/external/boringssl/src/ssl/ |
D | ssl_lib.cc | 201 void ssl_reset_error_state(SSL *ssl) { in ssl_reset_error_state() argument 204 ssl->s3->rwstate = SSL_NOTHING; in ssl_reset_error_state() 209 void ssl_set_read_error(SSL* ssl) { in ssl_set_read_error() argument 210 ssl->s3->read_shutdown = ssl_shutdown_error; in ssl_set_read_error() 211 ssl->s3->read_error.reset(ERR_save_state()); in ssl_set_read_error() 214 static bool check_read_error(const SSL *ssl) { in check_read_error() argument 215 if (ssl->s3->read_shutdown == ssl_shutdown_error) { in check_read_error() 216 ERR_restore_state(ssl->s3->read_error.get()); in check_read_error() 222 bool ssl_can_write(const SSL *ssl) { in ssl_can_write() argument 223 return !SSL_in_init(ssl) || ssl->s3->hs->can_early_write; in ssl_can_write() [all …]
|
D | s3_pkt.cc | 127 static int do_ssl3_write(SSL *ssl, int type, const uint8_t *in, unsigned len); 129 int ssl3_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in ssl3_write_app_data() argument 131 assert(ssl_can_write(ssl)); in ssl3_write_app_data() 132 assert(!ssl->s3->aead_write_ctx->is_null_cipher()); in ssl3_write_app_data() 136 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in ssl3_write_app_data() 143 assert(ssl->s3->wnum <= INT_MAX); in ssl3_write_app_data() 144 tot = ssl->s3->wnum; in ssl3_write_app_data() 145 ssl->s3->wnum = 0; in ssl3_write_app_data() 160 !ssl->server && SSL_in_early_data(ssl) && ssl->s3->hs->can_early_write; in ssl3_write_app_data() 165 unsigned max = ssl->max_send_fragment; in ssl3_write_app_data() [all …]
|
D | d1_lib.cc | 88 bool dtls1_new(SSL *ssl) { in dtls1_new() argument 89 if (!ssl3_new(ssl)) { in dtls1_new() 94 ssl3_free(ssl); in dtls1_new() 98 ssl->d1 = d1.release(); in dtls1_new() 105 ssl->version = DTLS1_2_VERSION; in dtls1_new() 109 void dtls1_free(SSL *ssl) { in dtls1_free() argument 110 ssl3_free(ssl); in dtls1_free() 112 if (ssl == NULL) { in dtls1_free() 116 Delete(ssl->d1); in dtls1_free() 117 ssl->d1 = NULL; in dtls1_free() [all …]
|
D | s3_both.cc | 135 static bool add_record_to_flight(SSL *ssl, uint8_t type, in add_record_to_flight() argument 138 assert(!ssl->s3->pending_hs_data); in add_record_to_flight() 140 assert(ssl->s3->pending_flight_offset == 0); in add_record_to_flight() 142 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 143 ssl->s3->pending_flight.reset(BUF_MEM_new()); in add_record_to_flight() 144 if (ssl->s3->pending_flight == nullptr) { in add_record_to_flight() 149 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); in add_record_to_flight() 150 size_t new_cap = ssl->s3->pending_flight->length + max_out; in add_record_to_flight() 157 if (!BUF_MEM_reserve(ssl->s3->pending_flight.get(), new_cap) || in add_record_to_flight() 158 !tls_seal_record(ssl, in add_record_to_flight() [all …]
|
D | handshake_client.cc | 218 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local 228 if (ssl->ctx->grease_enabled && in ssl_write_client_cipher_list() 252 for (const SSL_CIPHER *cipher : SSL_get_ciphers(ssl)) { in ssl_write_client_cipher_list() 275 if (ssl->mode & SSL_MODE_SEND_FALLBACK_SCSV) { in ssl_write_client_cipher_list() 285 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local 288 if (!ssl->method->init_message(ssl, cbb.get(), &body, SSL3_MT_CLIENT_HELLO)) { in ssl_write_client_hello() 294 !CBB_add_bytes(&body, ssl->s3->client_random, SSL3_RANDOM_SIZE) || in ssl_write_client_hello() 300 if (!ssl->s3->initial_handshake_complete && in ssl_write_client_hello() 305 if (SSL_is_dtls(ssl)) { in ssl_write_client_hello() 307 !CBB_add_bytes(&child, ssl->d1->cookie, ssl->d1->cookie_len)) { in ssl_write_client_hello() [all …]
