Searched refs:rpk (Results 1 – 12 of 12) sorted by relevance
/openssl/ssl/ |
H A D | ssl_cert.c | 130 CERT_PKEY *rpk = ret->pkeys + i; in ssl_cert_dup() local 133 rpk->x509 = cpk->x509; in ssl_cert_dup() 134 X509_up_ref(rpk->x509); in ssl_cert_dup() 138 rpk->privatekey = cpk->privatekey; in ssl_cert_dup() 143 rpk->chain = X509_chain_up_ref(cpk->chain); in ssl_cert_dup() 144 if (!rpk->chain) { in ssl_cert_dup() 152 if (rpk->serverinfo == NULL) in ssl_cert_dup() 161 rpk->comp_cert[j] = cpk->comp_cert[j]; in ssl_cert_dup() 433 if (sk != NULL && rpk != NULL) in ssl_verify_internal() 531 int ssl_verify_rpk(SSL_CONNECTION *s, EVP_PKEY *rpk) in ssl_verify_rpk() argument [all …]
|
H A D | ssl_local.h | 2549 __owur int ssl_verify_rpk(SSL_CONNECTION *s, EVP_PKEY *rpk);
|
H A D | ssl_lib.c | 7862 int SSL_add_expected_rpk(SSL *s, EVP_PKEY *rpk) in SSL_add_expected_rpk() argument 7870 if ((ret = i2d_PUBKEY(rpk, &data)) <= 0) in SSL_add_expected_rpk()
|
/openssl/doc/man3/ |
H A D | SSL_set1_server_cert_type.pod | 110 EVP_PKEY *rpk; 112 /* Assign rpk to an EVP_PKEY from a file or other means */ 122 if (!SSL_use_PrivateKey(ssl, rpk)) 135 EVP_PKEY *rpk; 138 /* Assign rpk to an EVP_PKEY from a file or other means */ 154 if (!SSL_add_expected_rpk(ssl, rpk))
|
H A D | SSL_get0_peer_rpk.pod | 15 int SSL_add_expected_rpk(SSL *s, EVP_PKEY *rpk); 23 SSL_add_expected_rpk() adds a DANE TLSA record matching public key B<rpk>
|
H A D | X509_STORE_CTX_new.pod | 36 EVP_PKEY *rpk);
|
/openssl/crypto/x509/ |
H A D | x509_vfy.c | 278 if (ctx->rpk != NULL) in X509_STORE_CTX_verify() 303 if (!check_key_level(ctx, ctx->rpk) in x509_verify_rpk() 1855 if (ctx->rpk != NULL) { in internal_verify() 2329 void X509_STORE_CTX_set0_rpk(X509_STORE_CTX *ctx, EVP_PKEY *rpk) in X509_STORE_CTX_set0_rpk() argument 2331 ctx->rpk = rpk; in X509_STORE_CTX_set0_rpk() 2460 ctx->rpk = rpk; in X509_STORE_CTX_init_rpk() 2493 ctx->rpk = NULL; in X509_STORE_CTX_init() 2665 return ctx->rpk; in X509_STORE_CTX_get0_rpk() 3055 static int dane_match_rpk(X509_STORE_CTX *ctx, EVP_PKEY *rpk) in dane_match_rpk() argument 3071 if ((len = i2d_PUBKEY(rpk, &i2dbuf)) <= 0) in dane_match_rpk() [all …]
|
/openssl/include/crypto/ |
H A D | x509.h | 282 EVP_PKEY *rpk; member
|
/openssl/include/openssl/ |
H A D | x509_vfy.h.in | 474 EVP_PKEY* rpk);
|
H A D | ssl.h.in | 2813 __owur int SSL_add_expected_rpk(SSL *s, EVP_PKEY *rpk);
|
/openssl/test/ |
H A D | build.info | 69 IF[{- !$disabled{'rpk'} -}]
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1687 SSL_R_WRONG_RPK_TYPE:351:wrong rpk type
|
Completed in 122 milliseconds