/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_clnt.c | 902 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert); 903 s->session->sess_cert=sc; 1030 if (s->session->sess_cert != NULL) 1033 if (s->session->sess_cert->peer_rsa_tmp != NULL) 1035 RSA_free(s->session->sess_cert->peer_rsa_tmp); 1036 s->session->sess_cert->peer_rsa_tmp=NULL; 1040 if (s->session->sess_cert->peer_dh_tmp) 1042 DH_free(s->session->sess_cert->peer_dh_tmp); 1043 s->session->sess_cert [all...] |
H A D | s2_srvr.c | 712 if (s->session->sess_cert != NULL) 715 * sess_cert. */ 716 ssl_sess_cert_free(s->session->sess_cert); 717 s->session->sess_cert = ssl_sess_cert_new(); 718 if (s->session->sess_cert == NULL) 724 /* If 'hit' is set, then s->sess_cert may be non-NULL or NULL, 736 if (s->session->sess_cert != NULL) 737 ssl_cert_free(s->session->sess_cert); 738 s->session->sess_cert=s->cert; 745 if (s->session->sess_cert [all...] |
H A D | s2_clnt.c | 518 s->session->peer = s->session->sess_cert->peer_key->x509; 523 if (s->session->sess_cert == NULL 524 || s->session->peer != s->session->sess_cert->peer_key->x509) 687 enc=ssl_rsa_public_encrypt(sess->sess_cert,enc, 866 n=i2d_X509(s->session->sess_cert->peer_key->x509,&p); 1062 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert); 1063 s->session->sess_cert=sc;
|
H A D | d1_clnt.c | 711 if (s->session->sess_cert->peer_rsa_tmp != NULL) 712 rsa=s->session->sess_cert->peer_rsa_tmp; 715 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 901 if (s->session->sess_cert->peer_dh_tmp != NULL) 902 dh_srvr=s->session->sess_cert->peer_dh_tmp;
|
H A D | s3_srvr.c | 2497 /* With the current implementation, sess_cert will always be NULL 2499 if (s->session->sess_cert == NULL) 2501 s->session->sess_cert = ssl_sess_cert_new(); 2502 if (s->session->sess_cert == NULL) 2508 if (s->session->sess_cert->cert_chain != NULL) 2509 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free); 2510 s->session->sess_cert->cert_chain=sk;
|
H A D | ssl_sess.c | 546 if (ss->sess_cert != NULL) ssl_sess_cert_free(ss->sess_cert);
|
H A D | ssl_lib.c | 749 if ((s == NULL) || (s->session == NULL) || (s->session->sess_cert == NULL)) 752 r=s->session->sess_cert->cert_chain;
|
H A D | ssl.h | 451 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 454 * On clients, it will be the same as sess_cert->peer_key->x509 455 * (the latter is not enough as sess_cert is not retained
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_clnt.c | 1267 if (s->session->sess_cert) 1268 ssl_sess_cert_free(s->session->sess_cert); 1269 s->session->sess_cert = sc; 1417 * identity hint is sent. Set session->sess_cert anyway to avoid 1421 s->session->sess_cert = ssl_sess_cert_new(); 1432 if (s->session->sess_cert != NULL) { 1434 if (s->session->sess_cert->peer_rsa_tmp != NULL) { 1435 RSA_free(s->session->sess_cert->peer_rsa_tmp); 1436 s->session->sess_cert->peer_rsa_tmp = NULL; 1440 if (s->session->sess_cert [all...] |
H A D | s2_srvr.c | 755 if (s->session->sess_cert != NULL) 758 * called ssl_get_new_session, which does not set sess_cert. 760 ssl_sess_cert_free(s->session->sess_cert); 761 s->session->sess_cert = ssl_sess_cert_new(); 762 if (s->session->sess_cert == NULL) { 768 * If 'hit' is set, then s->sess_cert may be non-NULL or NULL, 778 if (s->session->sess_cert != NULL) 779 ssl_cert_free(s->session->sess_cert); 780 s->session->sess_cert = s->cert; 786 if (s->session->sess_cert [all...] |
H A D | s2_clnt.c | 511 s->session->peer = s->session->sess_cert->peer_key->x509; 516 if (s->session->sess_cert == NULL 517 || s->session->peer != s->session->sess_cert->peer_key->x509) 667 enc = ssl_rsa_public_encrypt(sess->sess_cert, enc, 841 i = i2d_X509(s->session->sess_cert->peer_key->x509, &p); 1035 if (s->session->sess_cert) 1036 ssl_sess_cert_free(s->session->sess_cert); 1037 s->session->sess_cert = sc;
