HomeSort by relevance Sort by last modified time
    Searched refs:SSL (Results 1 - 25 of 155) sorted by null

1 2 3 4 5 6 7

  /external/boringssl/src/ssl/test/
handshake_util.h 24 // RetryAsync is called after a failed operation on |ssl| with return code
27 bool RetryAsync(SSL *ssl, int ret);
29 // CheckIdempotentError runs |func|, an operation on |ssl|, ensuring that
31 int CheckIdempotentError(const char *name, SSL *ssl, std::function<int()> func);
33 // DoSplitHandshake delegates the SSL handshake to a separate process, called
35 // client, using the |BIO| from |ssl|. After a successful handshake, |ssl| is
36 // replaced with a new |SSL| object, in a way that is intended to be invisibl
    [all...]
  /external/curl/docs/cmdline-opts/
ssl-reqd.d 1 Long: ssl-reqd
2 Help: Require SSL/TLS
6 Require SSL/TLS for the connection. Terminates the connection if the server
7 doesn't support SSL/TLS.
9 This option was formerly known as --ftp-ssl-reqd.
ssl.d 1 Long: ssl
2 Help: Try SSL/TLS
7 Try to use SSL/TLS for the connection. Reverts to a non-secure connection if
8 the server doesn't support SSL/TLS. See also --ftp-ssl-control and --ssl-reqd
11 This option was formerly known as --ftp-ssl (Added in 7.11.0). That option
no-sessionid.d 2 Help: Disable SSL session-ID reusing
6 Disable curl's use of SSL session-ID caching. By default all transfers are
8 attempting to reuse SSL session-IDs, there seem to be broken SSL
ftp-ssl-control.d 1 Long: ftp-ssl-control
2 Help: Require SSL/TLS for FTP login, clear for transfer
6 Require SSL/TLS for the FTP login, clear for transfer. Allows secure
8 transfer if the server doesn't support SSL/TLS.
sslv2.d 4 Protocols: SSL
11 Forces curl to use SSL version 2 when negotiating with a remote SSL
sslv3.d 4 Protocols: SSL
11 Forces curl to use SSL version 3 when negotiating with a remote SSL
proxy-ciphers.d 3 Help: SSL ciphers to use for proxy
ciphers.d 3 Help: SSL ciphers to use
7 specify valid ciphers. Read up on SSL cipher list details on this URL:
9 https://curl.haxx.se/docs/ssl-ciphers.html
insecure.d 3 Help: Allow insecure server connections when using SSL
8 By default, every SSL connection curl makes is verified to be secure. This
  /external/conscrypt/common/src/jni/main/include/conscrypt/
scoped_ssl_bio.h 20 #include <openssl/ssl.h>
25 * Sets the read and write BIO for an SSL connection and removes it when it goes out of scope.
30 ScopedSslBio(SSL* ssl, BIO* rbio, BIO* wbio) : ssl_(ssl) {
41 SSL* const ssl_;
ssl_error.h 20 #include <openssl/ssl.h>
25 * Manages the freeing of the SSL error stack. This allows you to
26 * instantiate this object during an SSL call that may fail and not worry
36 SslError(SSL* ssl, int returnCode) : sslError_(SSL_ERROR_NONE), released_(false) {
37 reset(ssl, returnCode);
50 void reset(SSL* ssl, int returnCode) {
52 sslError_ = SSL_get_error(ssl, returnCode);
  /external/boringssl/src/include/openssl/
ssl.h 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
175 // SSL implementation.
178 // SSL contexts.
215 // SSL connections.
217 // An |SSL| object represents a single TLS or DTLS connection. Although the
218 // shared |SSL_CTX| is thread-safe, an |SSL| is not thread-safe and may only be
221 // SSL_new returns a newly-allocated |SSL| using |ctx| or NULL on error. The ne
1445 OPENSSL_EXPORT STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *ssl); variable
1479 OPENSSL_EXPORT STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *ssl); variable
1491 OPENSSL_EXPORT STACK_OF(X509) *SSL_get_peer_full_cert_chain(const SSL *ssl); variable
1500 SSL_get0_peer_certificates(const SSL *ssl); variable
2548 OPENSSL_EXPORT STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *ssl); variable
2558 SSL_get0_server_requested_CAs(const SSL *ssl); variable
2942 SSL *ssl); variable
3599 SSL *ssl; member in struct:ssl_early_callback_ctx
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.h 2 * SSL/TLS interface functions for OpenSSL
16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
  /external/boringssl/src/ssl/
ssl_lib.cc 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
141 #include <openssl/ssl.h>
169 OPENSSL_DECLARE_ERROR_REASON(SSL, UNKNOWN_PROTOCOL)
173 OPENSSL_DECLARE_ERROR_REASON(SSL, BLOCK_CIPHER_PAD_IS_WRONG)
174 OPENSSL_DECLARE_ERROR_REASON(SSL, NO_CIPHERS_SPECIFIED)
