/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | bio_ssl.c | 0 /* ssl/bio_ssl.c */ 66 #include <openssl/ssl.h> 76 SSL *ssl; /* The ssl handle :-) */ member in struct:bio_ssl_st 86 BIO_TYPE_SSL, "ssl", 125 if (bs->ssl != NULL) 126 SSL_shutdown(bs->ssl); 128 if (a->init && (bs->ssl != NULL)) 129 SSL_free(bs->ssl); 142 SSL *ssl; local 225 SSL *ssl; local 289 SSL **sslp, *ssl; local 466 SSL *ssl; local 501 BIO *ret = NULL, *buf = NULL, *ssl = NULL; local 521 BIO *ret = NULL, *con = NULL, *ssl = NULL; local 541 SSL *ssl; local [all...] |
H A D | ssl_err2.c | 0 /* ssl/ssl_err2.c */ 61 #include <openssl/ssl.h>
|
H A D | tls1.h | 0 /* ssl/tls1.h */ 159 # define SSL_set_tlsext_debug_callback(ssl, cb) \ 160 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 162 # define SSL_set_tlsext_debug_arg(ssl, arg) \ 163 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 165 # define SSL_set_tlsext_status_type(ssl, type) \ 166 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 168 # define SSL_get_tlsext_status_exts(ssl, arg) \ 169 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 171 # define SSL_set_tlsext_status_exts(ssl, ar [all...] |
H A D | ssl.h | 0 /* ssl/ssl.h */ 421 * Look in ssl/ssl_asn1.c for more details 425 int ssl_version; /* what ssl version session info is being 598 # define SSL_set_options(ssl,op) \ 599 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) 600 # define SSL_clear_options(ssl,op) \ 601 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) 602 # define SSL_get_options(ssl) \ 603 SSL_ctrl((ssl),SSL_CTRL_OPTION [all...] |
H A D | ssl_rsa.c | 0 /* ssl/ssl_rsa.c */ 69 int SSL_use_certificate(SSL *ssl, X509 *x) argument 75 if (!ssl_cert_inst(&ssl->cert)) { 79 return (ssl_set_cert(ssl->cert, x)); 83 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) argument 105 x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback, 106 ssl->ctx->default_passwd_callback_userdata); 117 ret = SSL_use_certificate(ssl, x); 127 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) argument 138 ret = SSL_use_certificate(ssl, 144 SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 216 SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) argument 258 SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len) argument 276 SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey) argument 293 SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) argument 335 SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len) argument [all...] |
/freebsd-9.3-release/crypto/openssl/demos/tunala/ |
H A D | sm.c | 7 machine->ssl = NULL; 17 if (machine->ssl) 18 SSL_free(machine->ssl); 58 return machine->ssl; 61 int state_machine_set_SSL(state_machine_t * machine, SSL *ssl, int is_server) argument 63 if (machine->ssl) 66 machine->ssl = ssl; 73 SSL_set_bio(machine->ssl, machine->bio_intossl, machine->bio_fromssl); 75 SSL_set_accept_state(machine->ssl); [all...] |
H A D | buffer.c | 182 void buffer_from_SSL(buffer_t * buf, SSL *ssl) argument 185 if (!ssl || buffer_full(buf)) 187 ret = SSL_read(ssl, buf->data + buf->used, buffer_unused(buf)); 193 int_ssl_check(ssl, ret); 196 void buffer_to_SSL(buffer_t * buf, SSL *ssl) argument 199 if (!ssl || buffer_empty(buf)) 201 ret = SSL_write(ssl, buf->data, buf->used); 207 int_ssl_check(ssl, ret);
|
H A D | tunala.h | 78 # include <openssl/ssl.h> 157 void buffer_from_SSL(buffer_t * buf, SSL *ssl); 158 void buffer_to_SSL(buffer_t * buf, SSL *ssl); 179 SSL *ssl; member in struct:_state_machine_t 194 int state_machine_set_SSL(state_machine_t * machine, SSL *ssl, int is_server);
|
/freebsd-9.3-release/crypto/openssl/demos/ssl/ |
