/freebsd-9.3-release/crypto/openssl/demos/bio/ |
H A D | sconnect.c | 26 SSL_CTX *ssl_ctx = NULL; local 46 ssl_ctx = SSL_CTX_new(SSLv23_client_method()); 49 ssl = SSL_new(ssl_ctx); 109 if (ssl_ctx != NULL) 110 SSL_CTX_free(ssl_ctx);
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | authsrv.c | 106 srv.ssl_ctx = hapd->ssl_ctx; 143 hapd->ssl_ctx = tls_init(NULL); 144 if (hapd->ssl_ctx == NULL) { 157 if (tls_global_set_params(hapd->ssl_ctx, ¶ms)) { 163 if (tls_global_set_verify(hapd->ssl_ctx, 204 if (hapd->ssl_ctx) { 205 tls_deinit(hapd->ssl_ctx); 206 hapd->ssl_ctx = NULL;
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_server.h | 59 * ssl_ctx - TLS context 64 void *ssl_ctx; member in struct:radius_server_conf
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 33 data->conn = tls_connection_init(sm->ssl_ctx); 40 if (tls_connection_set_verify(sm->ssl_ctx, data->conn, verify_peer)) { 43 tls_connection_deinit(sm->ssl_ctx, data->conn); 63 tls_connection_deinit(sm->ssl_ctx, data->conn); 80 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 84 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 262 data->tls_out = tls_connection_server_handshake(sm->ssl_ctx, 269 if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) { 354 buf = tls_connection_encrypt(sm->ssl_ctx, data->conn, 399 if (tls_connection_get_write_alerts(sm->ssl_ctx, dat [all...] |
H A D | eap.h | 93 void *ssl_ctx; member in struct:eap_config
|
H A D | eap_i.h | 159 void *ssl_ctx; member in struct:eap_sm
|
H A D | eap_server_ttls.c | 332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 391 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 522 return tls_connection_ia_send_phase_finished(sm->ssl_ctx, 545 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 616 ret = tls_connection_ia_permute_inner_secret(sm->ssl_ctx, 1124 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1135 tls_connection_ia_final_phase_finished(sm->ssl_ctx, 1249 if (tls_connection_set_ia(sm->ssl_ctx, data->ssl.conn, 1)) { 1331 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) ||
|
H A D | eap_server_fast.c | 281 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 307 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 442 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn, 450 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 872 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 1395 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1455 if (!tls_connection_established(sm->ssl_ctx, data->ssl.conn) ||
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) argument 465 if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) { 763 void tls_deinit(void *ssl_ctx) argument 765 SSL_CTX *ssl = ssl_ctx; 883 int tls_get_errors(void *ssl_ctx) argument 897 struct tls_connection * tls_connection_init(void *ssl_ctx) argument 899 SSL_CTX *ssl = ssl_ctx; 947 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 960 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 966 int tls_connection_shutdown(void *ssl_ctx, struc argument 1263 SSL_CTX *ssl_ctx = _ssl_ctx; local 1297 SSL_CTX *ssl_ctx = _ssl_ctx; local 1425 tls_global_ca_cert(SSL_CTX *ssl_ctx, const char *ca_cert) argument 1449 tls_global_set_verify(void *ssl_ctx, int check_crl) argument 1494 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 1581 tls_global_client_cert(SSL_CTX *ssl_ctx, const char *client_cert) argument 1616 tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, const char *passwd) argument 1691 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 1721 tls_read_pkcs12_blob(SSL_CTX *ssl_ctx, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 1807 SSL_CTX *ssl_ctx = _ssl_ctx; local 1877 SSL_CTX *ssl_ctx = _ssl_ctx; local 2014 tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key, const char *private_key_passwd) argument 2133 tls_global_dh(SSL_CTX *ssl_ctx, const char *dh_file) argument 2207 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 2364 tls_connection_handshake(void *ssl_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 2464 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 2526 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 2542 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 2555 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 2577 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 2585 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 2593 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument 2675 SSL_CTX *ssl_ctx = tls_ctx; local [all...] |
H A D | tls_schannel.c | 105 void tls_deinit(void *ssl_ctx) argument 107 struct tls_global *global = ssl_ctx; 116 int tls_get_errors(void *ssl_ctx) argument 122 struct tls_connection * tls_connection_init(void *ssl_ctx) argument 135 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 144 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 150 int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 152 struct tls_global *global = ssl_ctx; 173 int tls_global_set_verify(void *ssl_ctx, int check_crl) argument 179 int tls_connection_set_verify(void *ssl_ctx, struc argument 186 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 631 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 644 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 651 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 658 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 666 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 674 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 682 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument [all...] |
