Searched refs:SSL (Results 1 - 25 of 206) sorted by relevance

123456789

/macosx-10.10.1/CPAN-56/Modules/IO-Socket-SSL-1.77/
H A DMakefile1 NAME = IO-Socket-SSL
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/example/
H A Dlwp-with-verifycn.pl4 ## !!! make sure that Net::SSL never gets loaded, otherwise it will
5 ## be used instead of IO::Socket::SSL from LWP
7 use IO::Socket::SSL 'debug0';
10 IO::Socket::SSL::set_ctx_defaults(
H A Dssl_client.pl2 # a test client for testing IO::Socket::SSL-class's behavior
10 use IO::Socket::SSL;
14 if($ARGV[0] eq "DEBUG") { $IO::Socket::SSL::DEBUG = 1; }
22 die "Please run this example from the IO::Socket::SSL distribution directory!\n";
26 if(!($sock = IO::Socket::SSL->new( PeerAddr => 'localhost',
33 warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n";
36 warn "connect ($sock).\n" if ($IO::Socket::SSL::DEBUG);
41 if( ref($sock) eq "IO::Socket::SSL") {
H A Dssl_server.pl2 # a test server for testing IO::Socket::SSL-class's behavior
9 use IO::Socket::SSL;
14 if($ARGV[0] eq "DEBUG") { $IO::Socket::SSL::DEBUG = 1; }
22 die "Please run this example from the IO::Socket::SSL distribution directory!\n";
26 if(!($sock = IO::Socket::SSL->new( Listen => 5,
34 warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n";
52 if( ref($sock) eq "IO::Socket::SSL") {
/macosx-10.10.1/OpenSSL098-52/src/ssl/
H A Dssl_locl.h5 * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
433 RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize);
437 DH *(*dh_tmp_cb)(SSL *ssl,int is_export,int keysize);
442 EC_KEY *(*ecdh_tmp_cb)(SSL *ssl,int is_export,int keysize);
464 RSA *peer_rsa_tmp; /* not used for SSL 2 */
467 DH *peer_dh_tmp; /* not used for SSL 2 */
499 int (*enc)(SSL *, in
[all...]
H A Dssl.h5 * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
369 int (*ssl_new)(SSL *s);
370 void (*ssl_clear)(SSL *s);
371 void (*ssl_free)(SSL *s);
372 int (*ssl_accept)(SSL *s);
373 int (*ssl_connect)(SSL *s);
374 int (*ssl_read)(SSL *
[all...]
/macosx-10.10.1/CPAN-56/Modules/IO-Socket-SSL-1.966/
H A DMakefile1 NAME = IO-Socket-SSL
/macosx-10.10.1/ruby-106/ruby/test/openssl/
H A Dtest_ssl.rb7 TLS_DEFAULT_OPS = defined?(OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS) ?
8 OpenSSL::SSL::OP_ALL & ~OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS :
9 OpenSSL::SSL::OP_ALL
12 ctx = OpenSSL::SSL::SSLContext.new
18 ctx = OpenSSL::SSL::SSLContext.new
19 ctx.options = OpenSSL::SSL::OP_ALL | OpenSSL::SSL::OP_NO_COMPRESSION
22 assert_equal(OpenSSL::SSL::OP_NO_COMPRESSION,
23 ctx.options & OpenSSL::SSL
[all...]
H A Dtest_ssl_session.rb7 session = OpenSSL::SSL::Session.new <<-SESSION
8 -----BEGIN SSL SESSION PARAMETERS-----
26 -----END SSL SESSION PARAMETERS-----
29 start_server(PORT, OpenSSL::SSL::VERIFY_NONE, true) { |_, port|
30 ctx = OpenSSL::SSL::SSLContext.new
31 ctx.session_cache_mode = OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT
35 ssl = OpenSSL::SSL::SSLSocket.new sock, ctx
44 start_server(PORT, OpenSSL::SSL::VERIFY_NONE, true) do |server, port|
46 ctx = OpenSSL::SSL::SSLContext.new("TLSv1")
47 ssl = OpenSSL::SSL
[all...]
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/t/
H A Dio-socket-inet6.t7 use IO::Socket::SSL;
18 if( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::IP" ) {
23 # check if we have loaded INET6, IO::Socket::SSL should do it by itself
25 unless( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::INET6" ) {
26 # not available or IO::Socket::SSL forgot to load it
50 my $server = IO::Socket::SSL->new(
73 my $to_server = IO::Socket::SSL->new( $addr ) || do {
74 notok( "connect failed: ".IO::Socket::SSL->errstr() );
H A Dcompatibility.t5 use IO::Socket::SSL;
22 IO::Socket::SSL::context_init(SSL_verify_mode => 0x01, SSL_version => 'TLSv1' );
47 use IO::Socket::SSL;
48 @ISA = "IO::Socket::SSL";
66 IO::Socket::SSL::socketToSSL($contact,
75 print "not " if IO::Socket::SSL::socket_to_SSL($contact, SSL_server => 1);
