Symbol: ssl
lib/libcrypto/arc4random/getentropy_aix.c
287
socklen_t ssl;
lib/libcrypto/arc4random/getentropy_aix.c
368
ssl = sizeof(ss);
lib/libcrypto/arc4random/getentropy_aix.c
370
(void *)&ss, &ssl) == -1,
lib/libcrypto/arc4random/getentropy_hpux.c
281
socklen_t ssl;
lib/libcrypto/arc4random/getentropy_hpux.c
362
ssl = sizeof(ss);
lib/libcrypto/arc4random/getentropy_hpux.c
364
(void *)&ss, &ssl) == -1,
lib/libcrypto/arc4random/getentropy_linux.c
387
socklen_t ssl;
lib/libcrypto/arc4random/getentropy_linux.c
472
ssl = sizeof(ss);
lib/libcrypto/arc4random/getentropy_linux.c
474
(void *)&ss, &ssl) == -1,
lib/libcrypto/arc4random/getentropy_osx.c
301
socklen_t ssl;
lib/libcrypto/arc4random/getentropy_osx.c
382
ssl = sizeof(ss);
lib/libcrypto/arc4random/getentropy_osx.c
384
(void *)&ss, &ssl) == -1,
lib/libcrypto/arc4random/getentropy_solaris.c
307
socklen_t ssl;
lib/libcrypto/arc4random/getentropy_solaris.c
388
ssl = sizeof(ss);
lib/libcrypto/arc4random/getentropy_solaris.c
390
(void *)&ss, &ssl) == -1,
lib/libcrypto/bio/bio.h
445
#define BIO_set_ssl(b,ssl,c) BIO_ctrl(b,BIO_C_SET_SSL,c,(char *)ssl)
lib/libssl/bio_ssl.c
133
if (bs->ssl != NULL)
lib/libssl/bio_ssl.c
134
SSL_shutdown(bs->ssl);
lib/libssl/bio_ssl.c
136
if (a->init && (bs->ssl != NULL))
lib/libssl/bio_ssl.c
137
SSL_free(bs->ssl);
lib/libssl/bio_ssl.c
150
SSL *ssl;
lib/libssl/bio_ssl.c
157
ssl = sb->ssl;
lib/libssl/bio_ssl.c
161
ret = SSL_read(ssl, out, outl);
lib/libssl/bio_ssl.c
163
switch (SSL_get_error(ssl, ret)) {
lib/libssl/bio_ssl.c
172
SSL_renegotiate(ssl);
lib/libssl/bio_ssl.c
183
SSL_renegotiate(ssl);
lib/libssl/bio_ssl.c
222
SSL *ssl;
lib/libssl/bio_ssl.c
228
ssl = bs->ssl;
lib/libssl/bio_ssl.c
232
ret = SSL_write(ssl, out, outl);
lib/libssl/bio_ssl.c
234
switch (SSL_get_error(ssl, ret)) {
lib/libssl/bio_ssl.c
243
SSL_renegotiate(ssl);
lib/libssl/bio_ssl.c
254
SSL_renegotiate(ssl);
lib/libssl/bio_ssl.c
284
SSL **sslp, *ssl;
lib/libssl/bio_ssl.c
290
ssl = bs->ssl;
lib/libssl/bio_ssl.c
291
if ((ssl == NULL) && (cmd != BIO_C_SET_SSL))
lib/libssl/bio_ssl.c
295
SSL_shutdown(ssl);
lib/libssl/bio_ssl.c
297
if (ssl->handshake_func == ssl->method->ssl_connect)
lib/libssl/bio_ssl.c
298
SSL_set_connect_state(ssl);
lib/libssl/bio_ssl.c
299
else if (ssl->handshake_func == ssl->method->ssl_accept)
lib/libssl/bio_ssl.c
300
SSL_set_accept_state(ssl);
lib/libssl/bio_ssl.c
302
SSL_clear(ssl);
lib/libssl/bio_ssl.c
306
else if (ssl->rbio != NULL)
lib/libssl/bio_ssl.c
307
ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
lib/libssl/bio_ssl.c
316
SSL_set_connect_state(ssl);
lib/libssl/bio_ssl.c
318
SSL_set_accept_state(ssl);
lib/libssl/bio_ssl.c
336
if (ssl != NULL) {
lib/libssl/bio_ssl.c
342
ssl = (SSL *)ptr;
lib/libssl/bio_ssl.c
343
((BIO_SSL *)b->ptr)->ssl = ssl;
lib/libssl/bio_ssl.c
344
bio = SSL_get_rbio(ssl);
lib/libssl/bio_ssl.c
356
*sslp = ssl;
lib/libssl/bio_ssl.c
367
ret = BIO_ctrl(ssl->wbio, cmd, num, ptr);
lib/libssl/bio_ssl.c
370
ret = SSL_pending(ssl);
lib/libssl/bio_ssl.c
372
ret = BIO_pending(ssl->rbio);
lib/libssl/bio_ssl.c
376
ret = BIO_ctrl(ssl->wbio, cmd, num, ptr);
lib/libssl/bio_ssl.c
380
if ((b->next_bio != NULL) && (b->next_bio != ssl->rbio)) {
lib/libssl/bio_ssl.c
381
SSL_set_bio(ssl, b->next_bio, b->next_bio);
lib/libssl/bio_ssl.c
392
if (ssl->rbio != ssl->wbio)
lib/libssl/bio_ssl.c
393
BIO_free_all(ssl->wbio);
lib/libssl/bio_ssl.c
396
ssl->wbio = NULL;
lib/libssl/bio_ssl.c
397
ssl->rbio = NULL;
lib/libssl/bio_ssl.c
404
ret = (int)SSL_do_handshake(ssl);
lib/libssl/bio_ssl.c
406
switch (SSL_get_error(ssl, (int)ret)) {
lib/libssl/bio_ssl.c
426
if (((BIO_SSL *)dbio->ptr)->ssl != NULL)
lib/libssl/bio_ssl.c
427
SSL_free(((BIO_SSL *)dbio->ptr)->ssl);
lib/libssl/bio_ssl.c
428
((BIO_SSL *)dbio->ptr)->ssl = SSL_dup(ssl);
lib/libssl/bio_ssl.c
437
ret = (((BIO_SSL *)dbio->ptr)->ssl != NULL);
lib/libssl/bio_ssl.c
440
ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
lib/libssl/bio_ssl.c
453
*fptr = SSL_get_info_callback(ssl);
lib/libssl/bio_ssl.c
457
ret = BIO_ctrl(ssl->rbio, cmd, num, ptr);
lib/libssl/bio_ssl.c
466
SSL *ssl;
lib/libssl/bio_ssl.c
471
ssl = bs->ssl;
lib/libssl/bio_ssl.c
477
SSL_set_info_callback(ssl,
lib/libssl/bio_ssl.c
482
ret = BIO_callback_ctrl(ssl->rbio, cmd, fp);
lib/libssl/bio_ssl.c
501
BIO *ret = NULL, *buf = NULL, *ssl = NULL;
lib/libssl/bio_ssl.c
505
if ((ssl = BIO_new_ssl_connect(ctx)) == NULL)
lib/libssl/bio_ssl.c
507
if ((ret = BIO_push(buf, ssl)) == NULL)
lib/libssl/bio_ssl.c
513
BIO_free(ssl);
lib/libssl/bio_ssl.c
521
BIO *ret = NULL, *con = NULL, *ssl = NULL;
lib/libssl/bio_ssl.c
525
if ((ssl = BIO_new_ssl(ctx, 1)) == NULL)
lib/libssl/bio_ssl.c
527
if ((ret = BIO_push(ssl, con)) == NULL)
lib/libssl/bio_ssl.c
533
BIO_free(ssl);
lib/libssl/bio_ssl.c
542
SSL *ssl;
lib/libssl/bio_ssl.c
546
if ((ssl = SSL_new(ctx)) == NULL)
lib/libssl/bio_ssl.c
550
SSL_set_connect_state(ssl);
lib/libssl/bio_ssl.c
552
SSL_set_accept_state(ssl);
lib/libssl/bio_ssl.c
554
BIO_set_ssl(ret, ssl, BIO_CLOSE);
lib/libssl/bio_ssl.c
570
if ((((BIO_SSL *)t->ptr)->ssl == NULL) ||
lib/libssl/bio_ssl.c
571
(((BIO_SSL *)f->ptr)->ssl == NULL))
lib/libssl/bio_ssl.c
573
if (!SSL_copy_session_id(((BIO_SSL *)t->ptr)->ssl,
lib/libssl/bio_ssl.c
574
((BIO_SSL *)f->ptr)->ssl))
lib/libssl/bio_ssl.c
587
s = ((BIO_SSL *)b->ptr)->ssl;
lib/libssl/bio_ssl.c
80
SSL *ssl; /* The ssl handle :-) */
lib/libssl/s3_lib.c
1649
SSL_set0_chain(SSL *ssl, STACK_OF(X509) *chain)
lib/libssl/s3_lib.c
1651
return ssl_cert_set0_chain(NULL, ssl, chain);
lib/libssl/s3_lib.c
1656
SSL_set1_chain(SSL *ssl, STACK_OF(X509) *chain)
lib/libssl/s3_lib.c
1658
return ssl_cert_set1_chain(NULL, ssl, chain);
lib/libssl/s3_lib.c
1663
SSL_add0_chain_cert(SSL *ssl, X509 *x509)
lib/libssl/s3_lib.c
1665
return ssl_cert_add0_chain_cert(NULL, ssl, x509);
lib/libssl/s3_lib.c
1670
SSL_add1_chain_cert(SSL *ssl, X509 *x509)
lib/libssl/s3_lib.c
1672
return ssl_cert_add1_chain_cert(NULL, ssl, x509);
lib/libssl/s3_lib.c
1677
SSL_get0_chain_certs(const SSL *ssl, STACK_OF(X509) **out_chain)
lib/libssl/s3_lib.c
1681
if (ssl->cert->key != NULL)
lib/libssl/s3_lib.c
1682
*out_chain = ssl->cert->key->chain;
lib/libssl/s3_lib.c
1689
SSL_clear_chain_certs(SSL *ssl)
lib/libssl/s3_lib.c
1691
return ssl_cert_set0_chain(NULL, ssl, NULL);
lib/libssl/srtp.h
141
STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl);
lib/libssl/ssl.h
1003
int SSL_get_min_proto_version(SSL *ssl);
lib/libssl/ssl.h
1004
int SSL_get_max_proto_version(SSL *ssl);
lib/libssl/ssl.h
1005
int SSL_set_min_proto_version(SSL *ssl, uint16_t version);
lib/libssl/ssl.h
1006
int SSL_set_max_proto_version(SSL *ssl, uint16_t version);
lib/libssl/ssl.h
1114
const SSL_CIPHER *SSL_CIPHER_find(SSL *ssl, const unsigned char *ptr);
lib/libssl/ssl.h
1147
int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa);
lib/libssl/ssl.h
1148
int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const unsigned char *d, long len);
lib/libssl/ssl.h
1149
int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey);
lib/libssl/ssl.h
1150
int SSL_use_PrivateKey_ASN1(int pk, SSL *ssl, const unsigned char *d, long len);
lib/libssl/ssl.h
1151
int SSL_use_certificate(SSL *ssl, X509 *x);
lib/libssl/ssl.h
1152
int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len);
lib/libssl/ssl.h
1154
int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type);
lib/libssl/ssl.h
1155
int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type);
lib/libssl/ssl.h
1156
int SSL_use_certificate_file(SSL *ssl, const char *file, int type);
lib/libssl/ssl.h
1157
int SSL_use_certificate_chain_file(SSL *ssl, const char *file);
lib/libssl/ssl.h
1215
int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
lib/libssl/ssl.h
1250
int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, unsigned int sid_ctx_len);
lib/libssl/ssl.h
1262
X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl);
lib/libssl/ssl.h
1263
int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm);
lib/libssl/ssl.h
1266
void SSL_free(SSL *ssl);
lib/libssl/ssl.h
1267
int SSL_up_ref(SSL *ssl);
lib/libssl/ssl.h
1268
int SSL_accept(SSL *ssl);
lib/libssl/ssl.h
1269
int SSL_connect(SSL *ssl);
lib/libssl/ssl.h
1272
int SSL_read(SSL *ssl, void *buf, int num);
lib/libssl/ssl.h
1273
int SSL_peek(SSL *ssl, void *buf, int num);
lib/libssl/ssl.h
1274
int SSL_write(SSL *ssl, const void *buf, int num);
lib/libssl/ssl.h
1275
