/macosx-10.10.1/CPAN-56/Modules/IO-Socket-SSL-1.77/ |
H A D | Makefile | 1 NAME = IO-Socket-SSL
|
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/example/ |
H A D | lwp-with-verifycn.pl | 4 ## !!! make sure that Net::SSL never gets loaded, otherwise it will 5 ## be used instead of IO::Socket::SSL from LWP 7 use IO::Socket::SSL 'debug0'; 10 IO::Socket::SSL::set_ctx_defaults(
|
H A D | ssl_client.pl | 2 # a test client for testing IO::Socket::SSL-class's behavior 10 use IO::Socket::SSL; 14 if($ARGV[0] eq "DEBUG") { $IO::Socket::SSL::DEBUG = 1; } 22 die "Please run this example from the IO::Socket::SSL distribution directory!\n"; 26 if(!($sock = IO::Socket::SSL->new( PeerAddr => 'localhost', 33 warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n"; 36 warn "connect ($sock).\n" if ($IO::Socket::SSL::DEBUG); 41 if( ref($sock) eq "IO::Socket::SSL") {
|
H A D | ssl_server.pl | 2 # a test server for testing IO::Socket::SSL-class's behavior 9 use IO::Socket::SSL; 14 if($ARGV[0] eq "DEBUG") { $IO::Socket::SSL::DEBUG = 1; } 22 die "Please run this example from the IO::Socket::SSL distribution directory!\n"; 26 if(!($sock = IO::Socket::SSL->new( Listen => 5, 34 warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n"; 52 if( ref($sock) eq "IO::Socket::SSL") {
|
/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | ssl_locl.h | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 433 RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize); 437 DH *(*dh_tmp_cb)(SSL *ssl,int is_export,int keysize); 442 EC_KEY *(*ecdh_tmp_cb)(SSL *ssl,int is_export,int keysize); 464 RSA *peer_rsa_tmp; /* not used for SSL 2 */ 467 DH *peer_dh_tmp; /* not used for SSL 2 */ 499 int (*enc)(SSL *, in [all...] |
H A D | ssl.h | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 369 int (*ssl_new)(SSL *s); 370 void (*ssl_clear)(SSL *s); 371 void (*ssl_free)(SSL *s); 372 int (*ssl_accept)(SSL *s); 373 int (*ssl_connect)(SSL *s); 374 int (*ssl_read)(SSL * [all...] |
/macosx-10.10.1/CPAN-56/Modules/IO-Socket-SSL-1.966/ |
H A D | Makefile | 1 NAME = IO-Socket-SSL
|
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_ssl.rb | 7 TLS_DEFAULT_OPS = defined?(OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS) ? 8 OpenSSL::SSL::OP_ALL & ~OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS : 9 OpenSSL::SSL::OP_ALL 12 ctx = OpenSSL::SSL::SSLContext.new 18 ctx = OpenSSL::SSL::SSLContext.new 19 ctx.options = OpenSSL::SSL::OP_ALL | OpenSSL::SSL::OP_NO_COMPRESSION 22 assert_equal(OpenSSL::SSL::OP_NO_COMPRESSION, 23 ctx.options & OpenSSL::SSL [all...] |
H A D | test_ssl_session.rb | 7 session = OpenSSL::SSL::Session.new <<-SESSION 8 -----BEGIN SSL SESSION PARAMETERS----- 26 -----END SSL SESSION PARAMETERS----- 29 start_server(PORT, OpenSSL::SSL::VERIFY_NONE, true) { |_, port| 30 ctx = OpenSSL::SSL::SSLContext.new 31 ctx.session_cache_mode = OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT 35 ssl = OpenSSL::SSL::SSLSocket.new sock, ctx 44 start_server(PORT, OpenSSL::SSL::VERIFY_NONE, true) do |server, port| 46 ctx = OpenSSL::SSL::SSLContext.new("TLSv1") 47 ssl = OpenSSL::SSL [all...] |
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/t/ |
H A D | io-socket-inet6.t | 7 use IO::Socket::SSL; 18 if( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::IP" ) { 23 # check if we have loaded INET6, IO::Socket::SSL should do it by itself 25 unless( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::INET6" ) { 26 # not available or IO::Socket::SSL forgot to load it 50 my $server = IO::Socket::SSL->new( 73 my $to_server = IO::Socket::SSL->new( $addr ) || do { 74 notok( "connect failed: ".IO::Socket::SSL->errstr() );
|
H A D | compatibility.t | 5 use IO::Socket::SSL; 22 IO::Socket::SSL::context_init(SSL_verify_mode => 0x01, SSL_version => 'TLSv1' ); 47 use IO::Socket::SSL; 48 @ISA = "IO::Socket::SSL"; 66 IO::Socket::SSL::socketToSSL($contact, 75 print "not " if IO::Socket::SSL::socket_to_SSL($contact, SSL_server => 1); 82 print "Bail Out! $IO::Socket::SSL::ERROR";
