version 1.28, 2018/01/28 09:21:34 |
version 1.29, 2018/02/07 04:57:06 |
|
|
print_stats(bio_s_out, ctx); |
print_stats(bio_s_out, ctx); |
ret = 0; |
ret = 0; |
end: |
end: |
if (ctx != NULL) |
SSL_CTX_free(ctx); |
SSL_CTX_free(ctx); |
X509_free(s_cert); |
if (s_cert) |
X509_free(s_dcert); |
X509_free(s_cert); |
EVP_PKEY_free(s_key); |
if (s_dcert) |
EVP_PKEY_free(s_dkey); |
X509_free(s_dcert); |
|
if (s_key) |
|
EVP_PKEY_free(s_key); |
|
if (s_dkey) |
|
EVP_PKEY_free(s_dkey); |
|
free(pass); |
free(pass); |
free(dpass); |
free(dpass); |
if (vpm) |
X509_VERIFY_PARAM_free(vpm); |
X509_VERIFY_PARAM_free(vpm); |
|
free(tlscstatp.host); |
free(tlscstatp.host); |
free(tlscstatp.port); |
free(tlscstatp.port); |
free(tlscstatp.path); |
free(tlscstatp.path); |
if (ctx2 != NULL) |
SSL_CTX_free(ctx2); |
SSL_CTX_free(ctx2); |
X509_free(s_cert2); |
if (s_cert2) |
EVP_PKEY_free(s_key2); |
X509_free(s_cert2); |
|
if (s_key2) |
|
EVP_PKEY_free(s_key2); |
|
free(alpn_ctx.data); |
free(alpn_ctx.data); |
if (bio_s_out != NULL) { |
if (bio_s_out != NULL) { |
BIO_free(bio_s_out); |
BIO_free(bio_s_out); |
|
|
BIO_printf(bio_s_out, "ACCEPT\n"); |
BIO_printf(bio_s_out, "ACCEPT\n"); |
|
|
free(buf); |
free(buf); |
if (io != NULL) |
BIO_free_all(io); |
BIO_free_all(io); |
|
/* if (ssl_bio != NULL) BIO_free(ssl_bio);*/ |
/* if (ssl_bio != NULL) BIO_free(ssl_bio);*/ |
return (ret); |
return (ret); |
} |
} |