Home
last modified time | relevance | path

Searched refs:peerscert (Results 1 – 4 of 4) sorted by relevance

/netbsd-src/crypto/dist/ipsec-tools/src/racoon/
H A Dremoteconf.c688 if (new->peerscert != NULL && new->peerscert == rmconf->peerscert) {
689 new->peerscert = vdup(new->peerscert);
690 STRDUP_FATAL(new->peerscert);
746 if (rmconf->peerscert)
747 vfree(rmconf->peerscert);
989 switch (oakley_get_certtype(p->peerscert)) { in dump_rmconf_single()
1005 oakley_get_certtype(p->peerscert)); in dump_rmconf_single()
H A Dcfparse.y2012 if (cur_rmconf->peerscert != NULL) {
2018 &cur_rmconf->peerscert)) {
2029 if (cur_rmconf->peerscert != NULL) {
2035 &cur_rmconf->peerscert)) {
2047 if (cur_rmconf->peerscert != NULL) {
2052 cur_rmconf->peerscert = vmalloc(1);
2053 if (cur_rmconf->peerscert == NULL) {
2058 cur_rmconf->peerscert->v[0] = ISAKMP_CERT_PLAINRSA;
2065 ABORT_AND_VFREE2(cur_rmconf->peerscert, $3);
2076 if (cur_rmconf->peerscert != NULL) {
[all …]
H A Dremoteconf.h107 vchar_t *peerscert; /* peer's certificate */ member
H A Doakley.c1379 certtype = oakley_get_certtype(iph1->rmconf->peerscert);
1426 if (iph1->rmconf->peerscert == NULL) {
1437 iph1->cert_p = vdup(iph1->rmconf->peerscert);
1463 oakley_get_certtype(iph1->rmconf->peerscert));
1503 certtype = oakley_get_certtype(iph1->rmconf->peerscert);
2245 if (rmconf->peerscert != NULL) { in oakley_append_rmconf_cr()
2246 type = oakley_get_certtype(rmconf->peerscert); in oakley_append_rmconf_cr()
2247 asn1dn = eay_get_x509asn1issuername(rmconf->peerscert); in oakley_append_rmconf_cr()