int SSL_read_ex(SSL *ssl, void *buf, size_t num, size_t *bytes_read);
lib/libssl/ssl.h
1276
int SSL_peek_ex(SSL *ssl, void *buf, size_t num, size_t *bytes_peeked);
lib/libssl/ssl.h
1277
int SSL_write_ex(SSL *ssl, const void *buf, size_t num, size_t *bytes_written);
lib/libssl/ssl.h
1298
long SSL_ctrl(SSL *ssl, int cmd, long larg, void *parg);
lib/libssl/ssl.h
1362
int SSL_add_client_CA(SSL *ssl, X509 *x);
lib/libssl/ssl.h
1373
SSL *SSL_dup(SSL *ssl);
lib/libssl/ssl.h
1375
X509 *SSL_get_certificate(const SSL *ssl);
lib/libssl/ssl.h
1376
/* EVP_PKEY */ struct evp_pkey_st *SSL_get_privatekey(const SSL *ssl);
lib/libssl/ssl.h
1380
void SSL_set_quiet_shutdown(SSL *ssl,int mode);
lib/libssl/ssl.h
1381
int SSL_get_quiet_shutdown(const SSL *ssl);
lib/libssl/ssl.h
1382
void SSL_set_shutdown(SSL *ssl,int mode);
lib/libssl/ssl.h
1383
int SSL_get_shutdown(const SSL *ssl);
lib/libssl/ssl.h
1384
int SSL_version(const SSL *ssl);
lib/libssl/ssl.h
1390
SSL_SESSION *SSL_get_session(const SSL *ssl);
lib/libssl/ssl.h
1391
SSL_SESSION *SSL_get1_session(SSL *ssl); /* obtain a reference count */
lib/libssl/ssl.h
1392
SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
lib/libssl/ssl.h
1393
SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx);
lib/libssl/ssl.h
1394
void SSL_set_info_callback(SSL *ssl,
lib/libssl/ssl.h
1395
void (*cb)(const SSL *ssl, int type, int val));
lib/libssl/ssl.h
1396
void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl, int type, int val);
lib/libssl/ssl.h
1397
int SSL_state(const SSL *ssl);
lib/libssl/ssl.h
1398
void SSL_set_state(SSL *ssl, int state);
lib/libssl/ssl.h
1400
void SSL_set_verify_result(SSL *ssl, long v);
lib/libssl/ssl.h
1401
long SSL_get_verify_result(const SSL *ssl);
lib/libssl/ssl.h
1403
int SSL_set_ex_data(SSL *ssl, int idx, void *data);
lib/libssl/ssl.h
1404
void *SSL_get_ex_data(const SSL *ssl, int idx);
lib/libssl/ssl.h
1414
int SSL_CTX_set_ex_data(SSL_CTX *ssl, int idx, void *data);
lib/libssl/ssl.h
1415
void *SSL_CTX_get_ex_data(const SSL_CTX *ssl, int idx);
lib/libssl/ssl.h
1440
#define SSL_get_max_cert_list(ssl) \
lib/libssl/ssl.h
1441
SSL_ctrl(ssl,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL)
lib/libssl/ssl.h
1442
#define SSL_set_max_cert_list(ssl,m) \
lib/libssl/ssl.h
1443
SSL_ctrl(ssl,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL)
lib/libssl/ssl.h
1447
#define SSL_set_max_send_fragment(ssl,m) \
lib/libssl/ssl.h
1448
SSL_ctrl(ssl,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL)
lib/libssl/ssl.h
1452
RSA *(*cb)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1454
void SSL_set_tmp_rsa_callback(SSL *ssl,
lib/libssl/ssl.h
1455
RSA *(*cb)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1457
DH *(*dh)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1458
void SSL_set_tmp_dh_callback(SSL *ssl,
lib/libssl/ssl.h
1459
DH *(*dh)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1461
EC_KEY *(*ecdh)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1462
void SSL_set_tmp_ecdh_callback(SSL *ssl,
lib/libssl/ssl.h
1463
EC_KEY *(*ecdh)(SSL *ssl, int is_export, int keylength));
lib/libssl/ssl.h
1549
void SSL_set_security_level(SSL *ssl, int level);
lib/libssl/ssl.h
1550
int SSL_get_security_level(const SSL *ssl);
lib/libssl/ssl.h
1624
int (*set_encryption_secrets)(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1637
int (*add_handshake_data)(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1646
int (*flush_flight)(SSL *ssl);
lib/libssl/ssl.h
1655
int (*send_alert)(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1671
int (*set_read_secret)(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1683
int (*set_write_secret)(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1699
int SSL_set_quic_method(SSL *ssl, const SSL_QUIC_METHOD *quic_method);
lib/libssl/ssl.h
1702
int SSL_is_quic(const SSL *ssl);
lib/libssl/ssl.h
1709
size_t SSL_quic_max_handshake_flight_len(const SSL *ssl,
lib/libssl/ssl.h
1715
enum ssl_encryption_level_t SSL_quic_read_level(const SSL *ssl);
lib/libssl/ssl.h
1720
enum ssl_encryption_level_t SSL_quic_write_level(const SSL *ssl);
lib/libssl/ssl.h
1729
int SSL_provide_quic_data(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl.h
1737
int SSL_process_quic_post_handshake(SSL *ssl);
lib/libssl/ssl.h
1747
int SSL_set_quic_transport_params(SSL *ssl, const uint8_t *params,
lib/libssl/ssl.h
1757
void SSL_get_peer_quic_transport_params(const SSL *ssl,
lib/libssl/ssl.h
1765
void SSL_set_quic_use_legacy_codepoint(SSL *ssl, int use_legacy);
lib/libssl/ssl.h
462
#define SSL_set_options(ssl,op) \
lib/libssl/ssl.h
463
SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL)
lib/libssl/ssl.h
464
#define SSL_clear_options(ssl,op) \
lib/libssl/ssl.h
465
SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
lib/libssl/ssl.h
466
#define SSL_get_options(ssl) \
lib/libssl/ssl.h
467
SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL)
lib/libssl/ssl.h
475
#define SSL_clear_mode(ssl,op) \
lib/libssl/ssl.h
476
SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL)
lib/libssl/ssl.h
477
#define SSL_set_mode(ssl,op) \
lib/libssl/ssl.h
478
SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL)
lib/libssl/ssl.h
479
#define SSL_get_mode(ssl) \
lib/libssl/ssl.h
480
SSL_ctrl((ssl),SSL_CTRL_MODE,0,NULL)
lib/libssl/ssl.h
481
#define SSL_set_mtu(ssl, mtu) \
lib/libssl/ssl.h
482
SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL)
lib/libssl/ssl.h
484
#define SSL_get_secure_renegotiation_support(ssl) \
lib/libssl/ssl.h
485
SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL)
lib/libssl/ssl.h
488
int version, int content_type, const void *buf, size_t len, SSL *ssl,
lib/libssl/ssl.h
490
void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version,
lib/libssl/ssl.h
491
int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
lib/libssl/ssl.h
493
#define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg))
lib/libssl/ssl.h
494
typedef void (*SSL_CTX_keylog_cb_func)(const SSL *ssl, const char *line);
lib/libssl/ssl.h
520
typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id,
lib/libssl/ssl.h
570
int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess));
lib/libssl/ssl.h
571
int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
lib/libssl/ssl.h
578
SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,
lib/libssl/ssl.h
580
SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
lib/libssl/ssl.h
582
void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,
lib/libssl/ssl.h
584
void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl, int type,
lib/libssl/ssl.h
587
int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));
lib/libssl/ssl.h
588
int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl, X509 **x509,
lib/libssl/ssl.h
591
int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,
lib/libssl/ssl.h
594
int (*app_verify_cookie_cb)(SSL *ssl, const unsigned char *cookie,
lib/libssl/ssl.h
596
void SSL_CTX_set_next_protos_advertised_cb(SSL_CTX *s, int (*cb)(SSL *ssl,
lib/libssl/ssl.h
598
void SSL_CTX_set_next_proto_select_cb(SSL_CTX *s, int (*cb)(SSL *ssl,
lib/libssl/ssl.h
614
int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
lib/libssl/ssl.h
617
int (*cb)(SSL *ssl, const unsigned char **out, unsigned char *outlen,
lib/libssl/ssl.h
619
void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
lib/libssl/ssl.h
623
typedef int (*SSL_psk_use_session_cb_func)(SSL *ssl, const EVP_MD *md,
lib/libssl/ssl.h
936
#define DTLSv1_get_timeout(ssl, arg) \
lib/libssl/ssl.h
937
SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg)
lib/libssl/ssl.h
938
#define DTLSv1_handle_timeout(ssl) \
lib/libssl/ssl.h
939
SSL_ctrl(ssl,DTLS_CTRL_HANDLE_TIMEOUT,0, NULL)
lib/libssl/ssl.h
940
#define DTLSv1_listen(ssl, peer) \
lib/libssl/ssl.h
941
SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
lib/libssl/ssl.h
943
#define SSL_session_reused(ssl) \
lib/libssl/ssl.h
944
SSL_ctrl((ssl),SSL_CTRL_GET_SESSION_REUSED,0,NULL)
lib/libssl/ssl.h
945
#define SSL_num_renegotiations(ssl) \
lib/libssl/ssl.h
946
SSL_ctrl((ssl),SSL_CTRL_GET_NUM_RENEGOTIATIONS,0,NULL)
lib/libssl/ssl.h
947
#define SSL_clear_num_renegotiations(ssl) \
lib/libssl/ssl.h
948
SSL_ctrl((ssl),SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS,0,NULL)
lib/libssl/ssl.h
949
#define SSL_total_renegotiations(ssl) \
lib/libssl/ssl.h
950
SSL_ctrl((ssl),SSL_CTRL_GET_TOTAL_RENEGOTIATIONS,0,NULL)
lib/libssl/ssl.h
965
