Lines Matching refs:SSL

5  * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
229 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
250 static unsigned int psk_client_callback(SSL *ssl, const char *hint,
255 static unsigned int psk_server_callback(SSL *ssl, const char *identity,
270 static char *MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
283 static int MS_CALLBACK ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
315 int doit_biopair(SSL *s_ssl, SSL *c_ssl, long bytes, clock_t *s_time,
317 int doit(SSL *s_ssl, SSL *c_ssl, long bytes);
393 static void print_details(SSL *c_ssl, const char *prefix)
427 * The SSL API does not allow us to look at temporary RSA/DH keys,
498 int opaque_prf_input_cb(SSL *ssl, void *peerinput, size_t len, void *arg_)
532 SSL *c_ssl, *s_ssl;
1144 int doit_biopair(SSL *s_ssl, SSL *c_ssl, long count,
1177 * c_ssl_bio: SSL filter BIO
1179 * client: pseudo-I/O for SSL library
1181 * client_io: client's SSL communication; usually to be
1185 * server_io: server's SSL communication
1187 * server: pseudo-I/O for SSL library
1189 * s_ssl_bio: SSL filter BIO
1252 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1274 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1324 fprintf(stderr, "SSL SERVER STARTUP FAILED\n");
1344 fprintf(stderr, "SSL SERVER STARTUP FAILED\n");
1419 * restartability of the SSL implementation more thoroughly
1510 int doit(SSL *s_ssl, SSL *c_ssl, long count)
1616 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1642 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1680 "SSL SERVER STARTUP FAILED in SSL_read\n");
1716 "SSL SERVER STARTUP FAILED in SSL_write\n");
2227 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
2433 static unsigned int psk_client_callback(SSL *ssl, const char *hint,
2456 static unsigned int psk_server_callback(SSL *ssl, const char *identity,