Home
last modified time | relevance | path

Searched refs:ssl (Results 1 – 25 of 820) sorted by relevance

12345678910>>...33

/external/boringssl/src/ssl/
Dssl_lib.cc201 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument
204 ssl->s3->rwstate = SSL_NOTHING; in ssl_reset_error_state()
209 void ssl_set_read_error(SSL* ssl) { in ssl_set_read_error() argument
210 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error()
211 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error()
214 static bool check_read_error(const SSL *ssl) { in check_read_error() argument
215 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error()
216 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error()
222 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument
223 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write()
[all …]
Ds3_pkt.cc127 static int do_ssl3_write(SSL *ssl, int type, const uint8_t *in, unsigned len);
129 int ssl3_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in ssl3_write_app_data() argument
131 assert(ssl_can_write(ssl)); in ssl3_write_app_data()
132 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in ssl3_write_app_data()
136 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in ssl3_write_app_data()
143 assert(ssl->s3->wnum <= INT_MAX); in ssl3_write_app_data()
144 tot = ssl->s3->wnum; in ssl3_write_app_data()
145 ssl->s3->wnum = 0; in ssl3_write_app_data()
160 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in ssl3_write_app_data()
165 unsigned max = ssl->max_send_fragment; in ssl3_write_app_data()
[all …]
Dd1_lib.cc88 bool dtls1_new(SSL *ssl) { in dtls1_new() argument
89 if (!ssl3_new(ssl)) { in dtls1_new()
94 ssl3_free(ssl); in dtls1_new()
98 ssl->d1 = d1.release(); in dtls1_new()
105 ssl->version = DTLS1_2_VERSION; in dtls1_new()
109 void dtls1_free(SSL *ssl) { in dtls1_free() argument
110 ssl3_free(ssl); in dtls1_free()
112 if (ssl == NULL) { in dtls1_free()
116 Delete(ssl->d1); in dtls1_free()
117 ssl->d1 = NULL; in dtls1_free()
[all …]
Ds3_both.cc135 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() argument
138 assert(!ssl->s3->pending_hs_data); in add_record_to_flight()
140 assert(ssl->s3->pending_flight_offset == 0); in add_record_to_flight()
142 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight()
143 ssl->s3->pending_flight.reset(BUF_MEM_new()); in add_record_to_flight()
144 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight()
149 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); in add_record_to_flight()
150 size_t new_cap = ssl->s3->pending_flight->length + max_out; in add_record_to_flight()
157 if (!BUF_MEM_reserve(ssl->s3->pending_flight.get(), new_cap) || in add_record_to_flight()
158 !tls_seal_record(ssl, in add_record_to_flight()
[all …]
Dhandshake_client.cc218 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local
228 if (ssl->ctx->grease_enabled && in ssl_write_client_cipher_list()
252 for (const SSL_CIPHER *cipher : SSL_get_ciphers(ssl)) { in ssl_write_client_cipher_list()
275 if (ssl->mode & SSL_MODE_SEND_FALLBACK_SCSV) { in ssl_write_client_cipher_list()
285 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local
288 if (!ssl->method->init_message(ssl, cbb.get(), &body, SSL3_MT_CLIENT_HELLO)) { in ssl_write_client_hello()
294 !CBB_add_bytes(&body, ssl->s3->client_random, SSL3_RANDOM_SIZE) || in ssl_write_client_hello()
300 if (!ssl->s3->initial_handshake_complete && in ssl_write_client_hello()
305 if (SSL_is_dtls(ssl)) { in ssl_write_client_hello()
307 !CBB_add_bytes(&child, ssl->d1->cookie, ssl->d1->cookie_len)) { in ssl_write_client_hello()
[all …]
Dd1_both.cc255 static bool dtls1_is_current_message_complete(const SSL *ssl) { in dtls1_is_current_message_complete() argument
256 size_t idx = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT; in dtls1_is_current_message_complete()
257 hm_fragment *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_is_current_message_complete()
