Lines Matching refs:cert
430 /* EAY EAY EAY need to check for DH fix cert
432 /* For TLS, cert_req is set to 2, so a cert chain
1142 int need_cert = 1; /* VRS: 0=> will allow null cert if auth == KRB5 */
1245 /* VRS: allow null cert if auth == KRB5 */
1958 /* TLS does not like anon-DH with client cert */
2513 /* we get them from the cert */
2576 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL))
2583 * For example, the cert have an ECC
2592 * if ((s->cert->key->privatekey != NULL) &&
2593 * (s->cert->key->privatekey->type ==
2605 /* Get the Server Public Key from Cert */
2648 tkey = s->cert->key->privatekey->pkey.ec;
2782 if (s->s3->tmp.cert_req && s->cert->key->privatekey) {
2783 if (EVP_PKEY_derive_set_peer(pkey_ctx,s->cert->key->privatekey) <=0) {
3001 pkey=s->cert->key->privatekey;
3023 const EVP_MD *md = s->cert->key->digest;
3151 if ((s->cert == NULL) ||
3152 (s->cert->key->x509 == NULL) ||
3153 (s->cert->key->privatekey == NULL))
3159 /* We need to get a client cert */
3202 /* Ok, we have a cert */
3210 (s->s3->tmp.cert_req == 2)?NULL:s->cert->key->x509);