/third_party/openssl/ssl/statem/ |
D | statem_local.h | 54 typedef int (*confunc_f) (SSL *s, WPACKET *pkt); 56 int ssl3_take_mac(SSL *s); 57 int check_in_list(SSL *s, uint16_t group_id, const uint16_t *groups, 59 int create_synthetic_message_hash(SSL *s, const unsigned char *hashval, 62 int parse_ca_names(SSL *s, PACKET *pkt); 63 const STACK_OF(X509_NAME) *get_ca_names(SSL *s); 64 int construct_ca_names(SSL *s, const STACK_OF(X509_NAME) *ca_sk, WPACKET *pkt); 65 size_t construct_key_exchange_tbs(SSL *s, unsigned char **ptbs, 71 int ossl_statem_client_read_transition(SSL *s, int mt); 72 WRITE_TRAN ossl_statem_client_write_transition(SSL *s); [all …]
|
D | statem.h | 131 __owur int ossl_statem_accept(SSL *s); 132 __owur int ossl_statem_connect(SSL *s); 133 void ossl_statem_clear(SSL *s); 134 void ossl_statem_set_renegotiate(SSL *s); 135 void ossl_statem_fatal(SSL *s, int al, int func, int reason, const char *file, 145 int ossl_statem_in_error(const SSL *s); 146 void ossl_statem_set_in_init(SSL *s, int init); 147 int ossl_statem_get_in_handshake(SSL *s); 148 void ossl_statem_set_in_handshake(SSL *s, int inhand); 149 __owur int ossl_statem_skip_early_data(SSL *s); [all …]
|
D | statem.c | 60 static int state_machine(SSL *s, int server); 61 static void init_read_state_machine(SSL *s); 62 static SUB_STATE_RETURN read_state_machine(SSL *s); 63 static void init_write_state_machine(SSL *s); 64 static SUB_STATE_RETURN write_state_machine(SSL *s); 66 OSSL_HANDSHAKE_STATE SSL_get_state(const SSL *ssl) in SSL_get_state() 71 int SSL_in_init(const SSL *s) in SSL_in_init() 76 int SSL_is_init_finished(const SSL *s) in SSL_is_init_finished() 81 int SSL_in_before(const SSL *s) in SSL_in_before() 97 void ossl_statem_clear(SSL *s) in ossl_statem_clear() [all …]
|
D | extensions.c | 17 static int final_renegotiate(SSL *s, unsigned int context, int sent); 18 static int init_server_name(SSL *s, unsigned int context); 19 static int final_server_name(SSL *s, unsigned int context, int sent); 21 static int init_ec_point_formats(SSL *s, unsigned int context); 22 static int final_ec_pt_formats(SSL *s, unsigned int context, int sent); 24 static int init_session_ticket(SSL *s, unsigned int context); 26 static int init_status_request(SSL *s, unsigned int context); 29 static int init_npn(SSL *s, unsigned int context); 31 static int init_alpn(SSL *s, unsigned int context); 32 static int final_alpn(SSL *s, unsigned int context, int sent); [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/openssl/ |
D | ssl.h | 42 ssl_get_peer_mbedtls_x509_crt(SSL *ssl); 44 int SSL_set_sni_callback(SSL *ssl, int(*cb)(void *, mbedtls_ssl_context *, 47 void SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx); 52 SSL *SSL_SSL_from_mbedtls_ssl_context(mbedtls_ssl_context *msc); 54 mbedtls_ssl_context *SSL_mbedtls_ssl_context_from_SSL(SSL *ssl); 81 SSL* SSL_new(SSL_CTX *ctx); 90 void SSL_free(SSL *ssl); 101 int SSL_connect(SSL *ssl); 112 int SSL_accept(SSL *ssl); 126 int SSL_read(SSL *ssl, void *buffer, int len); [all …]
|
/third_party/openssl/include/openssl/ |
D | ssl.h | 229 typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, 231 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, 262 typedef int (*custom_ext_add_cb)(SSL *s, unsigned int ext_type, 266 typedef void (*custom_ext_free_cb)(SSL *s, unsigned int ext_type, 269 typedef int (*custom_ext_parse_cb)(SSL *s, unsigned int ext_type, 274 typedef int (*SSL_custom_ext_add_cb_ex)(SSL *s, unsigned int ext_type, 281 typedef void (*SSL_custom_ext_free_cb_ex)(SSL *s, unsigned int ext_type, 286 typedef int (*SSL_custom_ext_parse_cb_ex)(SSL *s, unsigned int ext_type, 584 unsigned long SSL_get_options(const SSL *s); 586 unsigned long SSL_clear_options(SSL *s, unsigned long op); [all …]
|
/third_party/openssl/ssl/ |
