Lines Matching defs:cert
163 static void ssl_cert_set_default_md(CERT *cert)
167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
196 CERT *ssl_cert_dup(CERT *cert)
210 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
211 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
214 ret->valid = cert->valid;
215 ret->mask_k = cert->mask_k;
216 ret->mask_a = cert->mask_a;
217 ret->export_mask_k = cert->export_mask_k;
218 ret->export_mask_a = cert->export_mask_a;
221 if (cert->rsa_tmp != NULL)
223 RSA_up_ref(cert->rsa_tmp);
224 ret->rsa_tmp = cert->rsa_tmp;
226 ret->rsa_tmp_cb = cert->rsa_tmp_cb;
230 if (cert->dh_tmp != NULL)
232 ret->dh_tmp = DHparams_dup(cert->dh_tmp);
238 if (cert->dh_tmp->priv_key)
240 BIGNUM *b = BN_dup(cert->dh_tmp->priv_key);
248 if (cert->dh_tmp->pub_key)
250 BIGNUM *b = BN_dup(cert->dh_tmp->pub_key);
259 ret->dh_tmp_cb = cert->dh_tmp_cb;
263 if (cert->ecdh_tmp)
265 ret->ecdh_tmp = EC_KEY_dup(cert->ecdh_tmp);
272 ret->ecdh_tmp_cb = cert->ecdh_tmp_cb;
277 if (cert->pkeys[i].x509 != NULL)
279 ret->pkeys[i].x509 = cert->pkeys[i].x509;
284 if (cert->pkeys[i].privatekey != NULL)
286 ret->pkeys[i].privatekey = cert->pkeys[i].privatekey;
383 * s->cert being NULL, otherwise we could do without the
639 * much to do with CAs, either, since it will load any old cert.