/netbsd-current/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_client.c | 17 /* TLS_SESS_STATE *tls_client_post_connect(TLScontext, start_props) 18 /* TLS_SESS_STATE *TLScontext; 21 /* void tls_client_stop(app_ctx, stream, failure, TLScontext) 25 /* TLS_SESS_STATE *TLScontext; 74 /* state is available via the TLScontext structure: 75 /* .IP TLScontext->protocol 77 /* .IP TLScontext->cipher_name 79 /* .IP TLScontext->cipher_usebits 81 /* .IP TLScontext->cipher_algbits 89 /* .IP TLScontext 197 load_clnt_session(TLS_SESS_STATE *TLScontext) argument 248 TLS_SESS_STATE *TLScontext; local 293 uncache_session(SSL_CTX *ctx, TLS_SESS_STATE *TLScontext) argument 310 verify_extract_name(TLS_SESS_STATE *TLScontext, X509 *peercert, const TLS_CLIENT_START_PROPS *props) argument 379 add_namechecks(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument 491 tls_auth_enable(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument 891 TLS_SESS_STATE *TLScontext; local 1175 tls_client_post_connect(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument [all...] |
H A D | tls_verify.c | 16 /* int tls_log_verify_error(TLScontext) 17 /* TLS_SESS_STATE *TLScontext; 19 /* char *tls_peer_CN(peercert, TLScontext) 21 /* TLS_SESS_STATE *TLScontext; 23 /* char *tls_issuer_CN(peercert, TLScontext) 25 /* TLS_SESS_STATE *TLScontext; 58 /* SSL application context. This links to the Postfix TLScontext 65 /* .IP TLScontext 117 static void update_error_state(TLS_SESS_STATE *TLScontext, int depth, argument 121 if (TLScontext 148 TLS_SESS_STATE *TLScontext; local 191 tls_log_verify_error(TLS_SESS_STATE *TLScontext) argument 269 tls_text_name(X509_NAME *name, int nid, const char *label, const TLS_SESS_STATE *TLScontext, int gripe) argument 394 tls_peer_CN(X509 *peercert, const TLS_SESS_STATE *TLScontext) argument 409 tls_issuer_CN(X509 *peer, const TLS_SESS_STATE *TLScontext) argument [all...] |
H A D | tls_server.c | 17 /* TLS_SESS_STATE *tls_server_post_accept(TLScontext) 18 /* TLS_SESS_STATE *TLScontext; 20 /* void tls_server_stop(app_ctx, stream, failure, TLScontext) 24 /* TLS_SESS_STATE *TLScontext; 50 /* state is available via the TLScontext structure: 51 /* .IP TLScontext->protocol 53 /* .IP TLScontext->cipher_name 55 /* .IP TLScontext->cipher_usebits 57 /* .IP TLScontext->cipher_algbits 65 /* .IP TLScontext 190 TLS_SESS_STATE *TLScontext; local 236 uncache_session(SSL_CTX *ctx, TLS_SESS_STATE *TLScontext) argument 265 TLS_SESS_STATE *TLScontext; local 316 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(con, TLScontext_index); local 357 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(con, TLScontext_index); local 819 TLS_SESS_STATE *TLScontext; local 947 tls_server_post_accept(TLS_SESS_STATE *TLScontext) argument [all...] |
H A D | tls_stream.c | 101 TLS_SESS_STATE *TLScontext; local 103 TLScontext = (TLS_SESS_STATE *) context; 104 if (!TLScontext) 107 ret = tls_bio_read(fd, buf, len, timeout, TLScontext); 108 if (ret > 0 && (TLScontext->log_mask & TLS_LOG_ALLPKTS)) 121 TLS_SESS_STATE *TLScontext; local 123 TLScontext = (TLS_SESS_STATE *) context; 124 if (!TLScontext) 127 if (TLScontext->log_mask & TLS_LOG_ALLPKTS) 130 ret = tls_bio_write(fd, buf, len, timeout, TLScontext); [all...] |
