/external/libvncserver/libvncserver/ |
rfbssl_openssl.c | 29 SSL_CTX *ssl_ctx; member in struct:rfbssl_ctx 59 } else if (NULL == (ctx->ssl_ctx = SSL_CTX_new(TLSv1_server_method()))) { 61 } else if (SSL_CTX_use_PrivateKey_file(ctx->ssl_ctx, keyfile, SSL_FILETYPE_PEM) <= 0) { 63 } else if (SSL_CTX_use_certificate_file(ctx->ssl_ctx, cl->screen->sslcertfile, SSL_FILETYPE_PEM) <= 0) { 65 } else if (NULL == (ctx->ssl = SSL_new(ctx->ssl_ctx))) { 133 if (ctx->ssl_ctx) 134 SSL_CTX_free(ctx->ssl_ctx);
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 107 srv.ssl_ctx = hapd->ssl_ctx; 156 hapd->ssl_ctx = tls_init(NULL); 157 if (hapd->ssl_ctx == NULL) { 173 if (tls_global_set_params(hapd->ssl_ctx, ¶ms)) { 179 if (tls_global_set_verify(hapd->ssl_ctx, 220 if (hapd->ssl_ctx) { 221 tls_deinit(hapd->ssl_ctx); 222 hapd->ssl_ctx = NULL;
|
/external/boringssl/src/include/openssl/ |
ssl.h | 265 /* SSL_CTX_new returns a newly-allocated |SSL_CTX| with default settings or NULL 266 * on error. An |SSL_CTX| manages shared state and configuration between 268 OPENSSL_EXPORT SSL_CTX *SSL_CTX_new(const SSL_METHOD *method); 271 OPENSSL_EXPORT void SSL_CTX_free(SSL_CTX *ctx); 283 OPENSSL_EXPORT SSL *SSL_new(SSL_CTX *ctx); 309 OPENSSL_EXPORT void SSL_CTX_set_min_version(SSL_CTX *ctx, uint16_t version); 313 OPENSSL_EXPORT void SSL_CTX_set_max_version(SSL_CTX *ctx, uint16_t version); 387 OPENSSL_EXPORT uint32_t SSL_CTX_set_options(SSL_CTX *ctx, uint32_t options); 392 OPENSSL_EXPORT uint32_t SSL_CTX_clear_options(SSL_CTX *ctx, uint32_t options); 396 OPENSSL_EXPORT uint32_t SSL_CTX_get_options(const SSL_CTX *ctx) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 85 SSL_CTX *ssl_ctx; member in struct:tls_connection 464 static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name) 511 if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) { 738 SSL_CTX *ssl; 849 void tls_deinit(void *ssl_ctx) 851 SSL_CTX *ssl = ssl_ctx; 1032 int tls_get_errors(void *ssl_ctx) 1653 SSL_CTX *ssl_ctx = _ssl_ctx; local 1687 SSL_CTX *ssl_ctx = _ssl_ctx; local 2269 SSL_CTX *ssl_ctx = _ssl_ctx; local 2342 SSL_CTX *ssl_ctx = _ssl_ctx; local 3585 SSL_CTX *ssl_ctx = tls_ctx; local 3603 SSL_CTX *ssl_ctx = tls_ctx; local [all...] |
tls_gnutls.c | 129 void tls_deinit(void *ssl_ctx) 131 struct tls_global *global = ssl_ctx; 145 int tls_get_errors(void *ssl_ctx) 236 struct tls_connection * tls_connection_init(void *ssl_ctx) 238 struct tls_global *global = ssl_ctx; 273 void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn) 289 int tls_connection_established(void *ssl_ctx, struct tls_connection *conn) 295 int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn) 297 struct tls_global *global = ssl_ctx; 703 int tls_global_set_verify(void *ssl_ctx, int check_crl [all...] |
tls_none.c | 20 void tls_deinit(void *ssl_ctx)
|
/external/boringssl/src/ssl/test/ |
scoped_types.h | 24 using ScopedSSL_CTX = ScopedOpenSSLType<SSL_CTX, SSL_CTX_free>;
|
