Searched refs:sess_cert (Results 1 - 25 of 27) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Ds3_clnt.c902 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert);
903 s->session->sess_cert=sc;
1030 if (s->session->sess_cert != NULL)
1033 if (s->session->sess_cert->peer_rsa_tmp != NULL)
1035 RSA_free(s->session->sess_cert->peer_rsa_tmp);
1036 s->session->sess_cert->peer_rsa_tmp=NULL;
1040 if (s->session->sess_cert->peer_dh_tmp)
1042 DH_free(s->session->sess_cert->peer_dh_tmp);
1043 s->session->sess_cert
[all...]
H A Ds2_srvr.c712 if (s->session->sess_cert != NULL)
715 * sess_cert. */
716 ssl_sess_cert_free(s->session->sess_cert);
717 s->session->sess_cert = ssl_sess_cert_new();
718 if (s->session->sess_cert == NULL)
724 /* If 'hit' is set, then s->sess_cert may be non-NULL or NULL,
736 if (s->session->sess_cert != NULL)
737 ssl_cert_free(s->session->sess_cert);
738 s->session->sess_cert=s->cert;
745 if (s->session->sess_cert
[all...]
H A Ds2_clnt.c518 s->session->peer = s->session->sess_cert->peer_key->x509;
523 if (s->session->sess_cert == NULL
524 || s->session->peer != s->session->sess_cert->peer_key->x509)
687 enc=ssl_rsa_public_encrypt(sess->sess_cert,enc,
866 n=i2d_X509(s->session->sess_cert->peer_key->x509,&p);
1062 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert);
1063 s->session->sess_cert=sc;
H A Dd1_clnt.c711 if (s->session->sess_cert->peer_rsa_tmp != NULL)
712 rsa=s->session->sess_cert->peer_rsa_tmp;
715 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
901 if (s->session->sess_cert->peer_dh_tmp != NULL)
902 dh_srvr=s->session->sess_cert->peer_dh_tmp;
H A Ds3_srvr.c2497 /* With the current implementation, sess_cert will always be NULL
2499 if (s->session->sess_cert == NULL)
2501 s->session->sess_cert = ssl_sess_cert_new();
2502 if (s->session->sess_cert == NULL)
2508 if (s->session->sess_cert->cert_chain != NULL)
2509 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free);
2510 s->session->sess_cert->cert_chain=sk;
H A Dssl_sess.c546 if (ss->sess_cert != NULL) ssl_sess_cert_free(ss->sess_cert);
H A Dssl_lib.c749 if ((s == NULL) || (s->session == NULL) || (s->session->sess_cert == NULL))
752 r=s->session->sess_cert->cert_chain;
H A Dssl.h451 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st
454 * On clients, it will be the same as sess_cert->peer_key->x509
455 * (the latter is not enough as sess_cert is not retained
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds3_clnt.c1267 if (s->session->sess_cert)
1268 ssl_sess_cert_free(s->session->sess_cert);
1269 s->session->sess_cert = sc;
1417 * identity hint is sent. Set session->sess_cert anyway to avoid
1421 s->session->sess_cert = ssl_sess_cert_new();
1432 if (s->session->sess_cert != NULL) {
1434 if (s->session->sess_cert->peer_rsa_tmp != NULL) {
1435 RSA_free(s->session->sess_cert->peer_rsa_tmp);
1436 s->session->sess_cert->peer_rsa_tmp = NULL;
1440 if (s->session->sess_cert
[all...]
H A Ds2_srvr.c755 if (s->session->sess_cert != NULL)
758 * called ssl_get_new_session, which does not set sess_cert.
760 ssl_sess_cert_free(s->session->sess_cert);
761 s->session->sess_cert = ssl_sess_cert_new();
762 if (s->session->sess_cert == NULL) {
768 * If 'hit' is set, then s->sess_cert may be non-NULL or NULL,
778 if (s->session->sess_cert != NULL)
779 ssl_cert_free(s->session->sess_cert);
780 s->session->sess_cert = s->cert;
786 if (s->session->sess_cert
[all...]
