/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/shlib/ |
H A D | irix.sh | 6 gcc -c -Issl $SHFLAGS $FLAGS -o ssl.o ssl/ssl.c 7 ld -shared -o libssl.so ssl.o
|
H A D | hpux10-cc.sh | 16 # /usr/local/ssl. HP-UX prevents used executables and shared libraries 47 make DIRS="crypto ssl" 56 # Copy the libraries to /usr/local/ssl/lib (they have to be in their 60 mkdir /usr/local/ssl 61 mkdir /usr/local/ssl/lib 64 cp -p lib*_pic.a lib*.sl.0.9.8 /usr/local/ssl/lib 65 (cd /usr/local/ssl/lib ; ln -sf libcrypto.sl.0.9.8 libcrypto.sl ; ln -sf libssl.sl.0.9.8 libssl.sl) 77 sed 's/^PEX_LIBS=.*$/PEX_LIBS=-L\/usr\/local\/ssl\/lib/' Makefile.ssl >xxx; mv xxx Makefile.ssl [all...] |
H A D | sun.sh | 7 gcc -c -Issl $SHFLAGS $FLAGS -o ssl.o ssl/ssl.c 8 ld -G -z text -o libssl.so ssl.o
|
H A D | solaris.sh | 32 $CC -c $CFLAGS -o ssl.o ssl/ssl.c 35 gcc $CFLAGS -shared -o $slib.so ssl.o -L. -lcrypto
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | bio_ssl.c | 0 /* ssl/bio_ssl.c */ 66 #include <openssl/ssl.h> 77 SSL *ssl; /* The ssl handle :-) */ member in struct:bio_ssl_st 88 BIO_TYPE_SSL,"ssl", 127 if (bs->ssl != NULL) SSL_shutdown(bs->ssl); 130 if (a->init && (bs->ssl != NULL)) 131 SSL_free(bs->ssl); 144 SSL *ssl; local 232 SSL *ssl; local 298 SSL **sslp,*ssl; local 489 SSL *ssl; local 523 BIO *ret=NULL,*buf=NULL,*ssl=NULL; local 542 BIO *ret=NULL,*con=NULL,*ssl=NULL; local 560 SSL *ssl; local [all...] |
H A D | ssl_err2.c | 0 /* ssl/ssl_err2.c */ 61 #include <openssl/ssl.h>
|
H A D | ssl.h | 0 /* ssl/ssl.h */ 336 /* As of OpenSSL 1.0.0, ssl_create_cipher_list() in ssl/ssl_ciph.c always 467 * Look in ssl/ssl_asn1.c for more details 472 int ssl_version; /* what ssl version session info is 666 #define SSL_set_options(ssl,op) \ 667 SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) 668 #define SSL_clear_options(ssl,op) \ 669 SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) 670 #define SSL_get_options(ssl) \ [all...] |
H A D | tls1.h | 0 /* ssl/tls1.h */ 304 #define SSL_set_tlsext_debug_callback(ssl, cb) \ 305 SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) 307 #define SSL_set_tlsext_debug_arg(ssl, arg) \ 308 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) 310 #define SSL_set_tlsext_status_type(ssl, type) \ 311 SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) 313 #define SSL_get_tlsext_status_exts(ssl, arg) \ 314 SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) 316 #define SSL_set_tlsext_status_exts(ssl, ar [all...] |
H A D | srtp.h | 0 /* ssl/tls1.h */ 137 STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl); variable
|
H A D | ssl_rsa.c | 0 /* ssl/ssl_rsa.c */ 69 int SSL_use_certificate(SSL *ssl, X509 *x) argument 76 if (!ssl_cert_inst(&ssl->cert)) 81 return(ssl_set_cert(ssl->cert,x)); 85 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) argument 112 x=PEM_read_bio_X509(in,NULL,ssl->ctx->default_passwd_callback,ssl->ctx->default_passwd_callback_userdata); 126 ret=SSL_use_certificate(ssl,x); 134 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) argument 146 ret=SSL_use_certificate(ssl, 152 SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) argument 229 SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) argument 276 SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len) argument 295 SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey) argument 314 SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) argument 361 SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/tunala/ |
