Home | History | Annotate | Download | only in ssl

Lines Matching refs:cert

302 	if (ctx->cert != NULL)
305 * the CERT, not its contents; only when setting new
311 * Now we don't look at the SSL_CTX's CERT after having
314 s->cert = ssl_cert_dup(ctx->cert);
315 if (s->cert == NULL)
319 s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */
406 if (s->cert != NULL)
407 ssl_cert_free(s->cert);
581 if (s->cert != NULL) ssl_cert_free(s->cert);
891 CERT *tmp;
905 tmp=t->cert;
906 if (f->cert != NULL)
908 CRYPTO_add(&f->cert->references,1,CRYPTO_LOCK_SSL_CERT);
909 t->cert=f->cert;
912 t->cert=NULL;
917 /* Fix this so it checks all the valid key/cert options */
921 (ctx->cert == NULL) ||
922 (ctx->cert->key->x509 == NULL))
927 if (ctx->cert->key->privatekey == NULL)
932 return(X509_check_private_key(ctx->cert->key->x509, ctx->cert->key->privatekey));
943 if (ssl->cert == NULL)
948 if (ssl->cert->key->x509 == NULL)
953 if (ssl->cert->key->privatekey == NULL)
958 return(X509_check_private_key(ssl->cert->key->x509,
959 ssl->cert->key->privatekey));
1917 if ((ret->cert=ssl_cert_new()) == NULL)
2113 if (a->cert != NULL)
2114 ssl_cert_free(a->cert);
2187 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher)
2473 CERT *c;
2476 c=s->cert;
2490 * not an RSA cert but for EECDH-RSA
2491 * we need an RSA cert. Placing the
2493 * checks ensures the correct cert is chosen.
2544 CERT *c;
2547 c=s->cert;
2834 if (ssl->cert != NULL && ssl->cert->rsa_tmp != NULL)
2861 /* This copies session-id, SSL_METHOD, sid_ctx, and 'cert' */
2867 * that s->cert or ret->cert will be changed later --
2875 if (s->cert != NULL)
2877 if (ret->cert != NULL)
2879 ssl_cert_free(ret->cert);
2881 ret->cert = ssl_cert_dup(s->cert);
2882 if (ret->cert == NULL)
3007 if (s->cert != NULL)
3008 return(s->cert->key->x509);
3016 if (s->cert != NULL)
3017 return(s->cert->key->privatekey);
3154 if (ssl->cert != NULL)
3155 ssl_cert_free(ssl->cert);
3156 ssl->cert = ssl_cert_dup(ctx->cert);