/external/boringssl/src/crypto/err/ |
D | ssl.errordata | 1 SSL,277,ALPN_MISMATCH_ON_EARLY_DATA 2 SSL,281,APPLICATION_DATA_INSTEAD_OF_HANDSHAKE 3 SSL,100,APP_DATA_IN_HANDSHAKE 4 SSL,101,ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT 5 SSL,102,BAD_ALERT 6 SSL,103,BAD_CHANGE_CIPHER_SPEC 7 SSL,104,BAD_DATA_RETURNED_BY_CALLBACK 8 SSL,105,BAD_DH_P_LENGTH 9 SSL,106,BAD_DIGEST_LENGTH 10 SSL,107,BAD_ECC_CERT [all …]
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 227 OPENSSL_EXPORT SSL *SSL_new(SSL_CTX *ctx); 230 OPENSSL_EXPORT void SSL_free(SSL *ssl); 235 OPENSSL_EXPORT SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl); 238 OPENSSL_EXPORT void SSL_set_connect_state(SSL *ssl); 241 OPENSSL_EXPORT void SSL_set_accept_state(SSL *ssl); 245 OPENSSL_EXPORT int SSL_is_server(const SSL *ssl); 248 OPENSSL_EXPORT int SSL_is_dtls(const SSL *ssl); 268 OPENSSL_EXPORT void SSL_set_bio(SSL *ssl, BIO *rbio, BIO *wbio); 275 OPENSSL_EXPORT void SSL_set0_rbio(SSL *ssl, BIO *rbio); 282 OPENSSL_EXPORT void SSL_set0_wbio(SSL *ssl, BIO *wbio); [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_lib.cc | 169 OPENSSL_DECLARE_ERROR_REASON(SSL, UNKNOWN_PROTOCOL) 173 OPENSSL_DECLARE_ERROR_REASON(SSL, BLOCK_CIPHER_PAD_IS_WRONG) 174 OPENSSL_DECLARE_ERROR_REASON(SSL, NO_CIPHERS_SPECIFIED) 194 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in CBBFinishArray() 201 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() 209 void ssl_set_read_error(SSL* ssl) { in ssl_set_read_error() 214 static bool check_read_error(const SSL *ssl) { in check_read_error() 222 int ssl_can_write(const SSL *ssl) { in ssl_can_write() 226 int ssl_can_read(const SSL *ssl) { in ssl_can_read() 230 ssl_open_record_t ssl_open_handshake(SSL *ssl, size_t *out_consumed, in ssl_open_handshake() [all …]
|
D | internal.h | 192 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in OPENSSL_MSVC_PRAGMA() 314 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW); in OPENSSL_MSVC_PRAGMA() 319 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in OPENSSL_MSVC_PRAGMA() 374 bool ssl_get_version_range(const SSL *ssl, uint16_t *out_min_version, in OPENSSL_MSVC_PRAGMA() 393 uint16_t ssl_protocol_version(const SSL *ssl); in OPENSSL_MSVC_PRAGMA() 755 size_t ssl_record_prefix_len(const SSL *ssl); 788 enum ssl_open_record_t tls_open_record(SSL *ssl, uint8_t *out_type, 795 enum ssl_open_record_t dtls_open_record(SSL *ssl, uint8_t *out_type, 810 size_t ssl_seal_align_prefix_len(const SSL *ssl); 823 int tls_seal_record(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, [all …]
|
D | ssl_asn1.cc | 221 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 232 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 241 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 248 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 257 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 265 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 274 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 283 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 292 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() 302 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_SESSION_to_bytes_full() [all …]
|
D | ssl_file.cc | 143 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in STACK_OF() 158 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in STACK_OF() 208 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in SSL_add_file_cert_subjects_to_stack() 250 int SSL_use_certificate_file(SSL *ssl, const char *file, int type) { in SSL_use_certificate_file() 258 OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); in SSL_use_certificate_file() 263 OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); in SSL_use_certificate_file() 275 OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); in SSL_use_certificate_file() 280 OPENSSL_PUT_ERROR(SSL, reason_code); in SSL_use_certificate_file() 293 int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) { in SSL_use_RSAPrivateKey_file() 300 OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); in SSL_use_RSAPrivateKey_file() [all …]
