Searched refs:ssl (Results 76 - 100 of 168) sorted by relevance

1234567

/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_peap.c33 struct eap_ssl_data ssl; member in struct:eap_peap_data
159 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) {
186 eap_peer_tls_ssl_deinit(sm, &data->ssl);
267 resumed = tls_connection_resumed(sm->ssl_ctx, data->ssl.conn);
761 eap_peer_tls_reset_input(&data->ssl);
782 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
787 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
955 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP,
981 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret,
1013 if (tls_connection_established(sm->ssl_ctx, data->ssl
[all...]
H A Deap_fast.c34 struct eap_ssl_data ssl; member in struct:eap_fast_data
173 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) {
179 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,
193 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) {
241 eap_peer_tls_ssl_deinit(sm, &data->ssl);
278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,
305 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,
811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len);
1147 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST,
1305 eap_peer_tls_reset_input(&data->ssl);
[all...]
H A Deap_teap.c28 struct eap_ssl_data ssl; member in struct:eap_teap_data
192 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TEAP)) {
198 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,
262 eap_peer_tls_ssl_deinit(sm, &data->ssl);
294 res = tls_connection_export_key(sm->ssl_ctx, data->ssl.conn,
741 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1,
1370 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP,
1398 eap_peer_tls_reset_input(&data->ssl);
1407 res = eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP,
1410 if (res == 0 && !data->ssl
[all...]
H A Deap_ttls.c30 struct eap_ssl_data ssl; member in struct:eap_ttls_data
159 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) {
196 eap_peer_tls_ssl_deinit(sm, &data->ssl);
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
289 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
307 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge",
1073 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS,
1378 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) {
1413 eap_peer_tls_reset_input(&data->ssl);
1433 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTL
[all...]
/freebsd-13-stable/usr.sbin/portsnap/portsnap/
H A Dportsnap.sh459 if [ -r pub.ssl ] && [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then
464 rm -f pub.ssl
465 fetch ${QUIETFLAG} http://${SERVERNAME}/pub.ssl \
467 if ! [ -r pub.ssl ]; then
471 if ! [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then
473 rm -f pub.ssl
481 rm -f snapshot.ssl tag.new
484 fetch ${QUIETFLAG} http://${SERVERNAME}/$1.ssl \
486 if ! [ -r $1.ssl ]; the
[all...]
/freebsd-13-stable/contrib/dma/
H A Ddma.h45 #include <openssl/ssl.h>
142 SSL *ssl; member in struct:config
/freebsd-13-stable/contrib/serf/buckets/
H A Dssl_buckets.c38 #include <openssl/ssl.h>
145 SSL *ssl; member in struct:serf_ssl_context_t
182 /* The bucket-independent ssl context that this bucket is associated with */
202 /* Log all ssl alerts that we receive from the server. */
590 SSL *ssl; local
597 ssl = X509_STORE_CTX_get_ex_data(store_ctx,
599 ctx = SSL_get_app_data(ssl);
765 ssl_len = SSL_read(ctx->ssl, buf, bufsize);
789 ssl_len = SSL_read(ctx->ssl, buf, bufsize);
793 ssl_err = SSL_get_error(ctx->ssl, ssl_le
1208 ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument
[all...]
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_mcnf.c12 #include <openssl/ssl.h>
H A Dssl_local.h27 # include <openssl/ssl.h>
505 * Look in ssl/ssl_asn1.c for more details
