/openssl-master/ssl/statem/ |
A D | statem_local.h | 57 typedef int (*confunc_f) (SSL *s, WPACKET *pkt); 59 int ssl3_take_mac(SSL *s); 65 int parse_ca_names(SSL *s, PACKET *pkt); 66 const STACK_OF(X509_NAME) *get_ca_names(SSL *s); 80 size_t ossl_statem_client_max_message_size(SSL *s); 93 size_t ossl_statem_server_max_message_size(SSL *s); 100 __owur int dtls_get_message(SSL *s, int *mt); 115 __owur WORK_STATE dtls_wait_for_dry(SSL *s); 136 __owur int ssl3_check_cert_and_algorithm(SSL *s); 165 int ossl_gost18_cke_cipher_nid(const SSL *s); [all …]
|
A D | statem.h | 131 __owur int ossl_statem_accept(SSL *s); 132 __owur int ossl_statem_connect(SSL *s); 133 void ossl_statem_clear(SSL *s); 134 void ossl_statem_set_renegotiate(SSL *s); 135 void ossl_statem_send_fatal(SSL *s, int al); 145 int ossl_statem_in_error(const SSL *s); 146 void ossl_statem_set_in_init(SSL *s, int init); 147 int ossl_statem_get_in_handshake(SSL *s); 149 __owur int ossl_statem_skip_early_data(SSL *s); 153 __owur int ossl_statem_export_allowed(SSL *s); [all …]
|
A D | statem.c | 76 int SSL_in_init(const SSL *s) in SSL_in_init() 81 int SSL_is_init_finished(const SSL *s) in SSL_is_init_finished() 86 int SSL_in_before(const SSL *s) in SSL_in_before() 102 void ossl_statem_clear(SSL *s) in ossl_statem_clear() 167 int ossl_statem_in_error(const SSL *s) in ossl_statem_in_error() 194 int ossl_statem_skip_early_data(SSL *s) in ossl_statem_skip_early_data() 263 int ossl_statem_connect(SSL *s) in ossl_statem_connect() 268 int ossl_statem_accept(SSL *s) in ossl_statem_accept() 275 static info_cb get_callback(SSL *s) in get_callback() 708 static int statem_do_write(SSL *s) in statem_do_write() [all …]
|
A D | extensions.c | 23 static int init_server_name(SSL *s, unsigned int context); 31 static int init_npn(SSL *s, unsigned int context); 33 static int init_alpn(SSL *s, unsigned int context); 36 static int init_sig_algs(SSL *s, unsigned int context); 46 static int init_srp(SSL *s, unsigned int context); 49 static int init_etm(SSL *s, unsigned int context); 50 static int init_ems(SSL *s, unsigned int context); 55 static int init_srtp(SSL *s, unsigned int context); 76 int (*init)(SSL *s, unsigned int context); 1076 static int init_npn(SSL *s, unsigned int context) in init_npn() [all …]
|
/openssl-master/ssl/ |
A D | ssl_local.h | 490 int (*ssl_new) (SSL *s); 491 int (*ssl_clear) (SSL *s); 2444 void ssl_set_masks(SSL *s); 2503 __owur int ssl3_new(SSL *s); 2504 void ssl3_free(SSL *s); 2509 int ssl3_clear(SSL *s); 2572 __owur int tls1_new(SSL *s); 2573 void tls1_free(SSL *s); 2574 int tls1_clear(SSL *s); 2577 void dtls1_free(SSL *s); [all …]
|
A D | ssl_lib.c | 85 SSL *s; 188 static int ssl_dane_dup(SSL *to, SSL *from) in ssl_dane_dup() 569 int SSL_clear(SSL *s) in SSL_clear() 674 SSL *s; in SSL_new() 1604 int SSL_copy_session_id(SSL *t, const SSL *f) in SSL_copy_session_id() 1755 SSL *s = (SSL *)arg; in ssl_async_wait_ctx_cb() 1799 SSL *s; in ssl_io_intern() 3864 SSL *s; in ssl_do_handshake_intern() 4008 SSL *SSL_dup(SSL *s) in SSL_dup() 4010 SSL *ret; in SSL_dup() [all …]
|
