Lines Matching refs:cert
337 X509 *cert = NULL;
342 if (!d2i_X509(&cert, &p, ilen) || p < data ||
344 X509_free(cert);
349 if (X509_get0_pubkey(cert) == NULL) {
350 X509_free(cert);
357 X509_free(cert);
371 !sk_X509_push(dane->certs, cert)) {
373 X509_free(cert);
667 OSSL_default_cipher_list(), ctx->cert);
728 s->cert = ssl_cert_dup(ctx->cert);
729 if (s->cert == NULL)
1173 ssl_cert_clear_certs(s->cert);
1220 ssl_cert_free(s->cert);
1640 CRYPTO_UP_REF(&f->cert->references, &i, f->cert->lock);
1641 ssl_cert_free(t->cert);
1642 t->cert = f->cert;
1650 /* Fix this so it checks all the valid key/cert options */
1653 if ((ctx == NULL) || (ctx->cert->key->x509 == NULL)) {
1657 if (ctx->cert->key->privatekey == NULL) {
1662 (ctx->cert->key->x509, ctx->cert->key->privatekey);
1672 if (ssl->cert->key->x509 == NULL) {
1676 if (ssl->cert->key->privatekey == NULL) {
1680 return X509_check_private_key(ssl->cert->key->x509,
1681 ssl->cert->key->privatekey);
2419 return (s->cert->cert_flags |= larg);
2421 return (s->cert->cert_flags &= ~larg);
2585 return (ctx->cert->cert_flags |= larg);
2587 return (ctx->cert->cert_flags &= ~larg);
2753 ctx->cert);
2777 s->cert);
3277 if ((ret->cert = ssl_cert_new()) == NULL)
3309 OSSL_default_cipher_list(), ret->cert)
3488 ssl_cert_free(a->cert);
3597 ssl_cert_set_cert_cb(c->cert, cb, arg);
3602 ssl_cert_set_cert_cb(s->cert, cb, arg);
3607 CERT *c = s->cert;
3724 CERT_PKEY *cpk = s->s3.tmp.cert;
4094 * session-id, SSL_METHOD, sid_ctx, and 'cert'
4101 * s->cert or ret->cert will be changed later -- they should not both
4108 if (s->cert != NULL) {
4109 ssl_cert_free(ret->cert);
4110 ret->cert = ssl_cert_dup(s->cert);
4111 if (ret->cert == NULL)
4198 if (s->cert != NULL)
4199 return s->cert->key->x509;
4206 if (s->cert != NULL)
4207 return s->cert->key->privatekey;
4214 if (ctx->cert != NULL)
4215 return ctx->cert->key->x509;
4222 if (ctx->cert != NULL)
4223 return ctx->cert->key->privatekey;
4344 new_cert = ssl_cert_dup(ctx->cert);
4349 if (!custom_exts_copy_flags(&new_cert->custext, &ssl->cert->custext)) {
4354 ssl_cert_free(ssl->cert);
4355 ssl->cert = new_cert;
4593 OPENSSL_free(ctx->cert->psk_identity_hint);
4595 ctx->cert->psk_identity_hint = OPENSSL_strdup(identity_hint);
4596 if (ctx->cert->psk_identity_hint == NULL)
4599 ctx->cert->psk_identity_hint = NULL;
4612 OPENSSL_free(s->cert->psk_identity_hint);
4614 s->cert->psk_identity_hint = OPENSSL_strdup(identity_hint);
4615 if (s->cert->psk_identity_hint == NULL)
4618 s->cert->psk_identity_hint = NULL;
4882 s->cert->sec_level = level;
4887 return s->cert->sec_level;
4895 s->cert->sec_cb = cb;
4902 return s->cert->sec_cb;
4907 s->cert->sec_ex = ex;
4912 return s->cert->sec_ex;
4917 ctx->cert->sec_level = level;
4922 return ctx->cert->sec_level;
4930 ctx->cert->sec_cb = cb;
4939 return ctx->cert->sec_cb;
4944 ctx->cert->sec_ex = ex;
4949 return ctx->cert->sec_ex;
5111 X509 *cert = s->session != NULL ? s->session->peer : NULL;
5113 if (cert != NULL) {
5115 X509_get_ext_d2i(cert, NID_ct_precert_scts, NULL, NULL);
5229 X509 *cert = s->session != NULL ? s->session->peer : NULL;
5246 if (s->ct_validation_callback == NULL || cert == NULL ||
5270 CT_POLICY_EVAL_CTX_set1_cert(ctx, cert);
6048 EVP_PKEY_free(s->cert->dh_tmp);
6049 s->cert->dh_tmp = dhpkey;
6060 EVP_PKEY_free(ctx->cert->dh_tmp);
6061 ctx->cert->dh_tmp = dhpkey;