Home
last modified time | relevance | path

Searched refs:CERT (Results 1 – 24 of 24) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dssl_cert.c63 CERT *ssl_cert_new(size_t ssl_pkey_num) in ssl_cert_new()
65 CERT *ret = NULL; in ssl_cert_new()
95 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup()
97 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup()
240 void ssl_cert_clear_certs(CERT *c) in ssl_cert_clear_certs()
270 void ssl_cert_free(CERT *c) in ssl_cert_free()
366 int ssl_cert_select_current(CERT *c, X509 *x) in ssl_cert_select_current()
390 int ssl_cert_set_current(CERT *c, long op) in ssl_cert_set_current()
414 void ssl_cert_set_cert_cb(CERT *c, int (*cb)(SSL *ssl, void *arg), void *arg) in ssl_cert_set_cert_cb()
1068 CERT *c = s != NULL ? s->cert : ctx->cert; in ssl_build_cert_chain()
[all …]
H A Dssl_local.h2144 } CERT; typedef
2538 __owur CERT *ssl_cert_new(size_t ssl_pkey_num);
2539 __owur CERT *ssl_cert_dup(CERT *cert);
2540 void ssl_cert_clear_certs(CERT *c);
2541 void ssl_cert_free(CERT *c);
2558 CERT *c);
2588 __owur int ssl_cert_select_current(CERT *c, X509 *x);
2589 __owur int ssl_cert_set_current(CERT *c, long arg);
2590 void ssl_cert_set_cert_cb(CERT *c, int (*cb)(SSL *ssl, void *arg), void *arg);
2595 __owur int ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain,
[all …]
H A Dssl_rsa.c21 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx);
22 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx);
133 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx) in ssl_set_pkey()
258 static int ssl_set_cert(CERT *c, X509 *x, SSL_CTX *ctx) in ssl_set_cert()
986 CERT *c; in ssl_set_cert_and_key()
H A Dssl_conf.c440 CERT *c = NULL; in cmd_Certificate()
497 CERT *cert; in do_store()
1064 CERT *c = NULL; in SSL_CONF_CTX_finish()
H A Dssl_cert_comp.c336 static int ossl_set1_compressed_cert(CERT *cert, int algorithm, in ossl_set1_compressed_cert()
H A Dssl_ciph.c958 const SSL_CIPHER **ca_list, CERT *c) in ssl_cipher_process_rulestr()
1213 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, in check_suiteb_cipher_list()
1412 CERT *c) in STACK_OF()
H A Dt1_lib.c3490 CERT *c = s->cert; in tls1_set_shared_sigalgs()
3809 int tls1_set_sigalgs_list(SSL_CTX *ctx, CERT *c, const char *str, int client) in tls1_set_sigalgs_list()
3828 int tls1_set_raw_sigalgs(CERT *c, const uint16_t *psigs, size_t salglen, in tls1_set_raw_sigalgs()
3850 int tls1_set_sigalgs(CERT *c, const int *psig_nids, size_t salglen, int client) in tls1_set_sigalgs()
3997 CERT *c = s->cert; in tls1_check_chain()
H A Ds3_lib.c3952 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
4962 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len) in ssl3_set_req_cert_type()
H A Dssl_lib.c4562 CERT *c = s->cert; in ssl_set_masks()
5464 CERT *new_cert; in SSL_set_SSL_CTX()
/freebsd/share/dict/
H A Dfreebsd30 CERT
/freebsd/contrib/sendmail/smrsh/
H A DREADME4 This README file is provided as a courtesy of the CERT Coordination Center,
6 intended as a supplement to the CERT advisory CA-93:16.sendmail.vulnerability,
/freebsd/contrib/ldns/drill/
H A DChangeLog.22-nov-200560 - CERT RR supported
/freebsd/contrib/unbound/doc/
H A DFEATURES92 2538: CERT type.
/freebsd/crypto/openssl/doc/man3/
H A DOSSL_STORE_INFO.pod68 STORE_INFO_get0_<TYPE>() where <TYPE> can be NAME, PARAMS, PKEY, CERT, or CRL.
/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Checkers/
H A DCheckers.td79 def CERT : Package<"cert">, ParentPackage<Security>;
80 def ENV : Package<"env">, ParentPackage<CERT>;
998 HelpText<"Warn on using a floating point value as a loop counter (CERT: "
1010 "'setuid(getuid())' (CERT: POS36-C)">,
/freebsd/crypto/openssl/util/
H A Dindent.pro119 -T CERT
/freebsd/contrib/bzip2/
H A DCHANGES318 Security fix only. Fixes CERT-FI 20469 as it applies to bzip2.
/freebsd/contrib/ldns/
H A DChangelog530 * bugfix #342: patch for support for more CERT key types (RFC4398).
926 - fixed CERT RR type
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_srvr.c2588 CERT *cert = s->cert; in tls_construct_server_key_exchange()
/freebsd/contrib/tcp_wrappers/
H A DREADME471 A short-term solution, as outlined in in CERT advisory CA-95:01, is to
/freebsd/contrib/file/
H A DChangeLog1011 * Fix CDF parsing issues found by CERT's fuzzing tool (Will Dormann)
/freebsd/crypto/openssl/
H A DCHANGES.md8388 * Add support for certificate stores in CERT structure. This makes it
8392 to build and store a certificate chain in CERT structure: returning
8396 Note: if the CERT based stores are not set then the parent SSL_CTX
8433 Add new "cert_flags" field to CERT structure and include a "strict mode".
16533 *Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>,
20200 * Create a duplicate of the SSL_CTX's CERT in SSL_new instead of
20216 we don't use CERT any longer, but a new structure SESS_CERT
20219 and temporary key. CERT holds only those values that can have
/freebsd/contrib/ntp/
H A DChangeLog5035 * CERT problem fixed (99k23)
/freebsd/contrib/sendmail/
H A DRELEASE_NOTES6083 privileges. Problem reported by Wolfgang Ley of DFN-CERT.
6944 by Wolfgang Ley of DFN-CERT.