#define SSL_need_tmp_RSA(ssl) \
lib/libssl/ssl.h
966
SSL_ctrl(ssl,SSL_CTRL_NEED_TMP_RSA,0,NULL)
lib/libssl/ssl.h
967
#define SSL_set_tmp_rsa(ssl,rsa) \
lib/libssl/ssl.h
968
SSL_ctrl(ssl,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa)
lib/libssl/ssl.h
969
#define SSL_set_tmp_dh(ssl,dh) \
lib/libssl/ssl.h
970
SSL_ctrl(ssl,SSL_CTRL_SET_TMP_DH,0,(char *)dh)
lib/libssl/ssl.h
971
#define SSL_set_tmp_ecdh(ssl,ecdh) \
lib/libssl/ssl.h
972
SSL_ctrl(ssl,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh)
lib/libssl/ssl.h
985
int SSL_set0_chain(SSL *ssl, STACK_OF(X509) *chain);
lib/libssl/ssl.h
986
int SSL_set1_chain(SSL *ssl, STACK_OF(X509) *chain);
lib/libssl/ssl.h
987
int SSL_add0_chain_cert(SSL *ssl, X509 *x509);
lib/libssl/ssl.h
988
int SSL_add1_chain_cert(SSL *ssl, X509 *x509);
lib/libssl/ssl.h
989
int SSL_get0_chain_certs(const SSL *ssl, STACK_OF(X509) **out_chain);
lib/libssl/ssl.h
990
int SSL_clear_chain_certs(SSL *ssl);
lib/libssl/ssl.h
995
int SSL_set1_groups(SSL *ssl, const int *groups, size_t groups_len);
lib/libssl/ssl.h
996
int SSL_set1_groups_list(SSL *ssl, const char *groups);
lib/libssl/ssl_cert.c
299
ssl_get0_cert(SSL_CTX *ctx, SSL *ssl)
lib/libssl/ssl_cert.c
301
if (ssl != NULL)
lib/libssl/ssl_cert.c
302
return ssl->cert;
lib/libssl/ssl_cert.c
308
ssl_cert_set0_chain(SSL_CTX *ctx, SSL *ssl, STACK_OF(X509) *chain)
lib/libssl/ssl_cert.c
316
if ((ssl_cert = ssl_get0_cert(ctx, ssl)) == NULL)
lib/libssl/ssl_cert.c
324
if (!ssl_security_cert(ctx, ssl, x509, 0, &ssl_err)) {
lib/libssl/ssl_cert.c
337
ssl_cert_set1_chain(SSL_CTX *ctx, SSL *ssl, STACK_OF(X509) *chain)
lib/libssl/ssl_cert.c
345
if (!ssl_cert_set0_chain(ctx, ssl, new_chain)) {
lib/libssl/ssl_cert.c
354
ssl_cert_add0_chain_cert(SSL_CTX *ctx, SSL *ssl, X509 *cert)
lib/libssl/ssl_cert.c
360
if ((ssl_cert = ssl_get0_cert(ctx, ssl)) == NULL)
lib/libssl/ssl_cert.c
366
if (!ssl_security_cert(ctx, ssl, cert, 0, &ssl_err)) {
lib/libssl/ssl_cert.c
382
ssl_cert_add1_chain_cert(SSL_CTX *ctx, SSL *ssl, X509 *cert)
lib/libssl/ssl_cert.c
384
if (!ssl_cert_add0_chain_cert(ctx, ssl, cert))
lib/libssl/ssl_cert.c
549
SSL_add_client_CA(SSL *ssl, X509 *x)
lib/libssl/ssl_cert.c
551
return (add_client_CA(&(ssl->client_CA), x));
lib/libssl/ssl_ciph.c
1502
SSL_CIPHER_find(SSL *ssl, const unsigned char *ptr)
lib/libssl/ssl_lib.c
1010
SSL_check_private_key(const SSL *ssl)
lib/libssl/ssl_lib.c
1012
if (ssl == NULL) {
lib/libssl/ssl_lib.c
1016
if (ssl->cert == NULL) {
lib/libssl/ssl_lib.c
1017
SSLerror(ssl, SSL_R_NO_CERTIFICATE_ASSIGNED);
lib/libssl/ssl_lib.c
1020
if (ssl->cert->key->x509 == NULL) {
lib/libssl/ssl_lib.c
1021
SSLerror(ssl, SSL_R_NO_CERTIFICATE_ASSIGNED);
lib/libssl/ssl_lib.c
1024
if (ssl->cert->key->privatekey == NULL) {
lib/libssl/ssl_lib.c
1025
SSLerror(ssl, SSL_R_NO_PRIVATE_KEY_ASSIGNED);
lib/libssl/ssl_lib.c
1028
return (X509_check_private_key(ssl->cert->key->x509,
lib/libssl/ssl_lib.c
1029
ssl->cert->key->privatekey));
lib/libssl/ssl_lib.c
1877
SSL_CTX_set_next_protos_advertised_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl,
lib/libssl/ssl_lib.c
1932
SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
lib/libssl/ssl_lib.c
1948
if (!CBS_stow(&cbs, &ssl->alpn_client_proto_list,
lib/libssl/ssl_lib.c
1949
&ssl->alpn_client_proto_list_len))
lib/libssl/ssl_lib.c
1967
int (*cb) (SSL *ssl, const unsigned char **out, unsigned char *outlen,
lib/libssl/ssl_lib.c
1982
SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
lib/libssl/ssl_lib.c
1985
*data = ssl->s3->alpn_selected;
lib/libssl/ssl_lib.c
1986
*len = ssl->s3->alpn_selected_len;
lib/libssl/ssl_lib.c
2701
SSL_set_quic_method(SSL *ssl, const SSL_QUIC_METHOD *quic_method)
lib/libssl/ssl_lib.c
2703
if (ssl->method->dtls)
lib/libssl/ssl_lib.c
2706
ssl->quic_method = quic_method;
lib/libssl/ssl_lib.c
2713
SSL_quic_max_handshake_flight_len(const SSL *ssl,
lib/libssl/ssl_lib.c
2730
if (ssl->server) {
lib/libssl/ssl_lib.c
2735
if ((SSL_get_verify_mode(ssl) & SSL_VERIFY_PEER) != 0 &&
lib/libssl/ssl_lib.c
2736
ssl->max_cert_list > flight_len)
lib/libssl/ssl_lib.c
2737
flight_len = ssl->max_cert_list;
lib/libssl/ssl_lib.c
2743
if (ssl->max_cert_list * 2 > flight_len)
lib/libssl/ssl_lib.c
2744
flight_len = ssl->max_cert_list * 2;
lib/libssl/ssl_lib.c
2761
SSL_quic_read_level(const SSL *ssl)
lib/libssl/ssl_lib.c
2763
return ssl->s3->hs.tls13.quic_read_level;
lib/libssl/ssl_lib.c
2768
SSL_quic_write_level(const SSL *ssl)
lib/libssl/ssl_lib.c
2770
return ssl->s3->hs.tls13.quic_write_level;
lib/libssl/ssl_lib.c
2775
SSL_provide_quic_data(SSL *ssl, enum ssl_encryption_level_t level,
lib/libssl/ssl_lib.c
2778
if (!SSL_is_quic(ssl)) {
lib/libssl/ssl_lib.c
2779
SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
lib/libssl/ssl_lib.c
2783
if (level != SSL_quic_read_level(ssl)) {
lib/libssl/ssl_lib.c
2784
SSLerror(ssl, SSL_R_WRONG_ENCRYPTION_LEVEL_RECEIVED);
lib/libssl/ssl_lib.c
2788
if (ssl->s3->hs.tls13.quic_read_buffer == NULL) {
lib/libssl/ssl_lib.c
2789
ssl->s3->hs.tls13.quic_read_buffer = tls_buffer_new(0);
lib/libssl/ssl_lib.c
2790
if (ssl->s3->hs.tls13.quic_read_buffer == NULL) {
lib/libssl/ssl_lib.c
2791
SSLerror(ssl, ERR_R_MALLOC_FAILURE);
lib/libssl/ssl_lib.c
2797
tls_buffer_set_capacity_limit(ssl->s3->hs.tls13.quic_read_buffer,
lib/libssl/ssl_lib.c
2798
SSL_quic_max_handshake_flight_len(ssl, level));
lib/libssl/ssl_lib.c
2804
return tls_buffer_append(ssl->s3->hs.tls13.quic_read_buffer, data, len);
lib/libssl/ssl_lib.c
2809
SSL_process_quic_post_handshake(SSL *ssl)
lib/libssl/ssl_lib.c
3235
SSL_get_SSL_CTX(const SSL *ssl)
lib/libssl/ssl_lib.c
3237
return (ssl->ctx);
lib/libssl/ssl_lib.c
3242
SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx)
lib/libssl/ssl_lib.c
3247
ctx = ssl->initial_ctx;
lib/libssl/ssl_lib.c
3248
if (ssl->ctx == ctx)
lib/libssl/ssl_lib.c
3249
return (ssl->ctx);
lib/libssl/ssl_lib.c
3253
ssl_cert_free(ssl->cert);
lib/libssl/ssl_lib.c
3254
ssl->cert = new_cert;
lib/libssl/ssl_lib.c
3257
SSL_CTX_free(ssl->ctx); /* decrement reference count */
lib/libssl/ssl_lib.c
3258
ssl->ctx = ctx;
lib/libssl/ssl_lib.c
3260
return (ssl->ctx);
lib/libssl/ssl_lib.c
3287
SSL_set_info_callback(SSL *ssl, void (*cb)(const SSL *ssl, int type, int val))
lib/libssl/ssl_lib.c
3289
ssl->info_callback = cb;
lib/libssl/ssl_lib.c
3293
void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl, int type, int val)
lib/libssl/ssl_lib.c
3295
return (ssl->info_callback);
lib/libssl/ssl_lib.c
3300
SSL_state(const SSL *ssl)
lib/libssl/ssl_lib.c
3302
return (ssl->s3->hs.state);
lib/libssl/ssl_lib.c
3307
SSL_set_state(SSL *ssl, int state)
lib/libssl/ssl_lib.c
3309
ssl->s3->hs.state = state;
lib/libssl/ssl_lib.c
3314
SSL_set_verify_result(SSL *ssl, long arg)
lib/libssl/ssl_lib.c
3316
ssl->verify_result = arg;
lib/libssl/ssl_lib.c
3321
SSL_get_verify_result(const SSL *ssl)
lib/libssl/ssl_lib.c
3323
return (ssl->verify_result);
lib/libssl/ssl_lib.c
3328
SSL_verify_client_post_handshake(SSL *ssl)
lib/libssl/ssl_lib.c
3342
SSL_set_post_handshake_auth(SSL *ssl, int val)
lib/libssl/ssl_lib.c
3453
SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx, RSA *(*cb)(SSL *ssl, int is_export,
lib/libssl/ssl_lib.c
3461
SSL_set_tmp_rsa_callback(SSL *ssl, RSA *(*cb)(SSL *ssl, int is_export,
lib/libssl/ssl_lib.c
3464
SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_RSA_CB,(void (*)(void))cb);
lib/libssl/ssl_lib.c
3469
SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx, DH *(*dh)(SSL *ssl, int is_export,
lib/libssl/ssl_lib.c
3477
SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh)(SSL *ssl, int is_export,
lib/libssl/ssl_lib.c
3480
SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB,(void (*)(void))dh);
lib/libssl/ssl_lib.c
3485
SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx, EC_KEY *(*ecdh)(SSL *ssl,
lib/libssl/ssl_lib.c
3494
SSL_set_tmp_ecdh_callback(SSL *ssl, EC_KEY *(*ecdh)(SSL *ssl, int is_export,
lib/libssl/ssl_lib.c
3497
SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_ECDH_CB,(void (*)(void))ecdh);
lib/libssl/ssl_lib.c
3504
int content_type, const void *buf, size_t len, SSL *ssl, void *arg))
lib/libssl/ssl_lib.c
3512
SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version,
lib/libssl/ssl_lib.c
3513
int content_type, const void *buf, size_t len, SSL *ssl, void *arg))
lib/libssl/ssl_lib.c
3515
SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb);
lib/libssl/ssl_lib.c
3559
SSL_get_min_proto_version(SSL *ssl)
