summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_cert.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
-rw-r--r--src/lib/libssl/ssl_cert.c37
1 files changed, 1 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c
index c735547393..e91de659ce 100644
--- a/src/lib/libssl/ssl_cert.c
+++ b/src/lib/libssl/ssl_cert.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_cert.c,v 1.92 2022/01/08 12:43:44 jsing Exp $ */ 1/* $OpenBSD: ssl_cert.c,v 1.93 2022/01/08 12:59:58 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -347,41 +347,6 @@ ssl_cert_add1_chain_cert(SSL_CERT *c, X509 *cert)
347 return 1; 347 return 1;
348} 348}
349 349
350SESS_CERT *
351ssl_sess_cert_new(void)
352{
353 SESS_CERT *ret;
354
355 ret = calloc(1, sizeof *ret);
356 if (ret == NULL) {
357 SSLerrorx(ERR_R_MALLOC_FAILURE);
358 return NULL;
359 }
360 ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA]);
361 ret->references = 1;
362
363 return ret;
364}
365
366void
367ssl_sess_cert_free(SESS_CERT *sc)
368{
369 int i;
370
371 if (sc == NULL)
372 return;
373
374 i = CRYPTO_add(&sc->references, -1, CRYPTO_LOCK_SSL_SESS_CERT);
375 if (i > 0)
376 return;
377
378 sk_X509_pop_free(sc->cert_chain, X509_free);
379 for (i = 0; i < SSL_PKEY_NUM; i++)
380 X509_free(sc->peer_pkeys[i].x509);
381
382 free(sc);
383}
384
385int 350int
386ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk) 351ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk)
387{ 352{