H A D | inetdsrv.cpp | 14 #include <openssl/ssl.h> 30 SSL* ssl; local 51 ssl = SSL_new (ctx); CHK_NULL(ssl); 52 SSL_set_fd (ssl, fileno(stdin)); 53 err = SSL_accept (ssl); CHK_SSL(err); 57 fprintf (log, "SSL connection using %s\n", SSL_get_cipher (ssl)); 61 client_cert = SSL_get_peer_certificate (ssl); 85 err = SSL_read (ssl, buf, sizeof(buf) - 1); CHK_SSL(err); 89 err = SSL_write (ssl, "Lou [all...] |
H A D | cli.cpp | 20 #include <openssl/ssl.h> 34 SSL* ssl; local 63 ssl = SSL_new (ctx); CHK_NULL(ssl); 64 SSL_set_fd (ssl, sd); 65 err = SSL_connect (ssl); CHK_SSL(err); 72 printf ("SSL connection using %s\n", SSL_get_cipher (ssl)); 76 server_cert = SSL_get_peer_certificate (ssl); CHK_NULL(server_cert); 97 err = SSL_write (ssl, "Hello World!", strlen("Hello World!")); CHK_SSL(err); 99 err = SSL_read (ssl, bu [all...] |
H A D | serv.cpp | 24 #include <openssl/ssl.h> 48 SSL* ssl; local 107 ssl = SSL_new (ctx); CHK_NULL(ssl); 108 SSL_set_fd (ssl, sd); 109 err = SSL_accept (ssl); CHK_SSL(err); 113 printf ("SSL connection using %s\n", SSL_get_cipher (ssl)); 117 client_cert = SSL_get_peer_certificate (ssl); 140 err = SSL_read (ssl, buf, sizeof(buf) - 1); CHK_SSL(err); 144 err = SSL_write (ssl, " [all...] |
/freebsd-9.3-release/crypto/openssl/demos/bio/ |
H A D | sconnect.c | 15 #include <openssl/ssl.h> 27 SSL *ssl; local 49 ssl = SSL_new(ssl_ctx); 50 SSL_set_connect_state(ssl); 54 BIO_set_ssl(ssl_bio, ssl, BIO_CLOSE);
|
H A D | saccept.c | 17 #include <openssl/ssl.h> 36 SSL *ssl; local 66 ssl = SSL_new(ctx);
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | ciphers.c | 67 #include <openssl/ssl.h> 91 SSL *ssl = NULL; local 162 ssl = SSL_new(ctx); 163 if (ssl == NULL) 168 p = SSL_get_cipher_list(ssl, i); 177 sk = SSL_get_ciphers(ssl); 195 if (ssl != NULL) 196 SSL_free(ssl);
|
H A D | s_apps.h | 176 const void *buf, size_t len, SSL *ssl, void *arg); 181 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, 183 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie,
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 27 struct eap_ssl_data ssl; member in struct:eap_tls_data 68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 83 eap_server_tls_ssl_deinit(sm, &data->ssl); 115 if (data->ssl.state == FRAG_ACK) { 119 if (data->ssl.state == WAIT_FRAG_ACK) { 120 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 138 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 141 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 172 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
H A D | eap_server_peap.c | 39 struct eap_ssl_data ssl; member in struct:eap_peap_data 187 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 204 eap_server_tls_ssl_deinit(sm, &data->ssl); 264 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 303 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 336 tk = eap_server_tls_derive_key(sm, &data->ssl, "client EAP encryption", 455 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 483 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 494 if (data->ssl.state == FRAG_ACK) { 499 if (data->ssl [all...] |
H A D | eap_server_ttls.c | 43 struct eap_ssl_data ssl; member in struct:eap_ttls_data 327 return eap_server_tls_derive_key(sm, &data->ssl, 332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 403 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { 420 eap_server_tls_ssl_deinit(sm, &data->ssl); 471 encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf); 512 encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf); 523 data->ssl.conn, final); 531 if (data->ssl.state == FRAG_ACK) { 536 if (data->ssl [all...] |
/freebsd-9.3-release/contrib/ntp/sntp/libevent/include/event2/ |
H A D | bufferevent_ssl.h | 62 @param ssl A SSL* object from openssl. 71 struct ssl_st *ssl, 80 @param ssl A SSL* object from openssl. 89 struct ssl_st *ssl,
