| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_cert.c | 63 CERT *ssl_cert_new(size_t ssl_pkey_num) in ssl_cert_new() 65 CERT *ret = NULL; in ssl_cert_new() 95 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() 97 CERT *ret = OPENSSL_zalloc(sizeof(*ret)); in ssl_cert_dup() 240 void ssl_cert_clear_certs(CERT *c) in ssl_cert_clear_certs() 270 void ssl_cert_free(CERT *c) in ssl_cert_free() 366 int ssl_cert_select_current(CERT *c, X509 *x) in ssl_cert_select_current() 390 int ssl_cert_set_current(CERT *c, long op) in ssl_cert_set_current() 414 void ssl_cert_set_cert_cb(CERT *c, int (*cb)(SSL *ssl, void *arg), void *arg) in ssl_cert_set_cert_cb() 1068 CERT *c = s != NULL ? s->cert : ctx->cert; in ssl_build_cert_chain() [all …]
|
| H A D | ssl_local.h | 2144 } CERT; typedef 2538 __owur CERT *ssl_cert_new(size_t ssl_pkey_num); 2539 __owur CERT *ssl_cert_dup(CERT *cert); 2540 void ssl_cert_clear_certs(CERT *c); 2541 void ssl_cert_free(CERT *c); 2558 CERT *c); 2588 __owur int ssl_cert_select_current(CERT *c, X509 *x); 2589 __owur int ssl_cert_set_current(CERT *c, long arg); 2590 void ssl_cert_set_cert_cb(CERT *c, int (*cb)(SSL *ssl, void *arg), void *arg); 2595 __owur int ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, [all …]
|
| H A D | ssl_rsa.c | 21 static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx); 22 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx); 133 static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx) in ssl_set_pkey() 258 static int ssl_set_cert(CERT *c, X509 *x, SSL_CTX *ctx) in ssl_set_cert() 986 CERT *c; in ssl_set_cert_and_key()
|
| H A D | ssl_conf.c | 440 CERT *c = NULL; in cmd_Certificate() 497 CERT *cert; in do_store() 1064 CERT *c = NULL; in SSL_CONF_CTX_finish()
|
| H A D | ssl_cert_comp.c | 336 static int ossl_set1_compressed_cert(CERT *cert, int algorithm, in ossl_set1_compressed_cert()
|
| H A D | ssl_ciph.c | 958 const SSL_CIPHER **ca_list, CERT *c) in ssl_cipher_process_rulestr() 1213 static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, in check_suiteb_cipher_list() 1412 CERT *c) in STACK_OF()
|
| H A D | t1_lib.c | 3490 CERT *c = s->cert; in tls1_set_shared_sigalgs() 3809 int tls1_set_sigalgs_list(SSL_CTX *ctx, CERT *c, const char *str, int client) in tls1_set_sigalgs_list() 3828 int tls1_set_raw_sigalgs(CERT *c, const uint16_t *psigs, size_t salglen, in tls1_set_raw_sigalgs() 3850 int tls1_set_sigalgs(CERT *c, const int *psig_nids, size_t salglen, int client) in tls1_set_sigalgs() 3997 CERT *c = s->cert; in tls1_check_chain()
|
| H A D | s3_lib.c | 3952 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); 4962 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len) in ssl3_set_req_cert_type()
|
| H A D | ssl_lib.c | 4562 CERT *c = s->cert; in ssl_set_masks() 5464 CERT *new_cert; in SSL_set_SSL_CTX()
|
| /freebsd/share/dict/ |
| H A D | freebsd | 30 CERT
|
| /freebsd/contrib/sendmail/smrsh/ |
| H A D | README | 4 This README file is provided as a courtesy of the CERT Coordination Center, 6 intended as a supplement to the CERT advisory CA-93:16.sendmail.vulnerability,
|
| /freebsd/contrib/ldns/drill/ |
| H A D | ChangeLog.22-nov-2005 | 60 - CERT RR supported
|
| /freebsd/contrib/unbound/doc/ |
| H A D | FEATURES | 92 2538: CERT type.
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OSSL_STORE_INFO.pod | 68 STORE_INFO_get0_<TYPE>() where <TYPE> can be NAME, PARAMS, PKEY, CERT, or CRL.
|
| /freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Checkers/ |
| H A D | Checkers.td | 79 def CERT : Package<"cert">, ParentPackage<Security>; 80 def ENV : Package<"env">, ParentPackage<CERT>; 998 HelpText<"Warn on using a floating point value as a loop counter (CERT: " 1010 "'setuid(getuid())' (CERT: POS36-C)">,
|
| /freebsd/crypto/openssl/util/ |
| H A D | indent.pro | 119 -T CERT
|
| /freebsd/contrib/bzip2/ |
| H A D | CHANGES | 318 Security fix only. Fixes CERT-FI 20469 as it applies to bzip2.
|
| /freebsd/contrib/ldns/ |
| H A D | Changelog | 530 * bugfix #342: patch for support for more CERT key types (RFC4398). 926 - fixed CERT RR type
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 2588 CERT *cert = s->cert; in tls_construct_server_key_exchange()
|
| /freebsd/contrib/tcp_wrappers/ |
| H A D | README | 471 A short-term solution, as outlined in in CERT advisory CA-95:01, is to
|
| /freebsd/contrib/file/ |
| H A D | ChangeLog | 1011 * Fix CDF parsing issues found by CERT's fuzzing tool (Will Dormann)
|
| /freebsd/crypto/openssl/ |
| H A D | CHANGES.md | 8388 * Add support for certificate stores in CERT structure. This makes it 8392 to build and store a certificate chain in CERT structure: returning 8396 Note: if the CERT based stores are not set then the parent SSL_CTX 8433 Add new "cert_flags" field to CERT structure and include a "strict mode". 16533 *Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>, 20200 * Create a duplicate of the SSL_CTX's CERT in SSL_new instead of 20216 we don't use CERT any longer, but a new structure SESS_CERT 20219 and temporary key. CERT holds only those values that can have
|
| /freebsd/contrib/ntp/ |
| H A D | ChangeLog | 5035 * CERT problem fixed (99k23)
|
| /freebsd/contrib/sendmail/ |
| H A D | RELEASE_NOTES | 6083 privileges. Problem reported by Wolfgang Ley of DFN-CERT. 6944 by Wolfgang Ley of DFN-CERT.
|