/third_party/mbedtls/library/ |
H A D | ssl_tls13_generic.c | 284 if (!mbedtls_pk_can_do(&ssl->session_negotiate->peer_cert->pk, sig_alg)) { in ssl_tls13_parse_certificate_verify() 316 &ssl->session_negotiate->peer_cert->pk, in ssl_tls13_parse_certificate_verify() 468 if (ssl->session_negotiate->peer_cert != NULL) { in mbedtls_ssl_tls13_parse_certificate() 469 mbedtls_x509_crt_free(ssl->session_negotiate->peer_cert); in mbedtls_ssl_tls13_parse_certificate() 470 mbedtls_free(ssl->session_negotiate->peer_cert); in mbedtls_ssl_tls13_parse_certificate() 474 ssl->session_negotiate->peer_cert = NULL; in mbedtls_ssl_tls13_parse_certificate() 479 if ((ssl->session_negotiate->peer_cert = in mbedtls_ssl_tls13_parse_certificate() 488 mbedtls_x509_crt_init(ssl->session_negotiate->peer_cert); in mbedtls_ssl_tls13_parse_certificate() 513 ret = mbedtls_x509_crt_parse_der(ssl->session_negotiate->peer_cert, in mbedtls_ssl_tls13_parse_certificate() 603 ssl->session_negotiate->peer_cert); in mbedtls_ssl_tls13_parse_certificate() [all...] |
H A D | ssl_tls.c | 249 if (src->peer_cert != NULL) { in mbedtls_ssl_session_copy() 252 dst->peer_cert = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in mbedtls_ssl_session_copy() 253 if (dst->peer_cert == NULL) { in mbedtls_ssl_session_copy() 257 mbedtls_x509_crt_init(dst->peer_cert); in mbedtls_ssl_session_copy() 259 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy() 260 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy() 261 mbedtls_free(dst->peer_cert); in mbedtls_ssl_session_copy() 262 dst->peer_cert = NULL; in mbedtls_ssl_session_copy() 498 if (session->peer_cert ! in ssl_clear_peer_cert() [all...] |
H A D | ssl_tls12_client.c | 1944 if (ssl->session_negotiate->peer_cert == NULL) { in ssl_write_encrypted_pms() 1949 peer_pk = &ssl->session_negotiate->peer_cert->pk; in ssl_write_encrypted_pms() 1994 if (ssl->session_negotiate->peer_cert == NULL) { in ssl_get_ecdh_params_from_cert() 1999 peer_pk = &ssl->session_negotiate->peer_cert->pk; in ssl_get_ecdh_params_from_cert() 2308 if (ssl->session_negotiate->peer_cert == NULL) { in ssl_parse_server_key_exchange() 2313 peer_pk = &ssl->session_negotiate->peer_cert->pk; in ssl_parse_server_key_exchange()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | authsrv.c | 179 data->peer_cert.depth, in authsrv_tls_event() 180 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event() 181 data->peer_cert.subject); in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | authsrv.c | 159 data->peer_cert.depth, in authsrv_tls_event() 160 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event() 161 data->peer_cert.subject); in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_read.c | 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 311 ev.peer_cert.depth = depth; in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 317 ev.peer_cert.tod = 1; in tls_peer_cert_event() 320 ev.peer_cert.tod = 2; in tls_peer_cert_event() 343 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 265 X509 *peer_cert; member 1649 if (!conn->peer_cert) in tls_connection_peer_serial_num() 1652 ser = X509_get_serialNumber(conn->peer_cert); in tls_connection_peer_serial_num() 2221 ev.peer_cert.cert = cert; in openssl_tls_cert_event() 2230 ev.peer_cert.hash = hash; in openssl_tls_cert_event() 2231 ev.peer_cert.hash_len = sizeof(hash); in openssl_tls_cert_event() 2235 ev.peer_cert.depth = depth; in openssl_tls_cert_event() 2236 ev.peer_cert.subject = subject; in openssl_tls_cert_event() 2243 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 2285 ev.peer_cert in openssl_tls_cert_event() [all...] |
H A D | tls_wolfssl.c | 93 WOLFSSL_X509 *peer_cert; member 875 ev.peer_cert.cert = cert; in wolfssl_tls_cert_event() 886 ev.peer_cert.hash = hash; in wolfssl_tls_cert_event() 887 ev.peer_cert.hash_len = sizeof(hash); in wolfssl_tls_cert_event() 892 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event() 893 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event() 934 ev.peer_cert.altsubject[alt] = alt_subject[alt]; in wolfssl_tls_cert_event() 935 ev.peer_cert.num_altsubject = num_alt_subject; in wolfssl_tls_cert_event() 975 conn->peer_cert = err_cert; in tls_verify_cb()
|
H A D | tls_gnutls.c | 1311 ev.peer_cert.cert = cert_buf; in tls_connection_verify_peer() 1317 ev.peer_cert.hash = hash; in tls_connection_verify_peer() 1318 ev.peer_cert.hash_len = sizeof(hash); in tls_connection_verify_peer() 1321 ev.peer_cert.depth = i; in tls_connection_verify_peer() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
H A D | tls.h | 72 struct tls_cert_data peer_cert; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_read.c | 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 311 ev.peer_cert.depth = depth; in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 335 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_wolfssl.c | 94 WOLFSSL_X509 *peer_cert; member 879 ev.peer_cert.cert = cert; in wolfssl_tls_cert_event() 890 ev.peer_cert.hash = hash; in wolfssl_tls_cert_event() 891 ev.peer_cert.hash_len = sizeof(hash); in wolfssl_tls_cert_event() 896 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event() 897 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event() 941 ev.peer_cert.altsubject[alt] = alt_subject[alt]; in wolfssl_tls_cert_event() 942 ev.peer_cert.num_altsubject = num_alt_subject; in wolfssl_tls_cert_event() 982 conn->peer_cert = err_cert; in tls_verify_cb()