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 23 #include <openssl/ssl.h> 63 SSL *ssl; member in struct:tls_connection 319 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 386 if (!SSL_use_certificate(ssl, cert)) { 400 if (!SSL_use_RSAPrivateKey(ssl, rsa)) 419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) argument 486 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 494 static void ssl_info_cb(const SSL *ssl, int where, int ret) argument 510 str, SSL_state_string_long(ssl)); 520 SSL_get_app_data((SSL *) ssl); 681 SSL_CTX *ssl; local 765 SSL_CTX *ssl = ssl_ctx; local 899 SSL_CTX *ssl = ssl_ctx; local 1168 SSL *ssl; local 1616 tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, const char *passwd) argument 1691 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 1721 tls_read_pkcs12_blob(SSL_CTX *ssl_ctx, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 2210 SSL *ssl; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 28 struct eap_ssl_data ssl; member in struct:eap_tls_data 49 if (eap_peer_tls_ssl_init(sm, &data->ssl, config)) { 76 eap_peer_tls_ssl_deinit(sm, &data->ssl); 127 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 154 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_TLS, ret, 167 res = eap_peer_tls_process_helper(sm, &data->ssl, EAP_TYPE_TLS, 0, id, 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn); 203 if (eap_peer_tls_reauth_init(sm, &data->ssl)) { 215 return eap_peer_tls_status(sm, &data->ssl, bu [all...] |
/freebsd-9.3-release/secure/lib/libssl/ |
H A D | Makefile | 3 LIB= ssl 23 INCS= dtls1.h kssl.h ssl.h ssl2.h ssl23.h ssl3.h tls1.h 31 .PATH: ${LCRYPTO_SRC}/ssl \
|
/freebsd-9.3-release/crypto/openssl/demos/easy_tls/ |
H A D | easy-tls.c | 104 #include <openssl/ssl.h> 112 #include "easy-tls.h" /* include after <openssl/ssl.h> if both are 930 static void write_info(SSL *ssl, int *info_fd) argument 940 v = SSL_get_verify_result(ssl); 945 peercert = SSL_get_peer_certificate(ssl); 972 SSL *ssl; local 992 ssl = SSL_new(ctx); 993 if (ssl == NULL) 996 if (!SSL_set_fd(ssl, tls_fd)) 998 rbio = SSL_get_rbio(ssl); 1136 tls_get_error(SSL *ssl, int r, int *write_select, int *read_select, int *closed, int *progress) argument 1169 tls_connect_attempt(SSL *ssl, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref) argument 1184 tls_accept_attempt(SSL *ssl, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref) argument 1199 tls_write_attempt(SSL *ssl, struct tunnelbuf *buf, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref) argument 1223 tls_read_attempt(SSL *ssl, struct tunnelbuf *buf, int *write_select, int *read_select, int *closed, int *progress, const char **err_pref) argument [all...] |
/freebsd-9.3-release/lib/libfetch/ |
H A D | common.h | 43 #include <openssl/ssl.h> 56 SSL *ssl; /* SSL handle */ member in struct:fetchconn
|
/freebsd-9.3-release/contrib/ntp/sntp/libevent/ |
H A D | bufferevent_openssl.c | 67 #include <openssl/ssl.h> 298 SSL *ssl; member in struct:bufferevent_openssl 342 "ssl", 502 if (SSL_get_shutdown(bev_ssl->ssl) & SSL_RECEIVED_SHUTDOWN) 548 BIO_number_written(SSL_get_wbio(bev_ssl->ssl)); 550 BIO_number_read(SSL_get_rbio(bev_ssl->ssl)); 556 unsigned long num_w = BIO_number_written(SSL_get_wbio(bev_ssl->ssl)); 557 unsigned long num_r = BIO_number_read(SSL_get_rbio(bev_ssl->ssl)); 598 r = SSL_read(bev_ssl->ssl, space[i].iov_base, space[i].iov_len); 608 int err = SSL_get_error(bev_ssl->ssl, 1314 bufferevent_openssl_new_impl(struct event_base *base, struct bufferevent *underlying, evutil_socket_t fd, SSL *ssl, enum bufferevent_ssl_state state, int options) argument 1404 bufferevent_openssl_filter_new(struct event_base *base, struct bufferevent *underlying, SSL *ssl, enum bufferevent_ssl_state state, int options) argument 1426 bufferevent_openssl_socket_new(struct event_base *base, evutil_socket_t fd, SSL *ssl, enum bufferevent_ssl_state state, int options) argument [all...] |