/ssl/record/ |
A D | rec_layer_d1.c | 209 if (sc == NULL) in dtls1_read_bytes() 248 if (sc->rlayer.curr_rec >= sc->rlayer.num_recs) { in dtls1_read_bytes() 249 sc->rlayer.curr_rec = sc->rlayer.num_recs = 0; in dtls1_read_bytes() 251 rr = &sc->rlayer.tlsrecs[sc->rlayer.num_recs]; in dtls1_read_bytes() 254 sc->rlayer.rrlmethod->read_record(sc->rlayer.rrl, in dtls1_read_bytes() 272 } while (sc->rlayer.rrlmethod->processed_read_pending(sc->rlayer.rrl) in dtls1_read_bytes() 275 rr = &sc->rlayer.tlsrecs[sc->rlayer.curr_rec]; in dtls1_read_bytes() 396 sc->msg_callback(0, sc->version, SSL3_RT_ALERT, alert_bytes, 2, s, in dtls1_read_bytes() 460 SSL_CTX_remove_session(sc->session_ctx, sc->session); in dtls1_read_bytes() 561 if (!sc->rlayer.rrlmethod->unprocessed_read_pending(sc->rlayer.rrl)) { in dtls1_read_bytes() [all …]
|
A D | rec_layer_s3.c | 179 if (sc == NULL) in ssl3_pending() 182 if (SSL_CONNECTION_IS_DTLS(sc)) { in ssl3_pending() 199 num += sc->rlayer.rrlmethod->app_data_pending(sc->rlayer.rrl); in ssl3_pending() 213 if (sc == NULL || IS_QUIC(s)) in SSL_set_default_read_buffer_len() 215 sc->rlayer.default_read_buf_len = len; in SSL_set_default_read_buffer_len() 223 if (sc == NULL) in SSL_rstate_string_long() 226 if (sc->rlayer.rrlmethod == NULL || sc->rlayer.rrl == NULL) in SSL_rstate_string_long() 229 sc->rlayer.rrlmethod->get_state(sc->rlayer.rrl, NULL, &lng); in SSL_rstate_string_long() 239 if (sc == NULL) in SSL_rstate_string() 242 if (sc->rlayer.rrlmethod == NULL || sc->rlayer.rrl == NULL) in SSL_rstate_string() [all …]
|
/ssl/ |
A D | ssl_lib.c | 616 sc->client_version = sc->version; in ossl_ssl_connection_reset() 1573 sc->rlayer.rrlmethod->set1_bio(sc->rlayer.rrl, sc->rbio); in SSL_set0_rbio() 1594 sc->wbio = BIO_pop(sc->wbio); in SSL_set0_wbio() 1601 sc->wbio = BIO_push(sc->bbio, sc->wbio); in SSL_set0_wbio() 1603 sc->rlayer.wrlmethod->set1_bio(sc->rlayer.wrl, sc->wbio); in SSL_set0_wbio() 2427 if (sc == NULL || !sc->server) { in SSL_read_early_data() 3303 if (sc == NULL || !sc->server) in STACK_OF() 5842 if (sc == NULL || sc->session == NULL) in SSL_get_psk_identity_hint() 5852 if (sc == NULL || sc->session == NULL) in SSL_get_psk_identity() 7695 if (sc == NULL || sc->rbio == NULL) in SSL_get_rpoll_descriptor() [all …]
|
A D | s3_msg.c | 86 if (sc == NULL) in ssl3_dispatch_alert() 99 && !sc->renegotiate in ssl3_dispatch_alert() 104 templ.buf = &sc->s3.send_alert[0]; in ssl3_dispatch_alert() 119 sc->rlayer.wrlmethod->retry_write_records(sc->rlayer.wrl)); in ssl3_dispatch_alert() 124 sc->rlayer.wpend_tot = 0; in ssl3_dispatch_alert() 130 sc->rlayer.wrlmethod->write_records(sc->rlayer.wrl, &templ, 1)); in ssl3_dispatch_alert() 142 (void)BIO_flush(sc->wbio); in ssl3_dispatch_alert() 145 if (sc->msg_callback) in ssl3_dispatch_alert() 146 sc->msg_callback(1, sc->version, SSL3_RT_ALERT, sc->s3.send_alert, in ssl3_dispatch_alert() 150 cb = sc->info_callback; in ssl3_dispatch_alert() [all …]
|
A D | tls_srp.c | 233 if (sc == NULL) in SSL_srp_server_param_with_username() 249 if (sc == NULL) in SSL_set_srp_server_param_pw() 261 if (!SRP_create_verifier_BN_ex(user, pass, &sc->srp_ctx.s, &sc->srp_ctx.v, in SSL_set_srp_server_param_pw() 262 sc->srp_ctx.N, sc->srp_ctx.g, s->ctx->libctx, in SSL_set_srp_server_param_pw() 274 if (sc == NULL) in SSL_set_srp_server_param() 321 !(sc->srp_ctx.g) || !(sc->srp_ctx.s) || !(sc->srp_ctx.v)) in SSL_set_srp_server_param() 468 if (sc == NULL) in SRP_Calc_A_param() 478 if (sc == NULL) in SSL_get_srp_g() 490 if (sc == NULL) in SSL_get_srp_N() 502 if (sc == NULL) in SSL_get_srp_username() [all …]
