• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/

Lines Matching refs:SSL

24  * Source file for all OpenSSL-specific code for the TLS/SSL layer. No code
263 /* we have the "SSL is seeded" boolean static to prevent multiple
353 SSL *ssl;
628 failf(data,"unable to create an SSL structure");
649 * the SSL context */
723 * Global SSL init
725 * @retval 0 error initializing SSL
726 * @retval 1 SSL initialized successfully
819 failf(data, "SSL Engine '%s' not found", engine);
832 failf(data, "Failed to initialise SSL Engine '%s':\n%s",
840 failf(data, "SSL Engine not supported");
845 /* Sets engine as default for all SSL operations
891 * This function is called when an SSL connection is closed.
911 * This function is called to shut down the SSL layer but keep the
961 /* SSL wants a write. Really odd. Let's bail out. */
968 failf(conn->data, "SSL read: %s, errno %d",
977 failf(data, "SSL shutdown timeout");
982 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
1195 failf(data, "SSL: no alternative certificate subject name matches "
1243 failf(data, "SSL: illegal cert name field");
1266 "SSL: unable to obtain common name from peer certificate");
1270 failf(data, "SSL: certificate subject name '%s' does not match "
1351 * Our callback from the SSL/TLS layers.
1354 const void *buf, size_t len, const SSL *ssl,
1423 select_next_proto_cb(SSL *ssl,
1502 /* check to see if we've been told to use an explicit SSL/TLS version */
1543 failf(data, "SSL: couldn't create a context: %s",
1554 /* the SSL trace callback is only used for verbose logging so we only
1558 infof(data, "SSL: couldn't set callback!\n");
1562 infof(data, "SSL: couldn't set callback argument!\n");
1568 SSL-implementations. SSL_CTX_set_options() is used to enabled those
1584 enable the feature, one can do this in the SSL callback.
1595 OpenSSL added a work-around for a SSL 3.0/TLS 1.0 CBC vulnerability
1687 failf(data, "Unsupported SSL protocol version");
1766 /* tell SSL where to find CA certificates that are used to verify
1802 /* tell SSL where to find CRL file that is used to check certificate
1824 /* SSL always tries to verify the peer, this only says whether it should
1832 /* give application a chance to interfere with SSL set up. */
1842 /* Lets make an SSL structure */
1847 failf(data, "SSL: couldn't create a context (handle)!");
1869 failf(data, "SSL: SSL_set_session failed: %s",
1874 infof (data, "SSL re-using session ID\n");
1877 /* pass the raw socket into the SSL layers */
1879 failf(data, "SSL: SSL_set_fd failed: %s",
1941 SSL routines:
1947 SSL routines:
1955 "SSL certificate problem: %s",
1959 cert_problem = "SSL certificate problem, verify that the CA cert is"
1969 /* detail is already set to the SSL error above */
1976 failf(data, "Unknown SSL protocol error in connection to %s:%ld ",
1991 infof (data, "SSL connection using %s / %s\n",
2374 failf(data, "SSL: couldn't get peer certificate!");
2404 failf(data, "SSL: couldn't get X509-issuer name!");
2418 failf(data, "SSL: Unable to open issuer cert (%s)",
2427 failf(data, "SSL: Unable to read issuer cert (%s)",
2437 failf(data, "SSL: Certificate issuer check failed (%s)",
2444 infof(data, "\t SSL certificate issuer check ok (%s)\n",
2456 failf(data, "SSL certificate verify result: %s (%ld)",
2461 infof(data, "\t SSL certificate verify result: %s (%ld),"
2466 infof(data, "\t SSL certificate verify ok.\n");
2513 infof(data, "old SSL session ID is stale, removing\n");
2581 failf(data, "SSL connection timeout");
2598 failf(data, "SSL connection timeout");
2614 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
2624 failf(data, "SSL connection timeout");
2696 /* SSL is in use */
2728 /* The operation did not complete; the same TLS/SSL I/O function
2739 /* A failure in the SSL library occurred, usually a protocol error.
2792 failf(conn->data, "SSL read: %s, errno %d",
2854 return snprintf(buffer, size, "SSL/%x.%x.%x%s",