Lines Matching refs:cert
183 if (s->cert == NULL)
478 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
480 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
499 if (/* don't request cert unless asked for it: */
502 * don't request cert during re-negotiation: */
505 /* never request cert in anonymous ciphersuites
512 /* never request cert in Kerberos ciphersuites */
518 /* no cert request */
600 /* could be sent for a DH cert, even if we
647 * a client cert, it can be verified */
1046 CERT *cert;
1056 cert=s->cert;
1065 rsa=cert->rsa_tmp;
1066 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL))
1068 rsa=s->cert->rsa_tmp_cb(s,
1078 cert->rsa_tmp=rsa;
1095 dhp=cert->dh_tmp;
1096 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL))
1097 dhp=s->cert->dh_tmp_cb(s,
1154 ecdhp=cert->ecdh_tmp;
1155 if ((ecdhp == NULL) && (s->cert->ecdh_tmp_cb != NULL))
1157 ecdhp=s->cert->ecdh_tmp_cb(s,
1483 /* get the list of acceptable cert types */
1579 /* VRS: allow null cert if auth == KRB5 */