Lines Matching refs:ctx

26     OSSL_CMP_CTX *ctx; /* Client CMP context, reusing transactionID etc. */
48 OSSL_CMP_CTX_free(srv_ctx->ctx);
54 OSSL_CMP_SRV_CTX *ctx = OPENSSL_zalloc(sizeof(OSSL_CMP_SRV_CTX));
56 if (ctx == NULL)
59 if ((ctx->ctx = OSSL_CMP_CTX_new(libctx, propq)) == NULL)
61 ctx->certReqId = OSSL_CMP_CERTREQID_INVALID;
64 return ctx;
66 OSSL_CMP_SRV_CTX_free(ctx);
98 return srv_ctx->ctx;
169 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
211 if (!ossl_cmp_verify_popo(srv_ctx->ctx, req, srv_ctx->acceptRAVerified)) {
226 if (!OSSL_CMP_CTX_set_option(srv_ctx->ctx,
235 msg = ossl_cmp_certrep_new(srv_ctx->ctx, bodytype, certReqId, si,
260 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
283 if ((msg = ossl_cmp_rp_new(srv_ctx->ctx, si, certId,
303 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
309 msg = ossl_cmp_genp_new(srv_ctx->ctx, itavs);
320 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
326 if ((msg = ossl_cmp_pkiconf_new(srv_ctx->ctx)) == NULL)
334 OSSL_CMP_CTX *ctx;
340 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
343 ctx = srv_ctx->ctx;
347 if (OSSL_CMP_CTX_get_option(ctx, OSSL_CMP_OPT_IMPLICIT_CONFIRM) == 1
348 || ctx->status != OSSL_CMP_PKISTATUS_trans) {
354 ossl_cmp_err(ctx, "certificate rejected by client");
357 ossl_cmp_warn(ctx, "All CertStatus but the first will be ignored");
378 ossl_cmp_log2(INFO, ctx, "certificate rejected by client %s %s",
384 if ((msg = ossl_cmp_pkiconf_new(ctx)) == NULL)
399 if (!ossl_assert(srv_ctx != NULL && srv_ctx->ctx != NULL && req != NULL))
422 if ((msg = ossl_cmp_pollRep_new(srv_ctx->ctx, certReqId,
433 static int unprotected_exception(const OSSL_CMP_CTX *ctx,
438 if (!ossl_assert(ctx != NULL && req != NULL))
442 ossl_cmp_log1(WARN, ctx, "ignoring %s protection of request message",
447 && OSSL_CMP_CTX_get_option(ctx, OSSL_CMP_OPT_UNPROTECTED_ERRORS) == 1) {
448 ossl_cmp_warn(ctx, "ignoring missing protection of error message");
460 OSSL_CMP_CTX *ctx;
467 if (srv_ctx == NULL || srv_ctx->ctx == NULL
473 ctx = srv_ctx->ctx;
474 backup_secret = ctx->secretValue;
476 ossl_cmp_log1(DEBUG, ctx,
487 if (!OSSL_CMP_CTX_set1_recipient(ctx, hdr->sender->d.directoryName))
498 if (ctx->transactionID != NULL) {
501 tid = OPENSSL_buf2hexstr(ctx->transactionID->data,
502 ctx->transactionID->length);
504 ossl_cmp_log1(WARN, ctx,
510 if (!OSSL_CMP_CTX_set1_transactionID(ctx, NULL)
511 || !OSSL_CMP_CTX_set1_senderNonce(ctx, NULL))
516 if (ctx->transactionID == NULL) {
524 req_verified = ossl_cmp_msg_check_update(ctx, req, unprotected_exception,
526 if (ctx->secretValue != NULL && ctx->pkey != NULL
528 ctx->secretValue = NULL; /* use MSG_SIG_ALG when protecting rsp */
589 * which normally would set ctx->transactionID and ctx->recipNonce.
593 if (ctx->transactionID == NULL)
594 (void)OSSL_CMP_CTX_set1_transactionID(ctx, hdr->transactionID);
595 (void)ossl_cmp_ctx_set1_recipNonce(ctx, hdr->senderNonce);
603 rsp = ossl_cmp_error_new(srv_ctx->ctx, si, err,
608 OSSL_CMP_CTX_print_errors(ctx);
609 ctx->secretValue = backup_secret;
614 ossl_cmp_log1(DEBUG, ctx,
617 ossl_cmp_log(ERR, ctx, "cannot send proper CMP response");
620 ctx->status = OSSL_CMP_PKISTATUS_trans;
625 if (OSSL_CMP_CTX_get_option(ctx, OSSL_CMP_OPT_IMPLICIT_CONFIRM) == 0)
633 (void)OSSL_CMP_CTX_set1_transactionID(ctx, NULL);
634 (void)OSSL_CMP_CTX_set1_senderNonce(ctx, NULL);
635 ctx->status = OSSL_CMP_PKISTATUS_unspecified; /* transaction closed */