• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/

Lines Matching refs:SSL

5  * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
232 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
253 static unsigned int psk_client_callback(SSL *ssl, const char *hint,
258 static unsigned int psk_server_callback(SSL *ssl, const char *identity,
273 static char *MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
286 static int MS_CALLBACK ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
315 static int servername_cb(SSL *s, int *ad, void *arg)
332 static int verify_servername(SSL *client, SSL *server)
392 static int cb_server_alpn(SSL *s, const unsigned char **out,
426 static int verify_alpn(SSL *client, SSL *server)
512 static int serverinfo_cli_parse_cb(SSL *s, unsigned int ext_type,
544 static int custom_ext_0_cli_add_cb(SSL *s, unsigned int ext_type,
553 static int custom_ext_0_cli_parse_cb(SSL *s, unsigned int ext_type,
560 static int custom_ext_1_cli_add_cb(SSL *s, unsigned int ext_type,
571 static int custom_ext_1_cli_parse_cb(SSL *s, unsigned int ext_type,
578 static int custom_ext_2_cli_add_cb(SSL *s, unsigned int ext_type,
589 static int custom_ext_2_cli_parse_cb(SSL *s, unsigned int ext_type,
600 static int custom_ext_3_cli_add_cb(SSL *s, unsigned int ext_type,
611 static int custom_ext_3_cli_parse_cb(SSL *s, unsigned int ext_type,
628 static int custom_ext_0_srv_parse_cb(SSL *s, unsigned int ext_type,
637 static int custom_ext_0_srv_add_cb(SSL *s, unsigned int ext_type,
646 static int custom_ext_1_srv_parse_cb(SSL *s, unsigned int ext_type,
660 static int custom_ext_1_srv_add_cb(SSL *s, unsigned int ext_type,
667 static int custom_ext_2_srv_parse_cb(SSL *s, unsigned int ext_type,
681 static int custom_ext_2_srv_add_cb(SSL *s, unsigned int ext_type,
690 static int custom_ext_3_srv_parse_cb(SSL *s, unsigned int ext_type,
704 static int custom_ext_3_srv_add_cb(SSL *s, unsigned int ext_type,
726 int doit_biopair(SSL *s_ssl, SSL *c_ssl, long bytes, clock_t *s_time,
728 int doit(SSL *s_ssl, SSL *c_ssl, long bytes);
825 static void print_details(SSL *c_ssl, const char *prefix)
859 * The SSL API does not allow us to look at temporary RSA/DH keys,
930 int opaque_prf_input_cb(SSL *ssl, void *peerinput, size_t len, void *arg_)
963 SSL *c_ssl, *s_ssl;
1777 int doit_biopair(SSL *s_ssl, SSL *c_ssl, long count,
1810 * c_ssl_bio: SSL filter BIO
1812 * client: pseudo-I/O for SSL library
1814 * client_io: client's SSL communication; usually to be
1818 * server_io: server's SSL communication
1820 * server: pseudo-I/O for SSL library
1822 * s_ssl_bio: SSL filter BIO
1885 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1907 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
1957 fprintf(stderr, "SSL SERVER STARTUP FAILED\n");
1977 fprintf(stderr, "SSL SERVER STARTUP FAILED\n");
2052 * restartability of the SSL implementation more thoroughly
2154 int doit(SSL *s_ssl, SSL *c_ssl, long count)
2270 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
2298 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n");
2336 "SSL SERVER STARTUP FAILED in SSL_read\n");
2371 "SSL SERVER STARTUP FAILED in SSL_write\n");
2898 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
3104 static unsigned int psk_client_callback(SSL *ssl, const char *hint,
3127 static unsigned int psk_server_callback(SSL *ssl, const char *identity,