Lines Matching refs:info

972         OSSL_STORE_INFO *info = OSSL_STORE_load(ctx);
982 if (info == NULL) {
986 type = OSSL_STORE_INFO_get_type(info);
990 ok = (*ppkey = OSSL_STORE_INFO_get1_PKEY(info)) != NULL;
999 ok = ((*ppubkey = OSSL_STORE_INFO_get1_PKEY(info)) != NULL);
1005 ok = ((*ppubkey = OSSL_STORE_INFO_get1_PUBKEY(info)) != NULL);
1011 ok = ((*pparams = OSSL_STORE_INFO_get1_PARAMS(info)) != NULL);
1017 ok = (*pcert = OSSL_STORE_INFO_get1_CERT(info)) != NULL;
1022 OSSL_STORE_INFO_get1_CERT(info),
1028 ok = (*pcrl = OSSL_STORE_INFO_get1_CRL(info)) != NULL;
1032 ok = sk_X509_CRL_push(*pcrls, OSSL_STORE_INFO_get1_CRL(info));
1039 OSSL_STORE_INFO_free(info);
1041 failed = info == NULL ? NULL : OSSL_STORE_INFO_type_string(type);
2264 /* Ensure RFC 5280 compliance, adapt keyIDs as needed, and sign the cert info */
2301 /* Sign the certificate request info */
2314 /* Sign the CRL info */
2469 APP_HTTP_TLS_INFO *info = (APP_HTTP_TLS_INFO *)arg;
2470 SSL_CTX *ssl_ctx = info->ssl_ctx;
2483 if ((info->use_proxy
2484 && !OSSL_HTTP_proxy_connect(bio, info->server, info->port,
2486 info->timeout, bio_err, opt_getprog()))
2524 void APP_HTTP_TLS_INFO_free(APP_HTTP_TLS_INFO *info)
2526 if (info != NULL) {
2527 SSL_CTX_free(info->ssl_ctx);
2528 OPENSSL_free(info);
2538 APP_HTTP_TLS_INFO info;
2564 info.server = server;
2565 info.port = port;
2566 info.use_proxy = /* workaround for callback design flaw, see #17088 */
2568 info.timeout = timeout;
2569 info.ssl_ctx = ssl_ctx;
2571 app_http_tls_cb, &info, 0 /* buf_size */, headers,
2594 APP_HTTP_TLS_INFO info;
2601 info.server = host;
2602 info.port = port;
2603 info.use_proxy = /* workaround for callback design flaw, see #17088 */
2605 info.timeout = timeout;
2606 info.ssl_ctx = ssl_ctx;
2609 app_http_tls_cb, &info,