Lines Matching refs:cert
183 if (s->cert == NULL)
479 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
481 && EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey)*8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
500 if (/* don't request cert unless asked for it: */
503 * don't request cert during re-negotiation: */
506 /* never request cert in anonymous ciphersuites
513 /* never request cert in Kerberos ciphersuites */
519 /* no cert request */
601 /* could be sent for a DH cert, even if we
648 * a client cert, it can be verified */
1057 CERT *cert;
1067 cert=s->cert;
1076 rsa=cert->rsa_tmp;
1077 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL))
1079 rsa=s->cert->rsa_tmp_cb(s,
1089 cert->rsa_tmp=rsa;
1106 dhp=cert->dh_tmp;
1107 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL))
1108 dhp=s->cert->dh_tmp_cb(s,
1165 ecdhp=cert->ecdh_tmp;
1166 if ((ecdhp == NULL) && (s->cert->ecdh_tmp_cb != NULL))
1168 ecdhp=s->cert->ecdh_tmp_cb(s,
1495 /* get the list of acceptable cert types */
1591 /* VRS: allow null cert if auth == KRB5 */