|
D | ssl_cert.cc | 141 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_cert_new() 158 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_cert_dup() 239 static void ssl_cert_set_cert_cb(CERT *cert, int (*cb)(SSL *ssl, void *arg), in ssl_cert_set_cert_cb() 263 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in check_leaf_cert_and_privkey() 268 OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); in check_leaf_cert_and_privkey() 276 OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); in check_leaf_cert_and_privkey() 295 OPENSSL_PUT_ERROR(SSL, ERR_R_PASSED_NULL_PARAMETER); in cert_set_chain_and_key() 300 OPENSSL_PUT_ERROR(SSL, SSL_R_CANNOT_HAVE_BOTH_PRIVKEY_AND_METHOD); in cert_set_chain_and_key() 308 OPENSSL_PUT_ERROR(SSL, SSL_R_CERTIFICATE_AND_PRIVATE_KEY_MISMATCH); in cert_set_chain_and_key() 377 int ssl_has_certificate(const SSL *ssl) { in ssl_has_certificate() [all …]
|
D | tls_record.cc | 143 static int ssl_needs_record_splitting(const SSL *ssl) { in ssl_needs_record_splitting() 161 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW); in ssl_record_sequence_update() 165 size_t ssl_record_prefix_len(const SSL *ssl) { in ssl_record_prefix_len() 176 size_t ssl_seal_align_prefix_len(const SSL *ssl) { in ssl_seal_align_prefix_len() 190 static ssl_open_record_t skip_early_data(SSL *ssl, uint8_t *out_alert, in skip_early_data() 198 OPENSSL_PUT_ERROR(SSL, SSL_R_TOO_MUCH_SKIPPED_EARLY_DATA); in skip_early_data() 206 ssl_open_record_t tls_open_record(SSL *ssl, uint8_t *out_type, in tls_open_record() 242 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_VERSION_NUMBER); in tls_open_record() 249 OPENSSL_PUT_ERROR(SSL, SSL_R_ENCRYPTED_LENGTH_TOO_LONG); in tls_open_record() 274 OPENSSL_PUT_ERROR(SSL, SSL_R_TOO_MANY_EMPTY_FRAGMENTS); in tls_open_record() [all …]
|
D | tls13_both.cc | 59 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_get_cert_verify_signature_input() 65 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_get_cert_verify_signature_input() 81 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_get_cert_verify_signature_input() 89 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_get_cert_verify_signature_input() 98 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_get_cert_verify_signature_input() 107 SSL *const ssl = hs->ssl; in tls13_process_certificate() 114 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in tls13_process_certificate() 121 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in tls13_process_certificate() 134 OPENSSL_PUT_ERROR(SSL, SSL_R_CERT_LENGTH_MISMATCH); in tls13_process_certificate() 142 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in tls13_process_certificate() [all …]
|
D | ssl_privkey.cc | 81 OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); in ssl_set_pkey() 138 int ssl_has_private_key(const SSL *ssl) { in ssl_has_private_key() 142 static int pkey_supports_algorithm(const SSL *ssl, EVP_PKEY *pkey, in pkey_supports_algorithm() 168 static int setup_ctx(SSL *ssl, EVP_MD_CTX *ctx, EVP_PKEY *pkey, uint16_t sigalg, in setup_ctx() 171 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_SIGNATURE_TYPE); in setup_ctx() 199 SSL *const ssl = hs->ssl; in ssl_private_key_sign() 209 OPENSSL_PUT_ERROR(SSL, SSL_R_PRIVATE_KEY_OPERATION_FAILED); in ssl_private_key_sign() 224 bool ssl_public_key_verify(SSL *ssl, Span<const uint8_t> signature, in ssl_public_key_verify() 238 SSL *const ssl = hs->ssl; in ssl_private_key_decrypt() 248 OPENSSL_PUT_ERROR(SSL, SSL_R_PRIVATE_KEY_OPERATION_FAILED); in ssl_private_key_decrypt() [all …]
|
D | s3_both.cc | 135 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() 150 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW); in add_record_to_flight() 167 bool ssl3_init_message(SSL *ssl, CBB *cbb, CBB *body, uint8_t type) { in ssl3_init_message() 172 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in ssl3_init_message() 180 bool ssl3_finish_message(SSL *ssl, CBB *cbb, Array<uint8_t> *out_msg) { in ssl3_finish_message() 184 bool ssl3_add_message(SSL *ssl, Array<uint8_t> msg) { in ssl3_add_message() 207 bool ssl3_add_change_cipher_spec(SSL *ssl) { in ssl3_add_change_cipher_spec() 220 bool ssl3_add_alert(SSL *ssl, uint8_t level, uint8_t desc) { in ssl3_add_alert() 231 int ssl3_flush_flight(SSL *ssl) { in ssl3_flush_flight() 237 OPENSSL_PUT_ERROR(SSL, SSL_R_PROTOCOL_IS_SHUTDOWN); in ssl3_flush_flight() [all …]