|
D | d1_both.cc | 255 static bool dtls1_is_current_message_complete(const SSL *ssl) { in dtls1_is_current_message_complete() argument 256 size_t idx = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT; in dtls1_is_current_message_complete() 257 hm_fragment *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_is_current_message_complete() 266 SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) { in dtls1_get_incoming_message() argument 267 if (msg_hdr->seq < ssl->d1->handshake_read_seq || in dtls1_get_incoming_message() 268 msg_hdr->seq - ssl->d1->handshake_read_seq >= SSL_MAX_HANDSHAKE_FLIGHT) { in dtls1_get_incoming_message() 274 hm_fragment *frag = ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message() 289 ssl->d1->incoming_messages[idx] = dtls1_hm_fragment_new(msg_hdr); in dtls1_get_incoming_message() 290 if (!ssl->d1->incoming_messages[idx]) { in dtls1_get_incoming_message() 294 return ssl->d1->incoming_messages[idx].get(); in dtls1_get_incoming_message() [all …]
|
D | tls13_client.cc | 56 SSL *const ssl = hs->ssl; in do_read_hello_retry_request() local 57 assert(ssl->s3->have_version); in do_read_hello_retry_request() 59 if (!ssl->method->get_message(ssl, &msg)) { in do_read_hello_retry_request() 67 !ssl->method->add_change_cipher_spec(ssl)) { in do_read_hello_retry_request() 71 if (!ssl_check_message_type(ssl, msg, SSL3_MT_SERVER_HELLO)) { in do_read_hello_retry_request() 89 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in do_read_hello_retry_request() 101 SSL_CIPHER_get_min_version(cipher) > ssl_protocol_version(ssl) || in do_read_hello_retry_request() 102 SSL_CIPHER_get_max_version(cipher) < ssl_protocol_version(ssl)) { in do_read_hello_retry_request() 104 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in do_read_hello_retry_request() 110 if (!hs->transcript.InitHash(ssl_protocol_version(ssl), hs->new_cipher) || in do_read_hello_retry_request() [all …]
|
D | handshake.cc | 128 : ssl(ssl_arg), in SSL_HANDSHAKE() 153 assert(ssl); in SSL_HANDSHAKE() 157 ssl->ctx->x509_method->hs_flush_cached_ca_names(this); in ~SSL_HANDSHAKE() 160 UniquePtr<SSL_HANDSHAKE> ssl_handshake_new(SSL *ssl) { in ssl_handshake_new() argument 161 UniquePtr<SSL_HANDSHAKE> hs = MakeUnique<SSL_HANDSHAKE>(ssl); in ssl_handshake_new() 165 hs->config = ssl->config.get(); in ssl_handshake_new() 173 bool ssl_check_message_type(SSL *ssl, const SSLMessage &msg, int type) { in ssl_check_message_type() argument 175 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); in ssl_check_message_type() 184 bool ssl_add_message_cbb(SSL *ssl, CBB *cbb) { in ssl_add_message_cbb() argument 186 if (!ssl->method->finish_message(ssl, cbb, &msg) || in ssl_add_message_cbb() [all …]
|