194 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
201 void ssl_reset_error_state(SSL *ssl)
276 SSL *const ssl = hs->ssl; local
669 UniquePtr<SSL> ssl = MakeUnique<SSL>(ctx); local
    [all...]
ssl_asn1.cc 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
83 #include <openssl/ssl.h>
214 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
225 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
234 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
241 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
251 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE)
    [all...]
d1_lib.cc 57 #include <openssl/ssl.h>
88 bool dtls1_new(SSL *ssl) {
89 if (!ssl3_new(ssl)) {
94 ssl3_free(ssl);
98 ssl->d1 = d1.release();
105 ssl->version = DTLS1_2_VERSION;
109 void dtls1_free(SSL *ssl) {
110 ssl3_free(ssl);
    [all...]
internal.h 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
159 #include <openssl/ssl.h>
194 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
317 OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW);
322 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
405 // ssl_protocol_version returns |ssl|'s protocol version. It is an error to
407 uint16_t ssl_protocol_version(const SSL *ssl)
1423 SSL *ssl; member in struct:SSL_HANDSHAKE
2465 SSL *const ssl = nullptr; member in struct:SSL_CONFIG
    [all...]
ssl_file.cc 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
111 #include <openssl/ssl.h>
143 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
158 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
209 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
252 int SSL_use_certificate_file(SSL *ssl, const char *file, int type)
    [all...]
d1_srtp.cc 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
117 #include <openssl/ssl.h>
167 OPENSSL_PUT_ERROR(SSL, SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
179 OPENSSL_PUT_ERROR(SSL, SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE);
200 int SSL_set_srtp_profiles(SSL *ssl, const char *profiles) {
201 return ssl->config != nullptr &
    [all...]
tls13_both.cc 15 #include <openssl/ssl.h>
61 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
67 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
83 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
91 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
100 OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
109 SSL *const ssl = hs->ssl; local
122 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR)
342 SSL *const ssl = hs->ssl; local
390 SSL *const ssl = hs->ssl; local
420 SSL *const ssl = hs->ssl; local
554 SSL *const ssl = hs->ssl; local
604 SSL *const ssl = hs->ssl; local
    [all...]
bio_ssl.cc 10 #include <openssl/ssl.h>
15 static SSL *get_ssl(BIO *bio) {
16 return reinterpret_cast<SSL *>(bio->ptr);
20 SSL *ssl = get_ssl(bio); local
21 if (ssl == NULL) {
27 const int ret = SSL_read(ssl, out, outl);
29 switch (SSL_get_error(ssl, ret)) {
60 SSL *ssl = get_ssl(bio) local
94 SSL *ssl = get_ssl(bio); local
141 SSL *ssl = get_ssl(bio); local
156 SSL *ssl = get_ssl(bio); local
    [all...]
ssl_privkey.cc 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
57 #include <openssl/ssl.h>
81 OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE);
146 static bool pkey_supports_algorithm(const SSL *ssl, EVP_PKEY *pkey,
154 if (ssl_protocol_version(ssl) >= TLS1_3_VERSION) {
172 static bool setup_ctx(SSL *ssl, EVP_MD_CTX *ctx, EVP_PKEY *pkey
203 SSL *const ssl = hs->ssl; local
249 SSL *const ssl = hs->ssl; local
283 SSL *const ssl = hs->ssl; local
    [all...]
  /external/boringssl/src/decrepit/ssl/
ssl_decrepit.c 4 * This package is an SSL implementation written
6 * The implementation was written so as to conform with Netscapes SSL.
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
111 #include <openssl/ssl.h>
127 OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB);
139 OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB);
149 OPENSSL_PUT_ERROR(SSL, SSL_R_PATH_TOO_LONG);
  /device/linaro/bootloader/edk2/CryptoPkg/Library/TlsLib/
InternalTlsLib.h 19 #include <openssl/ssl.h>
25 // Main SSL Connection which is created by a server or a client
28 SSL *Ssl;
30 // Memory BIO for the TLS/SSL Reading operations.
34 // Memory BIO for the TLS/SSL Writing operations.

Completed in 441 milliseconds

1 2 3 4 5 6 7