Lines Matching refs:cert

337         X509 *cert = NULL;
342 if (!d2i_X509(&cert, &p, ilen) || p < data ||
344 X509_free(cert);
349 if (X509_get0_pubkey(cert) == NULL) {
350 X509_free(cert);
369 X509_free(cert);
382 !sk_X509_push(dane->certs, cert)) {
384 X509_free(cert);
727 OSSL_default_cipher_list(), ctx->cert);
788 s->cert = ssl_cert_dup(ctx->cert);
789 if (s->cert == NULL)
1237 ssl_cert_clear_certs(s->cert);
1282 ssl_cert_free(s->cert);
1722 CRYPTO_UP_REF(&f->cert->references, &i, f->cert->lock);
1723 ssl_cert_free(t->cert);
1724 t->cert = f->cert;
1732 /* Fix this so it checks all the valid key/cert options */
1735 if ((ctx == NULL) || (ctx->cert->key->x509 == NULL)) {
1739 if (ctx->cert->key->privatekey == NULL) {
1744 (ctx->cert->key->x509, ctx->cert->key->privatekey);
1754 if (ssl->cert->key->x509 == NULL) {
1758 if (ssl->cert->key->privatekey == NULL) {
1762 return X509_check_private_key(ssl->cert->key->x509,
1763 ssl->cert->key->privatekey);
2519 return (s->cert->cert_flags |= larg);
2521 return (s->cert->cert_flags &= ~larg);
2685 return (ctx->cert->cert_flags |= larg);
2687 return (ctx->cert->cert_flags &= ~larg);
2853 ctx->cert);
2877 s->cert);
3377 if ((ret->cert = ssl_cert_new()) == NULL)
3409 OSSL_default_cipher_list(), ret->cert)
3588 ssl_cert_free(a->cert);
3697 ssl_cert_set_cert_cb(c->cert, cb, arg);
3702 ssl_cert_set_cert_cb(s->cert, cb, arg);
3707 CERT *c = s->cert;
3824 CERT_PKEY *cpk = s->s3.tmp.cert;
4213 * session-id, SSL_METHOD, sid_ctx, and 'cert'
4220 * s->cert or ret->cert will be changed later -- they should not both
4227 if (s->cert != NULL) {
4228 ssl_cert_free(ret->cert);
4229 ret->cert = ssl_cert_dup(s->cert);
4230 if (ret->cert == NULL)
4317 if (s->cert != NULL)
4318 return s->cert->key->x509;
4325 if (s->cert != NULL)
4326 return s->cert->key->privatekey;
4333 if (ctx->cert != NULL)
4334 return ctx->cert->key->x509;
4341 if (ctx->cert != NULL)
4342 return ctx->cert->key->privatekey;
4463 new_cert = ssl_cert_dup(ctx->cert);
4468 if (!custom_exts_copy_flags(&new_cert->custext, &ssl->cert->custext)) {
4473 ssl_cert_free(ssl->cert);
4474 ssl->cert = new_cert;
4712 OPENSSL_free(ctx->cert->psk_identity_hint);
4714 ctx->cert->psk_identity_hint = OPENSSL_strdup(identity_hint);
4715 if (ctx->cert->psk_identity_hint == NULL)
4718 ctx->cert->psk_identity_hint = NULL;
4731 OPENSSL_free(s->cert->psk_identity_hint);
4733 s->cert->psk_identity_hint = OPENSSL_strdup(identity_hint);
4734 if (s->cert->psk_identity_hint == NULL)
4737 s->cert->psk_identity_hint = NULL;
5001 s->cert->sec_level = level;
5006 return s->cert->sec_level;
5014 s->cert->sec_cb = cb;
5021 return s->cert->sec_cb;
5026 s->cert->sec_ex = ex;
5031 return s->cert->sec_ex;
5036 ctx->cert->sec_level = level;
5041 return ctx->cert->sec_level;
5049 ctx->cert->sec_cb = cb;
5058 return ctx->cert->sec_cb;
5063 ctx->cert->sec_ex = ex;
5068 return ctx->cert->sec_ex;
5230 X509 *cert = s->session != NULL ? s->session->peer : NULL;
5232 if (cert != NULL) {
5234 X509_get_ext_d2i(cert, NID_ct_precert_scts, NULL, NULL);
5348 X509 *cert = s->session != NULL ? s->session->peer : NULL;
5365 if (s->ct_validation_callback == NULL || cert == NULL ||
5389 CT_POLICY_EVAL_CTX_set1_cert(ctx, cert);
6164 EVP_PKEY_free(s->cert->dh_tmp);
6165 s->cert->dh_tmp = dhpkey;
6176 EVP_PKEY_free(ctx->cert->dh_tmp);
6177 ctx->cert->dh_tmp = dhpkey;