D | tls13_server.cc | 58 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local 66 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_MISSING_EXTENSION); in resolve_ecdhe_secret() 75 ssl_send_alert(ssl, SSL3_AL_FATAL, alert); in resolve_ecdhe_secret() 92 !CBB_add_u16(&contents, hs->ssl->version) || in ssl_ext_supported_versions_add_serverhello() 132 const SSL *ssl, const SSL_CLIENT_HELLO *client_hello, uint16_t group_id) { in choose_tls13_cipher() argument 141 const uint16_t version = ssl_protocol_version(ssl); in choose_tls13_cipher() 174 SSL *const ssl = hs->ssl; in add_new_session_tickets() local 180 (SSL_get_options(ssl) & SSL_OP_NO_TICKET)) { in add_new_session_tickets() 191 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() 204 if (ssl->enable_early_data) { in add_new_session_tickets() [all …]
|
D | tls_record.cc | 143 static bool ssl_needs_record_splitting(const SSL *ssl) { in ssl_needs_record_splitting() argument 145 return !ssl->s3->aead_write_ctx->is_null_cipher() && in ssl_needs_record_splitting() 146 ssl->s3->aead_write_ctx->ProtocolVersion() < TLS1_1_VERSION && in ssl_needs_record_splitting() 147 (ssl->mode & SSL_MODE_CBC_RECORD_SPLITTING) != 0 && in ssl_needs_record_splitting() 148 SSL_CIPHER_is_block_cipher(ssl->s3->aead_write_ctx->cipher()); in ssl_needs_record_splitting() 165 size_t ssl_record_prefix_len(const SSL *ssl) { in ssl_record_prefix_len() argument 167 if (SSL_is_dtls(ssl)) { in ssl_record_prefix_len() 173 return header_len + ssl->s3->aead_read_ctx->ExplicitNonceLen(); in ssl_record_prefix_len() 176 size_t ssl_seal_align_prefix_len(const SSL *ssl) { in ssl_seal_align_prefix_len() argument 177 if (SSL_is_dtls(ssl)) { in ssl_seal_align_prefix_len() [all …]
|
D | handshake_server.cc | 197 SSL *const ssl = hs->ssl; in negotiate_version() local 198 assert(!ssl->s3->have_version); in negotiate_version() 224 if (SSL_is_dtls(ssl)) { in negotiate_version() 245 if (!ssl_negotiate_version(hs, out_alert, &ssl->version, &versions)) { in negotiate_version() 251 ssl->s3->have_version = true; in negotiate_version() 252 ssl->s3->aead_write_ctx->SetVersionIfNullCipher(ssl->version); in negotiate_version() 257 ssl_protocol_version(ssl) < hs->max_version) { in negotiate_version() 332 SSL *const ssl = hs->ssl; in ssl3_choose_cipher() local 349 if (ssl->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { in ssl3_choose_cipher() 367 SSL_CIPHER_get_min_version(c) <= ssl_protocol_version(ssl) && in ssl3_choose_cipher() [all …]
|
D | tls13_both.cc | 109 SSL *const ssl = hs->ssl; in tls13_process_certificate() local 122 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate() 127 if (uncompressed_len > ssl->max_cert_list) { in tls13_process_certificate() 128 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in tls13_process_certificate() 136 for (const auto* alg : ssl->ctx->cert_compression_algs.get()) { in tls13_process_certificate() 144 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_ILLEGAL_PARAMETER); in tls13_process_certificate() 151 if (!decompress(ssl, &decompressed_ptr, uncompressed_len, in tls13_process_certificate() 153 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate() 161 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate() 181 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); in tls13_process_certificate() [all …]
|