A D | tls_srp.c | 60 int ssl_srp_ctx_free_intern(SSL *s) in ssl_srp_ctx_free_intern() 79 int SSL_SRP_CTX_free(SSL *s) in SSL_SRP_CTX_free() 88 int ssl_srp_ctx_init_intern(SSL *s) in ssl_srp_ctx_init_intern() 157 int SSL_SRP_CTX_init(SSL *s) in SSL_SRP_CTX_init() 383 int srp_verify_server_param(SSL *s) in srp_verify_server_param() 419 int ssl_srp_calc_a_param_intern(SSL *s) in ssl_srp_calc_a_param_intern() 434 int SRP_Calc_A_param(SSL *s) in SRP_Calc_A_param() 439 BIGNUM *SSL_get_srp_g(SSL *s) in SSL_get_srp_g() 446 BIGNUM *SSL_get_srp_N(SSL *s) in SSL_get_srp_N() 453 char *SSL_get_srp_username(SSL *s) in SSL_get_srp_username() [all …]
|
A D | d1_lib.c | 67 int dtls1_new(SSL *s) in dtls1_new() 126 void dtls1_clear_sent_buffer(SSL *s) in dtls1_clear_sent_buffer() 139 void dtls1_free(SSL *s) in dtls1_free() 155 int dtls1_clear(SSL *s) in dtls1_clear() 243 void dtls1_start_timer(SSL *s) in dtls1_start_timer() 327 int dtls1_is_timer_expired(SSL *s) in dtls1_is_timer_expired() 352 void dtls1_stop_timer(SSL *s) in dtls1_stop_timer() 388 int dtls1_handle_timeout(SSL *s) in dtls1_handle_timeout() 860 int dtls1_shutdown(SSL *s) in dtls1_shutdown() 885 int dtls1_query_mtu(SSL *s) in dtls1_query_mtu() [all …]
|
/openssl-master/apps/include/ |
A D | s_apps.h | 32 int ssl_print_sigalgs(BIO *out, SSL *s); 33 int ssl_print_point_formats(BIO *out, SSL *s); 34 int ssl_print_groups(BIO *out, SSL *s, int noshared); 35 int ssl_print_tmp_key(BIO *out, SSL *s); 40 void do_ssl_shutdown(SSL *ssl); 47 size_t len, SSL *ssl, void *arg); 51 int generate_cookie_callback(SSL *ssl, unsigned char *cookie, 72 void print_verify_detail(SSL *s, BIO *bio); 73 void print_ssl_summary(SSL *s); 84 void print_ca_names(BIO *bio, SSL *s); [all …]
|
/openssl-master/doc/man3/ |
A D | BIO_f_ssl.pod | 10 BIO_ssl_shutdown - SSL BIO 22 long BIO_get_ssl(BIO *b, SSL **sslp); 40 SSL I/O. 42 I/O performed on an SSL BIO communicates using the SSL protocol with 49 Calling BIO_reset() on an SSL BIO closes down any current SSL connection 57 BIO_set_ssl() sets the internal SSL pointer of SSL BIO B<b> to B<ssl> using 60 BIO_get_ssl() retrieves the SSL pointer of SSL BIO B<b>, it can then be 90 the internal SSL pointer. 160 SSL *ssl; 209 SSL *ssl; [all …]
|
A D | SSL_new.pod | 5 SSL_dup, SSL_new, SSL_up_ref - create an SSL structure for a connection 11 SSL *SSL_dup(SSL *s); 12 SSL *SSL_new(SSL_CTX *ctx); 13 int SSL_up_ref(SSL *s); 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 20 options, verification settings, timeout settings. An B<SSL> structure is 27 existing B<SSL> structure. 31 the settings in I<s> into the new B<SSL> object. 110 =item Pointer to an SSL structure [all …]
|
A D | SSL_CTX_set_ssl_version.pod | 6 - choose a new TLS/SSL method 13 int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method); 14 const SSL_METHOD *SSL_get_ssl_method(const SSL *ssl); 18 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects 21 which are reset to the default values. SSL objects already created from this 25 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl> 28 SSL_get_ssl_method() returns a function pointer to the TLS/SSL method 37 an SSL object, the method of the SSL object is reset to the method currently
|
A D | SSL_want.pod | 7 SSL_want_client_hello_cb - obtain state information TLS/SSL I/O operation 13 int SSL_want(const SSL *ssl); 14 int SSL_want_nothing(const SSL *ssl); 15 int SSL_want_read(const SSL *ssl); 16 int SSL_want_write(const SSL *ssl); 17 int SSL_want_x509_lookup(const SSL *ssl); 18 int SSL_want_retry_verify(const SSL *ssl); 19 int SSL_want_async(const SSL *ssl); 20 int SSL_want_async_job(const SSL *ssl); 21 int SSL_want_client_hello_cb(const SSL *ssl); [all …]
