/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify.c | 459 cert_depth); in verify_cert_set_env() 498 cert_depth, subject); in verify_cert_call_plugin() 503 cert_depth, subject); in verify_cert_call_plugin() 591 cert_depth, subject); in verify_cert_call_command() 596 cert_depth, subject); in verify_cert_call_command() 616 cert_depth, subject); in verify_check_crl_dir() 629 cert_depth, subject, serial); in verify_check_crl_dir() 676 if (!cert_depth) in verify_cert() 692 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert() 699 if (cert_depth == 1 && opt->verify_hash) in verify_cert() [all …]
|
H A D | ssl_verify_backend.h | 57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth); 70 void cert_hash_remember(struct tls_session *session, const int cert_depth, 172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
|
H A D | ssl_verify_mbedtls.c | 50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument 63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback() 87 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback() 92 "subject string from certificate): %s", cert_depth, errstr); in verify_callback() 97 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback() 368 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument 385 cert_depth, shortname); in x509_setenv() 390 cert_depth); in x509_setenv()
|
H A D | ssl_verify_mbedtls.h | 72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
|
H A D | ssl_verify_openssl.c | 520 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument 568 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_verify.c | 459 cert_depth); in verify_cert_set_env() 498 cert_depth, subject); in verify_cert_call_plugin() 503 cert_depth, subject); in verify_cert_call_plugin() 591 cert_depth, subject); in verify_cert_call_command() 596 cert_depth, subject); in verify_cert_call_command() 616 cert_depth, subject); in verify_check_crl_dir() 629 cert_depth, subject, serial); in verify_check_crl_dir() 676 if (!cert_depth) in verify_cert() 692 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert() 699 if (cert_depth == 1 && opt->verify_hash) in verify_cert() [all …]
|
H A D | ssl_verify_backend.h | 57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth); 70 void cert_hash_remember(struct tls_session *session, const int cert_depth, 172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
|
H A D | ssl_verify_mbedtls.c | 50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument 63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback() 87 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback() 92 "subject string from certificate): %s", cert_depth, errstr); in verify_callback() 97 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback() 368 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument 385 cert_depth, shortname); in x509_setenv() 390 cert_depth); in x509_setenv()
|
H A D | ssl_verify_mbedtls.h | 72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
|
H A D | ssl_verify_openssl.c | 520 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument 568 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/ |
H A D | ssl_verify.c | 458 cert_depth); in verify_cert_set_env() 497 cert_depth, subject); in verify_cert_call_plugin() 502 cert_depth, subject); in verify_cert_call_plugin() 590 cert_depth, subject); in verify_cert_call_command() 595 cert_depth, subject); in verify_cert_call_command() 615 cert_depth, subject); in verify_check_crl_dir() 628 cert_depth, subject, serial); in verify_check_crl_dir() 679 if (!cert_depth) in verify_cert() 693 if (!cert_depth) in verify_cert() 718 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert() [all …]
|
H A D | ssl_verify_backend.h | 57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth); 70 void cert_hash_remember(struct tls_session *session, const int cert_depth, 172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
|
H A D | ssl_verify_mbedtls.c | 50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument 63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback() 103 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback() 108 "subject string from certificate): %s", cert_depth, errstr); in verify_callback() 113 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback() 384 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument 401 cert_depth, shortname); in x509_setenv() 406 cert_depth); in x509_setenv()
|
H A D | ssl_verify_mbedtls.h | 72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
|
H A D | ssl_verify_openssl.c | 531 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument 579 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
|
/dports/security/gnupg/gnupg-2.3.3/g10/ |
H A D | test-stubs.c | 74 byte *marginals, byte *completes, byte *cert_depth, in read_trust_options() argument 83 (void)cert_depth; in read_trust_options()
|
H A D | tdbio.h | 55 byte cert_depth; member
|
H A D | tdbio.c | 580 rec.r.ver.cert_depth = opt.max_cert_depth; in tdbio_update_version_record() 612 rec.r.ver.cert_depth = opt.max_cert_depth; in create_version_record() 917 && vr.r.ver.cert_depth == opt.max_cert_depth in tdbio_db_matches_options() 1459 rec->r.ver.cert_depth, in tdbio_dump_record() 1577 rec->r.ver.cert_depth = *p++; in tdbio_read_record() 1692 *p++ = rec->r.ver.cert_depth; in tdbio_write_record()
|
H A D | trustdb.h | 110 byte *marginals, byte *completes, byte *cert_depth,
|
H A D | gpgv.c | 316 byte *marginals, byte *completes, byte *cert_depth, in read_trust_options() argument 325 (void)cert_depth; in read_trust_options()
|
/dports/security/gnupg1/gnupg-1.4.23/g10/ |
H A D | trustdb.h | 74 byte *marginals,byte *completes,byte *cert_depth,
|
H A D | tdbio.h | 55 byte cert_depth; member
|
H A D | tdbio.c | 442 rec.r.ver.cert_depth = opt.max_cert_depth; in tdbio_update_version_record() 462 rec.r.ver.cert_depth = opt.max_cert_depth; in create_version_record() 690 && vr.r.ver.cert_depth == opt.max_cert_depth in tdbio_db_matches_options() 1125 rec->r.ver.cert_depth, in tdbio_dump_record() 1219 rec->r.ver.cert_depth = *p++; in tdbio_read_record() 1307 *p++ = rec->r.ver.cert_depth; in tdbio_write_record()
|
H A D | keylist.c | 63 byte trust_model,marginals,completes,cert_depth,min_cert_level; in public_key_list() local 67 &marginals,&completes,&cert_depth,&min_cert_level); in public_key_list() 81 if(cert_depth!=opt.max_cert_depth) in public_key_list() 94 printf(":%d:%d:%d",marginals,completes,cert_depth); in public_key_list()
|
/dports/www/netsurf/netsurf-3.10/content/fetchers/ |
H A D | curl.c | 240 int cert_depth; /**< deepest certificate in use */ member 494 fetch->cert_depth = -1; in fetch_curl_setup() 593 chain.depth = f->cert_depth + 1; /* 0 indexed certificate depth */ in fetch_curl_store_certs_in_cache() 724 if (depth > fetch->cert_depth) { in fetch_curl_verify_callback() 725 fetch->cert_depth = depth; in fetch_curl_verify_callback() 742 for (depth = fetch->cert_depth; depth > 0; depth--) { in fetch_curl_verify_callback()
|