266 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() argument
267 if (msg_hdr->seq < ssl->d1->handshake_read_seq || in dtls1_get_incoming_message()
268 msg_hdr->seq - ssl->d1->handshake_read_seq >= SSL_MAX_HANDSHAKE_FLIGHT) { in dtls1_get_incoming_message()
274 hm_fragment *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message()
289 ssl->d1->incoming_messages[idx] = dtls1_hm_fragment_new(msg_hdr); in dtls1_get_incoming_message()
290 if (!ssl->d1->incoming_messages[idx]) { in dtls1_get_incoming_message()
294 return ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message()
[all …]
Dtls13_client.cc56 SSL *const ssl = hs->ssl; in do_read_hello_retry_request() local
57 assert(ssl->s3->have_version); in do_read_hello_retry_request()
59 if (!ssl->method->get_message(ssl, &msg)) { in do_read_hello_retry_request()
67 !ssl->method->add_change_cipher_spec(ssl)) { in do_read_hello_retry_request()
71 if (!ssl_check_message_type(ssl, msg, SSL3_MT_SERVER_HELLO)) { in do_read_hello_retry_request()
89 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in do_read_hello_retry_request()
101 SSL_CIPHER_get_min_version(cipher) > ssl_protocol_version(ssl) || in do_read_hello_retry_request()
102 SSL_CIPHER_get_max_version(cipher) < ssl_protocol_version(ssl)) { in do_read_hello_retry_request()
104 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in do_read_hello_retry_request()
110 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request()
[all …]
Dhandshake.cc128 : ssl(ssl_arg), in SSL_HANDSHAKE()
153 assert(ssl); in SSL_HANDSHAKE()
157 ssl->ctx->x509_method->hs_flush_cached_ca_names(this); in ~SSL_HANDSHAKE()
160 UniquePtr<SSL_HANDSHAKE> ssl_handshake_new(SSL *ssl) { in ssl_handshake_new() argument
161 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new()
165 hs->config = ssl->config.get(); in ssl_handshake_new()
173 bool ssl_check_message_type(SSL *ssl, const SSLMessage &msg, int type) { in ssl_check_message_type() argument
175 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); in ssl_check_message_type()
184 bool ssl_add_message_cbb(SSL *ssl, CBB *cbb) { in ssl_add_message_cbb() argument
186 if (!ssl->method->finish_message(ssl, cbb, &msg) || in ssl_add_message_cbb()
[all …]
Dtls13_server.cc58 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local
66 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_MISSING_EXTENSION); in resolve_ecdhe_secret()
75 ssl_send_alert(ssl, SSL3_AL_FATAL, alert); in resolve_ecdhe_secret()
92 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello()
132 const SSL *ssl, const SSL_CLIENT_HELLO *client_hello, uint16_t group_id) { in choose_tls13_cipher() argument
141 const uint16_t version = ssl_protocol_version(ssl); in choose_tls13_cipher()
174 SSL *const ssl = hs->ssl; in add_new_session_tickets() local
180 (SSL_get_options(ssl) & SSL_OP_NO_TICKET)) { in add_new_session_tickets()
191 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets()
204 if (ssl->enable_early_data) { in add_new_session_tickets()
[all …]
Dtls_record.cc143 static bool ssl_needs_record_splitting(const SSL *ssl) { in ssl_needs_record_splitting() argument
145 return !ssl->s3->aead_write_ctx->is_null_cipher() && in ssl_needs_record_splitting()
146 ssl->s3->aead_write_ctx->ProtocolVersion() < TLS1_1_VERSION && in ssl_needs_record_splitting()
147 (ssl->mode & SSL_MODE_CBC_RECORD_SPLITTING) != 0 && in ssl_needs_record_splitting()
148 SSL_CIPHER_is_block_cipher(ssl->s3->aead_write_ctx->cipher()); in ssl_needs_record_splitting()
165 size_t ssl_record_prefix_len(const SSL *ssl) { in ssl_record_prefix_len() argument
167 if (SSL_is_dtls(ssl)) { in ssl_record_prefix_len()
173 return header_len + ssl->s3->aead_read_ctx->ExplicitNonceLen(); in ssl_record_prefix_len()
176 size_t ssl_seal_align_prefix_len(const SSL *ssl) { in ssl_seal_align_prefix_len() argument
177 if (SSL_is_dtls(ssl)) { in ssl_seal_align_prefix_len()
[all …]