D | ssl_local.h | 442 int (*ssl_new) (SSL *s); 443 int (*ssl_clear) (SSL *s); 444 void (*ssl_free) (SSL *s); 445 int (*ssl_accept) (SSL *s); 446 int (*ssl_connect) (SSL *s); 447 int (*ssl_read) (SSL *s, void *buf, size_t len, size_t *readbytes); 448 int (*ssl_peek) (SSL *s, void *buf, size_t len, size_t *readbytes); 449 int (*ssl_write) (SSL *s, const void *buf, size_t len, size_t *written); 450 int (*ssl_shutdown) (SSL *s); 451 int (*ssl_renegotiate) (SSL *s); [all …]
|
D | ssl_lib.c | 28 static int ssl_undefined_function_1(SSL *ssl, SSL3_RECORD *r, size_t s, int t) in ssl_undefined_function_1() 36 static int ssl_undefined_function_2(SSL *ssl, SSL3_RECORD *r, unsigned char *s, in ssl_undefined_function_2() 45 static int ssl_undefined_function_3(SSL *ssl, unsigned char *r, in ssl_undefined_function_3() 55 static int ssl_undefined_function_4(SSL *ssl, int r) in ssl_undefined_function_4() 61 static size_t ssl_undefined_function_5(SSL *ssl, const char *r, size_t s, in ssl_undefined_function_5() 76 static int ssl_undefined_function_7(SSL *ssl, unsigned char *r, size_t s, in ssl_undefined_function_7() 106 SSL *s; 111 int (*func_read) (SSL *, void *, size_t, size_t *); 112 int (*func_write) (SSL *, const void *, size_t, size_t *); 113 int (*func_other) (SSL *); [all …]
|
/third_party/openssl/doc/man7/ |
D | ssl.pod | 5 ssl - OpenSSL SSL/TLS library 13 The OpenSSL B<ssl> library implements the Secure Sockets Layer (SSL v2/v3) and 18 TLS/SSL enabled connections (see L<SSL_CTX_new(3)>). 23 B<SSL> object. After the B<SSL> object has been created using 28 When the TLS/SSL handshake is performed using 32 used to read and write data on the TLS/SSL connection. 34 TLS/SSL connection. 43 =item B<SSL_METHOD> (SSL Method) 49 =item B<SSL_CIPHER> (SSL Cipher) 52 are a core part of the SSL/TLS protocol. The available ciphers are configured [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/platform/ |
D | ssl_pm.h | 28 int ssl_pm_new(SSL *ssl); 29 void ssl_pm_free(SSL *ssl); 31 int ssl_pm_handshake(SSL *ssl); 32 int ssl_pm_shutdown(SSL *ssl); 33 int ssl_pm_clear(SSL *ssl); 35 int ssl_pm_read(SSL *ssl, void *buffer, int len); 36 int ssl_pm_send(SSL *ssl, const void *buffer, int len); 37 int ssl_pm_pending(const SSL *ssl); 39 void ssl_pm_set_fd(SSL *ssl, int fd, int mode); 40 int ssl_pm_get_fd(const SSL *ssl, int mode); [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_lib.c | 69 int ossl_statem_in_error(const SSL *ssl) in ossl_statem_in_error() 82 int SSL_want(const SSL *ssl) in SSL_want() 92 int SSL_want_nothing(const SSL *ssl) in SSL_want_nothing() 105 int SSL_want_read(const SSL *ssl) in SSL_want_read() 118 int SSL_want_write(const SSL *ssl) in SSL_want_write() 131 int SSL_want_x509_lookup(const SSL *ssl) in SSL_want_x509_lookup() 141 int SSL_get_error(const SSL *ssl, int ret_code) in SSL_get_error() 172 OSSL_HANDSHAKE_STATE SSL_get_state(const SSL *ssl) in SSL_get_state() 298 SSL *SSL_new(SSL_CTX *ctx) in SSL_new() 301 SSL *ssl; in SSL_new() [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_types.h | 82 typedef struct ssl_st SSL; typedef 165 typedef int (*next_proto_cb)(SSL *ssl, const unsigned char **out, 190 int (*default_verify_callback) (SSL *, mbedtls_x509_crt *); 232 int (*verify_callback) (SSL *, mbedtls_x509_crt *); 247 void (*info_callback) (const SSL *ssl, int type, int val); 265 int (*ssl_new)(SSL *ssl); 267 void (*ssl_free)(SSL *ssl); 269 int (*ssl_handshake)(SSL *ssl); 271 int (*ssl_shutdown)(SSL *ssl); 273 int (*ssl_clear)(SSL *ssl); [all …]
|
/third_party/openssl/doc/man3/ |