bssl_shim.cc | 403 ScopedSSL_CTX ssl_ctx(SSL_CTX_new( 405 if (!ssl_ctx) { 409 if (!SSL_CTX_set_cipher_list(ssl_ctx.get(), "ALL")) { 414 if (!dh || !SSL_CTX_set_tmp_dh(ssl_ctx.get(), dh.get())) { 422 ssl_ctx.get(), SSL_SESS_CACHE_BOTH | SSL_SESS_CACHE_NO_INTERNAL); 423 SSL_CTX_sess_set_get_cb(ssl_ctx.get(), GetSessionCallback); 425 SSL_CTX_set_session_cache_mode(ssl_ctx.get(), SSL_SESS_CACHE_BOTH); 428 ssl_ctx->select_certificate_cb = SelectCertificateCallback; 431 ssl_ctx.get(), NextProtosAdvertisedCallback, NULL); 433 SSL_CTX_set_next_proto_select_cb(ssl_ctx.get(), NextProtoSelectCallback 990 ScopedSSL_CTX ssl_ctx = SetupCtx(&config); local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 49 if (sm->ssl_ctx == NULL) { 57 data->conn = tls_connection_init(sm->ssl_ctx); 71 if (tls_connection_set_verify(sm->ssl_ctx, data->conn, verify_peer)) { 74 tls_connection_deinit(sm->ssl_ctx, data->conn); 93 tls_connection_deinit(sm->ssl_ctx, data->conn); 109 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, 0, 139 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 307 data->tls_out = tls_connection_server_handshake(sm->ssl_ctx, 314 if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) { 406 buf = tls_connection_encrypt(sm->ssl_ctx, data->conn [all...] |
eap.h | 108 void *ssl_ctx; member in struct:eap_config
|
/external/boringssl/src/ssl/ |
ssl_lib.c | 243 SSL *SSL_new(SSL_CTX *ctx) { 366 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const uint8_t *sid_ctx, 392 int SSL_CTX_set_generate_session_id(SSL_CTX *ctx, GEN_SESSION_CB cb) { 425 int SSL_CTX_set_purpose(SSL_CTX *s, int purpose) { 433 int SSL_CTX_set_trust(SSL_CTX *s, int trust) { 441 int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm) { 514 X509_VERIFY_PARAM *SSL_CTX_get0_param(SSL_CTX *ctx) { return ctx->param; } 731 int SSL_CTX_get_verify_mode(const SSL_CTX *ctx) { return ctx->verify_mode; } 733 int SSL_CTX_get_verify_depth(const SSL_CTX *ctx) { 737 int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int, X509_STORE_CTX *) [all...] |
ssl_sess.c | 155 static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s); 156 static void SSL_SESSION_list_add(SSL_CTX *ctx, SSL_SESSION *s); 157 static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck); 519 int SSL_CTX_add_session(SSL_CTX *ctx, SSL_SESSION *c) { 523 /* add just 1 reference count for the SSL_CTX's session cache even though it 576 int SSL_CTX_remove_session(SSL_CTX *ctx, SSL_SESSION *c) { 580 static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lock) { 704 long SSL_CTX_set_timeout(SSL_CTX *s, long t) { 715 long SSL_CTX_get_timeout(const SSL_CTX *s) { 724 SSL_CTX *ctx [all...] |
ssl_rsa.c | 316 int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x) { 367 int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type) { 410 int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const uint8_t *d) { 425 int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) { 449 int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type) { 490 int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const uint8_t *d, long len) { 507 int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey) { 516 int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type) { 556 int SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const uint8_t *d, 578 int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file) [all...] |
