != NULL) { 180 peer_rpk.length = i2d_PUBKEY(in->peer_rpk, &peer_rpk.data); 181 if (peer_rpk.length > 0 && peer_rpk.data != NULL [all...] |
| ssl_local.h | 509 EVP_PKEY *peer_rpk; member in struct:ssl_session_st
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| s_cb.c | 1310 EVP_PKEY *peer_rpk = SSL_get0_peer_rpk(s); local 1328 } else if (peer_rpk != NULL) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 45 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; 1908 EVP_PKEY *peer_rpk = NULL; local 1910 if (!tls_process_rpk(sc, pkt, &peer_rpk)) { 1915 if (peer_rpk == NULL) { 1920 EVP_PKEY_free(sc->session->peer_rpk); 1921 sc->session->peer_rpk = peer_rpk; 1933 if (sc->session->peer_rpk == NULL) { 1943 v_ok = ssl_verify_rpk(sc, sc->session->peer_rpk); 1955 if ((clu = ssl_cert_lookup_by_pkey(sc->session->peer_rpk, &certidx [all...] |
| statem_srvr.c | 56 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; 3560 EVP_PKEY *peer_rpk = NULL; local 3562 if (!tls_process_rpk(sc, pkt, &peer_rpk)) { 3567 if (peer_rpk == NULL) { 3575 if (ssl_verify_rpk(sc, peer_rpk) <= 0) { 3606 EVP_PKEY_free(sc->session->peer_rpk); 3607 sc->session->peer_rpk = peer_rpk; 3608 peer_rpk = NULL; 3637 EVP_PKEY_free(peer_rpk); [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_client.c | 3525 EVP_PKEY *peer_rpk = SSL_get0_peer_rpk(s); local 3527 if (peer_rpk != NULL) { 3529 EVP_PKEY_print_public(bio, peer_rpk, 2, NULL);
|