lib/libssl/ssl_lib.c
3561
return ssl->min_proto_version;
lib/libssl/ssl_lib.c
3566
SSL_set_min_proto_version(SSL *ssl, uint16_t version)
lib/libssl/ssl_lib.c
3568
return ssl_version_set_min(ssl->method, version,
lib/libssl/ssl_lib.c
3569
ssl->max_tls_version, &ssl->min_tls_version,
lib/libssl/ssl_lib.c
3570
&ssl->min_proto_version);
lib/libssl/ssl_lib.c
3574
SSL_get_max_proto_version(SSL *ssl)
lib/libssl/ssl_lib.c
3576
return ssl->max_proto_version;
lib/libssl/ssl_lib.c
3581
SSL_set_max_proto_version(SSL *ssl, uint16_t version)
lib/libssl/ssl_lib.c
3583
return ssl_version_set_max(ssl->method, version,
lib/libssl/ssl_lib.c
3584
ssl->min_tls_version, &ssl->max_tls_version,
lib/libssl/ssl_lib.c
3585
&ssl->max_proto_version);
lib/libssl/ssl_lib.c
3611
SSL_get_security_level(const SSL *ssl)
lib/libssl/ssl_lib.c
3613
return ssl->cert->security_level;
lib/libssl/ssl_lib.c
3618
SSL_set_security_level(SSL *ssl, int level)
lib/libssl/ssl_lib.c
3620
ssl->cert->security_level = level;
lib/libssl/ssl_lib.c
3625
SSL_is_quic(const SSL *ssl)
lib/libssl/ssl_lib.c
3627
return ssl->quic_method != NULL;
lib/libssl/ssl_lib.c
3632
SSL_set_quic_transport_params(SSL *ssl, const uint8_t *params,
lib/libssl/ssl_lib.c
3635
freezero(ssl->quic_transport_params,
lib/libssl/ssl_lib.c
3636
ssl->quic_transport_params_len);
lib/libssl/ssl_lib.c
3637
ssl->quic_transport_params = NULL;
lib/libssl/ssl_lib.c
3638
ssl->quic_transport_params_len = 0;
lib/libssl/ssl_lib.c
3640
if ((ssl->quic_transport_params = malloc(params_len)) == NULL)
lib/libssl/ssl_lib.c
3643
memcpy(ssl->quic_transport_params, params, params_len);
lib/libssl/ssl_lib.c
3644
ssl->quic_transport_params_len = params_len;
lib/libssl/ssl_lib.c
3651
SSL_get_peer_quic_transport_params(const SSL *ssl, const uint8_t **out_params,
lib/libssl/ssl_lib.c
3654
*out_params = ssl->s3->peer_quic_transport_params;
lib/libssl/ssl_lib.c
3655
*out_params_len = ssl->s3->peer_quic_transport_params_len;
lib/libssl/ssl_lib.c
3660
SSL_set_quic_use_legacy_codepoint(SSL *ssl, int use_legacy)
lib/libssl/ssl_lib.c
377
SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
lib/libssl/ssl_lib.c
381
SSLerror(ssl, SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG);
lib/libssl/ssl_lib.c
384
ssl->sid_ctx_length = sid_ctx_len;
lib/libssl/ssl_lib.c
385
memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len);
lib/libssl/ssl_lib.c
402
SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb)
lib/libssl/ssl_lib.c
405
ssl->generate_session_id = cb;
lib/libssl/ssl_lib.c
412
SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
lib/libssl/ssl_lib.c
427
r.ssl_version = ssl->version;
lib/libssl/ssl_lib.c
432
p = lh_SSL_SESSION_retrieve(ssl->ctx->sessions, &r);
lib/libssl/ssl_lib.c
510
SSL_get0_param(SSL *ssl)
lib/libssl/ssl_lib.c
512
return (ssl->param);
lib/libssl/ssl_lib.c
517
SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm)
lib/libssl/ssl_lib.c
519
return (X509_VERIFY_PARAM_set1(ssl->param, vpm));
lib/libssl/ssl_local.h
1216
SSL_CERT *ssl_get0_cert(SSL_CTX *ctx, SSL *ssl);
lib/libssl/ssl_local.h
1217
int ssl_cert_set0_chain(SSL_CTX *ctx, SSL *ssl, STACK_OF(X509) *chain);
lib/libssl/ssl_local.h
1218
int ssl_cert_set1_chain(SSL_CTX *ctx, SSL *ssl, STACK_OF(X509) *chain);
lib/libssl/ssl_local.h
1219
int ssl_cert_add0_chain_cert(SSL_CTX *ctx, SSL *ssl, X509 *cert);
lib/libssl/ssl_local.h
1220
int ssl_cert_add1_chain_cert(SSL_CTX *ctx, SSL *ssl, X509 *cert);
lib/libssl/ssl_local.h
1222
int ssl_security_default_cb(const SSL *ssl, const SSL_CTX *ctx, int op,
lib/libssl/ssl_local.h
1225
int ssl_security_cipher_check(const SSL *ssl, SSL_CIPHER *cipher);
lib/libssl/ssl_local.h
1226
int ssl_security_shared_cipher(const SSL *ssl, SSL_CIPHER *cipher);
lib/libssl/ssl_local.h
1227
int ssl_security_supported_cipher(const SSL *ssl, SSL_CIPHER *cipher);
lib/libssl/ssl_local.h
1229
int ssl_security_dh(const SSL *ssl, DH *dh);
lib/libssl/ssl_local.h
1230
int ssl_security_sigalg_check(const SSL *ssl, const EVP_PKEY *pkey);
lib/libssl/ssl_local.h
1231
int ssl_security_tickets(const SSL *ssl);
lib/libssl/ssl_local.h
1232
int ssl_security_version(const SSL *ssl, int version);
lib/libssl/ssl_local.h
1233
int ssl_security_cert(const SSL_CTX *ctx, const SSL *ssl, X509 *x509,
lib/libssl/ssl_local.h
1235
int ssl_security_cert_chain(const SSL *ssl, STACK_OF(X509) *sk,
lib/libssl/ssl_local.h
1237
int ssl_security_shared_group(const SSL *ssl, uint16_t group_id);
lib/libssl/ssl_local.h
1238
int ssl_security_supported_group(const SSL *ssl, uint16_t group_id);
lib/libssl/ssl_local.h
1282
int ssl3_renegotiate(SSL *ssl);
lib/libssl/ssl_local.h
1284
int ssl3_renegotiate_check(SSL *ssl);
lib/libssl/ssl_local.h
1294
SSL_CIPHER *ssl3_choose_cipher(SSL *ssl, STACK_OF(SSL_CIPHER) *clnt,
lib/libssl/ssl_local.h
1326
int ssl3_do_change_cipher_spec(SSL *ssl);
lib/libssl/ssl_local.h
1408
int tls1_count_shared_groups(const SSL *ssl, size_t *out_count);
lib/libssl/ssl_local.h
1409
int tls1_get_shared_group_by_index(const SSL *ssl, size_t index, int *out_nid);
lib/libssl/ssl_local.h
317
DH *(*dhe_params_cb)(SSL *ssl, int is_export, int keysize);
lib/libssl/ssl_local.h
658
const void *buf, size_t len, SSL *ssl, void *arg);
lib/libssl/ssl_local.h
717
int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess);
lib/libssl/ssl_local.h
719
SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,
lib/libssl/ssl_local.h
727
int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);
lib/libssl/ssl_local.h
730
int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,
lib/libssl/ssl_local.h
734
int (*app_verify_cookie_cb)(SSL *ssl, const unsigned char *cookie,
lib/libssl/ssl_local.h
753
int (*tlsext_ticket_key_cb)(SSL *ssl, unsigned char *name,
lib/libssl/ssl_local.h
758
int (*tlsext_status_cb)(SSL *ssl, void *arg);
lib/libssl/ssl_rsa.c
103
SSLerror(ssl, ERR_R_SYS_LIB);
lib/libssl/ssl_rsa.c
112
ssl->ctx->default_passwd_callback,
lib/libssl/ssl_rsa.c
113
ssl->ctx->default_passwd_callback_userdata);
lib/libssl/ssl_rsa.c
115
SSLerror(ssl, SSL_R_BAD_SSL_FILETYPE);
lib/libssl/ssl_rsa.c
120
SSLerror(ssl, j);
lib/libssl/ssl_rsa.c
124
ret = SSL_use_certificate(ssl, x);
lib/libssl/ssl_rsa.c
133
SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len)
lib/libssl/ssl_rsa.c
140
SSLerror(ssl, ERR_R_ASN1_LIB);
lib/libssl/ssl_rsa.c
144
ret = SSL_use_certificate(ssl, x);
lib/libssl/ssl_rsa.c
151
SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa)
lib/libssl/ssl_rsa.c
157
SSLerror(ssl, ERR_R_PASSED_NULL_PARAMETER);
lib/libssl/ssl_rsa.c
161
SSLerror(ssl, ERR_R_EVP_LIB);
lib/libssl/ssl_rsa.c
166
if (!ssl_set_pkey(NULL, ssl, pkey))
lib/libssl/ssl_rsa.c
179
ssl_set_pkey(SSL_CTX *ctx, SSL *ssl, EVP_PKEY *pkey)
lib/libssl/ssl_rsa.c
190
if ((c = ssl_get0_cert(ctx, ssl)) == NULL)
lib/libssl/ssl_rsa.c
232
SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type)
lib/libssl/ssl_rsa.c
240
SSLerror(ssl, ERR_R_BUF_LIB);
lib/libssl/ssl_rsa.c
245
SSLerror(ssl, ERR_R_SYS_LIB);
lib/libssl/ssl_rsa.c
254
ssl->ctx->default_passwd_callback,
lib/libssl/ssl_rsa.c
255
ssl->ctx->default_passwd_callback_userdata);
lib/libssl/ssl_rsa.c
257
SSLerror(ssl, SSL_R_BAD_SSL_FILETYPE);
lib/libssl/ssl_rsa.c
261
SSLerror(ssl, j);
lib/libssl/ssl_rsa.c
264
ret = SSL_use_RSAPrivateKey(ssl, rsa);
lib/libssl/ssl_rsa.c
273
SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const unsigned char *d, long len)
lib/libssl/ssl_rsa.c
279
SSLerror(ssl, ERR_R_ASN1_LIB);
lib/libssl/ssl_rsa.c
283
ret = SSL_use_RSAPrivateKey(ssl, rsa);
lib/libssl/ssl_rsa.c
290
SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey)
lib/libssl/ssl_rsa.c
295
SSLerror(ssl, ERR_R_PASSED_NULL_PARAMETER);
lib/libssl/ssl_rsa.c
298
ret = ssl_set_pkey(NULL, ssl, pkey);
lib/libssl/ssl_rsa.c
304
SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type)
lib/libssl/ssl_rsa.c
312
SSLerror(ssl, ERR_R_BUF_LIB);
lib/libssl/ssl_rsa.c
317
SSLerror(ssl, ERR_R_SYS_LIB);
lib/libssl/ssl_rsa.c
323
ssl->ctx->default_passwd_callback,
lib/libssl/ssl_rsa.c
324
ssl->ctx->default_passwd_callback_userdata);
lib/libssl/ssl_rsa.c
329
SSLerror(ssl, SSL_R_BAD_SSL_FILETYPE);
lib/libssl/ssl_rsa.c
333
SSLerror(ssl, j);
lib/libssl/ssl_rsa.c
336
ret = SSL_use_PrivateKey(ssl, pkey);
lib/libssl/ssl_rsa.c
345
SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len)
lib/libssl/ssl_rsa.c
351
SSLerror(ssl, ERR_R_ASN1_LIB);
lib/libssl/ssl_rsa.c
355
ret = SSL_use_PrivateKey(ssl, pkey);