|
A D | s3_lib.c | 3420 if (sc->s3.tmp.pkey == sc->s3.tmp.ks_pkey[i]) in ssl3_free() 3439 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); in ssl3_free() 3455 memset(&sc->s3, 0, sizeof(sc->s3)); in ssl3_free() 3471 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); in ssl3_clear() 3480 if (sc->s3.tmp.pkey == sc->s3.tmp.ks_pkey[i]) in ssl3_clear() 3503 memset(&sc->s3, 0, sizeof(sc->s3)); in ssl3_clear() 3786 sc->cert->key = sc->s3.tmp.cert; in ssl3_ctrl() 3870 if (sc->server || !sc->s3.tmp.cert_req) in ssl3_ctrl() 3922 if (sc->session == NULL || sc->s3.peer_tmp == NULL) { in ssl3_ctrl() 3933 if (sc->session == NULL || sc->s3.tmp.pkey == NULL) { in ssl3_ctrl() [all …]
|
A D | ssl_cert_comp.c | 203 if (sc == NULL in ssl_get_cert_to_compress() 205 || !sc->server in ssl_get_cert_to_compress() 266 if (sc == NULL in ssl_compress_certs() 311 if (sc == NULL in ssl_get_compressed_cert() 315 || !sc->server in ssl_get_compressed_cert() 376 if (sc == NULL) in SSL_set1_cert_comp_preference() 389 if (sc == NULL || sc->cert == NULL) in SSL_compress_certs() 418 if (sc == NULL) in SSL_get1_compressed_cert() 421 if (sc->cert != NULL) in SSL_get1_compressed_cert() 422 cpk = sc->cert->key; in SSL_get1_compressed_cert() [all …]
|
A D | t1_trce.c | 738 if (SSL_USE_SIGALGS(sc)) { in ssl_print_signature() 1027 if (SSL_CONNECTION_IS_DTLS(sc)) { in ssl_print_client_hello() 1362 if (SSL_CONNECTION_IS_TLS13(sc) in ssl_print_certificates() 1474 if (SSL_CONNECTION_IS_TLS13(sc)) { in ssl_print_cert_request() 1495 if (SSL_USE_SIGALGS(sc)) { in ssl_print_cert_request() 1549 if (SSL_CONNECTION_IS_TLS13(sc)) { in ssl_print_cert_request() 1577 if (SSL_CONNECTION_IS_TLS13(sc)) { in ssl_print_ticket() 1597 if (SSL_CONNECTION_IS_TLS13(sc) in ssl_print_ticket() 1622 if (SSL_CONNECTION_IS_DTLS(sc)) { in ssl_print_handshake() 1741 if (sc == NULL) in SSL_trace() [all …]
|
A D | d1_srtp.c | 153 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); in SSL_set_tlsext_use_srtp() local 155 if (sc == NULL) in SSL_set_tlsext_use_srtp() 158 return ssl_ctx_make_profiles(profiles, &sc->srtp_profiles); in SSL_set_tlsext_use_srtp() 163 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); in STACK_OF() local 165 if (sc != NULL) { in STACK_OF() 166 if (sc->srtp_profiles != NULL) { in STACK_OF() 167 return sc->srtp_profiles; in STACK_OF() 178 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); in SSL_get_selected_srtp_profile() local 180 if (sc == NULL) in SSL_get_selected_srtp_profile() 183 return sc->srtp_profile; in SSL_get_selected_srtp_profile()
|
A D | ssl_rsa.c | 37 if (sc == NULL) in SSL_use_certificate() 45 rv = ssl_security_cert(sc, NULL, x, 0, 1); in SSL_use_certificate() 51 return ssl_set_cert(sc->cert, x, SSL_CONNECTION_GET_CTX(sc)); in SSL_use_certificate() 88 if (sc == NULL) in SSL_use_certificate_file() 159 if (sc == NULL) in SSL_use_PrivateKey() 166 ret = ssl_set_pkey(sc->cert, pkey, SSL_CONNECTION_GET_CTX(sc)); in SSL_use_PrivateKey() 194 if (sc == NULL) in SSL_use_PrivateKey_file() 482 if (sc == NULL) in use_certificate_chain_file() 666 if (sc == NULL) { in serverinfoex_srv_add_cb() 984 SSL_CONNECTION *sc = NULL; in ssl_set_cert_and_key() local [all …]
|
