Lines Matching refs:cert

909  * Check cert parameters compatible with extensions: currently just checks EC
1293 if (s->cert->pkeys[real_idx].privatekey != NULL) {
1308 if (s->cert->pkeys[real_idx].privatekey != NULL) {
1315 idx = s->cert->key - s->cert->pkeys;
1374 if ((s->server == sent) && s->cert->client_sigalgs != NULL) {
1375 *psigs = s->cert->client_sigalgs;
1376 return s->cert->client_sigalgslen;
1377 } else if (s->cert->conf_sigalgs) {
1378 *psigs = s->cert->conf_sigalgs;
1379 return s->cert->conf_sigalgslen;
1395 if (s->cert->conf_sigalgs) {
1396 sigs = s->cert->conf_sigalgs;
1397 siglen = s->cert->conf_sigalgslen;
1555 || s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT)) {
2217 CERT *c = s->cert;
2291 int tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert)
2297 if (s->cert == NULL)
2300 if (cert)
2636 CERT *c = s->cert;
2652 /* If no cert or key, forget it */
2752 /* Check signature algorithm of each cert in chain */
2780 /* Check cert parameters are consistent */
2904 if (s->cert->dh_tmp_auto != 2) {
2911 if (s->s3.tmp.cert == NULL)
2913 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey);
3063 * Checks the given cert against signature_algorithm_cert restrictions sent by
3066 * Returns true if the cert is usable and false otherwise.
3134 return check_cert_usable(s, sig, s->cert->pkeys[idx].x509,
3135 s->cert->pkeys[idx].privatekey);
3139 * Returns true if the supplied cert |x| and key |pkey| is usable with the
3179 /* Check that we have a cert, and signature_algorithms_cert */
3187 : s->cert->pkeys[lu->sig_idx].privatekey;
3224 s->s3.tmp.cert = NULL;
3237 /* If ciphersuite doesn't require a cert nothing to do */
3240 if (!s->server && !ssl_has_cert(s, s->cert->key - s->cert->pkeys))
3250 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC]
3255 * cert type
3264 int cc_idx = s->cert->key - s->cert->pkeys;
3270 /* Check that we have a cert, and sig_algs_cert */
3275 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey;
3351 s->s3.tmp.cert = &s->cert->pkeys[sig_idx];
3352 s->cert->key = s->s3.tmp.cert;