Lines Matching defs:ssl
28 static int ssl_undefined_function_1(SSL *ssl, SSL3_RECORD *r, size_t s, int t,
31 return ssl_undefined_function(ssl);
34 static int ssl_undefined_function_2(SSL *ssl, SSL3_RECORD *r, unsigned char *s,
37 return ssl_undefined_function(ssl);
40 static int ssl_undefined_function_3(SSL *ssl, unsigned char *r,
43 return ssl_undefined_function(ssl);
46 static int ssl_undefined_function_4(SSL *ssl, int r)
48 return ssl_undefined_function(ssl);
51 static size_t ssl_undefined_function_5(SSL *ssl, const char *r, size_t s,
54 return ssl_undefined_function(ssl);
62 static int ssl_undefined_function_7(SSL *ssl, unsigned char *r, size_t s,
66 return ssl_undefined_function(ssl);
565 * Define a VPROC function for HP NonStop build ssl library.
902 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
909 ssl->sid_ctx_length = sid_ctx_len;
910 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len);
924 int SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb)
926 if (!CRYPTO_THREAD_write_lock(ssl->lock))
928 ssl->generate_session_id = cb;
929 CRYPTO_THREAD_unlock(ssl->lock);
933 int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
948 r.ssl_version = ssl->version;
952 if (!CRYPTO_THREAD_read_lock(ssl->session_ctx->lock))
954 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r);
955 CRYPTO_THREAD_unlock(ssl->session_ctx->lock);
1092 unsigned long SSL_dane_set_flags(SSL *ssl, unsigned long flags)
1094 unsigned long orig = ssl->dane.flags;
1096 ssl->dane.flags |= flags;
1100 unsigned long SSL_dane_clear_flags(SSL *ssl, unsigned long flags)
1102 unsigned long orig = ssl->dane.flags;
1104 ssl->dane.flags &= ~flags;
1167 int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm)
1169 return X509_VERIFY_PARAM_set1(ssl->param, vpm);
1177 X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl)
1179 return ssl->param;
1681 int SSL_check_private_key(const SSL *ssl)
1683 if (ssl == NULL) {
1687 if (ssl->cert->key->x509 == NULL) {
1691 if (ssl->cert->key->privatekey == NULL) {
1695 return X509_check_private_key(ssl->cert->key->x509,
1696 ssl->cert->key->privatekey);
2477 const void *buf, size_t len, SSL *ssl,
2626 const void *buf, size_t len, SSL *ssl,
3108 * SSL_set_alpn_protos sets the ALPN protocol list on |ssl| to |protos|.
3112 int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
3118 OPENSSL_free(ssl->ext.alpn);
3119 ssl->ext.alpn = NULL;
3120 ssl->ext.alpn_len = 0;
3132 OPENSSL_free(ssl->ext.alpn);
3133 ssl->ext.alpn = alpn;
3134 ssl->ext.alpn_len = protos_len;
3153 * SSL_get0_alpn_selected gets the selected ALPN protocol (if any) from |ssl|.
3158 void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
3161 *data = ssl->s3.alpn_selected;
3165 *len = (unsigned int)ssl->s3.alpn_selected_len;
3234 * via ssl.h.