|
D | d1_both.cc | 167 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in dtls1_hm_fragment_new() 178 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in dtls1_hm_fragment_new() 186 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW); in dtls1_hm_fragment_new() 192 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in dtls1_hm_fragment_new() 255 static bool dtls1_is_current_message_complete(const SSL *ssl) { in dtls1_is_current_message_complete() 266 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() 281 OPENSSL_PUT_ERROR(SSL, SSL_R_FRAGMENT_MISMATCH); in dtls1_get_incoming_message() 297 ssl_open_record_t dtls1_open_handshake(SSL *ssl, size_t *out_consumed, in dtls1_open_handshake() 310 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD); in dtls1_open_handshake() 323 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD); in dtls1_open_handshake() [all …]
|
D | t1_lib.cc | 202 int ssl_client_hello_init(SSL *ssl, SSL_CLIENT_HELLO *out, in ssl_client_hello_init() 295 Span<const uint16_t> tls1_get_grouplist(const SSL *ssl) { in tls1_get_grouplist() 304 SSL *const ssl = hs->ssl; in tls1_get_shared_group() 402 int tls1_check_group_id(const SSL *ssl, uint16_t group_id) { in tls1_check_group_id() 467 bool tls12_add_verify_sigalgs(const SSL *ssl, CBB *out) { in tls12_add_verify_sigalgs() 489 bool tls12_check_peer_sigalg(const SSL *ssl, uint8_t *out_alert, in tls12_check_peer_sigalg() 509 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_SIGNATURE_TYPE); in tls12_check_peer_sigalg() 547 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_EXTENSION); in forbid_parse_serverhello() 574 SSL *const ssl = hs->ssl; in ext_sni_add_clienthello() 603 SSL *const ssl = hs->ssl; in ext_sni_parse_clienthello() [all …]
|
D | handshake_client.cc | 202 static void ssl_get_client_disabled(SSL *ssl, uint32_t *out_mask_a, in ssl_get_client_disabled() 215 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() 267 OPENSSL_PUT_ERROR(SSL, SSL_R_NO_CIPHERS_AVAILABLE); in ssl_write_client_cipher_list() 291 SSL *const ssl = hs->ssl; in ssl_write_client_hello() 344 SSL *const ssl = hs->ssl; in parse_server_version() 348 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_MESSAGE); in parse_server_version() 354 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in parse_server_version() 370 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in parse_server_version() 383 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in parse_server_version() 414 SSL *const ssl = hs->ssl; in do_start_connect() [all …]
|
D | handshake_server.cc | 221 SSL *const ssl = hs->ssl; in negotiate_version() 229 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in negotiate_version() 285 OPENSSL_PUT_ERROR(SSL, SSL_R_INAPPROPRIATE_FALLBACK); in negotiate_version() 301 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_parse_client_cipher_list() 309 OPENSSL_PUT_ERROR(SSL, SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); in ssl_parse_client_cipher_list() 315 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_parse_client_cipher_list() 330 SSL *const ssl = hs->ssl; in ssl_get_compatible_server_ciphers() 360 SSL *const ssl = hs->ssl; in ssl3_choose_cipher() 433 SSL *const ssl = hs->ssl; in do_read_client_hello() 450 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in do_read_client_hello() [all …]
|
