Searched refs:mspki (Results 1 – 6 of 6) sorted by relevance
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_dane_enable.pod | 22 int SSL_get0_dane_authority(SSL *s, X509 **mcert, EVP_PKEY **mspki); 113 element of the chain, then that key is returned via B<mspki> argument (if not 304 EVP_PKEY *mspki = NULL; 306 int depth = SSL_get0_dane_authority(ssl, NULL, &mspki); 312 (mspki != NULL) ? "signed the peer" :
|
| /freebsd/contrib/sendmail/src/ |
| H A D | tls.c | 1839 EVP_PKEY *mspki; 1875 mspki = NULL; 1876 depth = SSL_get0_dane_authority(ssl, NULL, &mspki); 1890 (mspki != NULL) ? "TA_public_key_verified_certificate" 1908 (mspki != NULL) ? "TA_public_key_verified_certificate" :
|
| /freebsd/crypto/openssl/apps/lib/ |
| H A D | s_cb.c | 1256 EVP_PKEY *mspki = NULL; in print_verify_detail() local 1271 if ((mdpth = SSL_get0_dane_authority(s, NULL, &mspki)) >= 0) { in print_verify_detail() 1296 (mspki != NULL) ? "signed the peer" : mdpth ? "matched the TA" in print_verify_detail()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_lib.c | 1305 int SSL_get0_dane_authority(SSL *s, X509 **mcert, EVP_PKEY **mspki) in SSL_get0_dane_authority() argument 1320 if (mspki) in SSL_get0_dane_authority() 1321 *mspki = (dane->mcert == NULL) ? dane->mtlsa->spki : NULL; in SSL_get0_dane_authority()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ssl.h | 1898 __owur int SSL_get0_dane_authority(SSL *s, X509 **mcert, EVP_PKEY **mspki);
|
| H A D | ssl.h.in | 1851 __owur int SSL_get0_dane_authority(SSL *s, X509 **mcert, EVP_PKEY **mspki);
|