lib/libssl/ssl_rsa.c
373
ssl_get_password_cb_and_arg(SSL_CTX *ctx, SSL *ssl,
lib/libssl/ssl_rsa.c
376
if (ssl != NULL)
lib/libssl/ssl_rsa.c
377
ctx = ssl->ctx;
lib/libssl/ssl_rsa.c
386
ssl_set_cert(SSL_CTX *ctx, SSL *ssl, X509 *x)
lib/libssl/ssl_rsa.c
393
if (!ssl_security_cert(ctx, ssl, x, 1, &ssl_err)) {
lib/libssl/ssl_rsa.c
398
if ((c = ssl_get0_cert(ctx, ssl)) == NULL)
lib/libssl/ssl_rsa.c
675
ssl_use_certificate_chain_bio(SSL_CTX *ctx, SSL *ssl, BIO *in)
lib/libssl/ssl_rsa.c
683
if (!ssl_get_password_cb_and_arg(ctx, ssl, &passwd_cb, &passwd_arg))
lib/libssl/ssl_rsa.c
69
static int ssl_get_password_cb_and_arg(SSL_CTX *ctx, SSL *ssl,
lib/libssl/ssl_rsa.c
692
if (!ssl_set_cert(ctx, ssl, x))
lib/libssl/ssl_rsa.c
695
if (!ssl_cert_set0_chain(ctx, ssl, NULL))
lib/libssl/ssl_rsa.c
701
if (!ssl_cert_add0_chain_cert(ctx, ssl, ca)) {
lib/libssl/ssl_rsa.c
71
static int ssl_set_cert(SSL_CTX *ctx, SSL *ssl, X509 *x509);
lib/libssl/ssl_rsa.c
72
static int ssl_set_pkey(SSL_CTX *ctx, SSL *ssl, EVP_PKEY *pkey);
lib/libssl/ssl_rsa.c
722
ssl_use_certificate_chain_file(SSL_CTX *ctx, SSL *ssl, const char *file)
lib/libssl/ssl_rsa.c
73
static int ssl_use_certificate_chain_bio(SSL_CTX *ctx, SSL *ssl, BIO *in);
lib/libssl/ssl_rsa.c
738
ret = ssl_use_certificate_chain_bio(ctx, ssl, in);
lib/libssl/ssl_rsa.c
74
static int ssl_use_certificate_chain_file(SSL_CTX *ctx, SSL *ssl,
lib/libssl/ssl_rsa.c
753
SSL_use_certificate_chain_file(SSL *ssl, const char *file)
lib/libssl/ssl_rsa.c
755
return ssl_use_certificate_chain_file(NULL, ssl, file);
lib/libssl/ssl_rsa.c
78
SSL_use_certificate(SSL *ssl, X509 *x)
lib/libssl/ssl_rsa.c
81
SSLerror(ssl, ERR_R_PASSED_NULL_PARAMETER);
lib/libssl/ssl_rsa.c
84
return ssl_set_cert(NULL, ssl, x);
lib/libssl/ssl_rsa.c
89
SSL_use_certificate_file(SSL *ssl, const char *file, int type)
lib/libssl/ssl_rsa.c
98
SSLerror(ssl, ERR_R_BUF_LIB);
lib/libssl/ssl_seclevel.c
101
if (!ssl_security_level_and_minimum_bits(ctx, ssl, &security_level,
lib/libssl/ssl_seclevel.c
142
ssl_security_secop_version(const SSL_CTX *ctx, const SSL *ssl, int version)
lib/libssl/ssl_seclevel.c
147
if (!ssl_security_level_and_minimum_bits(ctx, ssl, &security_level, NULL))
lib/libssl/ssl_seclevel.c
159
ssl_security_secop_compression(const SSL_CTX *ctx, const SSL *ssl)
lib/libssl/ssl_seclevel.c
165
ssl_security_secop_tickets(const SSL_CTX *ctx, const SSL *ssl)
lib/libssl/ssl_seclevel.c
169
if (!ssl_security_level_and_minimum_bits(ctx, ssl, &security_level, NULL))
lib/libssl/ssl_seclevel.c
176
ssl_security_secop_tmp_dh(const SSL_CTX *ctx, const SSL *ssl, int bits)
lib/libssl/ssl_seclevel.c
180
if (!ssl_security_level_and_minimum_bits(ctx, ssl, &security_level,
lib/libssl/ssl_seclevel.c
192
ssl_security_secop_default(const SSL_CTX *ctx, const SSL *ssl, int bits)
lib/libssl/ssl_seclevel.c
196
if (!ssl_security_level_and_minimum_bits(ctx, ssl, NULL, &minimum_bits))
lib/libssl/ssl_seclevel.c
203
ssl_security_default_cb(const SSL *ssl, const SSL_CTX *ctx, int secop, int bits,
lib/libssl/ssl_seclevel.c
210
return ssl_security_secop_cipher(ctx, ssl, bits, cipher);
lib/libssl/ssl_seclevel.c
212
return ssl_security_secop_version(ctx, ssl, version);
lib/libssl/ssl_seclevel.c
214
return ssl_security_secop_compression(ctx, ssl);
lib/libssl/ssl_seclevel.c
216
return ssl_security_secop_tickets(ctx, ssl);
lib/libssl/ssl_seclevel.c
218
return ssl_security_secop_tmp_dh(ctx, ssl, bits);
lib/libssl/ssl_seclevel.c
220
return ssl_security_secop_default(ctx, ssl, bits);
lib/libssl/ssl_seclevel.c
232
ssl_security(const SSL *ssl, int secop, int bits, int nid, void *other)
lib/libssl/ssl_seclevel.c
234
return ssl->cert->security_cb(ssl, NULL, secop, bits, nid, other,
lib/libssl/ssl_seclevel.c
235
ssl->cert->security_ex_data);
lib/libssl/ssl_seclevel.c
239
ssl_security_sigalg_check(const SSL *ssl, const EVP_PKEY *pkey)
lib/libssl/ssl_seclevel.c
245
return ssl_security(ssl, SSL_SECOP_SIGALG_CHECK, bits, 0, NULL);
lib/libssl/ssl_seclevel.c
249
ssl_security_tickets(const SSL *ssl)
lib/libssl/ssl_seclevel.c
251
return ssl_security(ssl, SSL_SECOP_TICKET, 0, 0, NULL);
lib/libssl/ssl_seclevel.c
255
ssl_security_version(const SSL *ssl, int version)
lib/libssl/ssl_seclevel.c
257
return ssl_security(ssl, SSL_SECOP_VERSION, 0, version, NULL);
lib/libssl/ssl_seclevel.c
261
ssl_security_cipher(const SSL *ssl, SSL_CIPHER *cipher, int secop)
lib/libssl/ssl_seclevel.c
263
return ssl_security(ssl, secop, cipher->strength_bits, 0, cipher);
lib/libssl/ssl_seclevel.c
267
ssl_security_cipher_check(const SSL *ssl, SSL_CIPHER *cipher)
lib/libssl/ssl_seclevel.c
269
return ssl_security_cipher(ssl, cipher, SSL_SECOP_CIPHER_CHECK);
lib/libssl/ssl_seclevel.c
273
ssl_security_shared_cipher(const SSL *ssl, SSL_CIPHER *cipher)
lib/libssl/ssl_seclevel.c
275
return ssl_security_cipher(ssl, cipher, SSL_SECOP_CIPHER_SHARED);
lib/libssl/ssl_seclevel.c
279
ssl_security_supported_cipher(const SSL *ssl, SSL_CIPHER *cipher)
lib/libssl/ssl_seclevel.c
281
return ssl_security_cipher(ssl, cipher, SSL_SECOP_CIPHER_SUPPORTED);
lib/libssl/ssl_seclevel.c
295
ssl_security_dh(const SSL *ssl, DH *dh)
lib/libssl/ssl_seclevel.c
301
return ssl_security(ssl, SSL_SECOP_TMP_DH, bits, 0, dh);
lib/libssl/ssl_seclevel.c
316
ssl_security_cert_key(const SSL_CTX *ctx, const SSL *ssl, X509 *x509, int secop)
lib/libssl/ssl_seclevel.c
322
if (ssl != NULL)
lib/libssl/ssl_seclevel.c
323
return ssl_security(ssl, secop, security_bits, 0, x509);
lib/libssl/ssl_seclevel.c
34
ssl_security_normalize_level(const SSL_CTX *ctx, const SSL *ssl, int *out_level)
lib/libssl/ssl_seclevel.c
359
ssl_security_cert_sig(const SSL_CTX *ctx, const SSL *ssl, X509 *x509, int secop)
lib/libssl/ssl_seclevel.c
373
if (ssl != NULL)
lib/libssl/ssl_seclevel.c
374
return ssl_security(ssl, secop, security_bits, md_nid, x509);
lib/libssl/ssl_seclevel.c
380
ssl_security_cert(const SSL_CTX *ctx, const SSL *ssl, X509 *x509,
lib/libssl/ssl_seclevel.c
395
if (!ssl_security_cert_key(ctx, ssl, x509, operation)) {
lib/libssl/ssl_seclevel.c
400
if (!ssl_security_cert_sig(ctx, ssl, x509, SSL_SECOP_CA_MD)) {
lib/libssl/ssl_seclevel.c
41
security_level = SSL_get_security_level(ssl);
lib/libssl/ssl_seclevel.c
413
ssl_security_cert_chain(const SSL *ssl, STACK_OF(X509) *sk, X509 *x509,
lib/libssl/ssl_seclevel.c
426
if (!ssl_security_cert(NULL, ssl, x509, is_ee, out_error))
lib/libssl/ssl_seclevel.c
433
if (!ssl_security_cert(NULL, ssl, x509, is_ee, out_error))
lib/libssl/ssl_seclevel.c
441
ssl_security_group(const SSL *ssl, uint16_t group_id, int secop)
lib/libssl/ssl_seclevel.c
461
return ssl_security(ssl, secop, bits, nid, group);
lib/libssl/ssl_seclevel.c
470
ssl_security_shared_group(const SSL *ssl, uint16_t group_id)
lib/libssl/ssl_seclevel.c
472
return ssl_security_group(ssl, group_id, SSL_SECOP_CURVE_SHARED);
lib/libssl/ssl_seclevel.c
476
ssl_security_supported_group(const SSL *ssl, uint16_t group_id)
lib/libssl/ssl_seclevel.c
478
return ssl_security_group(ssl, group_id, SSL_SECOP_CURVE_SUPPORTED);
lib/libssl/ssl_seclevel.c
76
ssl_security_level_and_minimum_bits(const SSL_CTX *ctx, const SSL *ssl,
lib/libssl/ssl_seclevel.c
81
if (!ssl_security_normalize_level(ctx, ssl, &security_level))
lib/libssl/ssl_seclevel.c
95
ssl_security_secop_cipher(const SSL_CTX *ctx, const SSL *ssl, int bits,
lib/libssl/ssl_sess.c
1234
int (*cb)(struct ssl_st *ssl, SSL_SESSION *sess)) {
lib/libssl/ssl_sess.c
1240
(*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess)
lib/libssl/ssl_sess.c
1262
SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb)(struct ssl_st *ssl,
lib/libssl/ssl_sess.c
1270
(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(SSL *ssl, const unsigned char *data,
lib/libssl/ssl_sess.c
1279
void (*cb)(const SSL *ssl, int type, int val))
lib/libssl/ssl_sess.c
1286
(*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl, int type, int val)
lib/libssl/ssl_sess.c
1294
int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey))
lib/libssl/ssl_sess.c
1301
(*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL * ssl, X509 ** x509,
lib/libssl/ssl_sess.c
1310
int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len))
lib/libssl/ssl_sess.c
1318
int (*cb)(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len))
lib/libssl/ssl_sess.c
149
SSL_get_session(const SSL *ssl)
lib/libssl/ssl_sess.c
151
return (ssl->session);
lib/libssl/ssl_sess.c
157
SSL_get1_session(SSL *ssl)
lib/libssl/ssl_sess.c