D | ssl_x509.cc | 163 static void check_ssl_x509_method(const SSL *ssl) { in check_ssl_x509_method() argument 164 assert(ssl == NULL || ssl->ctx->x509_method == &ssl_crypto_x509_method); in check_ssl_x509_method() 371 SSL_CTX *ssl_ctx = hs->ssl->ctx.get(); in ssl_crypto_x509_session_verify_cert_chain() 384 ctx.get(), SSL_get_ex_data_X509_STORE_CTX_idx(), hs->ssl)) { in ssl_crypto_x509_session_verify_cert_chain() 392 hs->ssl->server ? "ssl_client" : "ssl_server"); in ssl_crypto_x509_session_verify_cert_chain() 432 X509_VERIFY_PARAM_inherit(hs->config->param, hs->ssl->ctx->param); in ssl_crypto_x509_ssl_new() 450 if ((hs->ssl->mode & SSL_MODE_NO_AUTO_CHAIN) || in ssl_crypto_x509_ssl_auto_chain_if_needed() 464 if (!X509_STORE_CTX_init(ctx.get(), hs->ssl->ctx->cert_store, leaf.get(), in ssl_crypto_x509_ssl_auto_chain_if_needed() 528 X509 *SSL_get_peer_certificate(const SSL *ssl) { in SSL_get_peer_certificate() argument 529 check_ssl_x509_method(ssl); in SSL_get_peer_certificate() [all …]
|
D | ssl_buffer.cc | 105 static int dtls_read_buffer_next_packet(SSL *ssl) { in dtls_read_buffer_next_packet() argument 106 SSLBuffer *buf = &ssl->s3->read_buffer; in dtls_read_buffer_next_packet() 117 BIO_read(ssl->rbio.get(), buf->data(), static_cast<int>(buf->cap())); in dtls_read_buffer_next_packet() 119 ssl->s3->rwstate = SSL_READING; in dtls_read_buffer_next_packet() 126 static int tls_read_buffer_extend_to(SSL *ssl, size_t len) { in tls_read_buffer_extend_to() argument 127 SSLBuffer *buf = &ssl->s3->read_buffer; in tls_read_buffer_extend_to() 138 int ret = BIO_read(ssl->rbio.get(), buf->data() + buf->size(), in tls_read_buffer_extend_to() 141 ssl->s3->rwstate = SSL_READING; in tls_read_buffer_extend_to() 150 int ssl_read_buffer_extend_to(SSL *ssl, size_t len) { in ssl_read_buffer_extend_to() argument 152 ssl->s3->read_buffer.DiscardConsumed(); in ssl_read_buffer_extend_to() [all …]
|
D | t1_lib.cc | 202 bool ssl_client_hello_init(SSL *ssl, SSL_CLIENT_HELLO *out, in ssl_client_hello_init() argument 205 out->ssl = ssl; in ssl_client_hello_init() 224 if (SSL_is_dtls(out->ssl)) { in ssl_client_hello_init() 303 SSL *const ssl = hs->ssl; in tls1_get_shared_group() local 304 assert(ssl->server); in tls1_get_shared_group() 317 if (ssl->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { in tls1_get_shared_group() 330 (ssl_protocol_version(ssl) >= TLS1_3_VERSION || in tls1_get_shared_group() 394 ssl_protocol_version(hs->ssl) < TLS1_3_VERSION) { in tls1_check_group_id() 502 static SSLSignatureAlgorithmList tls12_get_verify_sigalgs(const SSL *ssl, in tls12_get_verify_sigalgs() argument 505 if (!ssl->config->verify_sigalgs.empty()) { in tls12_get_verify_sigalgs() [all …]
|
D | t1_enc.cc | 167 static bool get_key_block_lengths(const SSL *ssl, size_t *out_mac_secret_len, in get_key_block_lengths() argument 172 ssl_protocol_version(ssl), SSL_is_dtls(ssl))) { in get_key_block_lengths() 192 int tls1_configure_aead(SSL *ssl, evp_aead_direction_t direction, in tls1_configure_aead() argument 197 if (!get_key_block_lengths(ssl, &mac_secret_len, &key_len, &iv_len, cipher)) { in tls1_configure_aead() 205 !SSL_generate_key_block(ssl, key_block_cache->data(), key_block_size)) { in tls1_configure_aead() 213 if (direction == (ssl->server ? evp_aead_open : evp_aead_seal)) { in tls1_configure_aead() 233 direction, ssl->version, SSL_is_dtls(ssl), cipher, key, mac_secret, iv); in tls1_configure_aead() 239 return ssl->method->set_read_state(ssl, std::move(aead_ctx)); in tls1_configure_aead() 242 return ssl->method->set_write_state(ssl, std::move(aead_ctx)); in tls1_configure_aead() 247 return tls1_configure_aead(hs->ssl, direction, &hs->key_block, in tls1_change_cipher_state() [all …]
