Lines Matching defs:ssl

28 static int ssl_undefined_function_1(SSL *ssl, SSL3_RECORD *r, size_t s, int t,
31 return ssl_undefined_function(ssl);
34 static int ssl_undefined_function_2(SSL *ssl, SSL3_RECORD *r, unsigned char *s,
37 return ssl_undefined_function(ssl);
40 static int ssl_undefined_function_3(SSL *ssl, unsigned char *r,
43 return ssl_undefined_function(ssl);
46 static int ssl_undefined_function_4(SSL *ssl, int r)
48 return ssl_undefined_function(ssl);
51 static size_t ssl_undefined_function_5(SSL *ssl, const char *r, size_t s,
54 return ssl_undefined_function(ssl);
62 static int ssl_undefined_function_7(SSL *ssl, unsigned char *r, size_t s,
66 return ssl_undefined_function(ssl);
554 * Define a VPROC function for HP NonStop build ssl library.
891 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
898 ssl->sid_ctx_length = sid_ctx_len;
899 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len);
913 int SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb)
915 if (!CRYPTO_THREAD_write_lock(ssl->lock))
917 ssl->generate_session_id = cb;
918 CRYPTO_THREAD_unlock(ssl->lock);
922 int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
937 r.ssl_version = ssl->version;
941 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock))
943 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r);
944 CRYPTO_THREAD_unlock(ssl->session_ctx->lock);
1081 unsigned long SSL_dane_set_flags(SSL *ssl, unsigned long flags)
1083 unsigned long orig = ssl->dane.flags;
1085 ssl->dane.flags |= flags;
1089 unsigned long SSL_dane_clear_flags(SSL *ssl, unsigned long flags)
1091 unsigned long orig = ssl->dane.flags;
1093 ssl->dane.flags &= ~flags;
1156 int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm)
1158 return X509_VERIFY_PARAM_set1(ssl->param, vpm);
1166 X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl)
1168 return ssl->param;
1666 int SSL_check_private_key(const SSL *ssl)
1668 if (ssl == NULL) {
1672 if (ssl->cert->key->x509 == NULL) {
1676 if (ssl->cert->key->privatekey == NULL) {
1680 return X509_check_private_key(ssl->cert->key->x509,
1681 ssl->cert->key->privatekey);
2462 const void *buf, size_t len, SSL *ssl,
2611 const void *buf, size_t len, SSL *ssl,
3093 * SSL_set_alpn_protos sets the ALPN protocol list on |ssl| to |protos|.
3097 int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
3103 OPENSSL_free(ssl->ext.alpn);
3104 ssl->ext.alpn = NULL;
3105 ssl->ext.alpn_len = 0;
3117 OPENSSL_free(ssl->ext.alpn);
3118 ssl->ext.alpn = alpn;
3119 ssl->ext.alpn_len = protos_len;
3138 * SSL_get0_alpn_selected gets the selected ALPN protocol (if any) from |ssl|.
3143 void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
3146 *data = ssl->s3.alpn_selected;
3150 *len = (unsigned int)ssl->s3.alpn_selected_len;
3219 * via ssl.h.
