Home | History | Annotate | Download | only in vtls

Lines Matching refs:cert

57 #include <cert.h>
459 cert;
471 cert = PK11_FindCertFromNickname(nickname, NULL);
472 if(cert)
473 CERT_DestroyCertificate(cert);
639 failf(data, "unable to load client cert: %d (%s)", err, err_name);
650 /* In case the cert file also has the key */
830 CERTCertificate *cert)
837 subject = CERT_NameToAscii(&cert->subject);
838 issuer = CERT_NameToAscii(&cert->issuer);
839 common_name = CERT_GetCommonName(&cert->subject);
842 CERT_GetCertTimes(cert, &notBefore, &notAfter);
862 CERTCertificate *cert;
877 cert = SSL_PeerCertificate(sock);
878 if(cert) {
882 display_cert_info(conn->data, cert);
883 CERT_DestroyCertificate(cert);
889 if(!cert->isRoot) {
890 cert2 = CERT_FindCertIssuer(cert, now, certUsageSSLCA);
905 for(i = 0; cert; cert = cert2) {
906 result = Curl_extract_certinfo(conn, i++, (char *)cert->derCert.data,
907 (char *)cert->derCert.data +
908 cert->derCert.len);
912 if(cert->isRoot) {
913 CERT_DestroyCertificate(cert);
917 cert2 = CERT_FindCertIssuer(cert, now, certUsageSSLCA);
918 CERT_DestroyCertificate(cert);
932 CERTCertificate *cert;
934 /* remember the cert verification result */
944 /* print only info about the cert, the error is printed off the callback */
945 cert = SSL_PeerCertificate(sock);
946 if(cert) {
948 display_cert_info(data, cert);
949 CERT_DestroyCertificate(cert);
965 CERTCertificate *cert, *cert_issuer, *issuer;
969 cert = SSL_PeerCertificate(sock);
970 cert_issuer = CERT_FindCertIssuer(cert, PR_Now(), certUsageObjectSigner);
981 CERT_DestroyCertificate(cert);
992 CERTCertificate *cert;
999 cert = SSL_PeerCertificate(connssl->handle);
1000 if(cert) {
1002 SECKEYPublicKey *pubkey = CERT_ExtractPublicKey(cert);
1014 CERT_DestroyCertificate(cert);
1048 /* use the cert/key provided by PEM reader */
1051 struct CERTCertificateStr *cert;
1067 cert = PK11_FindCertFromDERCertItem(slot, &cert_der, proto_win);
1069 if(NULL == cert) {
1075 key = PK11_FindPrivateKeyFromCert(slot, cert, NULL);
1079 CERT_DestroyCertificate(cert);
1084 display_cert_info(data, cert);
1086 *pRetCert = cert;
1765 if(SSL_SET_OPTION(cert)) {
1766 char *nickname = dup_nickname(data, SSL_SET_OPTION(cert));
1768 /* we are not going to use libnsspem.so to read the client cert */
1772 CURLcode rv = cert_stuff(conn, sockindex, SSL_SET_OPTION(cert),
1836 /* This is the password associated with the cert that we're using */