Searched refs:peer_rpk (Results 1 – 10 of 10) sorted by relevance
/openssl/ssl/ |
H A D | ssl_asn1.c | 48 ASN1_OCTET_STRING *peer_rpk; member 131 ASN1_OCTET_STRING peer_rpk; in i2d_SSL_SESSION() local 177 as.peer_rpk = NULL; in i2d_SSL_SESSION() 178 peer_rpk.data = NULL; in i2d_SSL_SESSION() 179 if (in->peer_rpk != NULL) { in i2d_SSL_SESSION() 180 peer_rpk.length = i2d_PUBKEY(in->peer_rpk, &peer_rpk.data); in i2d_SSL_SESSION() 181 if (peer_rpk.length > 0 && peer_rpk.data != NULL) in i2d_SSL_SESSION() 182 as.peer_rpk = &peer_rpk; in i2d_SSL_SESSION() 340 ret->peer_rpk = NULL; in d2i_SSL_SESSION_ex() 341 if (as->peer_rpk != NULL) { in d2i_SSL_SESSION_ex() [all …]
|
H A D | ssl_sess.c | 165 dest->peer_rpk = NULL; in ssl_session_dup_intern() 200 if (src->peer_rpk != NULL) { in ssl_session_dup_intern() 201 if (!EVP_PKEY_up_ref(src->peer_rpk)) in ssl_session_dup_intern() 203 dest->peer_rpk = src->peer_rpk; in ssl_session_dup_intern() 857 EVP_PKEY_free(ss->peer_rpk); in SSL_SESSION_free() 1094 return s->peer_rpk; in SSL_SESSION_get0_peer_rpk()
|
H A D | ssl_local.h | 512 EVP_PKEY *peer_rpk; member
|
H A D | ssl_lib.c | 7887 return sc->session->peer_rpk; in SSL_get0_peer_rpk()
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 44 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; in received_server_cert() 1890 EVP_PKEY *peer_rpk = NULL; in tls_process_server_rpk() local 1892 if (!tls_process_rpk(sc, pkt, &peer_rpk)) { in tls_process_server_rpk() 1897 if (peer_rpk == NULL) { in tls_process_server_rpk() 1902 EVP_PKEY_free(sc->session->peer_rpk); in tls_process_server_rpk() 1903 sc->session->peer_rpk = peer_rpk; in tls_process_server_rpk() 1914 if (sc->session->peer_rpk == NULL) { in tls_post_process_server_rpk() 1922 if (ssl_verify_rpk(sc, sc->session->peer_rpk) > 0 in tls_post_process_server_rpk() 2135 EVP_PKEY_free(s->session->peer_rpk); in tls_post_process_server_certificate() 2136 s->session->peer_rpk = NULL; in tls_post_process_server_certificate() [all …]
|
H A D | statem_srvr.c | 55 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; in received_client_cert() 3520 EVP_PKEY *peer_rpk = NULL; in tls_process_client_rpk() local 3522 if (!tls_process_rpk(sc, pkt, &peer_rpk)) { in tls_process_client_rpk() 3527 if (peer_rpk == NULL) { in tls_process_client_rpk() 3535 if (ssl_verify_rpk(sc, peer_rpk) <= 0) { in tls_process_client_rpk() 3566 EVP_PKEY_free(sc->session->peer_rpk); in tls_process_client_rpk() 3567 sc->session->peer_rpk = peer_rpk; in tls_process_client_rpk() 3568 peer_rpk = NULL; in tls_process_client_rpk() 3597 EVP_PKEY_free(peer_rpk); in tls_process_client_rpk() 3763 EVP_PKEY_free(s->session->peer_rpk); in tls_process_client_certificate() [all …]
|
H A D | statem_lib.c | 1101 if (sc->session->peer_rpk != NULL) in tls_get_peer_pkey() 1102 return sc->session->peer_rpk; in tls_get_peer_pkey() 1108 int tls_process_rpk(SSL_CONNECTION *sc, PACKET *pkt, EVP_PKEY **peer_rpk) in tls_process_rpk() argument 1295 if (peer_rpk != NULL) { in tls_process_rpk() 1296 *peer_rpk = pkey; in tls_process_rpk()
|
H A D | statem_local.h | 182 __owur int tls_process_rpk(SSL_CONNECTION *s, PACKET *pkt, EVP_PKEY **peer_rpk);
|
/openssl/apps/lib/ |
H A D | s_cb.c | 1304 EVP_PKEY *peer_rpk = SSL_get0_peer_rpk(s); in print_ssl_summary() local 1322 } else if (peer_rpk != NULL) { in print_ssl_summary()
|
/openssl/apps/ |
H A D | s_client.c | 3431 EVP_PKEY *peer_rpk = SSL_get0_peer_rpk(s); in print_stuff() local 3433 if (peer_rpk != NULL) { in print_stuff() 3435 EVP_PKEY_print_public(bio, peer_rpk, 2, NULL); in print_stuff()
|
Completed in 94 milliseconds