/dports/net/p5-Socket-Class/Socket-Class-2.258/xs/sc_ssl/openssl/source/ssl/ |
H A D | s2_srvr.c | 442 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) in get_client_master_key() 774 n=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); in server_hello() 776 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&d); in server_hello() 1068 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,NULL); in request_certificate() 1076 i=i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509,&p2); in request_certificate() 1119 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) in ssl_rsa_private_decrypt() 1124 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) in ssl_rsa_private_decrypt() 1129 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; in ssl_rsa_private_decrypt()
|
H A D | ssl_cert.c | 175 ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]); in ssl_cert_new() 279 case SSL_PKEY_RSA_ENC: in ssl_cert_dup() 424 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl_sess_cert_new()
|
H A D | s3_lib.c | 1803 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || in ssl3_ctrl() 1804 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))) in ssl3_ctrl() 2052 ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || in ssl3_ctx_ctrl() 2053 (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))) in ssl3_ctx_ctrl()
|
H A D | ssl_lib.c | 1691 cpk= &(c->pkeys[SSL_PKEY_RSA_ENC]); in ssl_set_cert_masks() 1925 if (c->pkeys[SSL_PKEY_RSA_ENC].x509 == NULL) in ssl_get_server_send_cert() 1928 i=SSL_PKEY_RSA_ENC; in ssl_get_server_send_cert() 1960 else if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey != NULL) in ssl_get_sign_pkey() 1961 return(c->pkeys[SSL_PKEY_RSA_ENC].privatekey); in ssl_get_sign_pkey()
|
H A D | d1_srvr.c | 344 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL in IMPLEMENT_dtls1_meth_func() 346 …&& EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->t… in IMPLEMENT_dtls1_meth_func()
|
H A D | s2_clnt.c | 1065 sc->peer_pkeys[SSL_PKEY_RSA_ENC].x509=x509; in ssl2_set_certificate() 1066 sc->peer_key= &(sc->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl2_set_certificate()
|
/dports/devel/godot2-tools/godot-2.1.6-stable/thirdparty/openssl/ssl/ |
H A D | s2_srvr.c | 457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) { in get_client_master_key() 806 n = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in server_hello() 808 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &d); in server_hello() 1096 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in request_certificate() 1103 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &p2); in request_certificate() 1145 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) { in ssl_rsa_private_decrypt() 1149 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) { in ssl_rsa_private_decrypt() 1153 rsa = c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; in ssl_rsa_private_decrypt()
|
H A D | ssl_cert.c | 193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in ssl_cert_set_default_md() 211 ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); in ssl_cert_new() 646 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl_sess_cert_new()
|
H A D | d1_srvr.c | 519 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL in IMPLEMENT_dtls1_meth_func() 522 [SSL_PKEY_RSA_ENC].privatekey) * in IMPLEMENT_dtls1_meth_func()
|
H A D | t1_lib.c | 3918 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3920 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3946 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3948 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3969 c->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in tls1_process_sigalgs() 4403 case SSL_PKEY_RSA_ENC: in tls1_check_chain() 4585 tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_ENC); in tls1_set_cert_validity()
|
H A D | s2_clnt.c | 1039 sc->peer_pkeys[SSL_PKEY_RSA_ENC].x509 = x509; in ssl2_set_certificate() 1040 sc->peer_key = &(sc->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl2_set_certificate()
|
/dports/devel/godot2/godot-2.1.6-stable/thirdparty/openssl/ssl/ |
H A D | s2_srvr.c | 457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) { in get_client_master_key() 806 n = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in server_hello() 808 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &d); in server_hello() 1096 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in request_certificate() 1103 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &p2); in request_certificate() 1145 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) { in ssl_rsa_private_decrypt() 1149 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) { in ssl_rsa_private_decrypt() 1153 rsa = c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; in ssl_rsa_private_decrypt()
|
H A D | ssl_cert.c | 193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in ssl_cert_set_default_md() 211 ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); in ssl_cert_new() 646 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl_sess_cert_new()
