Lines Matching refs:cert
302 if (ctx->cert != NULL)
305 * the CERT, not its contents; only when setting new
311 * Now we don't look at the SSL_CTX's CERT after having
314 s->cert = ssl_cert_dup(ctx->cert);
315 if (s->cert == NULL)
319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */
406 if (s->cert != NULL)
407 ssl_cert_free(s->cert);
581 if (s->cert != NULL) ssl_cert_free(s->cert);
891 CERT *tmp;
905 tmp=t->cert;
906 if (f->cert != NULL)
908 CRYPTO_add(&f->cert->references,1,CRYPTO_LOCK_SSL_CERT);
909 t->cert=f->cert;
912 t->cert=NULL;
917 /* Fix this so it checks all the valid key/cert options */
921 (ctx->cert == NULL) ||
922 (ctx->cert->key->x509 == NULL))
927 if (ctx->cert->key->privatekey == NULL)
932 return(X509_check_private_key(ctx->cert->key->x509, ctx->cert->key->privatekey));
943 if (ssl->cert == NULL)
948 if (ssl->cert->key->x509 == NULL)
953 if (ssl->cert->key->privatekey == NULL)
958 return(X509_check_private_key(ssl->cert->key->x509,
959 ssl->cert->key->privatekey));
1910 if ((ret->cert=ssl_cert_new()) == NULL)
2106 if (a->cert != NULL)
2107 ssl_cert_free(a->cert);
2180 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher)
2466 CERT *c;
2469 c=s->cert;
2483 * not an RSA cert but for EECDH-RSA
2484 * we need an RSA cert. Placing the
2486 * checks ensures the correct cert is chosen.
2537 CERT *c;
2540 c=s->cert;
2827 if (ssl->cert != NULL && ssl->cert->rsa_tmp != NULL)
2854 /* This copies session-id, SSL_METHOD, sid_ctx, and 'cert' */
2860 * that s->cert or ret->cert will be changed later --
2868 if (s->cert != NULL)
2870 if (ret->cert != NULL)
2872 ssl_cert_free(ret->cert);
2874 ret->cert = ssl_cert_dup(s->cert);
2875 if (ret->cert == NULL)
3000 if (s->cert != NULL)
3001 return(s->cert->key->x509);
3009 if (s->cert != NULL)
3010 return(s->cert->key->privatekey);
3147 if (ssl->cert != NULL)
3148 ssl_cert_free(ssl->cert);
3149 ssl->cert = ssl_cert_dup(ctx->cert);