s3_lib.c | 257 int SSL_CTX_need_tmp_RSA(const SSL_CTX *ctx) { 265 int SSL_CTX_set_tmp_rsa(SSL_CTX *ctx, const RSA *rsa) { 273 int SSL_CTX_set_tmp_dh(SSL_CTX *ctx, const DH *dh) { 293 int SSL_CTX_set_tmp_ecdh(SSL_CTX *ctx, const EC_KEY *ec_key) { 311 int SSL_CTX_enable_tls_channel_id(SSL_CTX *ctx) { 321 int SSL_CTX_set1_tls_channel_id(SSL_CTX *ctx, EVP_PKEY *private_key) { 499 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) { 597 SSL_CTX *ctx, int (*callback)(SSL *ssl, int *out_alert, void *arg)) { 602 int SSL_CTX_set_tlsext_servername_arg(SSL_CTX *ctx, void *arg) { 608 SSL_CTX *ctx, int (*callback)(SSL *ssl, uint8_t *key_name, uint8_t *iv [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 26 void *ssl_ctx; member in struct:eap_tls_data 47 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : 48 sm->ssl_ctx; 84 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : 85 sm->ssl_ctx; 111 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : 112 sm->ssl_ctx; 254 if (tls_connection_established(data->ssl_ctx, data->ssl.conn)) 269 return tls_connection_established(data->ssl_ctx, data->ssl.conn);
|
eap_tls_common.c | 191 data->conn = tls_connection_init(data->ssl_ctx); 198 res = tls_connection_set_params(data->ssl_ctx, data->conn, params); 220 tls_connection_deinit(data->ssl_ctx, data->conn); 251 data->ssl_ctx = sm->init_phase2 && sm->ssl_ctx2 ? sm->ssl_ctx2 : 252 sm->ssl_ctx; 290 tls_connection_deinit(data->ssl_ctx, data->conn); 319 if (tls_connection_prf(data->ssl_ctx, data->conn, label, 0, 0, 349 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 505 data->tls_out = tls_connection_handshake(data->ssl_ctx, data->conn, 511 tls_connection_established(data->ssl_ctx, data->conn) & [all...] |
eap_tls_common.h | 68 * ssl_ctx - TLS library context to use for the connection 70 void *ssl_ctx; member in struct:eap_ssl_data
|
eap_fast.c | 182 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 196 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 279 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 306 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
ServerSessionContext.java | 32 // TODO make sure SSL_CTX does not automaticaly clear sessions we want it to cache 35 // TODO remove SSL_CTX session cache limit so we can manage it
|
/external/libvncserver/libvncclient/ |
tls_openssl.c | 237 SSL_CTX *ssl_ctx = NULL; local 242 ssl_ctx = SSL_CTX_new (SSLv23_client_method ()); 243 SSL_CTX_set_default_verify_paths (ssl_ctx); 244 SSL_CTX_set_verify (ssl_ctx, SSL_VERIFY_NONE, &ssl_verify); 245 ssl = SSL_new (ssl_ctx); 251 SSL_CTX_set_app_data (ssl_ctx, client);
|
/external/boringssl/src/tool/ |
server.cc | 54 SSL_CTX *ctx = SSL_CTX_new(SSLv23_server_method());
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 100 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn,
|
eap_fast_common.c | 96 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, 105 if (tls_connection_prf(ssl_ctx, conn, label, 1, 1, out, len)) {
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 22 void *ssl_ctx; member in struct:eapol_auth_config
|
/external/google-breakpad/src/third_party/curl/ |
typecheck-gcc.h | 514 /* hack: if we included OpenSSL's ssl.h, we know about SSL_CTX 517 typedef CURLcode (_curl_ssl_ctx_callback5)(CURL *, SSL_CTX, void *); 518 typedef CURLcode (_curl_ssl_ctx_callback6)(CURL *, SSL_CTX, const void *); 519 typedef CURLcode (_curl_ssl_ctx_callback7)(CURL *, const SSL_CTX, void *); 520 typedef CURLcode (_curl_ssl_ctx_callback8)(CURL *, const SSL_CTX, const void *); [all...] |