H A D | sm.c | 7 machine->ssl = NULL; 17 if(machine->ssl) 18 SSL_free(machine->ssl); 55 return machine->ssl; 58 int state_machine_set_SSL(state_machine_t *machine, SSL *ssl, int is_server) argument 60 if(machine->ssl) 63 machine->ssl = ssl; 70 SSL_set_bio(machine->ssl, machine->bio_intossl, machine->bio_fromssl); 72 SSL_set_accept_state(machine->ssl); [all...] |
H A D | buffer.c | 151 void buffer_from_SSL(buffer_t *buf, SSL *ssl) argument 154 if(!ssl || buffer_full(buf)) 156 ret = SSL_read(ssl, buf->data + buf->used, buffer_unused(buf)); 162 int_ssl_check(ssl, ret); 165 void buffer_to_SSL(buffer_t *buf, SSL *ssl) argument 168 if(!ssl || buffer_empty(buf)) 170 ret = SSL_write(ssl, buf->data, buf->used); 176 int_ssl_check(ssl, ret);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ssl/ |
H A D | inetdsrv.cpp | 14 #include <openssl/ssl.h> 30 SSL* ssl; local 51 ssl = SSL_new (ctx); CHK_NULL(ssl); 52 SSL_set_fd (ssl, fileno(stdin)); 53 err = SSL_accept (ssl); CHK_SSL(err); 57 fprintf (log, "SSL connection using %s\n", SSL_get_cipher (ssl)); 61 client_cert = SSL_get_peer_certificate (ssl); 85 err = SSL_read (ssl, buf, sizeof(buf) - 1); CHK_SSL(err); 89 err = SSL_write (ssl, "Lou [all...] |
H A D | cli.cpp | 20 #include <openssl/ssl.h> 34 SSL* ssl; local 63 ssl = SSL_new (ctx); CHK_NULL(ssl); 64 SSL_set_fd (ssl, sd); 65 err = SSL_connect (ssl); CHK_SSL(err); 72 printf ("SSL connection using %s\n", SSL_get_cipher (ssl)); 76 server_cert = SSL_get_peer_certificate (ssl); CHK_NULL(server_cert); 97 err = SSL_write (ssl, "Hello World!", strlen("Hello World!")); CHK_SSL(err); 99 err = SSL_read (ssl, bu [all...] |
H A D | serv.cpp | 24 #include <openssl/ssl.h> 48 SSL* ssl; local 107 ssl = SSL_new (ctx); CHK_NULL(ssl); 108 SSL_set_fd (ssl, sd); 109 err = SSL_accept (ssl); CHK_SSL(err); 113 printf ("SSL connection using %s\n", SSL_get_cipher (ssl)); 117 client_cert = SSL_get_peer_certificate (ssl); 140 err = SSL_read (ssl, buf, sizeof(buf) - 1); CHK_SSL(err); 144 err = SSL_write (ssl, " [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/MacOS/GetHTTPS.src/ |
H A D | GetHTTPS.cpp | 35 #include <openssl/ssl.h> 42 #define kHTTPS_DNS "www.apache-ssl.org" 77 SSL *ssl = nil; local 121 ssl = SSL_new(ssl_ctx); 123 SSL_set_fd(ssl,theSocket); 125 errCode = SSL_connect(ssl); 139 errCode = SSL_write(ssl,tempString,CStrLength(tempString)); 143 SetErrorMessageAndLongIntAndBail("OpenSSL: Error writing data via ssl, SSL_write() = ",errCode); 155 bytesRead = SSL_read(ssl,tempString,sizeof(tempString) - 1); 164 SetErrorMessageAndLongIntAndBail("OpenSSL: Error reading data via ssl, SSL_rea [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/bio/ |
H A D | sconnect.c | 14 #include <openssl/ssl.h> 26 SSL *ssl; local 48 ssl=SSL_new(ssl_ctx); 49 SSL_set_connect_state(ssl); 53 BIO_set_ssl(ssl_bio,ssl,BIO_CLOSE);
|
H A D | saccept.c | 16 #include <openssl/ssl.h> 35 SSL *ssl; local 65 ssl=SSL_new(ctx);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/lib/libssl/ |
H A D | Makefile | 27 LIB= ssl 42 INCS= dtls1.h ssl.h ssl2.h ssl3.h ssl23.h tls1.h kssl.h srtp.h 49 # we patch `ssl.inc' as we need to be able to turn off SSLv2. 52 find ${OPENSSLSRC}/ssl -name Makefile | \ 54 patch -s ssl.inc < ssl.diff )
