Searched refs:TLScontext (Results 1 - 10 of 10) sorted by relevance

/netbsd-current/external/ibm-public/postfix/dist/src/tls/
H A Dtls_client.c17 /* TLS_SESS_STATE *tls_client_post_connect(TLScontext, start_props)
18 /* TLS_SESS_STATE *TLScontext;
21 /* void tls_client_stop(app_ctx, stream, failure, TLScontext)
25 /* TLS_SESS_STATE *TLScontext;
74 /* state is available via the TLScontext structure:
75 /* .IP TLScontext->protocol
77 /* .IP TLScontext->cipher_name
79 /* .IP TLScontext->cipher_usebits
81 /* .IP TLScontext->cipher_algbits
89 /* .IP TLScontext
197 load_clnt_session(TLS_SESS_STATE *TLScontext) argument
248 TLS_SESS_STATE *TLScontext; local
293 uncache_session(SSL_CTX *ctx, TLS_SESS_STATE *TLScontext) argument
310 verify_extract_name(TLS_SESS_STATE *TLScontext, X509 *peercert, const TLS_CLIENT_START_PROPS *props) argument
379 add_namechecks(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument
491 tls_auth_enable(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument
891 TLS_SESS_STATE *TLScontext; local
1175 tls_client_post_connect(TLS_SESS_STATE *TLScontext, const TLS_CLIENT_START_PROPS *props) argument
[all...]
H A Dtls_verify.c16 /* int tls_log_verify_error(TLScontext)
17 /* TLS_SESS_STATE *TLScontext;
19 /* char *tls_peer_CN(peercert, TLScontext)
21 /* TLS_SESS_STATE *TLScontext;
23 /* char *tls_issuer_CN(peercert, TLScontext)
25 /* TLS_SESS_STATE *TLScontext;
58 /* SSL application context. This links to the Postfix TLScontext
65 /* .IP TLScontext
117 static void update_error_state(TLS_SESS_STATE *TLScontext, int depth, argument
121 if (TLScontext
148 TLS_SESS_STATE *TLScontext; local
191 tls_log_verify_error(TLS_SESS_STATE *TLScontext) argument
269 tls_text_name(X509_NAME *name, int nid, const char *label, const TLS_SESS_STATE *TLScontext, int gripe) argument
394 tls_peer_CN(X509 *peercert, const TLS_SESS_STATE *TLScontext) argument
409 tls_issuer_CN(X509 *peer, const TLS_SESS_STATE *TLScontext) argument
[all...]
H A Dtls_server.c17 /* TLS_SESS_STATE *tls_server_post_accept(TLScontext)
18 /* TLS_SESS_STATE *TLScontext;
20 /* void tls_server_stop(app_ctx, stream, failure, TLScontext)
24 /* TLS_SESS_STATE *TLScontext;
50 /* state is available via the TLScontext structure:
51 /* .IP TLScontext->protocol
53 /* .IP TLScontext->cipher_name
55 /* .IP TLScontext->cipher_usebits
57 /* .IP TLScontext->cipher_algbits
65 /* .IP TLScontext
190 TLS_SESS_STATE *TLScontext; local
236 uncache_session(SSL_CTX *ctx, TLS_SESS_STATE *TLScontext) argument
265 TLS_SESS_STATE *TLScontext; local
316 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(con, TLScontext_index); local
357 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(con, TLScontext_index); local
819 TLS_SESS_STATE *TLScontext; local
947 tls_server_post_accept(TLS_SESS_STATE *TLScontext) argument
[all...]
H A Dtls_stream.c101 TLS_SESS_STATE *TLScontext; local
103 TLScontext = (TLS_SESS_STATE *) context;
104 if (!TLScontext)
107 ret = tls_bio_read(fd, buf, len, timeout, TLScontext);
108 if (ret > 0 && (TLScontext->log_mask & TLS_LOG_ALLPKTS))
121 TLS_SESS_STATE *TLScontext; local
123 TLScontext = (TLS_SESS_STATE *) context;
124 if (!TLScontext)
127 if (TLScontext->log_mask & TLS_LOG_ALLPKTS)
130 ret = tls_bio_write(fd, buf, len, timeout, TLScontext);
[all...]
