Lines Matching defs:certs
675 static void warn_certs(const char *uri, STACK_OF(X509) *certs, int warn_EE,
680 for (i = 0; i < sk_X509_num(certs); i++)
681 warn_cert(uri, sk_X509_value(certs, i), warn_EE, vpm);
720 STACK_OF(X509) *certs = NULL;
731 if (!load_cert_certs(files, NULL, &certs, 0, pass, desc, vpm))
733 if (!X509_add_certs(result, certs,
736 sk_X509_pop_free(certs, X509_free);
737 certs = NULL;
745 sk_X509_pop_free(certs, X509_free);
751 const STACK_OF(X509) *certs /* may NULL */)
759 for (i = 0; i < sk_X509_num(certs); i++) {
760 if (!X509_STORE_add_cert(store, sk_X509_value(certs, i))) {
776 STACK_OF(X509) *certs = NULL;
782 if (!load_cert_certs(input, NULL, &certs, 1, pass, desc, vpm)) {
786 ok = (store = sk_X509_to_store(store, certs)) != NULL;
787 sk_X509_pop_free(certs, X509_free);
788 certs = NULL;
797 * Initialize or extend, if *certs != NULL, a certificate stack.
798 * The caller is responsible for freeing *certs if its value is left not NULL.
800 int load_certs(const char *uri, int maybe_stdin, STACK_OF(X509) **certs,
803 int was_NULL = *certs == NULL;
806 NULL, NULL, certs, NULL, NULL);
809 sk_X509_pop_free(*certs, X509_free);
810 *certs = NULL;
878 pcrl != NULL ? "CRL" : pcerts != NULL ? "certs" :
2456 return "Cannot authenticate server via its TLS certificate, likely due to mismatch with our trusted TLS certs or missing revocation status";