A D | ssl_sess.c | 67 if (sc == NULL) in SSL_get_session() 70 return sc->session; in SSL_get_session() 898 if (sc == NULL) in SSL_set_session() 904 ssl_clear_bad_session(sc); in SSL_set_session() 915 SSL_SESSION_free(sc->session); in SSL_set_session() 916 sc->session = session; in SSL_set_session() 1157 if (sc == NULL) in SSL_set_session_secret_cb() 1170 if (sc == NULL) in SSL_set_session_ticket_ext_cb() 1182 if (sc == NULL) in SSL_set_session_ticket_ext() 1188 sc->ext.session_ticket = in SSL_set_session_ticket_ext() [all …]
|
A D | ssl_cert.c | 616 if (sc == NULL) in SSL_set0_CA_list() 636 if (sc == NULL) in STACK_OF() 639 return sc->ca_names != NULL ? sc->ca_names : s->ctx->ca_names; in STACK_OF() 656 if (sc == NULL) in SSL_set_client_CA_list() 666 if (sc == NULL) in STACK_OF() 676 if (sc == NULL) in STACK_OF() 679 if (!sc->server) in STACK_OF() 681 return sc->client_ca_names != NULL ? sc->client_ca_names in STACK_OF() 708 if (sc == NULL) in SSL_add1_to_CA_list() 727 if (sc == NULL) in SSL_add_client_CA() [all …]
|
A D | ssl_stat.c | 17 const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); in SSL_state_string_long() local 19 if (sc == NULL || ossl_statem_in_error(sc)) in SSL_state_string_long() 134 const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); in SSL_state_string() local 136 if (sc == NULL || ossl_statem_in_error(sc)) in SSL_state_string()
|
A D | d1_msg.c | 17 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); in dtls1_write_app_data_bytes() local 19 if (sc == NULL) in dtls1_write_app_data_bytes() 22 if (SSL_in_init(s) && !ossl_statem_get_in_handshake(sc)) { in dtls1_write_app_data_bytes() 23 i = sc->handshake_func(s); in dtls1_write_app_data_bytes() 37 return dtls1_write_bytes(sc, type, buf_, len, written); in dtls1_write_app_data_bytes()
|
A D | ssl_conf.c | 452 if (sc != NULL) { in cmd_Certificate() 454 c = sc->cert; in cmd_Certificate() 513 if (sc == NULL) in do_store() 516 cert = sc->cert; in do_store() 1063 if (sc != NULL) in SSL_CONF_CTX_finish() 1064 c = sc->cert; in SSL_CONF_CTX_finish() 1149 if (sc == NULL) in SSL_CONF_CTX_set_ssl() 1151 cctx->poptions = &sc->options; in SSL_CONF_CTX_set_ssl() 1152 cctx->min_version = &sc->min_proto_version; in SSL_CONF_CTX_set_ssl() 1154 cctx->pcert_flags = &sc->cert->cert_flags; in SSL_CONF_CTX_set_ssl() [all …]
|
/ssl/quic/ |
A D | quic_tls_api.c | 21 if (sc == NULL) in crypto_send_cb() 23 return sc->qtcb.crypto_send_cb(s, buf, buf_len, consumed, sc->qtarg); in crypto_send_cb() 32 if (sc == NULL) in crypto_recv_rcd_cb() 34 return sc->qtcb.crypto_recv_rcd_cb(s, buf, bytes_read, sc->qtarg); in crypto_recv_rcd_cb() 42 if (sc == NULL) in crypto_release_rcd_cb() 44 return sc->qtcb.crypto_release_rcd_cb(s, bytes_read, sc->qtarg); in crypto_release_rcd_cb() 54 if (sc == NULL) in yield_secret_cb() 67 if (sc == NULL) in got_transport_params_cb() 77 if (sc == NULL) in alert_cb() 79 return sc->qtcb.alert_cb(s, alert_code, sc->qtarg); in alert_cb() [all …]
|
A D | quic_tls.c | 743 sc->s3.flags |= TLS1_FLAGS_QUIC; in ossl_quic_tls_configure() 785 if (sc == NULL) in ossl_quic_tls_tick() 787 sctx = SSL_CONNECTION_GET_CTX(sc); in ossl_quic_tls_tick() 799 if (sc->ext.alpn == NULL || sc->ext.alpn_len == 0) in ossl_quic_tls_tick() 902 if (sc == NULL) in ossl_quic_tls_is_cert_request() 928 if (sc == NULL || !SSL_IS_QUIC_HANDSHAKE(sc) || !SSL_in_before(qtls->args.s)) in ossl_quic_tls_set_early_data_enabled() 932 sc->max_early_data = 0; in ossl_quic_tls_set_early_data_enabled() 937 if (sc->server) { in ossl_quic_tls_set_early_data_enabled() 938 sc->max_early_data = 0xffffffff; in ossl_quic_tls_set_early_data_enabled() 943 if ((sc->session == NULL || sc->session->ext.max_early_data != 0xffffffff) in ossl_quic_tls_set_early_data_enabled() [all …]