D | BIO_f_ssl.pod | 10 BIO_ssl_shutdown - SSL BIO 21 long BIO_set_ssl(BIO *b, SSL *ssl, long c); 22 long BIO_get_ssl(BIO *b, SSL **sslp); 38 BIO_f_ssl() returns the SSL BIO method. This is a filter BIO which 39 is a wrapper round the OpenSSL SSL routines adding a BIO "flavour" to 40 SSL I/O. 42 I/O performed on an SSL BIO communicates using the SSL protocol with 43 the SSLs read and write BIOs. If an SSL connection is not established 46 If a BIO is appended to an SSL BIO using BIO_push() it is automatically 47 used as the SSL BIOs read and write BIOs. [all …]
|
D | SSL_new.pod | 5 SSL_dup, SSL_new, SSL_up_ref - create an SSL structure for a connection 11 SSL *SSL_dup(SSL *s); 12 SSL *SSL_new(SSL_CTX *ctx); 13 int SSL_up_ref(SSL *s); 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 20 options, verification settings, timeout settings. An B<SSL> structure is 21 reference counted. Creating an B<SSL> structure for the first time increments 23 reference count drops to zero, any memory or resources allocated to the B<SSL> 27 existing B<SSL> structure. [all …]
|
D | SSL_CTX_set_ssl_version.pod | 6 - choose a new TLS/SSL method 13 int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method); 14 const SSL_METHOD *SSL_get_ssl_method(const SSL *ssl); 18 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects 19 newly created from this B<ctx>. SSL objects already created with 23 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl> 26 SSL_get_ssl_method() returns a function pointer to the TLS/SSL method 35 an SSL object, the method of the SSL object is reset to the method currently
|
D | SSL_CTX_set_ex_data.pod | 7 - Store and retrieve extra data from the SSL_CTX, SSL or SSL_SESSION 17 void *SSL_get_ex_data(const SSL *s, int idx); 19 int SSL_set_ex_data(SSL *s, int idx, void *arg); 23 SSL*_set_ex_data() functions can be used to store arbitrary user data into the 24 B<SSL_CTX>, or B<SSL> object. The user must supply a unique index 25 which they can subsequently use to retrieve the data using SSL*_get_ex_data(). 33 The SSL*_set_ex_data() functions return 1 if the item is successfully stored 35 The SSL*_get_ex_data() functions return the ex_data pointer if successful,
|
D | SSL_want.pod | 7 information TLS/SSL I/O operation 13 int SSL_want(const SSL *ssl); 14 int SSL_want_nothing(const SSL *ssl); 15 int SSL_want_read(const SSL *ssl); 16 int SSL_want_write(const SSL *ssl); 17 int SSL_want_x509_lookup(const SSL *ssl); 18 int SSL_want_async(const SSL *ssl); 19 int SSL_want_async_job(const SSL *ssl); 20 int SSL_want_client_hello_cb(const SSL *ssl); 24 SSL_want() returns state information for the SSL object B<ssl>. [all …]
|
/third_party/openssl/apps/ |
D | s_apps.h | 27 int ssl_print_sigalgs(BIO *out, SSL *s); 28 int ssl_print_point_formats(BIO *out, SSL *s); 29 int ssl_print_groups(BIO *out, SSL *s, int noshared); 30 int ssl_print_tmp_key(BIO *out, SSL *s); 39 void apps_ssl_info_callback(const SSL *s, int where, int ret); 41 size_t len, SSL *ssl, void *arg); 42 void tlsext_cb(SSL *s, int client_server, int type, const unsigned char *data, 45 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, 47 int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, 55 int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, [all …]
|
/third_party/openssl/ssl/record/ |
D | record.h | 129 SSL *s; 194 void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s); 204 __owur size_t ssl3_pending(const SSL *s); 205 __owur int ssl3_write_bytes(SSL *s, int type, const void *buf, size_t len, 207 int do_ssl3_write(SSL *s, int type, const unsigned char *buf, 210 __owur int ssl3_read_bytes(SSL *s, int type, int *recvd_type, 213 __owur int ssl3_setup_buffers(SSL *s); 214 __owur int ssl3_enc(SSL *s, SSL3_RECORD *inrecs, size_t n_recs, int send); 215 __owur int n_ssl3_mac(SSL *ssl, SSL3_RECORD *rec, unsigned char *md, int send); 216 __owur int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, size_t len, [all …]
|
