diff options
| author | jsing <> | 2022-01-08 12:59:59 +0000 |
|---|---|---|
| committer | jsing <> | 2022-01-08 12:59:59 +0000 |
| commit | 3356c48564c0e1e23cc9292d98f78822f270fe56 (patch) | |
| tree | a0f52599388e1e633ef501a33e33307964a97198 /src/lib/libssl/ssl_cert.c | |
| parent | 61fda75b6f45926dbb1ee6708bc724039eba7aa6 (diff) | |
| download | openbsd-3356c48564c0e1e23cc9292d98f78822f270fe56.tar.gz openbsd-3356c48564c0e1e23cc9292d98f78822f270fe56.tar.bz2 openbsd-3356c48564c0e1e23cc9292d98f78822f270fe56.zip | |
Merge SESS_CERT into SSL_SESSION.
There is no reason for SESS_CERT to exist - remove it and merge its members
into SSL_SESSION for the time being. More clean up to follow.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
| -rw-r--r-- | src/lib/libssl/ssl_cert.c | 37 |
1 files changed, 1 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index c735547393..e91de659ce 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_cert.c,v 1.92 2022/01/08 12:43:44 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.93 2022/01/08 12:59:58 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -347,41 +347,6 @@ ssl_cert_add1_chain_cert(SSL_CERT *c, X509 *cert) | |||
| 347 | return 1; | 347 | return 1; |
| 348 | } | 348 | } |
| 349 | 349 | ||
| 350 | SESS_CERT * | ||
| 351 | ssl_sess_cert_new(void) | ||
| 352 | { | ||
| 353 | SESS_CERT *ret; | ||
| 354 | |||
| 355 | ret = calloc(1, sizeof *ret); | ||
| 356 | if (ret == NULL) { | ||
| 357 | SSLerrorx(ERR_R_MALLOC_FAILURE); | ||
| 358 | return NULL; | ||
| 359 | } | ||
| 360 | ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA]); | ||
| 361 | ret->references = 1; | ||
| 362 | |||
| 363 | return ret; | ||
| 364 | } | ||
| 365 | |||
| 366 | void | ||
| 367 | ssl_sess_cert_free(SESS_CERT *sc) | ||
| 368 | { | ||
| 369 | int i; | ||
| 370 | |||
| 371 | if (sc == NULL) | ||
| 372 | return; | ||
| 373 | |||
| 374 | i = CRYPTO_add(&sc->references, -1, CRYPTO_LOCK_SSL_SESS_CERT); | ||
| 375 | if (i > 0) | ||
| 376 | return; | ||
| 377 | |||
| 378 | sk_X509_pop_free(sc->cert_chain, X509_free); | ||
| 379 | for (i = 0; i < SSL_PKEY_NUM; i++) | ||
| 380 | X509_free(sc->peer_pkeys[i].x509); | ||
| 381 | |||
| 382 | free(sc); | ||
| 383 | } | ||
| 384 | |||
| 385 | int | 350 | int |
| 386 | ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk) | 351 | ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk) |
| 387 | { | 352 | { |