D | s3_pkt.cc | 127 static int do_ssl3_write(SSL *ssl, int type, const uint8_t *in, unsigned len); 129 int ssl3_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in ssl3_write_app_data() 137 OPENSSL_PUT_ERROR(SSL, SSL_R_PROTOCOL_IS_SHUTDOWN); in ssl3_write_app_data() 155 OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_LENGTH); in ssl3_write_app_data() 202 static int ssl3_write_pending(SSL *ssl, int type, const uint8_t *in, in ssl3_write_pending() 208 OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_WRITE_RETRY); in ssl3_write_pending() 221 static int do_ssl3_write(SSL *ssl, int type, const uint8_t *in, unsigned len) { in do_ssl3_write() 229 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in do_ssl3_write() 245 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW); in do_ssl3_write() 291 ssl_open_record_t ssl3_open_app_data(SSL *ssl, Span<uint8_t> *out, in ssl3_open_app_data() [all …]
|
D | tls13_client.cc | 54 SSL *const ssl = hs->ssl; in do_read_hello_retry_request() 86 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in do_read_hello_retry_request() 101 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_CIPHER_RETURNED); in do_read_hello_retry_request() 132 OPENSSL_PUT_ERROR(SSL, SSL_R_EMPTY_HELLO_RETRY_REQUEST); in do_read_hello_retry_request() 141 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in do_read_hello_retry_request() 154 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in do_read_hello_retry_request() 162 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_CURVE); in do_read_hello_retry_request() 170 OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_CURVE); in do_read_hello_retry_request() 193 SSL *const ssl = hs->ssl; in do_send_second_client_hello() 213 SSL *const ssl = hs->ssl; in do_read_server_hello() [all …]
|
D | handshake.cc | 127 SSL_HANDSHAKE::SSL_HANDSHAKE(SSL *ssl_arg) in SSL_HANDSHAKE() 156 UniquePtr<SSL_HANDSHAKE> ssl_handshake_new(SSL *ssl) { in ssl_handshake_new() 165 bool ssl_check_message_type(SSL *ssl, const SSLMessage &msg, int type) { in ssl_check_message_type() 168 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_MESSAGE); in ssl_check_message_type() 176 bool ssl_add_message_cbb(SSL *ssl, CBB *cbb) { in ssl_add_message_cbb() 186 size_t ssl_max_handshake_message_len(const SSL *ssl) { in ssl_max_handshake_message_len() 239 OPENSSL_PUT_ERROR(SSL, SSL_R_PARSE_TLSEXT); in ssl_parse_extensions() 256 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_EXTENSION); in ssl_parse_extensions() 263 OPENSSL_PUT_ERROR(SSL, SSL_R_DUPLICATE_EXTENSION); in ssl_parse_extensions() 286 SSL *const ssl = hs->ssl; in ssl_verify_peer_cert() [all …]
|
D | ssl_buffer.cc | 49 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in EnsureCap() 64 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in EnsureCap() 105 static int dtls_read_buffer_next_packet(SSL *ssl) { in dtls_read_buffer_next_packet() 111 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in dtls_read_buffer_next_packet() 125 static int tls_read_buffer_extend_to(SSL *ssl, size_t len) { in tls_read_buffer_extend_to() 129 OPENSSL_PUT_ERROR(SSL, SSL_R_BUFFER_TOO_SMALL); in tls_read_buffer_extend_to() 149 int ssl_read_buffer_extend_to(SSL *ssl, size_t len) { in ssl_read_buffer_extend_to() 167 OPENSSL_PUT_ERROR(SSL, SSL_R_BIO_NOT_SET); in ssl_read_buffer_extend_to() 187 int ssl_handle_open_record(SSL *ssl, bool *out_retry, ssl_open_record_t ret, in ssl_handle_open_record() 239 static int tls_write_buffer_flush(SSL *ssl) { in tls_write_buffer_flush() [all …]
|
D | d1_lib.cc | 88 bool dtls1_new(SSL *ssl) { in dtls1_new() 109 void dtls1_free(SSL *ssl) { in dtls1_free() 120 void dtls1_start_timer(SSL *ssl) { in dtls1_start_timer() 138 bool dtls1_is_timer_expired(SSL *ssl) { in dtls1_is_timer_expired() 155 static void dtls1_double_timeout(SSL *ssl) { in dtls1_double_timeout() 162 void dtls1_stop_timer(SSL *ssl) { in dtls1_stop_timer() 168 bool dtls1_check_timeout_num(SSL *ssl) { in dtls1_check_timeout_num() 182 OPENSSL_PUT_ERROR(SSL, SSL_R_READ_TIMEOUT_EXPIRED); in dtls1_check_timeout_num() 193 void DTLSv1_set_initial_timeout_duration(SSL *ssl, unsigned int duration_ms) { in DTLSv1_set_initial_timeout_duration() 197 int DTLSv1_get_timeout(const SSL *ssl, struct timeval *out) { in DTLSv1_get_timeout() [all …]
|