|
H A D | ssl_sess.c | 272 if (src->sess_cert != NULL) 273 CRYPTO_add(&src->sess_cert->references, 1, CRYPTO_LOCK_SSL_SESS_CERT); 865 if (ss->sess_cert != NULL) 866 ssl_sess_cert_free(ss->sess_cert);
|
H A D | s3_srvr.c | 3281 * With the current implementation, sess_cert will always be NULL when we 3284 if (s->session->sess_cert == NULL) { 3285 s->session->sess_cert = ssl_sess_cert_new(); 3286 if (s->session->sess_cert == NULL) { 3291 if (s->session->sess_cert->cert_chain != NULL) 3292 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free); 3293 s->session->sess_cert->cert_chain = sk;
|
H A D | s3_lib.c | 3554 if (s->session && s->session->sess_cert) { 3556 sig = s->session->sess_cert->peer_key->digest; 3569 if (s->server || !s->session || !s->session->sess_cert) 3575 sc = s->session->sess_cert;
|
H A D | ssl_lib.c | 908 || (s->session->sess_cert == NULL)) 911 r = s->session->sess_cert->cert_chain;
|
H A D | t1_lib.c | 1141 if (s->session && s->session->sess_cert) 1142 s->session->sess_cert->peer_key->digest = *pmd;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_clnt.c | 1267 if (s->session->sess_cert) 1268 ssl_sess_cert_free(s->session->sess_cert); 1269 s->session->sess_cert = sc; 1417 * identity hint is sent. Set session->sess_cert anyway to avoid 1421 s->session->sess_cert = ssl_sess_cert_new(); 1432 if (s->session->sess_cert != NULL) { 1434 if (s->session->sess_cert->peer_rsa_tmp != NULL) { 1435 RSA_free(s->session->sess_cert->peer_rsa_tmp); 1436 s->session->sess_cert->peer_rsa_tmp = NULL; 1440 if (s->session->sess_cert [all...] |
H A D | s2_srvr.c | 755 if (s->session->sess_cert != NULL) 758 * called ssl_get_new_session, which does not set sess_cert. 760 ssl_sess_cert_free(s->session->sess_cert); 761 s->session->sess_cert = ssl_sess_cert_new(); 762 if (s->session->sess_cert == NULL) { 768 * If 'hit' is set, then s->sess_cert may be non-NULL or NULL, 778 if (s->session->sess_cert != NULL) 779 ssl_cert_free(s->session->sess_cert); 780 s->session->sess_cert = s->cert; 786 if (s->session->sess_cert [all...] |
H A D | s2_clnt.c | 511 s->session->peer = s->session->sess_cert->peer_key->x509; 516 if (s->session->sess_cert == NULL 517 || s->session->peer != s->session->sess_cert->peer_key->x509) 667 enc = ssl_rsa_public_encrypt(sess->sess_cert, enc, 841 i = i2d_X509(s->session->sess_cert->peer_key->x509, &p); 1035 if (s->session->sess_cert) 1036 ssl_sess_cert_free(s->session->sess_cert); 1037 s->session->sess_cert = sc;
|
H A D | ssl_sess.c | 272 if (src->sess_cert != NULL) 273 CRYPTO_add(&src->sess_cert->references, 1, CRYPTO_LOCK_SSL_SESS_CERT); 865 if (ss->sess_cert != NULL) 866 ssl_sess_cert_free(ss->sess_cert);
|
H A D | s3_srvr.c | 3281 * With the current implementation, sess_cert will always be NULL when we 3284 if (s->session->sess_cert == NULL) { 3285 s->session->sess_cert = ssl_sess_cert_new(); 3286 if (s->session->sess_cert == NULL) { 3291 if (s->session->sess_cert->cert_chain != NULL) 3292 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free); 3293 s->session->sess_cert->cert_chain = sk;
|
H A D | s3_lib.c | 3554 if (s->session && s->session->sess_cert) { 3556 sig = s->session->sess_cert->peer_key->digest; 3569 if (s->server || !s->session || !s->session->sess_cert) 3575 sc = s->session->sess_cert;
|
H A D | ssl_lib.c | 908 || (s->session->sess_cert == NULL)) 911 r = s->session->sess_cert->cert_chain;
|
H A D | t1_lib.c | 1141 if (s->session && s->session->sess_cert) 1142 s->session->sess_cert->peer_key->digest = *pmd;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 451 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 454 * On clients, it will be the same as sess_cert->peer_key->x509 455 * (the latter is not enough as sess_cert is not retained
|