|
H A D | d1_srvr.c | 519 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL in IMPLEMENT_dtls1_meth_func() 522 [SSL_PKEY_RSA_ENC].privatekey) * in IMPLEMENT_dtls1_meth_func()
|
H A D | t1_lib.c | 3918 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3920 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3946 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3948 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3969 c->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in tls1_process_sigalgs() 4403 case SSL_PKEY_RSA_ENC: in tls1_check_chain() 4585 tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_ENC); in tls1_set_cert_validity()
|
H A D | s2_clnt.c | 1039 sc->peer_pkeys[SSL_PKEY_RSA_ENC].x509 = x509; in ssl2_set_certificate() 1040 sc->peer_key = &(sc->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl2_set_certificate()
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/ssl/ |
H A D | s2_srvr.c | 457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) { in get_client_master_key() 806 n = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in server_hello() 808 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &d); in server_hello() 1096 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in request_certificate() 1103 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &p2); in request_certificate() 1145 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) { in ssl_rsa_private_decrypt() 1149 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) { in ssl_rsa_private_decrypt() 1153 rsa = c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; in ssl_rsa_private_decrypt()
|
H A D | ssl_cert.c | 193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in ssl_cert_set_default_md() 211 ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); in ssl_cert_new() 646 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl_sess_cert_new()
|
H A D | d1_srvr.c | 519 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL in IMPLEMENT_dtls1_meth_func() 522 [SSL_PKEY_RSA_ENC].privatekey) * in IMPLEMENT_dtls1_meth_func()
|
H A D | t1_lib.c | 3918 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3920 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3946 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3948 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3969 c->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in tls1_process_sigalgs() 4403 case SSL_PKEY_RSA_ENC: in tls1_check_chain() 4585 tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_ENC); in tls1_set_cert_validity()
|
/dports/security/openssl-unsafe/openssl-c9ba19c/ssl/ |
H A D | s2_srvr.c | 457 if (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) { in get_client_master_key() 806 n = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in server_hello() 808 i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &d); in server_hello() 1096 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, NULL); in request_certificate() 1103 i = i2d_X509(s->cert->pkeys[SSL_PKEY_RSA_ENC].x509, &p2); in request_certificate() 1145 if ((c == NULL) || (c->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL)) { in ssl_rsa_private_decrypt() 1149 if (c->pkeys[SSL_PKEY_RSA_ENC].privatekey->type != EVP_PKEY_RSA) { in ssl_rsa_private_decrypt() 1153 rsa = c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; in ssl_rsa_private_decrypt()
|
H A D | ssl_cert.c | 193 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in ssl_cert_set_default_md() 211 ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); in ssl_cert_new() 647 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); in ssl_sess_cert_new()
|
H A D | d1_srvr.c | 515 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL in IMPLEMENT_dtls1_meth_func() 518 [SSL_PKEY_RSA_ENC].privatekey) * in IMPLEMENT_dtls1_meth_func()
|
H A D | t1_lib.c | 3877 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3879 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3893 c->pkeys[SSL_PKEY_RSA_ENC].valid_flags = in tls1_process_sigalgs() 3895 c->pkeys[SSL_PKEY_RSA_ENC].digest = md; in tls1_process_sigalgs() 3916 c->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); in tls1_process_sigalgs() 4350 case SSL_PKEY_RSA_ENC: in tls1_check_chain() 4532 tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_ENC); in tls1_set_cert_validity()
|
H A D | s3_clnt.c | 1603 sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); in ssl3_get_key_exchange() 1677 sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); in ssl3_get_key_exchange() 1782 sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); in ssl3_get_key_exchange() 1901 sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); in ssl3_get_key_exchange() 2537 sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC]. in ssl3_send_client_key_exchange() 3231 pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); in ssl3_send_client_key_exchange()
|