H A D | tls_session.c | 11 /* void tls_session_stop(ctx, stream, timeout, failure, TLScontext) 16 /* TLS_SESS_STATE *TLScontext; 92 int failure, TLS_SESS_STATE *TLScontext) 100 if (TLScontext == 0) 123 if (!failure && !SSL_in_init(TLScontext->con)) { 124 retval = tls_bio_shutdown(vstream_fileno(stream), timeout, TLScontext); 126 tls_bio_shutdown(vstream_fileno(stream), timeout, TLScontext); local 128 tls_free_context(TLScontext); 91 tls_session_stop(TLS_APPL_STATE *unused_ctx, VSTREAM *stream, int timeout, int failure, TLS_SESS_STATE *TLScontext) argument
|
H A D | tls_misc.c | 14 /* void tls_log_summary(role, usage, TLScontext) 17 /* TLS_SESS_STATE *TLScontext; 66 /* void tls_free_context(TLScontext) 67 /* TLS_SESS_STATE *TLScontext; 88 /* const char *tls_set_ciphers(TLScontext, grade, exclusions) 89 /* TLS_SESS_STATE *TLScontext; 93 /* void tls_get_signature_params(TLScontext) 94 /* TLS_SESS_STATE *TLScontext; 151 /* tls_free_context() destroys a TLScontext structure 194 /* tls_get_signature_params() updates the "TLScontext" wit 845 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(ssl, TLScontext_index); local 917 tls_set_ciphers(TLS_SESS_STATE *TLScontext, const char *grade, const char *exclusions) argument 1019 tls_get_signature_params(TLS_SESS_STATE *TLScontext) argument 1268 TLS_SESS_STATE *TLScontext; local 1312 tls_free_context(TLS_SESS_STATE *TLScontext) argument [all...] |
H A D | tls_bio_ops.c | 76 /* .IP TLScontext 154 int tls_bio(int fd, int timeout, TLS_SESS_STATE *TLScontext, argument 187 vstream_fstat(TLScontext->stream, VSTREAM_FLAG_DEADLINE); 207 status = hsfunc(TLScontext->con); 209 status = rfunc(TLScontext->con, buf, num); 211 status = wfunc(TLScontext->con, buf, num); 214 err = SSL_get_error(TLScontext->con, status);
|
H A D | tls_fprint.c | 15 /* char *tls_serverid_digest(TLScontext, props, ciphers) 16 /* TLS_SESS_STATE *TLScontext; 243 char *tls_serverid_digest(TLS_SESS_STATE *TLScontext, argument 285 CHECK_OK_AND_DIGEST_OBJECT(mdctx, &TLScontext->must_fail); 291 if (TLScontext->level > TLS_LEV_ENCRYPT 304 if (TLScontext->level > TLS_LEV_ENCRYPT && TLScontext->peer_sni) 305 CHECK_OK_AND_DIGEST_CHARS(mdctx, TLScontext->peer_sni);
|
H A D | tls_dane.c | 55 /* void tls_dane_enable(TLScontext) 56 /* TLS_SESS_STATE *TLScontext; 58 /* void tls_dane_log(TLScontext) 59 /* TLS_SESS_STATE *TLScontext; 796 int tls_dane_enable(TLS_SESS_STATE *TLScontext) argument 798 const TLS_DANE *dane = TLScontext->dane; 800 SSL *ssl = TLScontext->con; 812 tlsa_carp(TLScontext->namaddr, ":", "", "unusable TLSA RR", 818 tlsa_carp(TLScontext->namaddr, ":", "", "error loading trust settings", 965 void tls_dane_log(TLS_SESS_STATE *TLScontext) argument [all...] |
H A D | tls.h | 497 #define tls_client_stop(ctx, stream, timeout, failure, TLScontext) \ 498 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext)) 563 #define tls_server_stop(ctx, stream, timeout, failure, TLScontext) \ 564 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext))
|