Dhandshake_server.cc197 SSL *const ssl = hs->ssl; in negotiate_version() local
198 assert(!ssl->s3->have_version); in negotiate_version()
224 if (SSL_is_dtls(ssl)) { in negotiate_version()
245 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version()
251 ssl->s3->have_version = true; in negotiate_version()
252 ssl->s3->aead_write_ctx->SetVersionIfNullCipher(ssl->version); in negotiate_version()
257 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version()
332 SSL *const ssl = hs->ssl; in ssl3_choose_cipher() local
349 if (ssl->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { in ssl3_choose_cipher()
367 SSL_CIPHER_get_min_version(c) <= ssl_protocol_version(ssl) && in ssl3_choose_cipher()
[all …]
Dtls13_both.cc109 SSL *const ssl = hs->ssl; in tls13_process_certificate() local
122 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate()
127 if (uncompressed_len > ssl->max_cert_list) { in tls13_process_certificate()
128 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in tls13_process_certificate()
136 for (const auto* alg : ssl->ctx->cert_compression_algs.get()) { in tls13_process_certificate()
144 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in tls13_process_certificate()
151 if (!decompress(ssl, &decompressed_ptr, uncompressed_len, in tls13_process_certificate()
153 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate()
161 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate()
181 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate()
[all …]
Dssl_x509.cc163 static void check_ssl_x509_method(const SSL *ssl) { in check_ssl_x509_method() argument
164 assert(ssl == NULL || ssl->ctx->x509_method == &ssl_crypto_x509_method); in check_ssl_x509_method()
371 SSL_CTX *ssl_ctx = hs->ssl->ctx.get(); in ssl_crypto_x509_session_verify_cert_chain()
384 ctx.get(), SSL_get_ex_data_X509_STORE_CTX_idx(), hs->ssl)) { in ssl_crypto_x509_session_verify_cert_chain()
392 hs->ssl->server ? "ssl_client" : "ssl_server"); in ssl_crypto_x509_session_verify_cert_chain()
432 X509_VERIFY_PARAM_inherit(hs->config->param, hs->ssl->ctx->param); in ssl_crypto_x509_ssl_new()
450 if ((hs->ssl->mode & SSL_MODE_NO_AUTO_CHAIN) || in ssl_crypto_x509_ssl_auto_chain_if_needed()
464 if (!X509_STORE_CTX_init(ctx.get(), hs->ssl->ctx->cert_store, leaf.get(), in ssl_crypto_x509_ssl_auto_chain_if_needed()
528 X509 *SSL_get_peer_certificate(const SSL *ssl) { in SSL_get_peer_certificate() argument
529 check_ssl_x509_method(ssl); in SSL_get_peer_certificate()
[all …]
Dssl_buffer.cc105 static int dtls_read_buffer_next_packet(SSL *ssl) { in dtls_read_buffer_next_packet() argument
106 SSLBuffer *buf = &ssl->s3->read_buffer; in dtls_read_buffer_next_packet()
117 BIO_read(ssl->rbio.get(), buf->data(), static_cast<int>(buf->cap())); in dtls_read_buffer_next_packet()
119 ssl->s3->rwstate = SSL_READING; in dtls_read_buffer_next_packet()
126 static int tls_read_buffer_extend_to(SSL *ssl, size_t len) { in tls_read_buffer_extend_to() argument
127 SSLBuffer *buf = &ssl->s3->read_buffer; in tls_read_buffer_extend_to()
138 int ret = BIO_read(ssl->rbio.get(), buf->data() + buf->size(), in tls_read_buffer_extend_to()
141 ssl->s3->rwstate = SSL_READING; in tls_read_buffer_extend_to()
150 int ssl_read_buffer_extend_to(SSL *ssl, size_t len) { in ssl_read_buffer_extend_to() argument
152 ssl->s3->read_buffer.DiscardConsumed(); in ssl_read_buffer_extend_to()
[all …]
Dt1_lib.cc202 bool ssl_client_hello_init(SSL *ssl, SSL_CLIENT_HELLO *out, in ssl_client_hello_init() argument
205 out->ssl = ssl; in ssl_client_hello_init()
224 if (SSL_is_dtls(out->ssl)) { in ssl_client_hello_init()
303 SSL *const ssl = hs->ssl; in tls1_get_shared_group() local
304 assert(ssl->server); in tls1_get_shared_group()
317 if (ssl->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { in tls1_get_shared_group()
330 (ssl_protocol_version(ssl) >= TLS1_3_VERSION || in tls1_get_shared_group()