H A D | tls_gnutls.c | 219 void tls_deinit(void *ssl_ctx) argument 221 struct tls_global *global = ssl_ctx; 235 int tls_get_errors(void *ssl_ctx) argument 326 struct tls_connection * tls_connection_init(void *ssl_ctx) argument 328 struct tls_global *global = ssl_ctx; 362 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) argument 389 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) argument 395 int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) argument 397 struct tls_global *global = ssl_ctx; 791 int tls_global_set_verify(void *ssl_ctx, in argument 798 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer) argument 813 tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn, struct tls_keys *keys) argument 1246 tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn) argument 1262 tls_get_cipher(void *ssl_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 1271 tls_connection_enable_workaround(void *ssl_ctx, struct tls_connection *conn) argument 1279 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 1288 tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn) argument 1296 tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn) argument 1304 tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn) argument [all...] |
H A D | tls_none.c | 26 void tls_deinit(void *ssl_ctx) argument
|
H A D | tls_internal.c | 63 void tls_deinit(void *ssl_ctx) argument 65 struct tls_global *global = ssl_ctx;
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.c | 146 data->conn = tls_connection_init(sm->ssl_ctx); 153 res = tls_connection_set_params(sm->ssl_ctx, data->conn, params); 172 tls_connection_deinit(sm->ssl_ctx, data->conn); 178 tls_connection_deinit(sm->ssl_ctx, data->conn); 244 tls_connection_deinit(sm->ssl_ctx, data->conn); 275 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 284 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 450 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 456 tls_connection_established(sm->ssl_ctx, data->conn) && 457 !tls_connection_get_failed(sm->ssl_ctx, dat [all...] |
H A D | eap_tls.c | 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn);
|
H A D | eap_i.h | 325 void *ssl_ctx; member in struct:eap_sm
|
H A D | eap_fast.c | 184 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 198 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 296 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, 1379 tls_connection_client_hello_ext(sm->ssl_ctx, data->ssl.conn, 1396 if (tls_connection_client_hello_ext(sm->ssl_ctx, data->ssl.conn, 1428 if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn, 1516 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn) && 1538 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 1545 tls_get_cipher(sm->ssl_ctx, dat [all...] |
H A D | eap_ttls.c | 144 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 272 ret = tls_connection_ia_permute_inner_secret(sm->ssl_ctx, 312 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 375 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 1036 buf = tls_connection_ia_send_phase_finished(sm->ssl_ctx, 1566 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { 1633 tls_connection_ia_final_phase_finished(sm->ssl_ctx, 1718 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 1830 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn) && 1856 return tls_connection_established(sm->ssl_ctx, dat [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/threads/ |
H A D | mttest.c | 351 int ndoit(SSL_CTX *ssl_ctx[2]) argument 357 ctx[0] = (char *)ssl_ctx[0]; 358 ctx[1] = (char *)ssl_ctx[1]; 361 ctx[2] = (char *)SSL_new(ssl_ctx[0]); 362 ctx[3] = (char *)SSL_new(ssl_ctx[1]); 372 ssl_ctx[0]->references, 373 ssl_ctx[1]->references); */ 701 SSL_CTX *ssl_ctx[2]; local 707 ssl_ctx[0] = s_ctx; 708 ssl_ctx[ 825 SSL_CTX *ssl_ctx[2]; local 913 SSL_CTX *ssl_ctx[2]; local 1003 SSL_CTX *ssl_ctx[2]; local 1087 SSL_CTX *ssl_ctx[2]; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.c | 102 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, argument 109 block_size = tls_connection_get_keyblock_size(ssl_ctx, conn); 117 if (tls_connection_prf(ssl_ctx, conn, label, 1, out, block_size + len) 123 if (tls_connection_get_keys(ssl_ctx, conn, &keys))
|
H A D | eap_fast_common.h | 106 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn,
|
/freebsd-9.3-release/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 28 void *ssl_ctx; member in struct:eapol_auth_config
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | common.h | 57 SSL_CTX *ssl_ctx; /* SSL context */ member in struct:fetchconn
|
H A D | common.c | 824 conn->ssl_ctx = SSL_CTX_new(conn->ssl_meth); 825 SSL_CTX_set_mode(conn->ssl_ctx, SSL_MODE_AUTO_RETRY); 827 fetch_ssl_setup_transport_layer(conn->ssl_ctx, verbose); 828 if (!fetch_ssl_setup_peer_verification(conn->ssl_ctx, verbose)) 830 if (!fetch_ssl_setup_client_certificate(conn->ssl_ctx, verbose)) 833 conn->ssl = SSL_new(conn->ssl_ctx); 1194 if (conn->ssl_ctx) { 1195 SSL_CTX_free(conn->ssl_ctx); 1196 conn->ssl_ctx = NULL;
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | s_server.c | 1542 static void print_stats(BIO *bio, SSL_CTX *ssl_ctx) argument 1545 SSL_CTX_sess_number(ssl_ctx)); 1547 SSL_CTX_sess_connect(ssl_ctx)); 1549 SSL_CTX_sess_connect_renegotiate(ssl_ctx)); 1551 SSL_CTX_sess_connect_good(ssl_ctx)); 1553 SSL_CTX_sess_accept(ssl_ctx)); 1555 SSL_CTX_sess_accept_renegotiate(ssl_ctx)); 1557 SSL_CTX_sess_accept_good(ssl_ctx)); 1558 BIO_printf(bio, "%4ld session cache hits\n", SSL_CTX_sess_hits(ssl_ctx)); 1560 SSL_CTX_sess_misses(ssl_ctx)); [all...] |