/dragonfly/crypto/libressl/ssl/ |
H A D | tls_lib.c | 24 X509 *peer_cert = NULL; in tls_process_peer_certs() local 31 peer_cert = sk_X509_value(peer_certs, 0); in tls_process_peer_certs() 32 X509_up_ref(peer_cert); in tls_process_peer_certs() 34 if ((pkey = X509_get0_pubkey(peer_cert)) == NULL) { in tls_process_peer_certs() 49 X509_free(s->session->peer_cert); in tls_process_peer_certs() 50 s->session->peer_cert = peer_cert; in tls_process_peer_certs() 51 peer_cert = NULL; in tls_process_peer_certs() 65 X509_free(peer_cert); in tls_process_peer_certs()
|
H A D | ssl_asn1.c | 116 if (s->peer_cert != NULL) { in SSL_SESSION_encode() 117 if ((len = i2d_X509(s->peer_cert, &peer_cert_bytes)) <= 0) in SSL_SESSION_encode() 119 if (!CBB_add_asn1(&session, &peer_cert, SSLASN1_PEER_CERT_TAG)) in SSL_SESSION_encode() 121 if (!CBB_add_bytes(&peer_cert, peer_cert_bytes, len)) in SSL_SESSION_encode() 245 CBS cbs, session, cipher_suite, session_id, master_key, peer_cert; in d2i_SSL_SESSION() local 329 X509_free(s->peer_cert); in d2i_SSL_SESSION() 330 s->peer_cert = NULL; in d2i_SSL_SESSION() 331 if (!CBS_get_optional_asn1(&session, &peer_cert, &present, in d2i_SSL_SESSION() 335 data_len = CBS_len(&peer_cert); in d2i_SSL_SESSION() 338 peer_cert_bytes = CBS_data(&peer_cert); in d2i_SSL_SESSION() [all …]
|
H A D | ssl_srvr.c | 463 ((s->session->peer_cert != NULL) && in ssl3_accept() 560 if (!s->session->peer_cert) in ssl3_accept() 1830 if ((client_pubkey = X509_get0_pubkey(s->session->peer_cert)) != NULL) { in ssl3_get_client_kex_gost() 1929 X509 *peer_cert = NULL; in ssl3_get_cert_verify() local 1951 peer_cert = s->session->peer_cert; in ssl3_get_cert_verify() 1952 pkey = X509_get0_pubkey(peer_cert); in ssl3_get_cert_verify() 1953 type = X509_certificate_type(peer_cert, pkey); in ssl3_get_cert_verify() 1957 if (peer_cert != NULL) { in ssl3_get_cert_verify() 1966 if (peer_cert == NULL) { in ssl3_get_cert_verify()
|
H A D | ssl_clnt.c | 1354 pkey = X509_get0_pubkey(s->session->peer_cert); in ssl3_get_server_key_exchange() 1357 pkey = X509_get0_pubkey(s->session->peer_cert); in ssl3_get_server_key_exchange() 1787 pkey = X509_get0_pubkey(s->session->peer_cert); in ssl3_send_client_kex_rsa() 1928 pkey = X509_get0_pubkey(s->session->peer_cert); in ssl3_send_client_kex_gost() 2446 if (!ssl_check_srvr_ecc_cert_and_alg(s, s->session->peer_cert)) { in ssl3_check_cert_and_algorithm() 2453 i = X509_certificate_type(s->session->peer_cert, NULL); in ssl3_check_cert_and_algorithm()
|
H A D | ssl_sess.c | 766 X509_free(ss->peer_cert); in SSL_SESSION_free() 881 return s->peer_cert; in SSL_SESSION_get0_peer()
|
H A D | tls13_server.c | 980 if ((cert = ctx->ssl->session->peer_cert) == NULL) in tls13_client_certificate_verify_recv()
|
H A D | tls13_client.c | 669 if ((cert = ctx->ssl->session->peer_cert) == NULL) in tls13_server_certificate_verify_recv()
|
H A D | ssl_locl.h | 485 X509 *peer_cert; member
|
H A D | ssl_lib.c | 873 if ((cert = s->session->peer_cert) == NULL) in SSL_get_peer_certificate()
|
/dragonfly/crypto/libressl/tls/ |
H A D | tls_conninfo.c | 204 free(ctx->conninfo->peer_cert); in tls_conninfo_cert_pem() 206 if ((ctx->conninfo->peer_cert = malloc(bptr->length)) == NULL) in tls_conninfo_cert_pem() 209 memcpy(ctx->conninfo->peer_cert, bptr->data, in tls_conninfo_cert_pem() 292 free(conninfo->peer_cert); in tls_conninfo_free()
|
H A D | tls_peer.c | 97 return (ctx->conninfo->peer_cert); in tls_peer_cert_chain_pem()
|
H A D | tls_internal.h | 135 uint8_t *peer_cert; member
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 179 data->peer_cert.depth, in authsrv_tls_event() 180 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event() 181 data->peer_cert.subject); in authsrv_tls_event()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_wolfssl.c | 93 WOLFSSL_X509 *peer_cert; member 875 ev.peer_cert.cert = cert; in wolfssl_tls_cert_event() 886 ev.peer_cert.hash = hash; in wolfssl_tls_cert_event() 887 ev.peer_cert.hash_len = sizeof(hash); in wolfssl_tls_cert_event() 892 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event() 893 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event() 934 ev.peer_cert.altsubject[alt] = alt_subject[alt]; in wolfssl_tls_cert_event() 935 ev.peer_cert.num_altsubject = num_alt_subject; in wolfssl_tls_cert_event() 975 conn->peer_cert = err_cert; in tls_verify_cb()
|
H A D | tls_openssl.c | 265 X509 *peer_cert; member 1649 if (!conn->peer_cert) in tls_connection_peer_serial_num() 1652 ser = X509_get_serialNumber(conn->peer_cert); in tls_connection_peer_serial_num() 2221 ev.peer_cert.cert = cert; in openssl_tls_cert_event() 2230 ev.peer_cert.hash = hash; in openssl_tls_cert_event() 2231 ev.peer_cert.hash_len = sizeof(hash); in openssl_tls_cert_event() 2235 ev.peer_cert.depth = depth; in openssl_tls_cert_event() 2236 ev.peer_cert.subject = subject; in openssl_tls_cert_event() 2243 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 2324 conn->peer_cert = err_cert; in tls_verify_cb() [all …]
|
H A D | tls_gnutls.c | 1311 ev.peer_cert.cert = cert_buf; in tls_connection_verify_peer() 1317 ev.peer_cert.hash = hash; in tls_connection_verify_peer() 1318 ev.peer_cert.hash_len = sizeof(hash); in tls_connection_verify_peer() 1321 ev.peer_cert.depth = i; in tls_connection_verify_peer() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
H A D | tls.h | 72 struct tls_cert_data peer_cert; member
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 311 ev.peer_cert.depth = depth; in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 335 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
|
/dragonfly/contrib/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 62 X509 *peer_cert; member 1023 ctx->peer_cert = cert; in curl_cb_ssl_verify() 1203 if (!ctx->peer_cert) { in ocsp_resp_cb() 1219 id = OCSP_cert_to_id(EVP_sha256(), ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb() 1232 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 2090 if (data->peer_cert.hash) { in eap_peer_sm_tls_event() 2091 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 2095 data->peer_cert.hash, in eap_peer_sm_tls_event() 2096 data->peer_cert.hash_len); in eap_peer_sm_tls_event() 2100 sm->eapol_cb->notify_cert(sm->eapol_ctx, &data->peer_cert, in eap_peer_sm_tls_event()
|