Lines Matching defs:chain

303         if (cpk->chain) {
304 rpk->chain = X509_chain_up_ref(cpk->chain);
305 if (!rpk->chain) {
436 if (cpk->chain) {
437 sk_X509_pop_free(cpk->chain, X509_free);
438 cpk->chain = NULL;
536 int ssl_cert_set0_chain(CERT *c, STACK_OF(X509) *chain)
541 if (cpk->chain)
542 sk_X509_pop_free(cpk->chain, X509_free);
543 cpk->chain = chain;
547 int ssl_cert_set1_chain(CERT *c, STACK_OF(X509) *chain)
550 if (!chain)
552 dchain = X509_chain_up_ref(chain);
567 if (!cpk->chain)
568 cpk->chain = sk_X509_new_null();
569 if (!cpk->chain || !sk_X509_push(cpk->chain, x))
1077 /* Add certificate chain to internal SSL BUF_MEM strcuture */
1099 * If we have a certificate specific chain use it, else use parent ctx.
1101 if (cpk && cpk->chain)
1102 extra_certs = cpk->chain;
1111 /* TLSv1 sends a chain with nothing in it, instead of an alert */
1130 for (i = 0; i < sk_X509_num(xs_ctx.chain); i++) {
1131 x = sk_X509_value(xs_ctx.chain, i);
1150 /* Build a certificate chain for current certificate */
1155 STACK_OF(X509) *chain = NULL, *untrusted = NULL;
1164 /* Rearranging and check the chain: add everything to a store */
1169 for (i = 0; i < sk_X509_num(cpk->chain); i++) {
1170 x = sk_X509_value(cpk->chain, i);
1193 untrusted = cpk->chain;
1212 chain = X509_STORE_CTX_get1_chain(&xs_ctx);
1223 if (cpk->chain)
1224 sk_X509_pop_free(cpk->chain, X509_free);
1225 /* Remove EE certificate from chain */
1226 x = sk_X509_shift(chain);
1229 if (sk_X509_num(chain) > 0) {
1231 x = sk_X509_value(chain, sk_X509_num(chain) - 1);
1234 x = sk_X509_pop(chain);
1239 cpk->chain = chain;
1249 int ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, int ref)
1252 if (chain)