3595 void SSL_CTX_set_cert_cb(SSL_CTX *c, int (*cb) (SSL *ssl, void *arg), void *arg)
3600 void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg)
4332 SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl)
4334 return ssl->ctx;
4337 SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx)
4340 if (ssl->ctx == ctx)
4341 return ssl->ctx;
4343 ctx = ssl->session_ctx;
4349 if (!custom_exts_copy_flags(&new_cert->custext, &ssl->cert->custext)) {
4354 ssl_cert_free(ssl->cert);
4355 ssl->cert = new_cert;
4361 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx)))
4367 * not match (i.e., it was set per-ssl with SSL_set_session_id_context),
4370 if ((ssl->ctx != NULL) &&
4371 (ssl->sid_ctx_length == ssl->ctx->sid_ctx_length) &&
4372 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) {
4373 ssl->sid_ctx_length = ctx->sid_ctx_length;
4374 memcpy(&ssl->sid_ctx, &ctx->sid_ctx, sizeof(ssl->sid_ctx));
4378 SSL_CTX_free(ssl->ctx); /* decrement reference count */
4379 ssl->ctx = ctx;
4381 return ssl->ctx;
4474 void SSL_set_info_callback(SSL *ssl,
4475 void (*cb) (const SSL *ssl, int type, int val))
4477 ssl->info_callback = cb;
4484 void (*SSL_get_info_callback(const SSL *ssl)) (const SSL * /* ssl */ ,
4487 return ssl->info_callback;
4490 void SSL_set_verify_result(SSL *ssl, long arg)
4492 ssl->verify_result = arg;
4495 long SSL_get_verify_result(const SSL *ssl)
4497 return ssl->verify_result;
4500 size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen)
4503 return sizeof(ssl->s3.client_random);
4504 if (outlen > sizeof(ssl->s3.client_random))
4505 outlen = sizeof(ssl->s3.client_random);
4506 memcpy(out, ssl->s3.client_random, outlen);
4510 size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen)
4513 return sizeof(ssl->s3.server_random);
4514 if (outlen > sizeof(ssl->s3.server_random))
4515 outlen = sizeof(ssl->s3.server_random);
4516 memcpy(out, ssl->s3.server_random, outlen);
4682 size_t len, SSL *ssl, void *arg))
4687 void SSL_set_msg_callback(SSL *ssl,
4690 size_t len, SSL *ssl, void *arg))
4692 SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb);
4696 int (*cb) (SSL *ssl,
4704 void SSL_set_not_resumable_session_callback(SSL *ssl,
4705 int (*cb) (SSL *ssl,
4708 SSL_callback_ctrl(ssl, SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB,
4713 size_t (*cb) (SSL *ssl, int type,
4741 int SSL_set_record_padding_callback(SSL *ssl,
4742 size_t (*cb) (SSL *ssl, int type,
4747 b = SSL_get_wbio(ssl);
4749 ssl->record_padding_cb = cb;
4755 void SSL_set_record_padding_callback_arg(SSL *ssl, void *arg)
4757 ssl->record_padding_arg = arg;
4760 void *SSL_get_record_padding_callback_arg(const SSL *ssl)
4762 return ssl->record_padding_arg;
4765 int SSL_set_block_padding(SSL *ssl, size_t block_size)
4769 ssl->block_padding = 0;
4771 ssl->block_padding = block_size;
5490 int SSL_free_buffers(SSL *ssl)
5492 RECORD_LAYER *rl = &ssl->rlayer;
5504 int SSL_alloc_buffers(SSL *ssl)
5506 return ssl3_setup_buffers(ssl);
5520 SSL *ssl,
5532 if (ssl->ctx->keylog_callback == NULL)
5546 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
5566 ssl->ctx->keylog_callback(ssl, (const char *)out);
5572 int ssl_log_rsa_client_key_exchange(SSL *ssl,
5579 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
5585 ssl,
5592 int ssl_log_secret(SSL *ssl,
5598 ssl,
5599 ssl->s3.client_random,
5817 __owur unsigned int ssl_get_max_send_fragment(const SSL *ssl)
5820 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session))
5821 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5824 return ssl->max_send_fragment;
5827 __owur unsigned int ssl_get_split_send_fragment(const SSL *ssl)
5830 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session)
5831 && ssl->split_send_fragment > GET_MAX_FRAGMENT_LENGTH(ssl->session))
5832 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5835 if (ssl->split_send_fragment > ssl->max_send_fragment)
5836 return ssl->max_send_fragment;
5839 return ssl->split_send_fragment;
5870 void SSL_set_post_handshake_auth(SSL *ssl, int val)
5872 ssl->pha_enabled = val;
5875 int SSL_verify_client_post_handshake(SSL *ssl)
5877 if (!SSL_IS_TLS13(ssl)) {
5881 if (!ssl->server) {
5886 if (!SSL_is_init_finished(ssl)) {
5891 switch (ssl->post_handshake_auth) {
5909 ssl->post_handshake_auth = SSL_PHA_REQUEST_PENDING;
5912 if (!send_certificate_request(ssl)) {
5913 ssl->post_handshake_auth = SSL_PHA_EXT_RECEIVED; /* restore on error */
5918 ossl_statem_set_in_init(ssl, 1);