/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_peap.c | 33 struct eap_ssl_data ssl; member in struct:eap_peap_data 159 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_PEAP)) { 186 eap_peer_tls_ssl_deinit(sm, &data->ssl); 267 resumed = tls_connection_resumed(sm->ssl_ctx, data->ssl.conn); 761 eap_peer_tls_reset_input(&data->ssl); 782 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 787 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 955 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_PEAP, 981 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_PEAP, ret, 1013 if (tls_connection_established(sm->ssl_ctx, data->ssl [all...] |
H A D | eap_fast.c | 34 struct eap_ssl_data ssl; member in struct:eap_fast_data 173 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) { 179 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 193 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 241 eap_peer_tls_ssl_deinit(sm, &data->ssl); 278 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 305 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 811 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); 1147 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST, 1305 eap_peer_tls_reset_input(&data->ssl); [all...] |
H A D | eap_teap.c | 28 struct eap_ssl_data ssl; member in struct:eap_teap_data 192 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TEAP)) { 198 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 262 eap_peer_tls_ssl_deinit(sm, &data->ssl); 294 res = tls_connection_export_key(sm->ssl_ctx, data->ssl.conn, 741 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, 1370 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, 1398 eap_peer_tls_reset_input(&data->ssl); 1407 res = eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TEAP, 1410 if (res == 0 && !data->ssl [all...] |
H A D | eap_ttls.c | 30 struct eap_ssl_data ssl; member in struct:eap_ttls_data 159 if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_TTLS)) { 196 eap_peer_tls_ssl_deinit(sm, &data->ssl); 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 289 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 307 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", 1073 if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTLS, 1378 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 1413 eap_peer_tls_reset_input(&data->ssl); 1433 return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_TTL [all...] |
/freebsd-13-stable/usr.sbin/portsnap/portsnap/ |
H A D | portsnap.sh | 459 if [ -r pub.ssl ] && [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then 464 rm -f pub.ssl 465 fetch ${QUIETFLAG} http://${SERVERNAME}/pub.ssl \ 467 if ! [ -r pub.ssl ]; then 471 if ! [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then 473 rm -f pub.ssl 481 rm -f snapshot.ssl tag.new 484 fetch ${QUIETFLAG} http://${SERVERNAME}/$1.ssl \ 486 if ! [ -r $1.ssl ]; the [all...] |
/freebsd-13-stable/contrib/dma/ |
H A D | dma.h | 45 #include <openssl/ssl.h> 142 SSL *ssl; member in struct:config
|
/freebsd-13-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 38 #include <openssl/ssl.h> 145 SSL *ssl; member in struct:serf_ssl_context_t 182 /* The bucket-independent ssl context that this bucket is associated with */ 202 /* Log all ssl alerts that we receive from the server. */ 590 SSL *ssl; local 597 ssl = X509_STORE_CTX_get_ex_data(store_ctx, 599 ctx = SSL_get_app_data(ssl); 765 ssl_len = SSL_read(ctx->ssl, buf, bufsize); 789 ssl_len = SSL_read(ctx->ssl, buf, bufsize); 793 ssl_err = SSL_get_error(ctx->ssl, ssl_le 1208 ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_mcnf.c | 12 #include <openssl/ssl.h>
|