|
/ssl/statem/ |
A D | extensions.c | 1786 memset(sc->ext.compress_certificate_from_peer, 0, in tls_init_compress_certificate() 1803 if (sc->server && sc->ext.server_cert_type != TLSEXT_cert_type_x509) { in tls_construct_compress_certificate() 1804 sc->cert_comp_prefs[0] = TLSEXT_comp_cert_none; in tls_construct_compress_certificate() 1809 if (!sc->server && sc->ext.client_cert_type_ctos) { in tls_construct_compress_certificate() 1810 sc->cert_comp_prefs[0] = TLSEXT_comp_cert_none; in tls_construct_compress_certificate() 1833 sc->ext.compress_certificate_sent = 1; in tls_construct_compress_certificate() 1859 if (sc->cert_comp_prefs[i] == alg) in tls_comp_in_pref() 1879 if (sc->server && sc->ext.server_cert_type != TLSEXT_cert_type_x509) in tls_parse_compress_certificate() 1881 if (!sc->server && sc->ext.client_cert_type != TLSEXT_cert_type_x509) in tls_parse_compress_certificate() 1918 if (sc->server) { in init_server_cert_type() [all …]
|
A D | statem_lib.c | 48 if (sc == NULL) in ossl_statem_set_mutator() 52 sc->statem.mutatearg = mutatearg; in ossl_statem_set_mutator() 1117 if (sc->session->peer_rpk != NULL) in tls_get_peer_pkey() 1118 return sc->session->peer_rpk; in tls_get_peer_pkey() 1119 if (sc->session->peer != NULL) in tls_get_peer_pkey() 1211 if (SSL_CONNECTION_IS_TLS13(sc)) { in tls_process_rpk() 1216 if (sc->server) { in tls_process_rpk() 1223 if (!PACKET_equal(&context, sc->pha_context, sc->pha_context_len)) { in tls_process_rpk() 1253 if (SSL_CONNECTION_IS_TLS13(sc)) { in tls_process_rpk() 1288 if (SSL_CONNECTION_IS_TLS13(sc)) { in tls_process_rpk() [all …]
|
A D | extensions_srvr.c | 2269 && (send_certificate_request(sc) in tls_construct_stoc_client_cert_type() 2285 if ((!send_certificate_request(sc) && sc->post_handshake_auth != SSL_PHA_EXT_RECEIVED) in tls_construct_stoc_client_cert_type() 2287 || sc->client_cert_type == NULL) { in tls_construct_stoc_client_cert_type() 2290 sc->ext.client_cert_type = TLSEXT_cert_type_x509; in tls_construct_stoc_client_cert_type() 2329 if (sc->client_cert_type == NULL) { in tls_parse_ctos_client_cert_type() 2331 sc->ext.client_cert_type = TLSEXT_cert_type_x509; in tls_parse_ctos_client_cert_type() 2352 … sc->client_cert_type, sc->client_cert_type_len, in tls_parse_ctos_client_cert_type() 2368 || sc->server_cert_type == NULL) { in tls_construct_stoc_server_cert_type() 2371 sc->ext.server_cert_type = TLSEXT_cert_type_x509; in tls_construct_stoc_server_cert_type() 2394 if (sc->server_cert_type == NULL) { in tls_parse_ctos_server_cert_type() [all …]
|
A D | statem.c | 78 if (sc == NULL) in SSL_get_state() 81 return sc->statem.hand_state; in SSL_get_state() 88 if (sc == NULL) in SSL_in_init() 91 return sc->statem.in_init; in SSL_in_init() 98 if (sc == NULL) in SSL_is_init_finished() 101 return !(sc->statem.in_init) && (sc->statem.hand_state == TLS_ST_OK); in SSL_is_init_finished() 108 if (sc == NULL) in SSL_in_before() 298 if (sc == NULL) in ossl_statem_connect() 301 return state_machine(sc, 0); in ossl_statem_connect() 308 if (sc == NULL) in ossl_statem_accept() [all …]
|