|
H A D | tls_gnutls.c | 1311 ev.peer_cert.cert = cert_buf; in tls_connection_verify_peer() 1317 ev.peer_cert.hash = hash; in tls_connection_verify_peer() 1318 ev.peer_cert.hash_len = sizeof(hash); in tls_connection_verify_peer() 1321 ev.peer_cert.depth = i; in tls_connection_verify_peer() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
H A D | tls_openssl.c | 270 X509 *peer_cert; member 1689 if (!conn->peer_cert) in tls_connection_peer_serial_num() 1692 ser = X509_get_serialNumber(conn->peer_cert); in tls_connection_peer_serial_num() 2264 ev.peer_cert.cert = cert; in openssl_tls_cert_event() 2273 ev.peer_cert.hash = hash; in openssl_tls_cert_event() 2274 ev.peer_cert.hash_len = sizeof(hash); in openssl_tls_cert_event() 2278 ev.peer_cert.depth = depth; in openssl_tls_cert_event() 2279 ev.peer_cert.subject = subject; in openssl_tls_cert_event() 2286 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 2328 ev.peer_cert in openssl_tls_cert_event() [all...] |
H A D | tls.h | 72 struct tls_cert_data peer_cert; member
|
/third_party/node/src/quic/ |
H A D | tlscontext.h | 124 v8::MaybeLocal<v8::Object> peer_cert(Environment* env) const;
|
H A D | tlscontext.cc | 503 MaybeLocal<Object> TLSContext::peer_cert(Environment* env) const { in peer_cert() function in node::quic::TLSContext
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 3025 X509 *peer_cert; in tls_construct_cke_gost() local 3040 peer_cert = s->session->peer; in tls_construct_cke_gost() 3041 if (peer_cert == NULL) { in tls_construct_cke_gost() 3048 X509_get0_pubkey(peer_cert), in tls_construct_cke_gost() 3173 X509 *peer_cert; in tls_construct_cke_gost18() local 3203 peer_cert = s->session->peer; in tls_construct_cke_gost18() 3204 if (peer_cert == NULL) { in tls_construct_cke_gost18() 3211 X509_get0_pubkey(peer_cert), in tls_construct_cke_gost18()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 3017 X509 *peer_cert; in tls_construct_cke_gost() local 3032 peer_cert = s->session->peer; in tls_construct_cke_gost() 3033 if (peer_cert == NULL) { in tls_construct_cke_gost() 3040 X509_get0_pubkey(peer_cert), in tls_construct_cke_gost() 3165 X509 *peer_cert; in tls_construct_cke_gost18() local 3195 peer_cert = s->session->peer; in tls_construct_cke_gost18() 3196 if (peer_cert == NULL) { in tls_construct_cke_gost18() 3203 X509_get0_pubkey(peer_cert), in tls_construct_cke_gost18()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | http_curl.c | 62 X509 *peer_cert; member 1023 ctx->peer_cert = cert; in curl_cb_ssl_verify() 1203 if (!ctx->peer_cert) { in ocsp_resp_cb() 1219 id = OCSP_cert_to_id(EVP_sha256(), ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb() 1232 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | http_curl.c | 62 X509 *peer_cert; member 1023 ctx->peer_cert = cert; in curl_cb_ssl_verify() 1203 if (!ctx->peer_cert) { in ocsp_resp_cb() 1219 id = OCSP_cert_to_id(EVP_sha256(), ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb() 1232 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb()
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 1705 session->peer_cert = mbedtls_calloc(1, sizeof(*session->peer_cert)); in mbedtls_test_ssl_tls12_populate_session() 1706 if (session->peer_cert == NULL) { in mbedtls_test_ssl_tls12_populate_session() 1709 *session->peer_cert = tmp_crt; in mbedtls_test_ssl_tls12_populate_session()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap.c | 2090 if (data->peer_cert.hash) { in eap_peer_sm_tls_event() 2091 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 2095 data->peer_cert.hash, in eap_peer_sm_tls_event() 2096 data->peer_cert.hash_len); in eap_peer_sm_tls_event() 2100 sm->eapol_cb->notify_cert(sm->eapol_ctx, &data->peer_cert, in eap_peer_sm_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap.c | 2135 if (data->peer_cert.hash) { in eap_peer_sm_tls_event() 2136 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 2140 data->peer_cert.hash, in eap_peer_sm_tls_event() 2141 data->peer_cert.hash_len); in eap_peer_sm_tls_event() 2145 sm->eapol_cb->notify_cert(sm->eapol_ctx, &data->peer_cert, in eap_peer_sm_tls_event()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 1823 X509 *peer_cert; in _ssl__SSLSocket_getpeercert_impl() local 1831 peer_cert = SSL_get_peer_certificate(self->ssl); in _ssl__SSLSocket_getpeercert_impl() 1832 if (peer_cert == NULL) in _ssl__SSLSocket_getpeercert_impl() 1837 result = _certificate_to_der(get_state_sock(self), peer_cert); in _ssl__SSLSocket_getpeercert_impl() 1843 result = _decode_certificate(get_state_sock(self), peer_cert); in _ssl__SSLSocket_getpeercert_impl() 1845 X509_free(peer_cert); in _ssl__SSLSocket_getpeercert_impl()
|