Home | History | Annotate | Download | only in ssl

Lines Matching refs:cert

425 			/* EAY EAY EAY need to check for DH fix cert
427 /* For TLS, cert_req is set to 2, so a cert chain
1166 int need_cert = 1; /* VRS: 0=> will allow null cert if auth == KRB5 */
1269 /* VRS: allow null cert if auth == KRB5 */
1987 /* TLS does not like anon-DH with client cert */
2630 /* we get them from the cert */
2705 if ((alg_k & (SSL_kECDHr|SSL_kECDHe)) && (s->cert != NULL))
2712 * For example, the cert have an ECC
2721 * if ((s->cert->key->privatekey != NULL) &&
2722 * (s->cert->key->privatekey->type ==
2734 /* Get the Server Public Key from Cert */
2777 tkey = s->cert->key->privatekey->pkey.ec;
2950 if (s->s3->tmp.cert_req && s->cert->key->privatekey) {
2951 if (EVP_PKEY_derive_set_peer(pkey_ctx,s->cert->key->privatekey) <=0) {
3087 pkey=s->cert->key->privatekey;
3258 if ((s->cert == NULL) ||
3259 (s->cert->key->x509 == NULL) ||
3260 (s->cert->key->privatekey == NULL))
3266 /* We need to get a client cert */
3309 /* Ok, we have a cert */
3317 (s->s3->tmp.cert_req == 2)?NULL:s->cert->key->x509);