A D | statem_clnt.c | 46 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; in received_server_cert() 1942 sc->rwstate = SSL_NOTHING; in tls_post_process_server_rpk() 1945 v_ok = ssl_verify_rpk(sc, sc->session->peer_rpk); in tls_post_process_server_rpk() 1948 SSLfatal(sc, ssl_x509err2alert(sc->verify_result), in tls_post_process_server_rpk() 1976 X509_free(sc->session->peer); in tls_post_process_server_rpk() 1977 sc->session->peer = NULL; in tls_post_process_server_rpk() 1980 sc->session->verify_result = sc->verify_result; in tls_post_process_server_rpk() 1984 && !ssl_handshake_hash(sc, sc->cert_verify_hash, in tls_post_process_server_rpk() 3912 if (sc->pha_context == NULL) { in tls_construct_client_compressed_certificate() 3916 } else if (!WPACKET_sub_memcpy_u8(&tmppkt, sc->pha_context, sc->pha_context_len)) in tls_construct_client_compressed_certificate() [all …]
|
A D | extensions_clnt.c | 2171 if (sc->client_cert_type == NULL) in tls_construct_ctos_client_cert_type() 2176 || !WPACKET_sub_memcpy_u8(pkt, sc->client_cert_type, sc->client_cert_type_len) in tls_construct_ctos_client_cert_type() 2205 if (sc->client_cert_type == NULL) { in tls_parse_stoc_client_cert_type() 2210 if (memchr(sc->client_cert_type, type, sc->client_cert_type_len) == NULL) { in tls_parse_stoc_client_cert_type() 2211 SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_VALUE); in tls_parse_stoc_client_cert_type() 2214 sc->ext.client_cert_type = type; in tls_parse_stoc_client_cert_type() 2223 if (sc->server_cert_type == NULL) in tls_construct_ctos_server_cert_type() 2228 || !WPACKET_sub_memcpy_u8(pkt, sc->server_cert_type, sc->server_cert_type_len) in tls_construct_ctos_server_cert_type() 2257 if (sc->server_cert_type == NULL) { in tls_parse_stoc_server_cert_type() 2262 if (memchr(sc->server_cert_type, type, sc->server_cert_type_len) == NULL) { in tls_parse_stoc_server_cert_type() [all …]
|
A D | statem_local.h | 136 __owur MSG_PROCESS_RETURN tls13_process_compressed_certificate(SSL_CONNECTION *sc, 176 __owur MSG_PROCESS_RETURN tls_process_server_rpk(SSL_CONNECTION *sc, 178 __owur MSG_PROCESS_RETURN tls_process_client_rpk(SSL_CONNECTION *sc, 180 __owur unsigned long tls_output_rpk(SSL_CONNECTION *sc, WPACKET *pkt, 547 __owur EVP_PKEY* tls_get_peer_pkey(const SSL_CONNECTION *sc); 549 EXT_RETURN tls_construct_ctos_client_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, 552 EXT_RETURN tls_construct_stoc_client_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, 555 int tls_parse_ctos_client_cert_type(SSL_CONNECTION *sc, PACKET *pkt, 558 int tls_parse_stoc_client_cert_type(SSL_CONNECTION *sc, PACKET *pkt, 561 EXT_RETURN tls_construct_ctos_server_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, [all …]
|
A D | statem_srvr.c | 57 return sc->session->peer_rpk != NULL || sc->session->peer != NULL; in received_client_cert() 397 if (sc->s3.tmp.cert == NULL) in get_compressed_certificate_alg() 3563 SSLfatal(sc, ssl_x509err2alert(sc->verify_result), in tls_process_client_rpk() 3584 sc->session = new_sess; in tls_process_client_rpk() 3588 X509_free(sc->session->peer); in tls_process_client_rpk() 3589 sc->session->peer = NULL; in tls_process_client_rpk() 3591 sc->session->peer_chain = NULL; in tls_process_client_rpk() 3594 sc->session->peer_rpk = peer_rpk; in tls_process_client_rpk() 3597 sc->session->verify_result = sc->verify_result; in tls_process_client_rpk() 3610 if (!ssl_handshake_hash(sc, sc->cert_verify_hash, in tls_process_client_rpk() [all …]
|