|
D | d1_pkt.cc | 131 ssl_open_record_t dtls1_open_app_data(SSL *ssl, Span<uint8_t> *out, in dtls1_open_app_data() argument 134 assert(!SSL_in_init(ssl)); in dtls1_open_app_data() 138 auto ret = dtls_open_record(ssl, &type, &record, out_consumed, out_alert, in); in dtls1_open_app_data() 157 msg_hdr.seq == ssl->d1->handshake_read_seq - 1) { in dtls1_open_app_data() 162 if (!dtls1_check_timeout_num(ssl)) { in dtls1_open_app_data() 167 dtls1_retransmit_outgoing_messages(ssl); in dtls1_open_app_data() 190 int dtls1_write_app_data(SSL *ssl, bool *out_needs_handshake, const uint8_t *in, in dtls1_write_app_data() argument 192 assert(!SSL_in_init(ssl)); in dtls1_write_app_data() 195 if (ssl->s3->write_shutdown != ssl_shutdown_none) { in dtls1_write_app_data() 214 int ret = dtls1_write_record(ssl, SSL3_RT_APPLICATION_DATA, in, (size_t)len, in dtls1_write_app_data() [all …]
|
D | tls13_enc.cc | 51 if (!init_key_schedule(hs, ssl_protocol_version(hs->ssl), hs->new_cipher)) { in tls13_init_key_schedule() 62 SSL *const ssl = hs->ssl; in tls13_init_early_key_schedule() local 63 return init_key_schedule(hs, ssl_session_protocol_version(ssl->session.get()), in tls13_init_early_key_schedule() 64 ssl->session->cipher) && in tls13_init_early_key_schedule() 134 bool tls13_set_traffic_key(SSL *ssl, enum ssl_encryption_level_t level, in tls13_set_traffic_key() argument 138 const SSL_SESSION *session = SSL_get_session(ssl); in tls13_set_traffic_key() 147 if (ssl->quic_method == nullptr) { in tls13_set_traffic_key() 152 version, SSL_is_dtls(ssl))) { in tls13_set_traffic_key() 176 direction, session->ssl_version, SSL_is_dtls(ssl), session->cipher, in tls13_set_traffic_key() 191 if (!ssl->method->set_read_state(ssl, std::move(traffic_aead))) { in tls13_set_traffic_key() [all …]
|
D | dtls_method.cc | 71 static void dtls1_on_handshake_complete(SSL *ssl) { in dtls1_on_handshake_complete() argument 73 dtls1_stop_timer(ssl); in dtls1_on_handshake_complete() 76 if (ssl->d1->flight_has_reply) { in dtls1_on_handshake_complete() 77 dtls_clear_outgoing_messages(ssl); in dtls1_on_handshake_complete() 81 static bool dtls1_set_read_state(SSL *ssl, UniquePtr<SSLAEADContext> aead_ctx) { in dtls1_set_read_state() argument 83 if (dtls_has_unprocessed_handshake_data(ssl)) { in dtls1_set_read_state() 85 ssl_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); in dtls1_set_read_state() 89 ssl->d1->r_epoch++; in dtls1_set_read_state() 90 OPENSSL_memset(&ssl->d1->bitmap, 0, sizeof(ssl->d1->bitmap)); in dtls1_set_read_state() 91 OPENSSL_memset(ssl->s3->read_sequence, 0, sizeof(ssl->s3->read_sequence)); in dtls1_set_read_state() [all …]
|
/external/python/cpython2/Lib/test/ |
D | test_ssl.py | 25 ssl = support.import_module("ssl") variable 27 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES) 29 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL') 30 IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) 91 ssl.sslwrap_simple(socket.socket(socket.AF_INET)) 98 ssl.sslwrap_simple(socket.socket(socket.AF_INET)._sock) 108 return ssl._OPENSSL_API_VERSION >= (0, 9, 8, 13, 15) 112 return ssl.OPENSSL_VERSION_INFO >= (0, 9, 7, 8, 15) 116 return ssl.OPENSSL_VERSION_INFO >= (0, 9, 8, 0, 15) 127 if ssl._OPENSSL_API_VERSION == (0, 9, 8, 9, 15): [all …]
|
/external/boringssl/src/ssl/test/ |