H A D | ssl_local.h | 27 # include <openssl/ssl.h> 505 * Look in ssl/ssl_asn1.c for more details 509 int ssl_version; /* what ssl version session info is being kept 774 int (*new_session_cb) (struct ssl_st *ssl, SSL_SESSION *sess); 776 SSL_SESSION *(*get_session_cb) (struct ssl_st *ssl, 816 int (*client_cert_cb) (SSL *ssl, X509 **x509, EVP_PKEY **pkey); 819 int (*app_gen_cookie_cb) (SSL *ssl, unsigned char *cookie, 823 int (*app_verify_cookie_cb) (SSL *ssl, const unsigned char *cookie, 827 int (*gen_stateless_cookie_cb) (SSL *ssl, unsigned char *cookie, 831 int (*verify_stateless_cookie_cb) (SSL *ssl, cons [all...] |
H A D | s3_msg.c | 41 /* Map tls/ssl alert value to correct one */ 73 void (*cb) (const SSL *ssl, int type, int val) = NULL;
|
/freebsd-13-stable/contrib/unbound/contrib/ |
H A D | warmup.sh | 105 ssl.comodo.com 106 ssl.verisign.com
|
H A D | warmup.cmd | 109 ssl.comodo.com
110 ssl.verisign.com
|
/freebsd-13-stable/contrib/unbound/dnstap/ |
H A D | dtstream.h | 136 /** ssl context for the io thread, for tls connections. type SSL_CTX* */ 151 /** ssl for current connection, type SSL* */ 152 void* ssl; member in struct:dt_io_thread
|
/freebsd-13-stable/contrib/libevent/sample/ |
H A D | openssl_hostname_validation.c | 1 /* Obtained from: https://github.com/iSECPartners/ssl-conservatory */ 43 #include <openssl/ssl.h>
|
/freebsd-13-stable/usr.bin/svn/svnmucc/ |
H A D | Makefile | 45 ssl \
|
/freebsd-13-stable/usr.bin/svn/svnrdump/ |
H A D | Makefile | 48 ssl \
|
/freebsd-13-stable/usr.bin/svn/svnsync/ |
H A D | Makefile | 43 ssl \
|
/freebsd-13-stable/contrib/libevent/test/ |
H A D | regress_http.c | 120 SSL *ssl = SSL_new(get_ssl_ctx()); local 122 SSL_use_certificate(ssl, ssl_getcert()); 123 SSL_use_PrivateKey(ssl, ssl_getkey()); 126 base, -1, ssl, BUFFEREVENT_SSL_ACCEPTING, 293 /** For ssl */ 437 SSL *ssl = SSL_new(get_ssl_ctx()); local 442 base, underlying, ssl, BUFFEREVENT_SSL_CONNECTING, flags); 445 base, fd, ssl, BUFFEREVENT_SSL_CONNECTING, flags); 455 http_basic_test_impl(void *arg, int ssl) argument 463 int server_flags = ssl 1014 http_connection_test_(struct basic_test_data *data, int persistent, const char *address, struct evdns_base *dnsbase, int ipv6, int family, int ssl) argument 1039 SSL *ssl = SSL_new(get_ssl_ctx()); local 3038 http_incomplete_test_(struct basic_test_data *data, int use_timeout, int ssl) argument 3253 http_chunk_out_test_impl(void *arg, int ssl) argument 3333 http_stream_out_test_impl(void *arg, int ssl) argument 3530 http_connection_fail_test_impl(void *arg, int ssl) argument 3593 int ssl; member in struct:http_server 3605 http_simple_test_impl(void *arg, int ssl, int dirty) argument 3647 http_connection_retry_test_basic(void *arg, const char *addr, struct evdns_base *dns_base, int ssl) argument 3777 http_connection_retry_conn_address_test_impl(void *arg, int ssl) argument 3804 http_connection_retry_test_impl(void *arg, int ssl) argument 4441 http_write_during_read_test_impl(void *arg, int ssl) argument [all...] |
H A D | regress.h | 133 #include <openssl/ssl.h>
|
/freebsd-13-stable/contrib/unbound/compat/ |
H A D | getentropy_solaris.c | 323 socklen_t ssl; local 404 ssl = sizeof(ss); 406 (void *)&ss, &ssl) == -1,
|
/freebsd-13-stable/contrib/unbound/util/ |
H A D | edns.c | 173 if(!cfg->pad_responses || c->type != comm_tcp || !c->ssl
|
/freebsd-13-stable/lib/libfetch/ |
H A D | Makefile | 19 LIBADD+= ssl crypto
|
/freebsd-13-stable/usr.sbin/sendmail/ |
H A D | Makefile | 57 LIBADD+= ssl crypto
|
/freebsd-13-stable/usr.bin/svn/svnbench/ |
H A D | Makefile | 54 ssl \
|
/freebsd-13-stable/contrib/unbound/services/ |
H A D | outside_network.h | 137 /** ssl context to create ssl wrapped TCP with DNS connections */ 240 * are the sockaddr and and then is-ssl bool, and then ptr value is 250 /** also key for tcp_reuse tree, if ssl is used */ 405 /** if it uses ssl upstream */ 708 * @param ssl: set to true for TLS. 715 struct sldns_buffer* query, int timeout, int ssl, char* host); 729 * @param ssl: set to true for https. 737 int ssl, char* host, char* path);
|