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_tls.c | 27 struct eap_ssl_data ssl; member in struct:eap_tls_data 68 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) { 83 eap_server_tls_ssl_deinit(sm, &data->ssl); 115 if (data->ssl.state == FRAG_ACK) { 119 if (data->ssl.state == WAIT_FRAG_ACK) { 120 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, 129 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 138 res = eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TLS, 0, id); 141 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { 172 if (data->state == SUCCESS && wpabuf_len(data->ssl [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | ciphers.c | 67 #include <openssl/ssl.h> 92 SSL *ssl=NULL; local 166 ssl=SSL_new(ctx); 167 if (ssl == NULL) goto err; 174 p=SSL_get_cipher_list(ssl,i); 183 sk=SSL_get_ciphers(ssl); 220 if (ssl != NULL) SSL_free(ssl);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/util/ |
H A D | cygwin.sh | 60 CERTS_DIR=${INSTALL_PREFIX}/usr/ssl/certs 88 export MANPATH="${MANPATH}:/usr/ssl/man" 92 setenv MANPATH "${MANPATH}:/usr/ssl/man" 94 setenv MANPATH ":/usr/ssl/man" 139 usr/ssl/certs usr/ssl/man/man[157] usr/ssl/misc usr/ssl/openssl.cnf \ 140 usr/ssl/private \ 144 find usr/include usr/lib/*.a usr/lib/pkgconfig usr/ssl/ma [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_openssl.c | 23 #include <openssl/ssl.h> 63 SSL *ssl; member in struct:tls_connection 319 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 386 if (!SSL_use_certificate(ssl, cert)) { 400 if (!SSL_use_RSAPrivateKey(ssl, rsa)) 419 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) argument 486 static int tls_cryptoapi_cert(SSL *ssl, const char *name) argument 494 static void ssl_info_cb(const SSL *ssl, int where, int ret) argument 510 str, SSL_state_string_long(ssl)); 520 SSL_get_app_data((SSL *) ssl); 681 SSL_CTX *ssl; local 765 SSL_CTX *ssl = ssl_ctx; local 899 SSL_CTX *ssl = ssl_ctx; local 1168 SSL *ssl; local 1616 tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12, const char *passwd) argument 1691 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 1721 tls_read_pkcs12_blob(SSL_CTX *ssl_ctx, SSL *ssl, const u8 *blob, size_t len, const char *passwd) argument 2210 SSL *ssl; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/os2/ |
H A D | OS2-EMX.cmd | 12 perl util\mkdef.pl ssl OS2 > os2\ssl.def 75 perl backwardify.pl ssl.def >backward_ssl.def 77 perl backwardify.pl -noname ssl.def >noname\backward_ssl.def 82 echo ssl.dll 83 gcc -Zomf -Zdll -Zcrtdll -o ssl.dll backward_ssl.def 2>&1 | grep -v L4085 89 echo noname\ssl.dll 90 gcc -Zomf -Zdll -Zcrtdll -o noname/ssl.dll noname/backward_ssl.def 2>&1 | grep -v L4085 102 echo then rename crypto.dll to cryptssl.dll, ssl.dll to open_ssl.dll
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_tls.c | 28 struct eap_ssl_data ssl; member in struct:eap_tls_data 49 if (eap_peer_tls_ssl_init(sm, &data->ssl, config)) { 76 eap_peer_tls_ssl_deinit(sm, &data->ssl); 127 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 154 pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_TLS, ret, 167 res = eap_peer_tls_process_helper(sm, &data->ssl, EAP_TYPE_TLS, 0, id, 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn); 203 if (eap_peer_tls_reauth_init(sm, &data->ssl)) { 215 return eap_peer_tls_status(sm, &data->ssl, bu [all...] |