D | bssl_shim.cc | 179 static int DoRead(SSL *ssl, uint8_t *out, size_t max_out) { in DoRead() argument 180 const TestConfig *config = GetTestConfig(ssl); in DoRead() 181 TestState *test_state = GetTestState(ssl); in DoRead() 190 ret = CheckIdempotentError("SSL_peek/SSL_read", ssl, [&]() -> int { in DoRead() 191 return config->peek_then_read ? SSL_peek(ssl, out, max_out) in DoRead() 192 : SSL_read(ssl, out, max_out); in DoRead() 202 if (!SSL_export_keying_material(ssl, &buf, 1, NULL, 0, NULL, 0, 0)) { in DoRead() 207 } while (config->async && RetryAsync(ssl, ret)); in DoRead() 213 int ret2 = SSL_peek(ssl, buf.get(), ret); in DoRead() 221 ret2 = SSL_read(ssl, buf.get(), ret); in DoRead() [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_ssl.py | 27 ssl = support.import_module("ssl") variable 30 PROTOCOLS = sorted(ssl._PROTOCOL_NAMES) 32 IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL') 33 IS_OPENSSL_1_1_0 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) 34 IS_OPENSSL_1_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 1) 44 proto = getattr(ssl, proto) 45 ver = getattr(ssl.TLSVersion, ver) 138 OP_NO_COMPRESSION = getattr(ssl, "OP_NO_COMPRESSION", 0) 139 OP_SINGLE_DH_USE = getattr(ssl, "OP_SINGLE_DH_USE", 0) 140 OP_SINGLE_ECDH_USE = getattr(ssl, "OP_SINGLE_ECDH_USE", 0) [all …]
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 230 OPENSSL_EXPORT void SSL_free(SSL *ssl); 235 OPENSSL_EXPORT SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl); 238 OPENSSL_EXPORT void SSL_set_connect_state(SSL *ssl); 241 OPENSSL_EXPORT void SSL_set_accept_state(SSL *ssl); 245 OPENSSL_EXPORT int SSL_is_server(const SSL *ssl); 248 OPENSSL_EXPORT int SSL_is_dtls(const SSL *ssl); 268 OPENSSL_EXPORT void SSL_set_bio(SSL *ssl, BIO *rbio, BIO *wbio); 275 OPENSSL_EXPORT void SSL_set0_rbio(SSL *ssl, BIO *rbio); 282 OPENSSL_EXPORT void SSL_set0_wbio(SSL *ssl, BIO *wbio); 285 OPENSSL_EXPORT BIO *SSL_get_rbio(const SSL *ssl); [all …]
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | NativeSsl.java | 44 import javax.net.ssl.SSLException; 45 import javax.net.ssl.SSLHandshakeException; 46 import javax.net.ssl.X509KeyManager; 47 import javax.net.ssl.X509TrustManager; 63 private volatile long ssl; field in NativeSsl 65 private NativeSsl(long ssl, SSLParametersImpl parameters, in NativeSsl() argument 68 this.ssl = ssl; in NativeSsl() 79 long ssl = NativeCrypto.SSL_new(ctx.sslCtxNativePointer, ctx); in newInstance() local 80 return new NativeSsl(ssl, parameters, handshakeCallbacks, chooser, pskCallbacks); in newInstance() 92 NativeCrypto.SSL_set_session(ssl, this, sslSessionNativePointer); in offerToResumeSession() [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | NativeSsl.java | 45 import javax.net.ssl.SSLException; 46 import javax.net.ssl.SSLHandshakeException; 47 import javax.net.ssl.X509KeyManager; 48 import javax.net.ssl.X509TrustManager; 64 private volatile long ssl; field in NativeSsl 66 private NativeSsl(long ssl, SSLParametersImpl parameters, in NativeSsl() argument 69 this.ssl = ssl; in NativeSsl() 80 long ssl = NativeCrypto.SSL_new(ctx.sslCtxNativePointer, ctx); in newInstance() local 81 return new NativeSsl(ssl, parameters, handshakeCallbacks, chooser, pskCallbacks); in newInstance() 93 NativeCrypto.SSL_set_session(ssl, this, sslSessionNativePointer); in offerToResumeSession() [all …]
|