|
A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 11 int SSL_accept(SSL *ssl); 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake. 46 The TLS/SSL handshake was not successful but was shut down controlled and 47 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 57 The TLS/SSL handshake was not successful because a fatal error occurred either
|
A D | SSL_in_init.pod | 17 int SSL_in_init(const SSL *s); 18 int SSL_in_before(const SSL *s); 19 int SSL_is_init_finished(const SSL *s); 21 int SSL_in_connect_init(SSL *s); 22 int SSL_in_accept_init(SSL *s); 24 OSSL_HANDSHAKE_STATE SSL_get_state(const SSL *ssl); 28 SSL_in_init() returns 1 if the SSL/TLS state machine is currently processing or 31 SSL_in_before() returns 1 if no SSL/TLS handshake has yet been initiated, or 0 34 SSL_is_init_finished() returns 1 if the SSL/TLS connection is in a state where
|
A D | SSL_rstate_string.pod | 5 SSL_rstate_string, SSL_rstate_string_long - get textual description of state of an SSL object durin… 11 const char *SSL_rstate_string(SSL *ssl); 12 const char *SSL_rstate_string_long(SSL *ssl); 17 of the SSL object B<ssl>. 20 the SSL object B<ssl>. 24 When performing a read operation, the SSL/TLS engine must parse the record,
|
A D | SSL_CTX_set_record_padding_callback.pod | 18 …void SSL_CTX_set_record_padding_callback(SSL_CTX *ctx, size_t (*cb)(SSL *s, int type, size_t len, … 19 …int SSL_set_record_padding_callback(SSL *ssl, size_t (*cb)(SSL *s, int type, size_t len, void *arg… 24 void SSL_set_record_padding_callback_arg(SSL *ssl, void *arg); 25 void *SSL_get_record_padding_callback_arg(const SSL *ssl); 28 int SSL_set_block_padding(SSL *ssl, size_t block_size); 34 for TLS 1.3 records. The value set in B<ctx> is copied to a new SSL by SSL_new(). 36 function cannot be set if Kernel TLS is already configured for the current SSL object. 40 set in B<ctx> is copied to a new SSL by SSL_new(). 70 the callback function is not set because Kernel TLS is configured for the SSL object.
|
A D | SSL_CTX_set1_verify_cert_store.pod | 20 int SSL_set0_verify_cert_store(SSL *ctx, X509_STORE *st); 21 int SSL_set1_verify_cert_store(SSL *ctx, X509_STORE *st); 22 int SSL_set0_chain_cert_store(SSL *ctx, X509_STORE *st); 23 int SSL_set1_chain_cert_store(SSL *ctx, X509_STORE *st); 35 except they apply to SSL structure B<ssl>. 45 The stores pointers associated with an SSL_CTX structure are copied to any SSL 46 structures when SSL_new() is called. As a result SSL structures will not be 50 peer: that is an SSL/TLS client will use the verification store to verify 51 the server's certificate chain and a SSL/TLS server will use it to verify
|
/openssl-master/test/helpers/ |
A D | ssltestlib.h | 19 int create_ssl_objects(SSL_CTX *serverctx, SSL_CTX *clientctx, SSL **sssl, 20 SSL **cssl, BIO *s_to_c_fbio, BIO *c_to_s_fbio); 21 int create_bare_ssl_connection(SSL *serverssl, SSL *clientssl, int want, 23 int create_ssl_objects2(SSL_CTX *serverctx, SSL_CTX *clientctx, SSL **sssl, 24 SSL **cssl, int sfd, int cfd); 26 int create_ssl_connection(SSL *serverssl, SSL *clientssl, int want); 27 void shutdown_ssl_connection(SSL *serverssl, SSL *clientssl);
|
/openssl-master/ssl/record/ |