H A Dtls_session.c11 /* void tls_session_stop(ctx, stream, timeout, failure, TLScontext)
16 /* TLS_SESS_STATE *TLScontext;
92 int failure, TLS_SESS_STATE *TLScontext)
100 if (TLScontext == 0)
123 if (!failure && !SSL_in_init(TLScontext->con)) {
124 retval = tls_bio_shutdown(vstream_fileno(stream), timeout, TLScontext);
126 tls_bio_shutdown(vstream_fileno(stream), timeout, TLScontext); local
128 tls_free_context(TLScontext);
91 tls_session_stop(TLS_APPL_STATE *unused_ctx, VSTREAM *stream, int timeout, int failure, TLS_SESS_STATE *TLScontext) argument
H A Dtls_misc.c14 /* void tls_log_summary(role, usage, TLScontext)
17 /* TLS_SESS_STATE *TLScontext;
66 /* void tls_free_context(TLScontext)
67 /* TLS_SESS_STATE *TLScontext;
88 /* const char *tls_set_ciphers(TLScontext, grade, exclusions)
89 /* TLS_SESS_STATE *TLScontext;
93 /* void tls_get_signature_params(TLScontext)
94 /* TLS_SESS_STATE *TLScontext;
151 /* tls_free_context() destroys a TLScontext structure
194 /* tls_get_signature_params() updates the "TLScontext" wit
845 TLS_SESS_STATE *TLScontext = SSL_get_ex_data(ssl, TLScontext_index); local
917 tls_set_ciphers(TLS_SESS_STATE *TLScontext, const char *grade, const char *exclusions) argument
1019 tls_get_signature_params(TLS_SESS_STATE *TLScontext) argument
1268 TLS_SESS_STATE *TLScontext; local
1312 tls_free_context(TLS_SESS_STATE *TLScontext) argument
[all...]
H A Dtls_bio_ops.c76 /* .IP TLScontext
154 int tls_bio(int fd, int timeout, TLS_SESS_STATE *TLScontext, argument
187 vstream_fstat(TLScontext->stream, VSTREAM_FLAG_DEADLINE);
207 status = hsfunc(TLScontext->con);
209 status = rfunc(TLScontext->con, buf, num);
211 status = wfunc(TLScontext->con, buf, num);
214 err = SSL_get_error(TLScontext->con, status);
H A Dtls_fprint.c15 /* char *tls_serverid_digest(TLScontext, props, ciphers)
16 /* TLS_SESS_STATE *TLScontext;
243 char *tls_serverid_digest(TLS_SESS_STATE *TLScontext, argument
285 CHECK_OK_AND_DIGEST_OBJECT(mdctx, &TLScontext->must_fail);
291 if (TLScontext->level > TLS_LEV_ENCRYPT
304 if (TLScontext->level > TLS_LEV_ENCRYPT && TLScontext->peer_sni)
305 CHECK_OK_AND_DIGEST_CHARS(mdctx, TLScontext->peer_sni);
H A Dtls_dane.c55 /* void tls_dane_enable(TLScontext)
56 /* TLS_SESS_STATE *TLScontext;
58 /* void tls_dane_log(TLScontext)
59 /* TLS_SESS_STATE *TLScontext;
796 int tls_dane_enable(TLS_SESS_STATE *TLScontext) argument
798 const TLS_DANE *dane = TLScontext->dane;
800 SSL *ssl = TLScontext->con;
812 tlsa_carp(TLScontext->namaddr, ":", "", "unusable TLSA RR",
818 tlsa_carp(TLScontext->namaddr, ":", "", "error loading trust settings",
965 void tls_dane_log(TLS_SESS_STATE *TLScontext) argument
[all...]
H A Dtls.h497 #define tls_client_stop(ctx, stream, timeout, failure, TLScontext) \
498 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext))
563 #define tls_server_stop(ctx, stream, timeout, failure, TLScontext) \
564 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext))

Completed in 289 milliseconds