Home
last modified time | relevance | path

Searched refs:cert_depth (Results 1 – 25 of 32) sorted by relevance

12

/dports/security/openvpn/openvpn-2.5.6/src/openvpn/
H A Dssl_verify.c459 cert_depth); in verify_cert_set_env()
498 cert_depth, subject); in verify_cert_call_plugin()
503 cert_depth, subject); in verify_cert_call_plugin()
591 cert_depth, subject); in verify_cert_call_command()
596 cert_depth, subject); in verify_cert_call_command()
616 cert_depth, subject); in verify_check_crl_dir()
629 cert_depth, subject, serial); in verify_check_crl_dir()
676 if (!cert_depth) in verify_cert()
692 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert()
699 if (cert_depth == 1 && opt->verify_hash) in verify_cert()
[all …]
H A Dssl_verify_backend.h57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth);
70 void cert_hash_remember(struct tls_session *session, const int cert_depth,
172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
H A Dssl_verify_mbedtls.c50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument
63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback()
87 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback()
92 "subject string from certificate): %s", cert_depth, errstr); in verify_callback()
97 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback()
368 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument
385 cert_depth, shortname); in x509_setenv()
390 cert_depth); in x509_setenv()
H A Dssl_verify_mbedtls.h72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
H A Dssl_verify_openssl.c520 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument
568 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/
H A Dssl_verify.c459 cert_depth); in verify_cert_set_env()
498 cert_depth, subject); in verify_cert_call_plugin()
503 cert_depth, subject); in verify_cert_call_plugin()
591 cert_depth, subject); in verify_cert_call_command()
596 cert_depth, subject); in verify_cert_call_command()
616 cert_depth, subject); in verify_check_crl_dir()
629 cert_depth, subject, serial); in verify_check_crl_dir()
676 if (!cert_depth) in verify_cert()
692 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert()
699 if (cert_depth == 1 && opt->verify_hash) in verify_cert()
[all …]
H A Dssl_verify_backend.h57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth);
70 void cert_hash_remember(struct tls_session *session, const int cert_depth,
172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
H A Dssl_verify_mbedtls.c50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument
63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback()
87 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback()
92 "subject string from certificate): %s", cert_depth, errstr); in verify_callback()
97 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback()
368 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument
385 cert_depth, shortname); in x509_setenv()
390 cert_depth); in x509_setenv()
H A Dssl_verify_mbedtls.h72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
H A Dssl_verify_openssl.c520 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument
568 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/
H A Dssl_verify.c458 cert_depth); in verify_cert_set_env()
497 cert_depth, subject); in verify_cert_call_plugin()
502 cert_depth, subject); in verify_cert_call_plugin()
590 cert_depth, subject); in verify_cert_call_command()
595 cert_depth, subject); in verify_cert_call_command()
615 cert_depth, subject); in verify_check_crl_dir()
628 cert_depth, subject, serial); in verify_check_crl_dir()
679 if (!cert_depth) in verify_cert()
693 if (!cert_depth) in verify_cert()
718 if (cert_depth >= MAX_CERT_DEPTH) in verify_cert()
[all …]
H A Dssl_verify_backend.h57 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth);
70 void cert_hash_remember(struct tls_session *session, const int cert_depth,
172 void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert);
H A Dssl_verify_mbedtls.c50 verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, in verify_callback() argument
63 cert_hash_remember(session, cert_depth, &cert_fingerprint); in verify_callback()
103 cert_depth, subject, serial ? serial : "<not available>", errstr); in verify_callback()
108 "subject string from certificate): %s", cert_depth, errstr); in verify_callback()
113 else if (SUCCESS != verify_cert(session, cert, cert_depth)) in verify_callback()
384 x509_setenv(struct env_set *es, int cert_depth, mbedtls_x509_crt *cert) in x509_setenv() argument
401 cert_depth, shortname); in x509_setenv()
406 cert_depth); in x509_setenv()
H A Dssl_verify_mbedtls.h72 int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth,
H A Dssl_verify_openssl.c531 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) in x509_setenv() argument
579 openvpn_snprintf(name_expand, name_expand_size, "X509_%d_%s", cert_depth, in x509_setenv()
/dports/security/gnupg/gnupg-2.3.3/g10/
H A Dtest-stubs.c74 byte *marginals, byte *completes, byte *cert_depth, in read_trust_options() argument
83 (void)cert_depth; in read_trust_options()
H A Dtdbio.h55 byte cert_depth; member
H A Dtdbio.c580 rec.r.ver.cert_depth = opt.max_cert_depth; in tdbio_update_version_record()
612 rec.r.ver.cert_depth = opt.max_cert_depth; in create_version_record()
917 && vr.r.ver.cert_depth == opt.max_cert_depth in tdbio_db_matches_options()
1459 rec->r.ver.cert_depth, in tdbio_dump_record()
1577 rec->r.ver.cert_depth = *p++; in tdbio_read_record()
1692 *p++ = rec->r.ver.cert_depth; in tdbio_write_record()
H A Dtrustdb.h110 byte *marginals, byte *completes, byte *cert_depth,
H A Dgpgv.c316 byte *marginals, byte *completes, byte *cert_depth, in read_trust_options() argument
325 (void)cert_depth; in read_trust_options()
/dports/security/gnupg1/gnupg-1.4.23/g10/
H A Dtrustdb.h74 byte *marginals,byte *completes,byte *cert_depth,
H A Dtdbio.h55 byte cert_depth; member
H A Dtdbio.c442 rec.r.ver.cert_depth = opt.max_cert_depth; in tdbio_update_version_record()
462 rec.r.ver.cert_depth = opt.max_cert_depth; in create_version_record()
690 && vr.r.ver.cert_depth == opt.max_cert_depth in tdbio_db_matches_options()
1125 rec->r.ver.cert_depth, in tdbio_dump_record()
1219 rec->r.ver.cert_depth = *p++; in tdbio_read_record()
1307 *p++ = rec->r.ver.cert_depth; in tdbio_write_record()
H A Dkeylist.c63 byte trust_model,marginals,completes,cert_depth,min_cert_level; in public_key_list() local
67 &marginals,&completes,&cert_depth,&min_cert_level); in public_key_list()
81 if(cert_depth!=opt.max_cert_depth) in public_key_list()
94 printf(":%d:%d:%d",marginals,completes,cert_depth); in public_key_list()
/dports/www/netsurf/netsurf-3.10/content/fetchers/
H A Dcurl.c240 int cert_depth; /**< deepest certificate in use */ member
494 fetch->cert_depth = -1; in fetch_curl_setup()
593 chain.depth = f->cert_depth + 1; /* 0 indexed certificate depth */ in fetch_curl_store_certs_in_cache()
724 if (depth > fetch->cert_depth) { in fetch_curl_verify_callback()
725 fetch->cert_depth = depth; in fetch_curl_verify_callback()
742 for (depth = fetch->cert_depth; depth > 0; depth--) { in fetch_curl_verify_callback()

12