167
sess = ssl->session;
lib/libssl/ssl_sess.c
408
def_generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len)
lib/libssl/ssl_sess.c
414
} while (SSL_has_matching_session_id(ssl, id, *id_len) &&
lib/libssl/t1_lib.c
486
tls1_get_group_lists(const SSL *ssl, const uint16_t **pref, size_t *preflen,
lib/libssl/t1_lib.c
492
if (!ssl->server)
lib/libssl/t1_lib.c
495
server_pref = (ssl->options & SSL_OP_CIPHER_SERVER_PREFERENCE);
lib/libssl/t1_lib.c
496
tls1_get_group_list(ssl, (server_pref == 0), pref, preflen);
lib/libssl/t1_lib.c
497
tls1_get_group_list(ssl, (server_pref != 0), supp, supplen);
lib/libssl/t1_lib.c
516
tls1_count_shared_groups(const SSL *ssl, size_t *out_count)
lib/libssl/t1_lib.c
521
if (!tls1_get_group_lists(ssl, &pref, &preflen, &supp, &supplen))
lib/libssl/t1_lib.c
529
if (!ssl_security_shared_group(ssl, pref[i]))
lib/libssl/t1_lib.c
541
tls1_group_by_index(const SSL *ssl, size_t n, int *out_nid,
lib/libssl/t1_lib.c
547
if (!tls1_get_group_lists(ssl, &pref, &preflen, &supp, &supplen))
lib/libssl/t1_lib.c
555
if (!ssl_security_fn(ssl, pref[i]))
lib/libssl/t1_lib.c
566
tls1_get_shared_group_by_index(const SSL *ssl, size_t index, int *out_nid)
lib/libssl/t1_lib.c
568
return tls1_group_by_index(ssl, index, out_nid,
lib/libssl/t1_lib.c
573
tls1_get_supported_group(const SSL *ssl, int *out_nid)
lib/libssl/t1_lib.c
575
return tls1_group_by_index(ssl, 0, out_nid,
lib/libssl/tls1.h
319
int SSL_get_signature_type_nid(const SSL *ssl, int *nid);
lib/libssl/tls1.h
320
int SSL_get_peer_signature_type_nid(const SSL *ssl, int *nid);
lib/libssl/tls1.h
325
#define SSL_set_tlsext_debug_callback(ssl, cb) \
lib/libssl/tls1.h
326
SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb)
lib/libssl/tls1.h
328
#define SSL_set_tlsext_debug_arg(ssl, arg) \
lib/libssl/tls1.h
329
SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg)
lib/libssl/tls1.h
331
#define SSL_get_tlsext_status_type(ssl) \
lib/libssl/tls1.h
332
SSL_ctrl(ssl, SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE, 0, NULL)
lib/libssl/tls1.h
334
#define SSL_set_tlsext_status_type(ssl, type) \
lib/libssl/tls1.h
335
SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL)
lib/libssl/tls1.h
337
#define SSL_get_tlsext_status_exts(ssl, arg) \
lib/libssl/tls1.h
338
SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
lib/libssl/tls1.h
340
#define SSL_set_tlsext_status_exts(ssl, arg) \
lib/libssl/tls1.h
341
SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg)
lib/libssl/tls1.h
343
#define SSL_get_tlsext_status_ids(ssl, arg) \
lib/libssl/tls1.h
344
SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS,0, (void *)arg)
lib/libssl/tls1.h
346
#define SSL_set_tlsext_status_ids(ssl, arg) \
lib/libssl/tls1.h
347
SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS,0, (void *)arg)
lib/libssl/tls1.h
349
#define SSL_get_tlsext_status_ocsp_resp(ssl, arg) \
lib/libssl/tls1.h
350
SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP,0, (void *)arg)
lib/libssl/tls1.h
352
#define SSL_set_tlsext_status_ocsp_resp(ssl, arg, arglen) \
lib/libssl/tls1.h
353
SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP,arglen, (void *)arg)
lib/libssl/tls1.h
371
#define SSL_CTX_get_tlsext_status_cb(ssl, cb) \
lib/libssl/tls1.h
372
SSL_CTX_callback_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB,(void (*)(void))cb)
lib/libssl/tls1.h
373
#define SSL_CTX_set_tlsext_status_cb(ssl, cb) \
lib/libssl/tls1.h
374
SSL_CTX_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB,(void (*)(void))cb)
lib/libssl/tls1.h
376
#define SSL_CTX_get_tlsext_status_arg(ssl, arg) \
lib/libssl/tls1.h
377
SSL_CTX_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG,0,(void *)arg)
lib/libssl/tls1.h
378
#define SSL_CTX_set_tlsext_status_arg(ssl, arg) \
lib/libssl/tls1.h
379
SSL_CTX_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG,0,(void *)arg)
lib/libssl/tls1.h
381
#define SSL_CTX_set_tlsext_ticket_key_cb(ssl, cb) \
lib/libssl/tls1.h
382
SSL_CTX_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB,(void (*)(void))cb)
lib/libssl/tls13_client.c
1027
if (!tls1_transcript_hash_value(ctx->ssl, transcript_hash,
lib/libssl/tls13_client.c
104
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
163
tls1_transcript_freeze(ctx->ssl);
lib/libssl/tls13_client.c
229
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
32
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
353
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
455
if (!tls1_check_group(ctx->ssl, ctx->hs->tls13.server_group))
lib/libssl/tls13_client.c
477
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
517
if (!tlsext_client_parse(ctx->ssl, SSL_TLSEXT_MSG_EE, cbs, &alert_desc)) {
lib/libssl/tls13_client.c
547
if (!tlsext_client_parse(ctx->ssl, SSL_TLSEXT_MSG_CR, cbs, &alert_desc)) {
lib/libssl/tls13_client.c
566
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
586
if (!tlsext_client_parse(ctx->ssl, SSL_TLSEXT_MSG_CT,
lib/libssl/tls13_client.c
681
if ((cert = ctx->ssl->session->peer_cert) == NULL)
lib/libssl/tls13_client.c
685
if ((sigalg = ssl_sigalg_for_peer(ctx->ssl, pkey,
lib/libssl/tls13_client.c
779
if (!tls1_transcript_hash_value(ctx->ssl, transcript_hash,
lib/libssl/tls13_client.c
813
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
835
SSL *s = ctx->ssl;
lib/libssl/tls13_client.c
874
SSL *s = ctx->ssl;
lib/libssl/tls13_handshake.c
350
return tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs));
lib/libssl/tls13_handshake.c
477
if (!tls1_transcript_hash_value(ctx->ssl,
lib/libssl/tls13_handshake.c
521
if (!tls1_transcript_hash_value(ctx->ssl,
lib/libssl/tls13_handshake.c
560
if (ctx->ssl->method->version < TLS1_3_VERSION)
lib/libssl/tls13_internal.h
273
SSL *ssl;
lib/libssl/tls13_internal.h
311
struct tls13_ctx *tls13_ctx_new(int mode, SSL *ssl);
lib/libssl/tls13_internal.h
329
int tls13_legacy_accept(SSL *ssl);
lib/libssl/tls13_internal.h
330
int tls13_legacy_connect(SSL *ssl);
lib/libssl/tls13_internal.h
334
int tls13_legacy_pending(const SSL *ssl);
lib/libssl/tls13_internal.h
335
int tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len,
lib/libssl/tls13_internal.h
337
int tls13_legacy_write_bytes(SSL *ssl, int type, const void *buf, int len);
lib/libssl/tls13_internal.h
338
int tls13_legacy_shutdown(SSL *ssl);
lib/libssl/tls13_legacy.c
100
tls13_legacy_wire_flush(SSL *ssl)
lib/libssl/tls13_legacy.c
102
if (BIO_flush(ssl->wbio) <= 0) {
lib/libssl/tls13_legacy.c
103
if (BIO_should_write(ssl->wbio))
lib/libssl/tls13_legacy.c
120
return tls13_legacy_wire_flush(ctx->ssl);
lib/libssl/tls13_legacy.c
124
tls13_legacy_error(SSL *ssl)
lib/libssl/tls13_legacy.c
126
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
130
if (ssl->s3->fatal_alert != 0)
lib/libssl/tls13_legacy.c
163
tls13_legacy_return_code(SSL *ssl, ssize_t ret)
lib/libssl/tls13_legacy.c
166
SSLerror(ssl, ERR_R_INTERNAL_ERROR);
lib/libssl/tls13_legacy.c
174
ssl->rwstate = SSL_NOTHING;
lib/libssl/tls13_legacy.c
181
tls13_legacy_error(ssl);
lib/libssl/tls13_legacy.c
185
tls13_legacy_error(ssl);
lib/libssl/tls13_legacy.c
189
BIO_set_retry_read(ssl->rbio);
lib/libssl/tls13_legacy.c
190
ssl->rwstate = SSL_READING;
lib/libssl/tls13_legacy.c
194
BIO_set_retry_write(ssl->wbio);
lib/libssl/tls13_legacy.c
195
ssl->rwstate = SSL_WRITING;
lib/libssl/tls13_legacy.c
199
SSLerror(ssl, ERR_R_INTERNAL_ERROR);
lib/libssl/tls13_legacy.c
203
SSLerror(ssl, ERR_R_INTERNAL_ERROR);
lib/libssl/tls13_legacy.c
208
tls13_legacy_pending(const SSL *ssl)
lib/libssl/tls13_legacy.c
210
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
224
tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int peek)
lib/libssl/tls13_legacy.c
226
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
230
if ((ret = ssl->handshake_func(ssl)) <= 0)
lib/libssl/tls13_legacy.c
234
return tls13_legacy_return_code(ssl, TLS13_IO_WANT_POLLIN);
lib/libssl/tls13_legacy.c
238
(ctx->ssl->mode & SSL_MODE_AUTO_RETRY) != 0);
lib/libssl/tls13_legacy.c
24
tls13_legacy_wire_read(SSL *ssl, uint8_t *buf, size_t len)
lib/libssl/tls13_legacy.c
241
SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
lib/libssl/tls13_legacy.c
245
SSLerror(ssl, SSL_R_BAD_LENGTH);
lib/libssl/tls13_legacy.c
254
return tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
258
tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len)
lib/libssl/tls13_legacy.c
260
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
266
