Lines Matching refs:con
213 static void print_stuff(BIO *berr,SSL *con,int full);
563 SSL *con=NULL; in MAIN() local
1246 con=SSL_new(ctx); in MAIN()
1267 SSL_set_session(con, sess); in MAIN()
1273 if (!SSL_set_tlsext_host_name(con,servername)) in MAIN()
1282 if (con && (kctx = kssl_ctx_new()) != NULL) in MAIN()
1284 SSL_set0_kssl_ctx(con, kctx); in MAIN()
1291 SSL_set_tlsext_opaque_prf_input(con, "Test client", 11); in MAIN()
1317 if (c_Pause & 0x01) SSL_set_debug(con, 1); in MAIN()
1319 if ( SSL_version(con) == DTLS1_VERSION) in MAIN()
1346 SSL_set_options(con, SSL_OP_NO_QUERY_MTU); in MAIN()
1347 SSL_set_mtu(con, socket_mtu - 28); in MAIN()
1366 SSL_set_debug(con, 1); in MAIN()
1372 SSL_set_msg_callback(con, msg_cb); in MAIN()
1373 SSL_set_msg_callback_arg(con, bio_c_out); in MAIN()
1378 SSL_set_tlsext_debug_callback(con, tlsext_cb); in MAIN()
1379 SSL_set_tlsext_debug_arg(con, bio_c_out); in MAIN()
1383 SSL_set_tlsext_status_type(con, TLSEXT_STATUSTYPE_ocsp); in MAIN()
1394 SSL_set_tlsext_status_ids(con, ids); in MAIN()
1404 SSL_set_bio(con,sbio,sbio); in MAIN()
1405 SSL_set_connect_state(con); in MAIN()
1408 width=SSL_get_fd(con)+1; in MAIN()
1537 if ((SSL_version(con) == DTLS1_VERSION) && in MAIN()
1538 DTLSv1_get_timeout(con, &timeout)) in MAIN()
1543 if (SSL_in_init(con) && !SSL_total_renegotiations(con)) in MAIN()
1556 if (servername != NULL && !SSL_session_reused(con)) in MAIN()
1567 PEM_write_bio_SSL_SESSION(stmp, SSL_get_session(con)); in MAIN()
1573 print_stuff(bio_c_out,con,full_log); in MAIN()
1587 SSL_shutdown(con); in MAIN()
1588 SSL_set_connect_state(con); in MAIN()
1589 SHUTDOWN(SSL_get_fd(con)); in MAIN()
1595 ssl_pending = read_ssl && SSL_pending(con); in MAIN()
1606 openssl_fdset(SSL_get_fd(con),&readfds); in MAIN()
1608 openssl_fdset(SSL_get_fd(con),&writefds); in MAIN()
1612 openssl_fdset(SSL_get_fd(con),&readfds); in MAIN()
1614 openssl_fdset(SSL_get_fd(con),&writefds); in MAIN()
1691 if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0) in MAIN()
1696 if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds)) in MAIN()
1698 k=SSL_write(con,&(cbuf[cbuf_off]), in MAIN()
1700 switch (SSL_get_error(con,k)) in MAIN()
1792 else if (ssl_pending || FD_ISSET(SSL_get_fd(con),&readfds)) in MAIN()
1795 { static int iiii; if (++iiii == 52) { SSL_renegotiate(con); iiii=0; } } in MAIN()
1798 k=SSL_read(con,sbuf,1024 /* BUFSIZZ */ ); in MAIN()
1801 k=SSL_read(con,sbuf,16); in MAIN()
1803 printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240)); in MAIN()
1807 switch (SSL_get_error(con,k)) in MAIN()
1897 SSL_renegotiate(con); in MAIN()
1904 SSL_heartbeat(con); in MAIN()
1925 print_stuff(bio_c_out,con,full_log); in MAIN()
1926 SSL_shutdown(con); in MAIN()
1927 SHUTDOWN(SSL_get_fd(con)); in MAIN()
1929 if (con != NULL) in MAIN()
1932 print_stuff(bio_c_out,con,1); in MAIN()
1933 SSL_free(con); in MAIN()