D | record_local.h | 39 __owur int ssl3_read_n(SSL *s, size_t n, size_t max, int extend, int clearold, 42 DTLS1_BITMAP *dtls1_get_bitmap(SSL *s, SSL3_RECORD *rr, 44 int dtls1_process_buffered_records(SSL *s); 45 int dtls1_retrieve_buffered_record(SSL *s, record_pqueue *queue); 46 int dtls1_buffer_record(SSL *s, record_pqueue *q, unsigned char *priority); 51 int dtls1_record_replay_check(SSL *s, DTLS1_BITMAP *bitmap); 52 void dtls1_record_bitmap_update(SSL *s, DTLS1_BITMAP *bitmap); 72 __owur int ssl3_setup_read_buffer(SSL *s); 73 __owur int ssl3_setup_write_buffer(SSL *s, size_t numwpipes, size_t len); 74 int ssl3_release_read_buffer(SSL *s); [all …]
|
/third_party/openssl/test/ |
D | ssltestlib.h | 19 int create_ssl_objects(SSL_CTX *serverctx, SSL_CTX *clientctx, SSL **sssl, 20 SSL **cssl, BIO *s_to_c_fbio, BIO *c_to_s_fbio); 21 int create_bare_ssl_connection(SSL *serverssl, SSL *clientssl, int want, 23 int create_ssl_connection(SSL *serverssl, SSL *clientssl, int want); 24 void shutdown_ssl_connection(SSL *serverssl, SSL *clientssl);
|
/third_party/boost/libs/asio/doc/overview/ |
D | ssl.qbk | 8 [section:ssl SSL] 10 Boost.Asio contains classes and class templates for basic SSL support. These classes 14 Before creating an encrypted stream, an application must construct an SSL 15 context object. This object is used to set SSL options such as verification 23 To use SSL with a TCP socket, one may write: 36 lifetime than the SSL stream, in which case the template parameter should be a 42 SSL handshaking must be performed prior to transmitting or receiving data over 47 Once connected, SSL stream objects are used as synchronous or asynchronous read 56 Boost.Asio provides various methods for configuring the way SSL certificates are 92 // Perform SSL handshake and verify the remote host's [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/platform/ |
D | ssl_pm.c | 51 SSL *owner; 117 int ssl_pm_new(SSL *ssl) in ssl_pm_new() 227 void ssl_pm_free(SSL *ssl) in ssl_pm_free() 243 static int ssl_pm_reload_crt(SSL *ssl) in ssl_pm_reload_crt() 306 int ssl_pm_handshake(SSL *ssl) in ssl_pm_handshake() 379 ssl_get_peer_mbedtls_x509_crt(SSL *ssl) in ssl_get_peer_mbedtls_x509_crt() 389 int ssl_pm_shutdown(SSL *ssl) in ssl_pm_shutdown() 411 int ssl_pm_clear(SSL *ssl) in ssl_pm_clear() 417 int ssl_pm_read(SSL *ssl, void *buffer, int len) in ssl_pm_read() 444 int ssl_pm_send(SSL *ssl, const void *buffer, int len) in ssl_pm_send() [all …]
|
/third_party/openssl/doc/man1/ |
D | sess_id.pod | 6 sess_id - SSL/TLS session handling utility 22 The B<sess_id> process the encoded version of the SSL session structure 23 and optionally prints out SSL session details (for example the SSL session 25 needs some knowledge of the SSL protocol to use properly, most users will 85 SSL-Session: 106 The cipher used this is the actual raw SSL or TLS cipher code, see the SSL 111 The SSL session ID in hex format. 119 This is the SSL session master key. 132 This is the return code when an SSL client certificate is verified. 140 -----BEGIN SSL SESSION PARAMETERS----- [all …]
|
/third_party/curl/docs/ |
D | SSL-PROBLEMS.md | 7 # SSL problems 9 First, let's establish that we often refer to TLS and SSL interchangeably as 10 SSL here. The current protocol is called TLS, it was called SSL a long time 13 There are several known reasons why a connection that involves SSL might 42 SSL servers are supposed to handle. This may cause the connection to fail 43 completely. Sometimes you may need to explicitly select a SSL version to use 46 An additional complication can be that modern SSL libraries sometimes are 47 built with support for older SSL and TLS versions disabled! 49 All versions of SSL and the TLS versions before 1.2 are considered insecure 59 ciphers from its default set (slightly depending on SSL backend in use). [all …]
|