if ((ret = ssl->handshake_func(ssl)) <= 0)
lib/libssl/tls13_legacy.c
270
return tls13_legacy_return_code(ssl, TLS13_IO_WANT_POLLOUT);
lib/libssl/tls13_legacy.c
274
SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
lib/libssl/tls13_legacy.c
278
SSLerror(ssl, SSL_R_BAD_LENGTH);
lib/libssl/tls13_legacy.c
28
if (ssl->rbio == NULL) {
lib/libssl/tls13_legacy.c
286
if (ssl->mode & SSL_MODE_ENABLE_PARTIAL_WRITE) {
lib/libssl/tls13_legacy.c
288
return tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
29
SSLerror(ssl, SSL_R_BIO_NOT_SET);
lib/libssl/tls13_legacy.c
295
sent = ssl->s3->wnum;
lib/libssl/tls13_legacy.c
297
SSLerror(ssl, SSL_R_BAD_LENGTH);
lib/libssl/tls13_legacy.c
303
ssl->s3->wnum = 0;
lib/libssl/tls13_legacy.c
308
ssl->s3->wnum = sent;
lib/libssl/tls13_legacy.c
309
return tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
319
SSL *s = ctx->ssl;
lib/libssl/tls13_legacy.c
33
ssl->rwstate = SSL_READING;
lib/libssl/tls13_legacy.c
36
if ((n = BIO_read(ssl->rbio, buf, len)) <= 0) {
lib/libssl/tls13_legacy.c
37
if (BIO_should_read(ssl->rbio))
lib/libssl/tls13_legacy.c
387
SSL *s = ctx->ssl;
lib/libssl/tls13_legacy.c
401
SSL *s = ctx->ssl;
lib/libssl/tls13_legacy.c
414
tls13_legacy_accept(SSL *ssl)
lib/libssl/tls13_legacy.c
416
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
420
if ((ctx = tls13_ctx_new(TLS13_HS_SERVER, ssl)) == NULL) {
lib/libssl/tls13_legacy.c
421
SSLerror(ssl, ERR_R_INTERNAL_ERROR); /* XXX */
lib/libssl/tls13_legacy.c
426
SSLerror(ssl, ERR_R_INTERNAL_ERROR); /* XXX */
lib/libssl/tls13_legacy.c
435
return ssl->method->ssl_accept(ssl);
lib/libssl/tls13_legacy.c
437
ret = tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
446
tls13_legacy_connect(SSL *ssl)
lib/libssl/tls13_legacy.c
448
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
452
if ((ctx = tls13_ctx_new(TLS13_HS_CLIENT, ssl)) == NULL) {
lib/libssl/tls13_legacy.c
453
SSLerror(ssl, ERR_R_INTERNAL_ERROR); /* XXX */
lib/libssl/tls13_legacy.c
458
SSLerror(ssl, ERR_R_INTERNAL_ERROR); /* XXX */
lib/libssl/tls13_legacy.c
467
return ssl->method->ssl_connect(ssl);
lib/libssl/tls13_legacy.c
469
ret = tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
478
tls13_legacy_shutdown(SSL *ssl)
lib/libssl/tls13_legacy.c
480
struct tls13_ctx *ctx = ssl->tls13;
lib/libssl/tls13_legacy.c
49
ssl->rwstate = SSL_NOTHING;
lib/libssl/tls13_legacy.c
491
if (ctx == NULL || ssl->quiet_shutdown) {
lib/libssl/tls13_legacy.c
492
ssl->shutdown = SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN;
lib/libssl/tls13_legacy.c
496
if ((ssl->shutdown & SSL_SENT_SHUTDOWN) == 0) {
lib/libssl/tls13_legacy.c
497
ssl->shutdown |= SSL_SENT_SHUTDOWN;
lib/libssl/tls13_legacy.c
502
return tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
510
return tls13_legacy_return_code(ssl, ret);
lib/libssl/tls13_legacy.c
512
if ((ssl->shutdown & SSL_RECEIVED_SHUTDOWN) == 0) {
lib/libssl/tls13_legacy.c
528
if (ssl->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN))
lib/libssl/tls13_legacy.c
539
SSL_CTX *ssl_ctx = ctx->ssl->ctx;
lib/libssl/tls13_legacy.c
540
SSL *s = ctx->ssl;
lib/libssl/tls13_legacy.c
59
return tls13_legacy_wire_read(ctx->ssl, buf, n);
lib/libssl/tls13_legacy.c
63
tls13_legacy_wire_write(SSL *ssl, const uint8_t *buf, size_t len)
lib/libssl/tls13_legacy.c
67
if (ssl->wbio == NULL) {
lib/libssl/tls13_legacy.c
68
SSLerror(ssl, SSL_R_BIO_NOT_SET);
lib/libssl/tls13_legacy.c
72
ssl->rwstate = SSL_WRITING;
lib/libssl/tls13_legacy.c
75
if ((n = BIO_write(ssl->wbio, buf, len)) <= 0) {
lib/libssl/tls13_legacy.c
76
if (BIO_should_write(ssl->wbio))
lib/libssl/tls13_legacy.c
86
ssl->rwstate = SSL_NOTHING;
lib/libssl/tls13_legacy.c
96
return tls13_legacy_wire_write(ctx->ssl, buf, n);
lib/libssl/tls13_lib.c
119
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
151
ctx->ssl->shutdown |= SSL_RECEIVED_SHUTDOWN;
lib/libssl/tls13_lib.c
152
ctx->ssl->s3->warn_alert = alert_desc;
lib/libssl/tls13_lib.c
165
ctx->ssl->s3->fatal_alert = alert_desc;
lib/libssl/tls13_lib.c
167
SSLerror(ctx->ssl, SSL_AD_REASON_OFFSET + alert_desc);
lib/libssl/tls13_lib.c
170
SSL_CTX_remove_session(ctx->ssl->ctx, ctx->ssl->session);
lib/libssl/tls13_lib.c
192
SSLerror(ctx->ssl, SSL_AD_REASON_OFFSET + alert_desc);
lib/libssl/tls13_lib.c
199
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
213
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
227
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
236
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
402
if (!tlsext_client_parse(ctx->ssl, SSL_TLSEXT_MSG_NST, cbs, &alert))
lib/libssl/tls13_lib.c
426
if ((sess = ssl_session_dup(ctx->ssl->session, 0)) == NULL)
lib/libssl/tls13_lib.c
454
SSL_SESSION_free(ctx->ssl->session);
lib/libssl/tls13_lib.c
455
ctx->ssl->session = sess;
lib/libssl/tls13_lib.c
458
ssl_update_cache(ctx->ssl, SSL_SESS_CACHE_CLIENT);
lib/libssl/tls13_lib.c
537
tls13_ctx_new(int mode, SSL *ssl)
lib/libssl/tls13_lib.c
544
ctx->hs = &ssl->s3->hs;
lib/libssl/tls13_lib.c
546
ctx->ssl = ssl;
lib/libssl/tls13_lib.c
560
ssl->tls13 = ctx;
lib/libssl/tls13_lib.c
562
if (SSL_is_quic(ssl)) {
lib/libssl/tls13_lib.c
606
if (!build_extensions(ctx->ssl, SSL_TLSEXT_MSG_CT, cbb))
lib/libssl/tls13_lib.c
626
SSL *s = ctx->ssl;
lib/libssl/tls13_lib.c
649
tls1_transcript_reset(ctx->ssl);
lib/libssl/tls13_lib.c
650
if (!tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs)))
lib/libssl/tls13_quic.c
110
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
116
if (ssl->quic_method->set_write_secret != NULL)
lib/libssl/tls13_quic.c
117
return ssl->quic_method->set_write_secret(ssl,
lib/libssl/tls13_quic.c
121
if (ssl->quic_method->set_encryption_secrets != NULL)
lib/libssl/tls13_quic.c
122
return ssl->quic_method->set_encryption_secrets(ssl,
lib/libssl/tls13_quic.c
133
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
137
if (!ssl->quic_method->send_alert(ssl, ctx->hs->tls13.quic_write_level,
lib/libssl/tls13_quic.c
139
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
lib/libssl/tls13_quic.c
187
SSL_set_bio(ctx->ssl, bio, bio);
lib/libssl/tls13_quic.c
25
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
27
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
lib/libssl/tls13_quic.c
35
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
37
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
lib/libssl/tls13_quic.c
45
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
47
if (!ssl->quic_method->flush_flight(ssl)) {
lib/libssl/tls13_quic.c
48
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
lib/libssl/tls13_quic.c
70
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
72
if (!ssl->quic_method->add_handshake_data(ssl,
lib/libssl/tls13_quic.c
74
SSLerror(ssl, SSL_R_QUIC_INTERNAL_ERROR);
lib/libssl/tls13_quic.c
86
SSL *ssl = ctx->ssl;
lib/libssl/tls13_quic.c
92
if (ssl->quic_method->set_read_secret != NULL)
lib/libssl/tls13_quic.c
93
return ssl->quic_method->set_read_secret(ssl,
lib/libssl/tls13_quic.c
97
if (ssl->quic_method->set_encryption_secrets != NULL)
lib/libssl/tls13_quic.c
98
return ssl->quic_method->set_encryption_secrets(ssl,
lib/libssl/tls13_server.c
102
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
152
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
30
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
300
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
335
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
379
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
473
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
534
if (!tlsext_server_build(ctx->ssl, SSL_TLSEXT_MSG_EE, cbb))
lib/libssl/tls13_server.c
549
if (!tlsext_server_build(ctx->ssl, SSL_TLSEXT_MSG_CR, cbb))
lib/libssl/tls13_server.c
565
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
594
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
627
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
805
if (!tls1_transcript_hash_value(ctx->ssl, transcript_hash,
lib/libssl/tls13_server.c
867
SSL *s = ctx->ssl;
lib/libssl/tls13_server.c
972
if ((cert = ctx->ssl->session->peer_cert) == NULL)
lib/libssl/tls13_server.c
976
if ((sigalg = ssl_sigalg_for_peer(ctx->ssl, pkey,
lib/libssl/tls_internal.h
100
int tls_key_share_peer_security(const SSL *ssl, struct tls_key_share *ks);
lib/libssl/tls_key_share.c
795
tls_key_share_peer_security(const SSL *ssl, struct tls_key_share *ks)
lib/libssl/tls_key_share.c
799
