Lines Matching refs:cert
334 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */
335 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */
338 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */
339 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */
340 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */
341 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */
346 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */
347 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */
352 # define TLS_S_DH_OK 0x00200000 /* DH cert is ok */
1055 ** SSL_VERIFY_PEER requests a client cert but even
1057 ** will be aborted if the client presents a cert
1152 ** certreq -- did we ask for a cert?
1159 ** {cipher_bits}, {alg_bits}, {cert}, {cert_subject},
1176 X509 *cert;
1194 cert = SSL_get_peer_certificate(ssl);
1199 who, verifyok, (unsigned long) cert);
1200 if (cert != NULL)
1207 subj = X509_get_subject_name(cert);
1208 issuer = X509_get_issuer_name(cert);
1264 if (X509_digest(cert, EVP_md5(), md, &n) != 0 && n > 0)
1293 if (cert != NULL)
1310 if (cert != NULL)
1311 X509_free(cert);
1344 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
1596 X509 *cert;
1600 cert = X509_STORE_CTX_get_current_cert(ctx);
1614 X509_NAME_oneline(X509_get_subject_name(cert), buf, sizeof(buf));
1616 "STARTTLS: %s cert verify: depth=%d %s, state=%d, reason=%s",