/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_clnt.c | 1161 SESS_CERT *sc; [all...] |
s2_srvr.c | 712 if (s->session->sess_cert != NULL) 715 * sess_cert. */ 716 ssl_sess_cert_free(s->session->sess_cert); 717 s->session->sess_cert = ssl_sess_cert_new(); 718 if (s->session->sess_cert == NULL) 724 /* If 'hit' is set, then s->sess_cert may be non-NULL or NULL, 736 if (s->session->sess_cert != NULL) 737 ssl_cert_free(s->session->sess_cert); 738 s->session->sess_cert=s->cert; 745 if (s->session->sess_cert == NULL [all...] |
s2_clnt.c | 128 static int ssl_rsa_public_encrypt(SESS_CERT *sc, int len, unsigned char *from, 520 s->session->peer = s->session->sess_cert->peer_key->x509; 525 if (s->session->sess_cert == NULL 526 || s->session->peer != s->session->sess_cert->peer_key->x509) 689 enc=ssl_rsa_public_encrypt(sess->sess_cert,enc, 868 i=i2d_X509(s->session->sess_cert->peer_key->x509,&p); 1031 SESS_CERT *sc=NULL; 1066 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert); 1067 s->session->sess_cert=sc [all...] |
d1_clnt.c | 991 if (s->session->sess_cert->peer_rsa_tmp != NULL) 992 rsa=s->session->sess_cert->peer_rsa_tmp; 995 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1181 if (s->session->sess_cert->peer_dh_tmp != NULL) 1182 dh_srvr=s->session->sess_cert->peer_dh_tmp; [all...] |
s3_srvr.c | [all...] |
ssl_sess.c | 765 if (ss->sess_cert != NULL) ssl_sess_cert_free(ss->sess_cert); [all...] |
ssl_lib.c | 851 if ((s == NULL) || (s->session == NULL) || (s->session->sess_cert == NULL)) 854 r=s->session->sess_cert->cert_chain; [all...] |
ssl.h | 502 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 505 * On clients, it will be the same as sess_cert->peer_key->x509 506 * (the latter is not enough as sess_cert is not retained [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 1161 SESS_CERT *sc; [all...] |
s2_srvr.c | 712 if (s->session->sess_cert != NULL) 715 * sess_cert. */ 716 ssl_sess_cert_free(s->session->sess_cert); 717 s->session->sess_cert = ssl_sess_cert_new(); 718 if (s->session->sess_cert == NULL) 724 /* If 'hit' is set, then s->sess_cert may be non-NULL or NULL, 736 if (s->session->sess_cert != NULL) 737 ssl_cert_free(s->session->sess_cert); 738 s->session->sess_cert=s->cert; 745 if (s->session->sess_cert == NULL [all...] |
s2_clnt.c | 128 static int ssl_rsa_public_encrypt(SESS_CERT *sc, int len, unsigned char *from, 520 s->session->peer = s->session->sess_cert->peer_key->x509; 525 if (s->session->sess_cert == NULL 526 || s->session->peer != s->session->sess_cert->peer_key->x509) 689 enc=ssl_rsa_public_encrypt(sess->sess_cert,enc, 868 i=i2d_X509(s->session->sess_cert->peer_key->x509,&p); 1031 SESS_CERT *sc=NULL; 1066 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert); 1067 s->session->sess_cert=sc [all...] |
d1_clnt.c | 991 if (s->session->sess_cert->peer_rsa_tmp != NULL) 992 rsa=s->session->sess_cert->peer_rsa_tmp; 995 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1181 if (s->session->sess_cert->peer_dh_tmp != NULL) 1182 dh_srvr=s->session->sess_cert->peer_dh_tmp; [all...] |
s3_srvr.c | [all...] |
ssl_sess.c | 765 if (ss->sess_cert != NULL) ssl_sess_cert_free(ss->sess_cert); [all...] |
ssl_lib.c | 864 if ((s == NULL) || (s->session == NULL) || (s->session->sess_cert == NULL)) 867 r=s->session->sess_cert->cert_chain; [all...] |
ssl.h | 502 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 505 * On clients, it will be the same as sess_cert->peer_key->x509 506 * (the latter is not enough as sess_cert is not retained [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
ssl.h | 502 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 505 * On clients, it will be the same as sess_cert->peer_key->x509 506 * (the latter is not enough as sess_cert is not retained [all...] |
/external/openssl/include/openssl/ |
ssl.h | 502 struct sess_cert_st /* SESS_CERT */ *sess_cert; member in struct:ssl_session_st 505 * On clients, it will be the same as sess_cert->peer_key->x509 506 * (the latter is not enough as sess_cert is not retained [all...] |