394 ssl_protocol_version(hs->ssl) < TLS1_3_VERSION) { in tls1_check_group_id()
502 static SSLSignatureAlgorithmList tls12_get_verify_sigalgs(const SSL *ssl, in tls12_get_verify_sigalgs() argument
505 if (!ssl->config->verify_sigalgs.empty()) { in tls12_get_verify_sigalgs()
[all …]
Dt1_enc.cc167 static bool get_key_block_lengths(const SSL *ssl, size_t *out_mac_secret_len, in get_key_block_lengths() argument
172 ssl_protocol_version(ssl), SSL_is_dtls(ssl))) { in get_key_block_lengths()
192 int tls1_configure_aead(SSL *ssl, evp_aead_direction_t direction, in tls1_configure_aead() argument
197 if (!get_key_block_lengths(ssl, &mac_secret_len, &key_len, &iv_len, cipher)) { in tls1_configure_aead()
205 !SSL_generate_key_block(ssl, key_block_cache->data(), key_block_size)) { in tls1_configure_aead()
213 if (direction == (ssl->server ? evp_aead_open : evp_aead_seal)) { in tls1_configure_aead()
233 direction, ssl->version, SSL_is_dtls(ssl), cipher, key, mac_secret, iv); in tls1_configure_aead()
239 return ssl->method->set_read_state(ssl, std::move(aead_ctx)); in tls1_configure_aead()
242 return ssl->method->set_write_state(ssl, std::move(aead_ctx)); in tls1_configure_aead()
247 return tls1_configure_aead(hs->ssl, direction, &hs->key_block, in tls1_change_cipher_state()
[all …]
Dd1_pkt.cc131 ssl_open_record_t dtls1_open_app_data(SSL *ssl, Span<uint8_t> *out, in dtls1_open_app_data() argument
134 assert(!SSL_in_init(ssl)); in dtls1_open_app_data()
138 auto ret = dtls_open_record(ssl, &type, &record, out_consumed, out_alert, in); in dtls1_open_app_data()
157 msg_hdr.seq == ssl->d1->handshake_read_seq - 1) { in dtls1_open_app_data()
162 if (!dtls1_check_timeout_num(ssl)) { in dtls1_open_app_data()
167 dtls1_retransmit_outgoing_messages(ssl); in dtls1_open_app_data()
190 int dtls1_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in dtls1_write_app_data() argument
192 assert(!SSL_in_init(ssl)); in dtls1_write_app_data()
195 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in dtls1_write_app_data()
214 int ret = dtls1_write_record(ssl, SSL3_RT_APPLICATION_DATA, in, (size_t)len, in dtls1_write_app_data()
[all …]
Dtls13_enc.cc51 if (!init_key_schedule(hs, ssl_protocol_version(hs->ssl), hs->new_cipher)) { in tls13_init_key_schedule()
62 SSL *const ssl = hs->ssl; in tls13_init_early_key_schedule() local
63 return init_key_schedule(hs, ssl_session_protocol_version(ssl->session.get()), in tls13_init_early_key_schedule()
64 ssl->session->cipher) && in tls13_init_early_key_schedule()
134 bool tls13_set_traffic_key(SSL *ssl, enum ssl_encryption_level_t level, in tls13_set_traffic_key() argument
138 const SSL_SESSION *session = SSL_get_session(ssl); in tls13_set_traffic_key()
147 if (ssl->quic_method == nullptr) { in tls13_set_traffic_key()
152 version, SSL_is_dtls(ssl))) { in tls13_set_traffic_key()
176 direction, session->ssl_version, SSL_is_dtls(ssl), session->cipher, in tls13_set_traffic_key()
191 if (!ssl->method->set_read_state(ssl, std::move(traffic_aead))) { in tls13_set_traffic_key()
[all …]
Ddtls_method.cc71 static void dtls1_on_handshake_complete(SSL *ssl) { in dtls1_on_handshake_complete() argument
73 dtls1_stop_timer(ssl); in dtls1_on_handshake_complete()
76 if (ssl->d1->flight_has_reply) { in dtls1_on_handshake_complete()
77 dtls_clear_outgoing_messages(ssl); in dtls1_on_handshake_complete()
81 static bool dtls1_set_read_state(SSL *ssl, UniquePtr<SSLAEADContext> aead_ctx) { in dtls1_set_read_state() argument
83 if (dtls_has_unprocessed_handshake_data(ssl)) { in dtls1_set_read_state()
85 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); in dtls1_set_read_state()
89 ssl->d1->r_epoch++; in dtls1_set_read_state()
90 OPENSSL_memset(&ssl->d1->bitmap, 0, sizeof(ssl->d1->bitmap)); in dtls1_set_read_state()
91 OPENSSL_memset(ssl->s3->read_sequence, 0, sizeof(ssl->s3->read_sequence)); in dtls1_set_read_state()
[all …]
/external/python/cpython2/Lib/test/
Dtest_ssl.py25 ssl = support.import_module("ssl") variable