D | ssl_x509.cc | 163 static void check_ssl_x509_method(const SSL *ssl) { in check_ssl_x509_method() 298 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_crypto_x509_session_cache_objects() 307 OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR); in ssl_crypto_x509_session_cache_objects() 314 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); in ssl_crypto_x509_session_cache_objects() 358 SSL *ssl, in ssl_crypto_x509_session_verify_cert_chain() 374 OPENSSL_PUT_ERROR(SSL, ERR_R_X509_LIB); in ssl_crypto_x509_session_verify_cert_chain() 420 static int ssl_crypto_x509_ssl_new(SSL *ssl) { in ssl_crypto_x509_ssl_new() 429 static void ssl_crypto_x509_ssl_flush_cached_client_CA(SSL *ssl) { in ssl_crypto_x509_ssl_flush_cached_client_CA() 434 static void ssl_crypto_x509_ssl_free(SSL *ssl) { in ssl_crypto_x509_ssl_free() 439 static int ssl_crypto_x509_ssl_auto_chain_if_needed(SSL *ssl) { in ssl_crypto_x509_ssl_auto_chain_if_needed() [all …]
|
D | d1_pkt.cc | 131 ssl_open_record_t dtls1_open_app_data(SSL *ssl, Span<uint8_t> *out, in dtls1_open_app_data() 151 OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_HANDSHAKE_RECORD); in dtls1_open_app_data() 177 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD); in dtls1_open_app_data() 190 int dtls1_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in dtls1_write_app_data() 196 OPENSSL_PUT_ERROR(SSL, SSL_R_PROTOCOL_IS_SHUTDOWN); in dtls1_write_app_data() 201 OPENSSL_PUT_ERROR(SSL, SSL_R_DTLS_MESSAGE_TOO_BIG); in dtls1_write_app_data() 206 OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_LENGTH); in dtls1_write_app_data() 222 int dtls1_write_record(SSL *ssl, int type, const uint8_t *in, size_t len, in dtls1_write_record() 232 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in dtls1_write_record() 253 int dtls1_dispatch_alert(SSL *ssl) { in dtls1_dispatch_alert()
|
D | t1_enc.cc | 179 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in ssl3_prf() 188 OPENSSL_PUT_ERROR(SSL, ERR_LIB_EVP); in ssl3_prf() 199 OPENSSL_PUT_ERROR(SSL, ERR_LIB_EVP); in ssl3_prf() 217 static bool get_key_block_lengths(const SSL *ssl, size_t *out_mac_secret_len, in get_key_block_lengths() 223 OPENSSL_PUT_ERROR(SSL, SSL_R_CIPHER_OR_HASH_UNAVAILABLE); in get_key_block_lengths() 233 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); in get_key_block_lengths() 242 int tls1_configure_aead(SSL *ssl, evp_aead_direction_t direction, in tls1_configure_aead() 306 const SSL *ssl = hs->ssl; in tls1_generate_master_secret() 341 size_t SSL_get_key_block_len(const SSL *ssl) { in SSL_get_key_block_len() 352 int SSL_generate_key_block(const SSL *ssl, uint8_t *out, size_t out_len) { in SSL_generate_key_block() [all …]
|
D | tls_method.cc | 70 static void ssl3_on_handshake_complete(SSL *ssl) { in ssl3_on_handshake_complete() 84 static bool ssl3_set_read_state(SSL *ssl, UniquePtr<SSLAEADContext> aead_ctx) { in ssl3_set_read_state() 87 OPENSSL_PUT_ERROR(SSL, SSL_R_BUFFERED_MESSAGES_ON_CIPHER_CHANGE); in ssl3_set_read_state() 97 static bool ssl3_set_write_state(SSL *ssl, UniquePtr<SSLAEADContext> aead_ctx) { in ssl3_set_write_state() 144 SSL *ssl, in ssl_noop_x509_session_verify_cert_chain() 150 static int ssl_noop_x509_ssl_new(SSL *ctx) { return 1; } in ssl_noop_x509_ssl_new() 151 static void ssl_noop_x509_ssl_free(SSL *ctx) { } in ssl_noop_x509_ssl_free() 152 static void ssl_noop_x509_ssl_flush_cached_client_CA(SSL *ssl) {} in ssl_noop_x509_ssl_flush_cached_client_CA() 153 static int ssl_noop_x509_ssl_auto_chain_if_needed(SSL *ssl) { return 1; } in ssl_noop_x509_ssl_auto_chain_if_needed()
|
/external/curl/docs/ |
D | SSL-PROBLEMS.md | 7 # SSL problems 9 First, let's establish that we often refer to TLS and SSL interchangeably as 10 SSL here. The current protocol is called TLS, it was called SSL a long time 13 There are several known reasons why a connection that involves SSL might 32 SSL servers are supposed to handle. This may cause the connection to fail 33 completely. Sometimes you may need to explicitly select a SSL version to use 36 An additional complication can be that modern SSL libraries sometimes are 37 built with support for older SSL and TLS versions disabled! 39 All versions of SSL are considered insecure and should be avoided. Use TLS. 48 ciphers from its default set (slightly depending on SSL backend in use). [all …]
|