Lines Matching refs:cert
233 if (s->cert == NULL)
482 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
484 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
502 if (/* don't request cert unless asked for it: */
505 * don't request cert during re-negotiation: */
508 /* never request cert in anonymous ciphersuites
515 /* never request cert in Kerberos ciphersuites */
521 /* no cert request */
647 * a client cert, it can be verified
1579 CERT *cert;
1589 cert=s->cert;
1598 rsa=cert->rsa_tmp;
1599 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL))
1601 rsa=s->cert->rsa_tmp_cb(s,
1611 cert->rsa_tmp=rsa;
1628 dhp=cert->dh_tmp;
1629 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL))
1630 dhp=s->cert->dh_tmp_cb(s,
1686 ecdhp=cert->ecdh_tmp;
1687 if ((ecdhp == NULL) && (s->cert->ecdh_tmp_cb != NULL))
1689 ecdhp=s->cert->ecdh_tmp_cb(s,
2041 /* get the list of acceptable cert types */
2167 if ((s->cert != NULL) && (s->cert->rsa_tmp != NULL))
2168 rsa=s->cert->rsa_tmp;
2181 pkey=s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey;
2285 if (n == 0L) /* the parameters are in the cert */
2545 tkey = s->cert->pkeys[SSL_PKEY_ECC].privatekey->pkey.ec;
2825 pk = s->cert->pkeys[SSL_PKEY_GOST94].privatekey;
2827 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey;
3194 /* If tls asked for a client cert, the client must return a 0 list */
3339 /* VRS: allow null cert if auth == KRB5 */