A D | record.h | 131 SSL *s; 202 void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s); 212 __owur size_t ssl3_pending(const SSL *s); 215 int do_ssl3_write(SSL *s, int type, const unsigned char *buf, 218 __owur int ssl3_read_bytes(SSL *s, int type, int *recvd_type, 221 __owur int ssl3_setup_buffers(SSL *s); 230 __owur int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int send, 238 __owur int dtls1_read_bytes(SSL *s, int type, int *recvd_type, 243 int do_dtls1_write(SSL *s, int type, const unsigned char *buf, 245 void dtls1_reset_seq_numbers(SSL *s, int rw); [all …]
|
A D | record_local.h | 42 DTLS1_BITMAP *dtls1_get_bitmap(SSL *s, SSL3_RECORD *rr, 44 int dtls1_process_buffered_records(SSL *s); 51 int dtls1_record_replay_check(SSL *s, DTLS1_BITMAP *bitmap); 74 __owur int ssl3_setup_read_buffer(SSL *s); 76 int ssl3_release_read_buffer(SSL *s); 77 int ssl3_release_write_buffer(SSL *s); 107 int ssl3_get_record(SSL *s); 108 __owur int ssl3_do_compress(SSL *ssl, SSL3_RECORD *wr); 109 __owur int ssl3_do_uncompress(SSL *ssl, SSL3_RECORD *rr); 125 int dtls1_process_record(SSL *s, DTLS1_BITMAP *bitmap); [all …]
|
/openssl-master/include/openssl/ |
A D | ssl.h.in | 323 * SSL/TLS connection options. 1575 void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg); 1668 __owur int SSL_copy_session_id(SSL *to, const SSL *from); 1756 SSL *SSL_new(SSL_CTX *ctx); 1757 int SSL_up_ref(SSL *s); 1855 void SSL_free(SSL *ssl); 1988 int SSL_shutdown(SSL *s); 2028 __owur SSL *SSL_dup(SSL *ssl); 2064 void (*SSL_get_info_callback(const SSL *ssl)) (const SSL *ssl, int type, 2375 /* SSL/TLS version */ [all …]
|
/openssl-master/doc/man7/ |
A D | ssl.pod | 5 ssl - OpenSSL SSL/TLS library 20 TLS/SSL enabled connections (see L<SSL_CTX_new(3)>). 25 B<SSL> object. After the B<SSL> object has been created using 30 When the TLS/SSL handshake is performed using 34 used to read and write data on the TLS/SSL connection. 36 TLS/SSL connection. 44 =item B<SSL_METHOD> (SSL Method) 50 =item B<SSL_CIPHER> (SSL Cipher) 57 =item B<SSL_CTX> (SSL Context) 63 =item B<SSL_SESSION> (SSL Session) [all …]
|
/openssl-master/test/ |
A D | tls13secretstest.c | 129 int ssl3_digest_cached_records(SSL *s, int keep) in ssl3_digest_cached_records() 137 int ssl_handshake_hash(SSL *s, unsigned char *out, size_t outlen, in ssl_handshake_hash() 155 const EVP_MD *ssl_handshake_md(SSL *s) in ssl_handshake_md() 188 int ssl_log_secret(SSL *ssl, in ssl_log_secret() 201 void ossl_statem_send_fatal(SSL *s, int al) in ossl_statem_send_fatal() 205 void ossl_statem_fatal(SSL *s, int al, int reason, const char *fmt, ...) in ossl_statem_fatal() 209 int ossl_statem_export_allowed(SSL *s) in ossl_statem_export_allowed() 214 int ossl_statem_export_early_allowed(SSL *s) in ossl_statem_export_early_allowed() 229 static int test_secret(SSL *s, unsigned char *prk, in test_secret() 277 SSL *s = NULL; in test_handshake_secrets()
|
/openssl-master/doc/man1/ |
A D | openssl-sess_id.pod.in | 6 openssl-sess_id - SSL/TLS session handling command 23 This command processes the encoded version of the SSL session 24 structure and optionally prints out SSL session details (for example 25 the SSL session master key) in human readable format. Since this is a 26 diagnostic tool that needs some knowledge of the SSL protocol to use 84 SSL-Session: 105 The cipher used this is the actual raw SSL or TLS cipher code, see the SSL 110 The SSL session ID in hex format. 118 This is the SSL session master key. 131 This is the return code when an SSL client certificate is verified. [all …]
|