• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/openssl/ssl/

Lines Matching refs:ssl

30 static int ssl_undefined_function_1(SSL *ssl, SSL3_RECORD *r, size_t s, int t)
35 return ssl_undefined_function(ssl);
38 static int ssl_undefined_function_2(SSL *ssl, SSL3_RECORD *r, unsigned char *s,
44 return ssl_undefined_function(ssl);
47 static int ssl_undefined_function_3(SSL *ssl, unsigned char *r,
54 return ssl_undefined_function(ssl);
57 static int ssl_undefined_function_4(SSL *ssl, int r)
60 return ssl_undefined_function(ssl);
63 static size_t ssl_undefined_function_5(SSL *ssl, const char *r, size_t s,
69 return ssl_undefined_function(ssl);
78 static int ssl_undefined_function_7(SSL *ssl, unsigned char *r, size_t s,
89 return ssl_undefined_function(ssl);
894 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
902 ssl->sid_ctx_length = sid_ctx_len;
903 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len);
916 int SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb)
918 CRYPTO_THREAD_write_lock(ssl->lock);
919 ssl->generate_session_id = cb;
920 CRYPTO_THREAD_unlock(ssl->lock);
924 int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
939 r.ssl_version = ssl->version;
943 CRYPTO_THREAD_read_lock(ssl->session_ctx->lock);
944 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r);
945 CRYPTO_THREAD_unlock(ssl->session_ctx->lock);
1053 unsigned long SSL_dane_set_flags(SSL *ssl, unsigned long flags)
1055 unsigned long orig = ssl->dane.flags;
1057 ssl->dane.flags |= flags;
1061 unsigned long SSL_dane_clear_flags(SSL *ssl, unsigned long flags)
1063 unsigned long orig = ssl->dane.flags;
1065 ssl->dane.flags &= ~flags;
1128 int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm)
1130 return X509_VERIFY_PARAM_set1(ssl->param, vpm);
1138 X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl)
1140 return ssl->param;
1629 int SSL_check_private_key(const SSL *ssl)
1631 if (ssl == NULL) {
1635 if (ssl->cert->key->x509 == NULL) {
1639 if (ssl->cert->key->privatekey == NULL) {
1643 return X509_check_private_key(ssl->cert->key->x509,
1644 ssl->cert->key->privatekey);
2362 const void *buf, size_t len, SSL *ssl,
2502 const void *buf, size_t len, SSL *ssl,
2942 * SSL_set_alpn_protos sets the ALPN protocol list on |ssl| to |protos|.
2946 int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
2949 OPENSSL_free(ssl->ext.alpn);
2950 ssl->ext.alpn = OPENSSL_memdup(protos, protos_len);
2951 if (ssl->ext.alpn == NULL) {
2952 ssl->ext.alpn_len = 0;
2956 ssl->ext.alpn_len = protos_len;
2975 * SSL_get0_alpn_selected gets the selected ALPN protocol (if any) from |ssl|.
2980 void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
2984 if (ssl->s3)
2985 *data = ssl->s3->alpn_selected;
2989 *len = (unsigned int)ssl->s3->alpn_selected_len;
3058 * via ssl.h.