H A Ds2_clnt.c511 s->session->peer = s->session->sess_cert->peer_key->x509;
516 if (s->session->sess_cert == NULL
517 || s->session->peer != s->session->sess_cert->peer_key->x509)
667 enc = ssl_rsa_public_encrypt(sess->sess_cert, enc,
841 i = i2d_X509(s->session->sess_cert->peer_key->x509, &p);
1035 if (s->session->sess_cert)
1036 ssl_sess_cert_free(s->session->sess_cert);
1037 s->session->sess_cert = sc;
H A Dssl_sess.c272 if (src->sess_cert != NULL)
273 CRYPTO_add(&src->sess_cert->references, 1, CRYPTO_LOCK_SSL_SESS_CERT);
865 if (ss->sess_cert != NULL)
866 ssl_sess_cert_free(ss->sess_cert);
H A Ds3_srvr.c3281 * With the current implementation, sess_cert will always be NULL when we
3284 if (s->session->sess_cert == NULL) {
3285 s->session->sess_cert = ssl_sess_cert_new();
3286 if (s->session->sess_cert == NULL) {
3291 if (s->session->sess_cert->cert_chain != NULL)
3292 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free);
3293 s->session->sess_cert->cert_chain = sk;
H A Ds3_lib.c3554 if (s->session && s->session->sess_cert) {
3556 sig = s->session->sess_cert->peer_key->digest;
3569 if (s->server || !s->session || !s->session->sess_cert)
3575 sc = s->session->sess_cert;
H A Dssl_lib.c908 || (s->session->sess_cert == NULL))
911 r = s->session->sess_cert->cert_chain;
H A Dt1_lib.c1141 if (s->session && s->session->sess_cert)
1142 s->session->sess_cert->peer_key->digest = *pmd;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds3_clnt.c1267 if (s->session->sess_cert)
1268 ssl_sess_cert_free(s->session->sess_cert);
1269 s->session->sess_cert = sc;
1417 * identity hint is sent. Set session->sess_cert anyway to avoid
1421 s->session->sess_cert = ssl_sess_cert_new();
1432 if (s->session->sess_cert != NULL) {
1434 if (s->session->sess_cert->peer_rsa_tmp != NULL) {
1435 RSA_free(s->session->sess_cert->peer_rsa_tmp);
1436 s->session->sess_cert->peer_rsa_tmp = NULL;
1440 if (s->session->sess_cert
[all...]
H A Ds2_srvr.c755 if (s->session->sess_cert != NULL)
758 * called ssl_get_new_session, which does not set sess_cert.
760 ssl_sess_cert_free(s->session->sess_cert);
761 s->session->sess_cert = ssl_sess_cert_new();
762 if (s->session->sess_cert == NULL) {
768 * If 'hit' is set, then s->sess_cert may be non-NULL or NULL,
778 if (s->session->sess_cert != NULL)
779 ssl_cert_free(s->session->sess_cert);
780 s->session->sess_cert = s->cert;
786 if (s->session->sess_cert
[all...]
H A Ds2_clnt.c511 s->session->peer = s->session->sess_cert->peer_key->x509;
516 if (s->session->sess_cert == NULL
517 || s->session->peer != s->session->sess_cert->peer_key->x509)
667 enc = ssl_rsa_public_encrypt(sess->sess_cert, enc,
841 i = i2d_X509(s->session->sess_cert->peer_key->x509, &p);
1035 if (s->session->sess_cert)
1036 ssl_sess_cert_free(s->session->sess_cert);
1037 s->session->sess_cert = sc;
H A Dssl_sess.c272 if (src->sess_cert != NULL)
273 CRYPTO_add(&src->sess_cert->references, 1, CRYPTO_LOCK_SSL_SESS_CERT);
865 if (ss->sess_cert != NULL)
866 ssl_sess_cert_free(ss->sess_cert);
H A Ds3_srvr.c3281 * With the current implementation, sess_cert will always be NULL when we
3284 if (s->session->sess_cert == NULL) {
3285 s->session->sess_cert = ssl_sess_cert_new();
3286 if (s->session->sess_cert == NULL) {
3291 if (s->session->sess_cert->cert_chain != NULL)
3292 sk_X509_pop_free(s->session->sess_cert->cert_chain, X509_free);
3293 s->session->sess_cert->cert_chain = sk;
H A Ds3_lib.c3554 if (s->session && s->session->sess_cert) {
3556 sig = s->session->sess_cert->peer_key->digest;
3569 if (s->server || !s->session || !s->session->sess_cert)
3575 sc = s->session->sess_cert;
H A Dssl_lib.c908 || (s->session->sess_cert == NULL))
911 r = s->session->sess_cert->cert_chain;
H A Dt1_lib.c1141 if (s->session && s->session->sess_cert)
1142 s->session->sess_cert->peer_key->digest = *pmd;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h451 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st
454 * On clients, it will be the same as sess_cert->peer_key->x509
455 * (the latter is not enough as sess_cert is not retained

Completed in 401 milliseconds

12