|
H A D | io-socket-ip.t | 7 use IO::Socket::SSL; 16 # check if we have loaded IO::Socket::IP, IO::Socket::SSL should do it by 18 unless( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::IP" ) { 19 # not available or IO::Socket::SSL forgot to load it 43 my $server = IO::Socket::SSL->new( 66 my $to_server = IO::Socket::SSL->new( $addr ) || do { 67 notok( "connect failed: ".IO::Socket::SSL->errstr() );
|
H A D | dhe.t | 13 use IO::Socket::SSL; 28 my $server = IO::Socket::SSL->new( 56 my $to_server = IO::Socket::SSL->new( $addr ) || do {
|
H A D | sessions.t | 7 use IO::Socket::SSL; 45 my @servers = (IO::Socket::SSL->new( %server_options), 46 IO::Socket::SSL->new( %server_options), 47 IO::Socket::SSL->new( %server_options)); 62 my $ctx = IO::Socket::SSL::SSL_Context->new( 118 IO::Socket::SSL::set_default_context($ctx); 125 IO::Socket::SSL->new("$SSL_SERVER_ADDR:$SSL_SERVER_PORT"), 126 IO::Socket::SSL->new("$SSL_SERVER_ADDR:$SSL_SERVER_PORT2"), 127 IO::Socket::SSL->start_SSL( $sock3 ), 168 IO::Socket::SSL [all...] |
H A D | npn.t | 7 use IO::Socket::SSL; 29 my $server = IO::Socket::SSL->new( 51 my $to_server = IO::Socket::SSL->new( 55 ok(0, "connect failed: ".IO::Socket::SSL->errstr() );
|
H A D | signal-readline.t | 6 use IO::Socket::SSL; 23 my $server = IO::Socket::SSL->new( 43 my $client = IO::Socket::SSL->new( "$SSL_SERVER_ADDR:$SSL_SERVER_PORT" )
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/urlPageGrab/ |
H A D | grabPages | 4 # also to work with URLSimpleDownload with SSL. Arguments to this 8 set SSL = NO 13 set SSL = YES 20 # sites which fail when SSL is NOT specified 30 if ($SSL == "YES") then
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | ssl.h | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 369 int (*ssl_new)(SSL *s); 370 void (*ssl_clear)(SSL *s); 371 void (*ssl_free)(SSL *s); 372 int (*ssl_accept)(SSL *s); 373 int (*ssl_connect)(SSL *s); 374 int (*ssl_read)(SSL * [all...] |
/macosx-10.10.1/apache-793/httpd/modules/ssl/ |
H A D | ssl_util_ssl.h | 38 * SSL library version number 61 void *SSL_get_app_data2(SSL *); 62 void SSL_set_app_data2(SSL *, void *); 64 int SSL_smart_shutdown(SSL *ssl);
|
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | s_apps.h | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 168 void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret); 169 void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg); 170 void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type, 175 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len); 176 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
|
/macosx-10.10.1/ruby-106/ruby/sample/openssl/ |
H A D | echo_cli.rb | 15 ctx = OpenSSL::SSL::SSLContext.new() 21 ctx.verify_mode = OpenSSL::SSL::VERIFY_PEER 28 ssl = OpenSSL::SSL::SSLSocket.new(s, ctx) 29 ssl.connect # start SSL session
|
H A D | echo_svr.rb | 43 ctx = OpenSSL::SSL::SSLContext.new() 48 OpenSSL::SSL::VERIFY_PEER|OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT 55 ssls = OpenSSL::SSL::SSLServer.new(tcps, ctx)
|
/macosx-10.10.1/ruby-106/ruby/sample/drb/ |
H A D | drbssl_c.rb | 9 config[:SSLVerifyMode] = OpenSSL::SSL::VERIFY_PEER
|
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_bundled_ca.rb | 33 http.verify_mode = OpenSSL::SSL::VERIFY_PEER 38 rescue OpenSSL::SSL::SSLError => e
|
/macosx-10.10.1/ruby-106/ruby/ext/openssl/lib/openssl/ |
H A D | ssl.rb | 2 = $RCSfile$ -- Ruby-space definitions that completes C-space funcs for SSL 21 module SSL module in class:OpenSSL 25 :verify_mode => OpenSSL::SSL::VERIFY_PEER, 27 :options => defined?(OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS) ? 28 OpenSSL::SSL::OP_ALL & ~OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS : 29 OpenSSL::SSL::OP_ALL, 39 # Sets the parameters for this SSL context to the values in +params+. 49 if self.verify_mode != OpenSSL::SSL::VERIFY_NONE 138 unless OpenSSL::SSL [all...] |