3386 void SSL_CTX_set_cert_cb(SSL_CTX *c, int (*cb) (SSL *ssl, void *arg), void *arg)
3391 void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg)
4135 SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl)
4137 return ssl->ctx;
4140 SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx)
4143 if (ssl->ctx == ctx)
4144 return ssl->ctx;
4146 ctx = ssl->session_ctx;
4152 if (!custom_exts_copy_flags(&new_cert->custext, &ssl->cert->custext)) {
4157 ssl_cert_free(ssl->cert);
4158 ssl->cert = new_cert;
4164 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx)))
4170 * not match (i.e., it was set per-ssl with SSL_set_session_id_context),
4173 if ((ssl->ctx != NULL) &&
4174 (ssl->sid_ctx_length == ssl->ctx->sid_ctx_length) &&
4175 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) {
4176 ssl->sid_ctx_length = ctx->sid_ctx_length;
4177 memcpy(&ssl->sid_ctx, &ctx->sid_ctx, sizeof(ssl->sid_ctx));
4181 SSL_CTX_free(ssl->ctx); /* decrement reference count */
4182 ssl->ctx = ctx;
4184 return ssl->ctx;
4229 void SSL_set_info_callback(SSL *ssl,
4230 void (*cb) (const SSL *ssl, int type, int val))
4232 ssl->info_callback = cb;
4239 void (*SSL_get_info_callback(const SSL *ssl)) (const SSL * /* ssl */ ,
4242 return ssl->info_callback;
4245 void SSL_set_verify_result(SSL *ssl, long arg)
4247 ssl->verify_result = arg;
4250 long SSL_get_verify_result(const SSL *ssl)
4252 return ssl->verify_result;
4255 size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen)
4258 return sizeof(ssl->s3->client_random);
4259 if (outlen > sizeof(ssl->s3->client_random))
4260 outlen = sizeof(ssl->s3->client_random);
4261 memcpy(out, ssl->s3->client_random, outlen);
4265 size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen)
4268 return sizeof(ssl->s3->server_random);
4269 if (outlen > sizeof(ssl->s3->server_random))
4270 outlen = sizeof(ssl->s3->server_random);
4271 memcpy(out, ssl->s3->server_random, outlen);
4349 DH *(*dh) (SSL *ssl, int is_export,
4355 void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export,
4358 SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh);
4458 size_t len, SSL *ssl, void *arg))
4463 void SSL_set_msg_callback(SSL *ssl,
4466 size_t len, SSL *ssl, void *arg))
4468 SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb);
4472 int (*cb) (SSL *ssl,
4480 void SSL_set_not_resumable_session_callback(SSL *ssl,
4481 int (*cb) (SSL *ssl,
4484 SSL_callback_ctrl(ssl, SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB,
4489 size_t (*cb) (SSL *ssl, int type,
4517 int SSL_set_record_padding_callback(SSL *ssl,
4518 size_t (*cb) (SSL *ssl, int type,
4523 b = SSL_get_wbio(ssl);
4525 ssl->record_padding_cb = cb;
4531 void SSL_set_record_padding_callback_arg(SSL *ssl, void *arg)
4533 ssl->record_padding_arg = arg;
4536 void *SSL_get_record_padding_callback_arg(const SSL *ssl)
4538 return ssl->record_padding_arg;
4541 int SSL_set_block_padding(SSL *ssl, size_t block_size)
4545 ssl->block_padding = 0;
4547 ssl->block_padding = block_size;
5276 int SSL_free_buffers(SSL *ssl)
5278 RECORD_LAYER *rl = &ssl->rlayer;
5287 int SSL_alloc_buffers(SSL *ssl)
5289 return ssl3_setup_buffers(ssl);
5303 SSL *ssl,
5315 if (ssl->ctx->keylog_callback == NULL)
5329 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR, SSL_F_NSS_KEYLOG_INT,
5350 ssl->ctx->keylog_callback(ssl, (const char *)out);
5356 int ssl_log_rsa_client_key_exchange(SSL *ssl,
5363 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR,
5370 ssl,
5377 int ssl_log_secret(SSL *ssl,
5383 ssl,
5384 ssl->s3->client_random,
5612 __owur unsigned int ssl_get_max_send_fragment(const SSL *ssl)
5615 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session))
5616 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5619 return ssl->max_send_fragment;
5622 __owur unsigned int ssl_get_split_send_fragment(const SSL *ssl)
5625 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session)
5626 && ssl->split_send_fragment > GET_MAX_FRAGMENT_LENGTH(ssl->session))
5627 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5630 if (ssl->split_send_fragment > ssl->max_send_fragment)
5631 return ssl->max_send_fragment;
5634 return ssl->split_send_fragment;
5665 void SSL_set_post_handshake_auth(SSL *ssl, int val)
5667 ssl->pha_enabled = val;
5670 int SSL_verify_client_post_handshake(SSL *ssl)
5672 if (!SSL_IS_TLS13(ssl)) {
5676 if (!ssl->server) {
5681 if (!SSL_is_init_finished(ssl)) {
5686 switch (ssl->post_handshake_auth) {
5704 ssl->post_handshake_auth = SSL_PHA_REQUEST_PENDING;
5707 if (!send_certificate_request(ssl)) {
5708 ssl->post_handshake_auth = SSL_PHA_EXT_RECEIVED; /* restore on error */
5713 ossl_statem_set_in_init(ssl, 1);