3610 void SSL_CTX_set_cert_cb(SSL_CTX *c, int (*cb) (SSL *ssl, void *arg), void *arg)
3615 void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg)
4347 SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl)
4349 return ssl->ctx;
4352 SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx)
4355 if (ssl->ctx == ctx)
4356 return ssl->ctx;
4358 ctx = ssl->session_ctx;
4364 if (!custom_exts_copy_flags(&new_cert->custext, &ssl->cert->custext)) {
4369 ssl_cert_free(ssl->cert);
4370 ssl->cert = new_cert;
4376 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx)))
4382 * not match (i.e., it was set per-ssl with SSL_set_session_id_context),
4385 if ((ssl->ctx != NULL) &&
4386 (ssl->sid_ctx_length == ssl->ctx->sid_ctx_length) &&
4387 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) {
4388 ssl->sid_ctx_length = ctx->sid_ctx_length;
4389 memcpy(&ssl->sid_ctx, &ctx->sid_ctx, sizeof(ssl->sid_ctx));
4393 SSL_CTX_free(ssl->ctx); /* decrement reference count */
4394 ssl->ctx = ctx;
4396 return ssl->ctx;
4489 void SSL_set_info_callback(SSL *ssl,
4490 void (*cb) (const SSL *ssl, int type, int val))
4492 ssl->info_callback = cb;
4499 void (*SSL_get_info_callback(const SSL *ssl)) (const SSL * /* ssl */ ,
4502 return ssl->info_callback;
4505 void SSL_set_verify_result(SSL *ssl, long arg)
4507 ssl->verify_result = arg;
4510 long SSL_get_verify_result(const SSL *ssl)
4512 return ssl->verify_result;
4515 size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen)
4518 return sizeof(ssl->s3.client_random);
4519 if (outlen > sizeof(ssl->s3.client_random))
4520 outlen = sizeof(ssl->s3.client_random);
4521 memcpy(out, ssl->s3.client_random, outlen);
4525 size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen)
4528 return sizeof(ssl->s3.server_random);
4529 if (outlen > sizeof(ssl->s3.server_random))
4530 outlen = sizeof(ssl->s3.server_random);
4531 memcpy(out, ssl->s3.server_random, outlen);
4697 size_t len, SSL *ssl, void *arg))
4702 void SSL_set_msg_callback(SSL *ssl,
4705 size_t len, SSL *ssl, void *arg))
4707 SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb);
4711 int (*cb) (SSL *ssl,
4719 void SSL_set_not_resumable_session_callback(SSL *ssl,
4720 int (*cb) (SSL *ssl,
4723 SSL_callback_ctrl(ssl, SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB,
4728 size_t (*cb) (SSL *ssl, int type,
4756 int SSL_set_record_padding_callback(SSL *ssl,
4757 size_t (*cb) (SSL *ssl, int type,
4762 b = SSL_get_wbio(ssl);
4764 ssl->record_padding_cb = cb;
4770 void SSL_set_record_padding_callback_arg(SSL *ssl, void *arg)
4772 ssl->record_padding_arg = arg;
4775 void *SSL_get_record_padding_callback_arg(const SSL *ssl)
4777 return ssl->record_padding_arg;
4780 int SSL_set_block_padding(SSL *ssl, size_t block_size)
4784 ssl->block_padding = 0;
4786 ssl->block_padding = block_size;
5505 int SSL_free_buffers(SSL *ssl)
5507 RECORD_LAYER *rl = &ssl->rlayer;
5519 int SSL_alloc_buffers(SSL *ssl)
5521 return ssl3_setup_buffers(ssl);
5535 SSL *ssl,
5547 if (ssl->ctx->keylog_callback == NULL)
5561 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
5581 ssl->ctx->keylog_callback(ssl, (const char *)out);
5587 int ssl_log_rsa_client_key_exchange(SSL *ssl,
5594 SSLfatal(ssl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
5600 ssl,
5607 int ssl_log_secret(SSL *ssl,
5613 ssl,
5614 ssl->s3.client_random,
5832 __owur unsigned int ssl_get_max_send_fragment(const SSL *ssl)
5835 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session))
5836 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5839 return ssl->max_send_fragment;
5842 __owur unsigned int ssl_get_split_send_fragment(const SSL *ssl)
5845 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session)
5846 && ssl->split_send_fragment > GET_MAX_FRAGMENT_LENGTH(ssl->session))
5847 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5850 if (ssl->split_send_fragment > ssl->max_send_fragment)
5851 return ssl->max_send_fragment;
5854 return ssl->split_send_fragment;
5885 void SSL_set_post_handshake_auth(SSL *ssl, int val)
5887 ssl->pha_enabled = val;
5890 int SSL_verify_client_post_handshake(SSL *ssl)
5892 if (!SSL_IS_TLS13(ssl)) {
5896 if (!ssl->server) {
5901 if (!SSL_is_init_finished(ssl)) {
5906 switch (ssl->post_handshake_auth) {
5924 ssl->post_handshake_auth = SSL_PHA_REQUEST_PENDING;
5927 if (!send_certificate_request(ssl)) {
5928 ssl->post_handshake_auth = SSL_PHA_EXT_RECEIVED; /* restore on error */
5933 ossl_statem_set_in_init(ssl, 1);