509 int ssl_version; /* what ssl version session info is being kept
774 int (*new_session_cb) (struct ssl_st *ssl, SSL_SESSION *sess);
776 SSL_SESSION *(*get_session_cb) (struct ssl_st *ssl,
816 int (*client_cert_cb) (SSL *ssl, X509 **x509, EVP_PKEY **pkey);
819 int (*app_gen_cookie_cb) (SSL *ssl, unsigned char *cookie,
823 int (*app_verify_cookie_cb) (SSL *ssl, const unsigned char *cookie,
827 int (*gen_stateless_cookie_cb) (SSL *ssl, unsigned char *cookie,
831 int (*verify_stateless_cookie_cb) (SSL *ssl, cons
[all...]
H A Ds3_msg.c41 /* Map tls/ssl alert value to correct one */
73 void (*cb) (const SSL *ssl, int type, int val) = NULL;
/freebsd-13-stable/contrib/unbound/contrib/
H A Dwarmup.sh105 ssl.comodo.com
106 ssl.verisign.com
H A Dwarmup.cmd109 ssl.comodo.com
110 ssl.verisign.com
/freebsd-13-stable/contrib/unbound/dnstap/
H A Ddtstream.h136 /** ssl context for the io thread, for tls connections. type SSL_CTX* */
151 /** ssl for current connection, type SSL* */
152 void* ssl; member in struct:dt_io_thread
/freebsd-13-stable/contrib/libevent/sample/
H A Dopenssl_hostname_validation.c1 /* Obtained from: https://github.com/iSECPartners/ssl-conservatory */
43 #include <openssl/ssl.h>
/freebsd-13-stable/usr.bin/svn/svnmucc/
H A DMakefile45 ssl \
/freebsd-13-stable/usr.bin/svn/svnrdump/
H A DMakefile48 ssl \
/freebsd-13-stable/usr.bin/svn/svnsync/
H A DMakefile43 ssl \
/freebsd-13-stable/contrib/libevent/test/
H A Dregress_http.c120 SSL *ssl = SSL_new(get_ssl_ctx()); local
122 SSL_use_certificate(ssl, ssl_getcert());
123 SSL_use_PrivateKey(ssl, ssl_getkey());
126 base, -1, ssl, BUFFEREVENT_SSL_ACCEPTING,
293 /** For ssl */
437 SSL *ssl = SSL_new(get_ssl_ctx()); local
442 base, underlying, ssl, BUFFEREVENT_SSL_CONNECTING, flags);
445 base, fd, ssl, BUFFEREVENT_SSL_CONNECTING, flags);
455 http_basic_test_impl(void *arg, int ssl) argument
463 int server_flags = ssl
1014 http_connection_test_(struct basic_test_data *data, int persistent, const char *address, struct evdns_base *dnsbase, int ipv6, int family, int ssl) argument
1039 SSL *ssl = SSL_new(get_ssl_ctx()); local
3038 http_incomplete_test_(struct basic_test_data *data, int use_timeout, int ssl) argument
3253 http_chunk_out_test_impl(void *arg, int ssl) argument
3333 http_stream_out_test_impl(void *arg, int ssl) argument
3530 http_connection_fail_test_impl(void *arg, int ssl) argument
3593 int ssl; member in struct:http_server
3605 http_simple_test_impl(void *arg, int ssl, int dirty) argument
3647 http_connection_retry_test_basic(void *arg, const char *addr, struct evdns_base *dns_base, int ssl) argument
3777 http_connection_retry_conn_address_test_impl(void *arg, int ssl) argument
3804 http_connection_retry_test_impl(void *arg, int ssl) argument
4441 http_write_during_read_test_impl(void *arg, int ssl) argument
[all...]
H A Dregress.h133 #include <openssl/ssl.h>
/freebsd-13-stable/contrib/unbound/compat/
H A Dgetentropy_solaris.c323 socklen_t ssl; local
404 ssl = sizeof(ss);
406 (void *)&ss, &ssl) == -1,
/freebsd-13-stable/contrib/unbound/util/
H A Dedns.c173 if(!cfg->pad_responses || c->type != comm_tcp || !c->ssl
/freebsd-13-stable/lib/libfetch/
H A DMakefile19 LIBADD+= ssl crypto
/freebsd-13-stable/usr.sbin/sendmail/
H A DMakefile57 LIBADD+= ssl crypto
/freebsd-13-stable/usr.bin/svn/svnbench/
H A DMakefile54 ssl \
/freebsd-13-stable/contrib/unbound/services/
H A Doutside_network.h137 /** ssl context to create ssl wrapped TCP with DNS connections */
240 * are the sockaddr and and then is-ssl bool, and then ptr value is
250 /** also key for tcp_reuse tree, if ssl is used */
405 /** if it uses ssl upstream */
708 * @param ssl: set to true for TLS.
715 struct sldns_buffer* query, int timeout, int ssl, char* host);
729 * @param ssl: set to true for https.
737 int ssl, char* host, char* path);

Completed in 142 milliseconds

1234567