82 print "Bail Out! $IO::Socket::SSL::ERROR";
H A Dio-socket-ip.t7 use IO::Socket::SSL;
16 # check if we have loaded IO::Socket::IP, IO::Socket::SSL should do it by
18 unless( IO::Socket::SSL->CAN_IPV6 eq "IO::Socket::IP" ) {
19 # not available or IO::Socket::SSL forgot to load it
43 my $server = IO::Socket::SSL->new(
66 my $to_server = IO::Socket::SSL->new( $addr ) || do {
67 notok( "connect failed: ".IO::Socket::SSL->errstr() );
H A Ddhe.t13 use IO::Socket::SSL;
28 my $server = IO::Socket::SSL->new(
56 my $to_server = IO::Socket::SSL->new( $addr ) || do {
H A Dsessions.t7 use IO::Socket::SSL;
45 my @servers = (IO::Socket::SSL->new( %server_options),
46 IO::Socket::SSL->new( %server_options),
47 IO::Socket::SSL->new( %server_options));
62 my $ctx = IO::Socket::SSL::SSL_Context->new(
118 IO::Socket::SSL::set_default_context($ctx);
125 IO::Socket::SSL->new("$SSL_SERVER_ADDR:$SSL_SERVER_PORT"),
126 IO::Socket::SSL->new("$SSL_SERVER_ADDR:$SSL_SERVER_PORT2"),
127 IO::Socket::SSL->start_SSL( $sock3 ),
168 IO::Socket::SSL
[all...]
H A Dnpn.t7 use IO::Socket::SSL;
29 my $server = IO::Socket::SSL->new(
51 my $to_server = IO::Socket::SSL->new(
55 ok(0, "connect failed: ".IO::Socket::SSL->errstr() );
H A Dsignal-readline.t6 use IO::Socket::SSL;
23 my $server = IO::Socket::SSL->new(
43 my $client = IO::Socket::SSL->new( "$SSL_SERVER_ADDR:$SSL_SERVER_PORT" )
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/urlPageGrab/
H A DgrabPages4 # also to work with URLSimpleDownload with SSL. Arguments to this
8 set SSL = NO
13 set SSL = YES
20 # sites which fail when SSL is NOT specified
30 if ($SSL == "YES") then
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/
H A Dssl.h5 * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
369 int (*ssl_new)(SSL *s);
370 void (*ssl_clear)(SSL *s);
371 void (*ssl_free)(SSL *s);
372 int (*ssl_accept)(SSL *s);
373 int (*ssl_connect)(SSL *s);
374 int (*ssl_read)(SSL *
[all...]
/macosx-10.10.1/apache-793/httpd/modules/ssl/
H A Dssl_util_ssl.h38 * SSL library version number
61 void *SSL_get_app_data2(SSL *);
62 void SSL_set_app_data2(SSL *, void *);
64 int SSL_smart_shutdown(SSL *ssl);
/macosx-10.10.1/OpenSSL098-52/src/apps/
H A Ds_apps.h5 * This package is an SSL implementation written
7 * The implementation was written so as to conform with Netscapes SSL.
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
168 void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
169 void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
170 void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
175 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len);
176 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
/macosx-10.10.1/ruby-106/ruby/sample/openssl/
H A Decho_cli.rb15 ctx = OpenSSL::SSL::SSLContext.new()
21 ctx.verify_mode = OpenSSL::SSL::VERIFY_PEER
28 ssl = OpenSSL::SSL::SSLSocket.new(s, ctx)
29 ssl.connect # start SSL session
H A Decho_svr.rb43 ctx = OpenSSL::SSL::SSLContext.new()
48 OpenSSL::SSL::VERIFY_PEER|OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
55 ssls = OpenSSL::SSL::SSLServer.new(tcps, ctx)
/macosx-10.10.1/ruby-106/ruby/sample/drb/
H A Ddrbssl_c.rb9 config[:SSLVerifyMode] = OpenSSL::SSL::VERIFY_PEER
/macosx-10.10.1/ruby-106/ruby/test/rubygems/
H A Dtest_bundled_ca.rb33 http.verify_mode = OpenSSL::SSL::VERIFY_PEER
38 rescue OpenSSL::SSL::SSLError => e
/macosx-10.10.1/ruby-106/ruby/ext/openssl/lib/openssl/
H A Dssl.rb2 = $RCSfile$ -- Ruby-space definitions that completes C-space funcs for SSL
21 module SSL module in class:OpenSSL
25 :verify_mode => OpenSSL::SSL::VERIFY_PEER,
27 :options => defined?(OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS) ?
28 OpenSSL::SSL::OP_ALL & ~OpenSSL::SSL::OP_DONT_INSERT_EMPTY_FRAGMENTS :
29 OpenSSL::SSL::OP_ALL,
39 # Sets the parameters for this SSL context to the values in +params+.
49 if self.verify_mode != OpenSSL::SSL::VERIFY_NONE
138 unless OpenSSL::SSL
[all...]

Completed in 300 milliseconds

123456789