Lines Matching refs:cert
463 * data as a trusted cert (X509 + X509_AUX) and fall back
464 * to reading it as a normal cert (just X509), but if
466 * trusted cert, then no fallback should be engaged.
471 X509 *cert = X509_new_ex(libctx, propq);
473 if (cert == NULL)
481 if (d2i_X509_AUX(&cert, (const unsigned char **)&data->octet_data,
484 || d2i_X509(&cert, (const unsigned char **)&data->octet_data,
486 X509_free(cert);
487 cert = NULL;
490 if (cert != NULL) {
493 *v = OSSL_STORE_INFO_new_CERT(cert);
495 X509_free(cert);
549 X509 *cert = NULL;
590 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) {
608 if (ok && cert != NULL) {
609 if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL
610 /* clearing cert here avoids case distinctions */
611 && (cert = NULL) == NULL
629 X509_free(cert);