Home | History | Annotate | Download | only in crypto

Lines Matching full:conn

118 	struct tls_connection *conn;
120 conn = os_zalloc(sizeof(*conn));
121 if (conn == NULL)
123 conn->start = 1;
125 return conn;
129 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn)
131 if (conn == NULL)
134 os_free(conn);
138 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn)
140 return conn ? conn->established : 0;
144 int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn)
147 if (conn == NULL)
150 conn->eap_tls_prf_set = 0;
151 conn->established = conn->failed = 0;
152 conn->read_alerts = conn->write_alerts = 0;
153 global->sspi->DeleteSecurityContext(&conn->context);
173 int tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn,
180 int tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn,
188 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
201 if (conn == NULL || !conn->eap_tls_prf_set || server_random_first ||
203 out_len > sizeof(conn->eap_tls_prf))
206 os_memcpy(out, conn->eap_tls_prf, out_len);
213 struct tls_connection *conn)
239 &conn->creds, NULL, NULL /* server name */, sspi_flags, 0,
240 SECURITY_NATIVE_DREP, NULL, 0, &conn->context,
244 &conn->creds, NULL, NULL /* server name */, sspi_flags, 0,
245 SECURITY_NATIVE_DREP, NULL, 0, &conn->context,
259 conn->start = 0;
283 static int tls_get_eap(struct tls_global *global, struct tls_connection *conn)
292 &conn->context, SECPKG_ATTR_EAP_KEY_BLOCK, &kb);
305 os_memcpy(conn->eap_tls_prf, kb.rgbKeys, sizeof(kb.rgbKeys));
306 conn->eap_tls_prf_set = 1;
312 struct tls_connection *conn,
327 if (conn->start)
328 return tls_conn_hs_clienthello(global, conn);
364 &conn->creds, &conn->context, NULL, sspi_flags, 0,
369 &conn->creds, &conn->context, NULL, sspi_flags, 0,
406 conn->established = 1;
407 tls_get_eap(global, conn);
441 conn->failed++;
442 global->sspi->DeleteSecurityContext(&conn->context);
459 struct tls_connection *conn,
468 struct tls_connection *conn,
479 status = global->sspi->QueryContextAttributes(&conn->context,
513 status = global->sspi->EncryptMessage(&conn->context, 0, &buf, 0);
550 struct tls_connection *conn,
578 status = global->sspi->DecryptMessage(&conn->context, &buf, 0,
625 int tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn)
631 int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
638 int tls_get_cipher(void *ssl_ctx, struct tls_connection *conn,
646 struct tls_connection *conn)
652 int tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn,
660 int tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn)
662 if (conn == NULL)
664 return conn->failed;
668 int tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn)
670 if (conn == NULL)
672 return conn->read_alerts;
676 int tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn)
678 if (conn == NULL)
680 return conn->write_alerts;
684 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
692 if (conn == NULL)
703 os_memset(&conn->schannel_cred, 0, sizeof(conn->schannel_cred));
704 conn->schannel_cred.dwVersion = SCHANNEL_CRED_VERSION;
705 conn->schannel_cred.grbitEnabledProtocols = SP_PROT_TLS1;
707 conn->schannel_cred.cSupportedAlgs = 1;
708 conn->schannel_cred.palgSupportedAlgs = algs;
709 conn->schannel_cred.dwFlags |= SCH_CRED_NO_DEFAULT_CREDS;
713 &conn->schannel_cred, NULL, NULL, &conn->creds, &ts_expiry);
717 &conn->schannel_cred, NULL, NULL, &conn->creds, &ts_expiry);