Lines Matching refs:cert
361 # define TLS_S_CERT_EX 0x00000001 /* cert file exists */
362 # define TLS_S_CERT_OK 0x00000002 /* cert file is ok */
365 # define TLS_S_CERTP_EX 0x00000010 /* CA cert path exists */
366 # define TLS_S_CERTP_OK 0x00000020 /* CA cert path is ok */
367 # define TLS_S_CERTF_EX 0x00000040 /* CA cert file exists */
368 # define TLS_S_CERTF_OK 0x00000080 /* CA cert file is ok */
373 # define TLS_S_CERT2_EX 0x00001000 /* 2nd cert file exists */
374 # define TLS_S_CERT2_OK 0x00002000 /* 2nd cert file is ok */
379 # define TLS_S_DH_OK 0x00200000 /* DH cert is ok */
1108 ** SSL_VERIFY_PEER requests a client cert but even
1110 ** will be aborted if the client presents a cert
1205 ** certreq -- did we ask for a cert?
1212 ** {cipher_bits}, {alg_bits}, {cert}, {cert_subject},
1229 X509 *cert;
1247 cert = SSL_get_peer_certificate(ssl);
1252 who, verifyok, (unsigned long) cert);
1253 if (cert != NULL)
1260 subj = X509_get_subject_name(cert);
1261 issuer = X509_get_issuer_name(cert);
1317 if (X509_digest(cert, EVP_md5(), md, &n) != 0 && n > 0)
1346 if (cert != NULL)
1363 if (cert != NULL)
1364 X509_free(cert);
1397 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
1649 X509 *cert;
1653 cert = X509_STORE_CTX_get_current_cert(ctx);
1667 X509_NAME_oneline(X509_get_subject_name(cert), buf, sizeof(buf));
1669 "STARTTLS: %s cert verify: depth=%d %s, state=%d, reason=%s",