Lines Matching refs:NULL

157  * other (CA) certs. Note either ca should be NULL, *ca should be NULL,
163 * pass - Pass phrase for the private key (possibly empty) or NULL if
171 * to match. This value should be a NULL terminated string.
215 /* If NULL PKCS12 structure, this is an error */
216 if (p12 == NULL) {
223 *pkey = NULL;
225 *cert = NULL;
231 ca_supplied = (ca != NULL && *ca != NULL);
232 if (ca != NULL && *ca == NULL) {
233 if ((*ca = sk_X509_new_null()) == NULL) {
240 * If password is zero length or NULL then try verifying both cases
244 * non-zero length and is not NULL then call PKCS12_verify_mac() with
249 if (pass == NULL || *pass == '\0') {
250 if (PKCS12_verify_mac(p12, NULL, 0))
251 pass = NULL;
278 if (ca_supplied == B_FALSE && ca != NULL)
292 * pass - Pass phrase for the private key (possibly empty) or NULL if
300 * to match. This value should be a NULL terminated string.
323 STACK_OF(EVP_PKEY) *work_kl = NULL; /* Head for private key list */
324 STACK_OF(EVP_PKEY) *nocerts = NULL; /* Head for alt. key list */
325 STACK_OF(X509) *work_ca = NULL; /* Head for cert list */
326 STACK_OF(X509) *work_cl = NULL;
355 if (keyid == NULL) {
373 if (name_str == NULL) {
427 if (work_cl == NULL || sk_X509_num(work_cl) == 0)
430 if (work_kl == NULL || sk_EVP_PKEY_num(work_kl) == 0)
444 retval |= set_results(NULL, NULL, NULL, NULL, ca, &work_ca,
445 NULL, NULL);
452 if (pkey != NULL && *pkey != NULL) {
454 *pkey = NULL;
456 if (cert != NULL && *cert != NULL) {
458 *cert = NULL;
463 if (work_kl != NULL) {
466 if (work_ca != NULL)
468 if (work_cl != NULL)
479 * various certs. Note these should either be NULL, *whatever should
480 * be NULL, or it should point to a valid STACK_OF(X509) structure.
485 * empty) or NULL if there is none.
501 STACK_OF(EVP_PKEY) *work_kl = NULL;
502 STACK_OF(X509) *work_ca = NULL;
509 if ((work_kl = sk_EVP_PKEY_new_null()) == NULL) {
514 if ((work_ca = sk_X509_new_null()) == NULL) {
527 retval = set_results(pkey, &work_kl, certs, &work_ca, NULL,
528 NULL, NULL, NULL);
531 if (work_kl != NULL) {
561 if ((asafes = M_PKCS12_unpack_authsafes(p12)) == NULL)
580 if (bags == NULL) {
645 X509_ATTRIBUTE *attr = NULL;
646 ASN1_TYPE *keyid = NULL;
647 ASN1_TYPE *fname = NULL;
649 EVP_PKEY *pkey = NULL;
650 X509 *x509 = NULL;
651 uchar_t *data = NULL;
652 char *str = NULL;
660 if ((pkey = EVP_PKCS82PKEY(bag->value.keybag)) == NULL) {
672 if ((p8 = M_PKCS12_decrypt_skey(bag, pass, -1)) == NULL) {
679 if (pkey == NULL) {
690 if ((x509 = M_PKCS12_certbag2x509(bag)) == NULL) {
697 if (keyid != NULL) {
714 if (fname != NULL) {
715 ASN1_STRING *tmpstr = NULL;
747 x509 = NULL;
751 if (keyid != NULL)
753 if (fname != NULL)
764 if (keyid != NULL)
766 if (fname != NULL)
773 if (pkey != NULL) {
774 if (retval != 0 && (keyid != NULL || fname != NULL) &&
775 pkey->attributes == NULL) {
777 if (pkey->attributes == NULL) {
784 if (retval != 0 && keyid != NULL) {
786 if (attr == NULL)
792 keyid = NULL;
799 attr = NULL;
804 if (retval != 0 && fname != NULL) {
806 if (attr == NULL) {
812 fname = NULL;
819 attr = NULL;
831 pkey = NULL;
836 if (pkey != NULL) {
840 if (x509 != NULL)
843 if (keyid != NULL)
846 if (fname != NULL)
849 if (attr != NULL)
852 if (data != NULL)
855 if (str != NULL)