Lines Matching defs:NULL

139         return (NULL);
148 BUF_MEM *buf = NULL;
149 unsigned long Time = (unsigned long)time(NULL);
150 void (*cb) (const SSL *ssl, int type, int val) = NULL;
162 if (s->info_callback != NULL)
164 else if (s->ctx->info_callback != NULL)
177 s->in_handshake, NULL);
208 if (cb != NULL)
222 if (s->init_buf == NULL) {
223 if ((buf = BUF_MEM_new()) == NULL) {
234 buf = NULL;
356 sizeof(labelbuffer), NULL, 0,
489 sizeof(labelbuffer), NULL, 0, 0);
550 if (s->s3->tmp.new_compression == NULL)
575 0, NULL);
625 0, NULL);
710 if (s->init_buf != NULL) {
712 s->init_buf = NULL;
737 if (cb != NULL)
762 if ((cb != NULL) && (s->state != state)) {
780 s->in_handshake, NULL);
783 if (buf != NULL)
785 if (cb != NULL)
801 if ((s->session == NULL) || (s->session->ssl_version != s->version) ||
868 if (s->ctx->comp_methods == NULL)
877 *(p++) = 0; /* Add the NULL method */
888 NULL) {
969 EVP_PKEY *pkey = NULL;
975 EC_KEY *clnt_ecdh = NULL;
976 const EC_POINT *srvr_ecpoint = NULL;
977 EVP_PKEY *srvr_pub_pkey = NULL;
978 unsigned char *encodedPoint = NULL;
980 BN_CTX *bn_ctx = NULL;
997 if (s->session->sess_cert == NULL) {
1006 if (s->session->sess_cert->peer_rsa_tmp != NULL)
1013 if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA)
1014 || (pkey->pkey.rsa == NULL)) {
1069 krb5_data authenticator, *authp = NULL;
1071 const EVP_CIPHER *enc = NULL;
1084 authp = NULL;
1092 if (enc == NULL)
1116 ** kssl_krb5_free_data_contents(NULL,&krb5_ap_req);
1142 authp->data = NULL;
1154 * EVP_EncryptInit_ex(&ciph_ctx,enc, NULL,NULL);
1157 * EVP_EncryptInit_ex(&ciph_ctx,NULL, key,iv);
1161 EVP_EncryptInit_ex(&ciph_ctx, enc, NULL, kssl_ctx->key, iv);
1194 if (s->session->sess_cert == NULL) {
1201 if (s->session->sess_cert->peer_dh_tmp != NULL)
1212 if ((dh_clnt = DHparams_dup(dh_srvr)) == NULL) {
1255 const EC_GROUP *srvr_group = NULL;
1260 if (s->session->sess_cert == NULL) {
1272 if ((alg_k & (SSL_kECDHr | SSL_kECDHe)) && (s->cert != NULL)) {
1281 * message. if ((s->cert->key->privatekey != NULL) &&
1287 if (s->session->sess_cert->peer_ecdh_tmp != NULL) {
1294 if ((srvr_pub_pkey == NULL)
1296 || (srvr_pub_pkey->pkey.ec == NULL)) {
1308 if ((srvr_group == NULL) || (srvr_ecpoint == NULL)) {
1314 if ((clnt_ecdh = EC_KEY_new()) == NULL) {
1332 if (priv_key == NULL) {
1362 clnt_ecdh, NULL);
1389 NULL, 0, NULL);
1394 if ((encodedPoint == NULL) || (bn_ctx == NULL)) {
1417 if (encodedPoint != NULL)
1419 if (clnt_ecdh != NULL)
1428 unsigned char *t = NULL;
1434 if (s->psk_client_callback == NULL) {
1463 if (s->session->psk_identity_hint != NULL)
1467 if (s->ctx->psk_identity_hint != NULL
1468 && s->session->psk_identity_hint == NULL) {
1474 if (s->session->psk_identity != NULL)
1477 if (s->session->psk_identity == NULL) {
1533 if (encodedPoint != NULL)
1535 if (clnt_ecdh != NULL)
1628 X509 *x509 = NULL;
1629 EVP_PKEY *pkey = NULL;
1634 if ((s->cert == NULL) ||
1635 (s->cert->key->x509 == NULL) ||
1636 (s->cert->key->privatekey == NULL))
1655 if ((i == 1) && (pkey != NULL) && (x509 != NULL)) {
1665 if (x509 != NULL)
1667 if (pkey != NULL)
1687 2) ? NULL : s->cert->key->x509);