/freebsd/crypto/openssl/ssl/ |
H A D | ssl_cert.c | 61 CERT *ssl_cert_new(void) in ssl_cert_new() 63 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_new() 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() 87 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup() 214 void ssl_cert_clear_certs(CERT *c) in ssl_cert_clear_certs() 233 void ssl_cert_free(CERT *c) in ssl_cert_free() 323 int ssl_cert_select_current(CERT *c, X509 *x) in ssl_cert_select_current() 346 int ssl_cert_set_current(CERT *c, long op) in ssl_cert_set_current() 369 void ssl_cert_set_cert_cb(CERT *c, int (*cb) (SSL *ssl, void *arg), void *arg) in ssl_cert_set_cert_cb() 876 CERT *c = s ? s->cert : ctx->cert; in ssl_build_cert_chain() [all …]
|
H A D | ssl_local.h | 2069 } CERT; typedef 2382 __owur CERT *ssl_cert_new(void); 2383 __owur CERT *ssl_cert_dup(CERT *cert); 2384 void ssl_cert_clear_certs(CERT *c); 2385 void ssl_cert_free(CERT *c); 2401 CERT *c); 2425 __owur int ssl_cert_select_current(CERT *c, X509 *x); 2426 __owur int ssl_cert_set_current(CERT *c, long arg); 2427 void ssl_cert_set_cert_cb(CERT *c, int (*cb) (SSL *ssl, void *arg), void *arg); 2431 __owur int ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, [all …]
|
H A D | ssl_rsa.c | 20 static int ssl_set_cert(CERT *c, X509 *x509); 21 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey); 118 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey) in ssl_set_pkey() 227 static int ssl_set_cert(CERT *c, X509 *x) in ssl_set_cert() 930 CERT *c = ssl != NULL ? ssl->cert : ctx->cert; in ssl_set_cert_and_key()
|
H A D | ssl_conf.c | 432 CERT *c = NULL; in cmd_Certificate() 476 CERT *cert; in do_store() 983 CERT *c = NULL; in SSL_CONF_CTX_finish()
|
H A D | t1_lib.c | 2238 CERT *c = s->cert; in tls1_set_shared_sigalgs() 2507 int tls1_set_sigalgs_list(CERT *c, const char *str, int client) in tls1_set_sigalgs_list() 2518 int tls1_set_raw_sigalgs(CERT *c, const uint16_t *psigs, size_t salglen, in tls1_set_raw_sigalgs() 2542 int tls1_set_sigalgs(CERT *c, const int *psig_nids, size_t salglen, int client) in tls1_set_sigalgs() 2657 CERT *c = s->cert; in tls1_check_chain()
|
H A D | ssl_ciph.c | 998 const SSL_CIPHER **ca_list, CERT *c) in ssl_cipher_process_rulestr() 1256 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, in check_suiteb_cipher_list() 1447 CERT *c) in STACK_OF()
|
H A D | s3_lib.c | 3420 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 4380 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len) in ssl3_set_req_cert_type()
|
H A D | ssl_lib.c | 3622 CERT *c = s->cert; in ssl_set_masks() 4354 CERT *new_cert; in SSL_set_SSL_CTX()
|
/freebsd/usr.sbin/certctl/ |
H A D | certctl.sh | 179 local CFUNC CSEARCH CPATH CFILE CERT SPLITDIR 200 for CERT in $(find "$SPLITDIR" -type f) ; do 201 "$CFUNC" "$CERT"
|
/freebsd/share/dict/ |
H A D | freebsd | 30 CERT
|
/freebsd/contrib/sendmail/smrsh/ |
H A D | README | 4 This README file is provided as a courtesy of the CERT Coordination Center, 6 intended as a supplement to the CERT advisory CA-93:16.sendmail.vulnerability,
|
/freebsd/contrib/ldns/drill/ |
H A D | ChangeLog.22-nov-2005 | 60 - CERT RR supported
|
/freebsd/contrib/unbound/doc/ |
H A D | FEATURES | 92 2538: CERT type.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_STORE_INFO.pod | 68 STORE_INFO_get0_<TYPE>() where <TYPE> can be NAME, PARAMS, PKEY, CERT, or CRL.
|
/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Checkers/ |
H A D | Checkers.td | 79 def CERT : Package<"cert">, ParentPackage<Security>; 80 def ENV : Package<"env">, ParentPackage<CERT>; 998 HelpText<"Warn on using a floating point value as a loop counter (CERT: " 1010 "'setuid(getuid())' (CERT: POS36-C)">,
|
/freebsd/crypto/openssl/util/ |
H A D | indent.pro | 119 -T CERT
|
/freebsd/contrib/bzip2/ |
H A D | CHANGES | 318 Security fix only. Fixes CERT-FI 20469 as it applies to bzip2.
|
/freebsd/contrib/ldns/ |
H A D | Changelog | 530 * bugfix #342: patch for support for more CERT key types (RFC4398). 926 - fixed CERT RR type
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_srvr.c | 2454 CERT *cert = s->cert; in tls_construct_server_key_exchange()
|
/freebsd/contrib/tcp_wrappers/ |
H A D | README | 471 A short-term solution, as outlined in in CERT advisory CA-95:01, is to
|
/freebsd/contrib/file/ |
H A D | ChangeLog | 979 * Fix CDF parsing issues found by CERT's fuzzing tool (Will Dormann)
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 6703 * Add support for certificate stores in CERT structure. This makes it 6707 to build and store a certificate chain in CERT structure: returning 6711 Note: if the CERT based stores are not set then the parent SSL_CTX 6748 Add new "cert_flags" field to CERT structure and include a "strict mode". 14848 *Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>, 18515 * Create a duplicate of the SSL_CTX's CERT in SSL_new instead of 18531 we don't use CERT any longer, but a new structure SESS_CERT 18534 and temporary key. CERT holds only those values that can have
|
/freebsd/contrib/ntp/ |
H A D | ChangeLog | 5035 * CERT problem fixed (99k23)
|
/freebsd/contrib/sendmail/ |
H A D | RELEASE_NOTES | 6083 privileges. Problem reported by Wolfgang Ley of DFN-CERT. 6944 by Wolfgang Ley of DFN-CERT.
|