27 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES)
29 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL')
30 IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0)
91 ssl.sslwrap_simple(socket.socket(socket.AF_INET))
98 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock)
108 return ssl._OPENSSL_API_VERSION >= (0, 9, 8, 13, 15)
112 return ssl.OPENSSL_VERSION_INFO >= (0, 9, 7, 8, 15)
116 return ssl.OPENSSL_VERSION_INFO >= (0, 9, 8, 0, 15)
127 if ssl._OPENSSL_API_VERSION == (0, 9, 8, 9, 15):
[all …]
/external/boringssl/src/ssl/test/
Dbssl_shim.cc179 static int DoRead(SSL *ssl, uint8_t *out, size_t max_out) { in DoRead() argument
180 const TestConfig *config = GetTestConfig(ssl); in DoRead()
181 TestState *test_state = GetTestState(ssl); in DoRead()
190 ret = CheckIdempotentError("SSL_peek/SSL_read", ssl, [&]() -> int { in DoRead()
191 return config->peek_then_read ? SSL_peek(ssl, out, max_out) in DoRead()
192 : SSL_read(ssl, out, max_out); in DoRead()
202 if (!SSL_export_keying_material(ssl, &buf, 1, NULL, 0, NULL, 0, 0)) { in DoRead()
207 } while (config->async && RetryAsync(ssl, ret)); in DoRead()
213 int ret2 = SSL_peek(ssl, buf.get(), ret); in DoRead()
221 ret2 = SSL_read(ssl, buf.get(), ret); in DoRead()
[all …]
/external/python/cpython3/Lib/test/
Dtest_ssl.py27 ssl = support.import_module("ssl") variable
30 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES)
32 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL')
33 IS_OPENSSL_1_1_0 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0)
34 IS_OPENSSL_1_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 1)
44 proto = getattr(ssl, proto)
45 ver = getattr(ssl.TLSVersion, ver)
138 OP_NO_COMPRESSION = getattr(ssl, "OP_NO_COMPRESSION", 0)
139 OP_SINGLE_DH_USE = getattr(ssl, "OP_SINGLE_DH_USE", 0)
140 OP_SINGLE_ECDH_USE = getattr(ssl, "OP_SINGLE_ECDH_USE", 0)
[all …]
/external/boringssl/src/include/openssl/
Dssl.h230 OPENSSL_EXPORT void SSL_free(SSL *ssl);
235 OPENSSL_EXPORT SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
238 OPENSSL_EXPORT void SSL_set_connect_state(SSL *ssl);
241 OPENSSL_EXPORT void SSL_set_accept_state(SSL *ssl);
245 OPENSSL_EXPORT int SSL_is_server(const SSL *ssl);
248 OPENSSL_EXPORT int SSL_is_dtls(const SSL *ssl);
268 OPENSSL_EXPORT void SSL_set_bio(SSL *ssl, BIO *rbio, BIO *wbio);
275 OPENSSL_EXPORT void SSL_set0_rbio(SSL *ssl, BIO *rbio);
282 OPENSSL_EXPORT void SSL_set0_wbio(SSL *ssl, BIO *wbio);
285 OPENSSL_EXPORT BIO *SSL_get_rbio(const SSL *ssl);
[all …]
/external/conscrypt/common/src/main/java/org/conscrypt/
DNativeSsl.java44 import javax.net.ssl.SSLException;
45 import javax.net.ssl.SSLHandshakeException;
46 import javax.net.ssl.X509KeyManager;
47 import javax.net.ssl.X509TrustManager;
63 private volatile long ssl; field in NativeSsl
65 private NativeSsl(long ssl, SSLParametersImpl parameters, in NativeSsl() argument
68 this.ssl = ssl; in NativeSsl()
79 long ssl = NativeCrypto.SSL_new(ctx.sslCtxNativePointer, ctx); in newInstance() local
80 return new NativeSsl(ssl, parameters, handshakeCallbacks, chooser, pskCallbacks); in newInstance()
92 NativeCrypto.SSL_set_session(ssl, this, sslSessionNativePointer); in offerToResumeSession()
[all …]
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DNativeSsl.java45 import javax.net.ssl.SSLException;
46 import javax.net.ssl.SSLHandshakeException;
47 import javax.net.ssl.X509KeyManager;
48 import javax.net.ssl.X509TrustManager;
64 private volatile long ssl; field in NativeSsl
66 private NativeSsl(long ssl, SSLParametersImpl parameters, in NativeSsl() argument
69 this.ssl = ssl; in NativeSsl()
80 long ssl = NativeCrypto.SSL_new(ctx.sslCtxNativePointer, ctx); in newInstance() local
81 return new NativeSsl(ssl, parameters, handshakeCallbacks, chooser, pskCallbacks); in newInstance()
93 NativeCrypto.SSL_set_session(ssl, this, sslSessionNativePointer); in offerToResumeSession()
[all …]

12345678910>>...33