return ssl_security_dh(ssl, ks->dhe_peer);
lib/libtls/tls_internal.h
293
int tls_ocsp_verify_cb(SSL *ssl, void *arg);
lib/libtls/tls_internal.h
294
int tls_ocsp_stapling_cb(SSL *ssl, void *arg);
lib/libtls/tls_ocsp.c
319
tls_ocsp_verify_cb(SSL *ssl, void *arg)
lib/libtls/tls_ocsp.c
325
if ((ctx = SSL_get_app_data(ssl)) == NULL)
lib/libtls/tls_ocsp.c
328
size = SSL_get_tlsext_status_ocsp_resp(ssl, &raw);
lib/libtls/tls_ocsp.c
353
tls_ocsp_stapling_cb(SSL *ssl, void *arg)
lib/libtls/tls_ocsp.c
359
if ((ctx = SSL_get_app_data(ssl)) == NULL)
lib/libtls/tls_server.c
171
tls_server_ticket_cb(SSL *ssl, unsigned char *keyname, unsigned char *iv,
lib/libtls/tls_server.c
177
if ((tls_ctx = SSL_get_app_data(ssl)) == NULL)
lib/libtls/tls_server.c
68
tls_server_alpn_cb(SSL *ssl, const unsigned char **out, unsigned char *outlen,
lib/libtls/tls_server.c
82
tls_servername_cb(SSL *ssl, int *al, void *arg)
lib/libtls/tls_server.c
91
if ((conn_ctx = SSL_get_app_data(ssl)) == NULL)
lib/libtls/tls_server.c
94
if ((name = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name)) ==
regress/lib/libcrypto/ocsp/ocsp_test.c
104
ssl = SSL_new(ctx);
regress/lib/libcrypto/ocsp/ocsp_test.c
106
SSL_set_fd(ssl, (int) sd);
regress/lib/libcrypto/ocsp/ocsp_test.c
107
SSL_set_tlsext_status_type(ssl, TLSEXT_STATUSTYPE_ocsp);
regress/lib/libcrypto/ocsp/ocsp_test.c
109
if (SSL_connect(ssl) <= 0) {
regress/lib/libcrypto/ocsp/ocsp_test.c
114
if (SSL_get_verify_result(ssl) != X509_V_OK) {
regress/lib/libcrypto/ocsp/ocsp_test.c
122
len = SSL_get_tlsext_status_ocsp_resp(ssl, &p);
regress/lib/libcrypto/ocsp/ocsp_test.c
148
ch = SSL_get_peer_cert_chain(ssl);
regress/lib/libcrypto/ocsp/ocsp_test.c
82
SSL *ssl;
regress/lib/libssl/api/apitest.c
100
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/api/apitest.c
106
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/api/apitest.c
111
return ssl;
regress/lib/libssl/api/apitest.c
118
SSL *ssl = NULL;
regress/lib/libssl/api/apitest.c
134
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/api/apitest.c
140
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/api/apitest.c
145
return ssl;
regress/lib/libssl/api/apitest.c
149
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret)
regress/lib/libssl/api/apitest.c
153
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/api/apitest.c
172
do_connect(SSL *ssl, const char *name, int *done)
regress/lib/libssl/api/apitest.c
176
if ((ssl_ret = SSL_connect(ssl)) == 1) {
regress/lib/libssl/api/apitest.c
182
return ssl_error(ssl, name, "connect", ssl_ret);
regress/lib/libssl/api/apitest.c
186
do_accept(SSL *ssl, const char *name, int *done)
regress/lib/libssl/api/apitest.c
190
if ((ssl_ret = SSL_accept(ssl)) == 1) {
regress/lib/libssl/api/apitest.c
196
return ssl_error(ssl, name, "accept", ssl_ret);
regress/lib/libssl/api/apitest.c
199
typedef int (*ssl_func)(SSL *ssl, const char *name, int *done);
regress/lib/libssl/api/apitest.c
87
SSL *ssl = NULL;
regress/lib/libssl/ciphers/cipherstest.c
1125
SSL *ssl = NULL;
regress/lib/libssl/ciphers/cipherstest.c
1156
if ((ssl = SSL_new(ctx)) == NULL)
regress/lib/libssl/ciphers/cipherstest.c
1160
if (!SSL_set_ciphersuites(ssl, cst->ssl_ciphersuites))
regress/lib/libssl/ciphers/cipherstest.c
1164
if (!SSL_set_cipher_list(ssl, cst->ssl_rulestr))
regress/lib/libssl/ciphers/cipherstest.c
1168
if (!SSL_set_ciphersuites(ssl, cst->ssl_ciphersuites))
regress/lib/libssl/ciphers/cipherstest.c
1172
ciphers = SSL_get_ciphers(ssl);
regress/lib/libssl/ciphers/cipherstest.c
1190
SSL_free(ssl);
regress/lib/libssl/ciphers/cipherstest.c
729
SSL *ssl = NULL;
regress/lib/libssl/ciphers/cipherstest.c
737
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/ciphers/cipherstest.c
741
if (!SSL_set_cipher_list(ssl, "ALL")) {
regress/lib/libssl/ciphers/cipherstest.c
746
if ((ciphers = SSL_get_ciphers(ssl)) == NULL) {
regress/lib/libssl/ciphers/cipherstest.c
766
if ((cipher = SSL_CIPHER_find(ssl, buf)) == NULL) {
regress/lib/libssl/ciphers/cipherstest.c
861
SSL_free(ssl);
regress/lib/libssl/client/clienttest.c
1031
SSL_free(ssl);
regress/lib/libssl/client/clienttest.c
934
SSL *ssl = NULL;
regress/lib/libssl/client/clienttest.c
961
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/client/clienttest.c
966
if (!tlsext_linearize_build_order(ssl)) {
regress/lib/libssl/client/clienttest.c
973
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/client/clienttest.c
975
if (SSL_connect(ssl) != 0) {
regress/lib/libssl/dtls/dtlstest.c
385
dtls_cookie_generate(SSL *ssl, unsigned char *cookie,
regress/lib/libssl/dtls/dtlstest.c
396
dtls_cookie_verify(SSL *ssl, const unsigned char *cookie,
regress/lib/libssl/dtls/dtlstest.c
404
dtls_info_callback(const SSL *ssl, int type, int val)
regress/lib/libssl/dtls/dtlstest.c
410
if (ssl->wbio == ssl->bbio)
regress/lib/libssl/dtls/dtlstest.c
411
((SSL *)ssl)->wbio = BIO_pop(ssl->wbio);
regress/lib/libssl/dtls/dtlstest.c
418
SSL *ssl = NULL;
regress/lib/libssl/dtls/dtlstest.c
431
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/dtls/dtlstest.c
434
SSL_set_bio(ssl, bio, bio);
regress/lib/libssl/dtls/dtlstest.c
438
SSL_set_options(ssl, SSL_OP_NO_QUERY_MTU);
regress/lib/libssl/dtls/dtlstest.c
439
SSL_set_mtu(ssl, mtu);
regress/lib/libssl/dtls/dtlstest.c
445
return ssl;
regress/lib/libssl/dtls/dtlstest.c
452
SSL *ssl = NULL;
regress/lib/libssl/dtls/dtlstest.c
478
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/dtls/dtlstest.c
481
if (SSL_use_certificate_chain_file(ssl, server_cert_file) != 1) {
regress/lib/libssl/dtls/dtlstest.c
485
SSL_set_bio(ssl, bio, bio);
regress/lib/libssl/dtls/dtlstest.c
489
SSL_set_options(ssl, SSL_OP_NO_QUERY_MTU);
regress/lib/libssl/dtls/dtlstest.c
490
SSL_set_mtu(ssl, mtu);
regress/lib/libssl/dtls/dtlstest.c
497
return ssl;
regress/lib/libssl/dtls/dtlstest.c
501
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret,
regress/lib/libssl/dtls/dtlstest.c
506
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/dtls/dtlstest.c
525
do_connect(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
529
if ((ssl_ret = SSL_connect(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
530
return ssl_error(ssl, name, "connect", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
539
do_connect_read(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
545
if ((ssl_ret = SSL_connect(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
546
return ssl_error(ssl, name, "connect", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
553
if ((ssl_ret = SSL_read(ssl, buf, sizeof(buf))) != 3) {
regress/lib/libssl/dtls/dtlstest.c
563
do_connect_shutdown(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
568
if ((ssl_ret = SSL_connect(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
569
return ssl_error(ssl, name, "connect", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
574
ssl_ret = SSL_read(ssl, buf, sizeof(buf));
regress/lib/libssl/dtls/dtlstest.c
575
if (SSL_get_error(ssl, ssl_ret) != SSL_ERROR_ZERO_RETURN) {
regress/lib/libssl/dtls/dtlstest.c
586
do_accept(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
590
if ((ssl_ret = SSL_accept(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
591
return ssl_error(ssl, name, "accept", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
600
do_accept_write(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
606
if ((ssl_ret = SSL_accept(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
607
return ssl_error(ssl, name, "accept", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
613
if ((ssl_ret = SSL_write(ssl, "abc", 3)) != 3) {
regress/lib/libssl/dtls/dtlstest.c
619
if ((bio = SSL_get_wbio(ssl)) == NULL)
regress/lib/libssl/dtls/dtlstest.c
630
do_accept_shutdown(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
635
if ((ssl_ret = SSL_accept(ssl)) != 1)
regress/lib/libssl/dtls/dtlstest.c
636
return ssl_error(ssl, name, "accept", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
640
SSL_shutdown(ssl);
regress/lib/libssl/dtls/dtlstest.c
642
if ((bio = SSL_get_wbio(ssl)) == NULL)
regress/lib/libssl/dtls/dtlstest.c
653
do_read(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
658
if ((ssl_ret = SSL_read(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/dtls/dtlstest.c
666
return ssl_error(ssl, name, "read", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
670
do_write(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
675
if ((ssl_ret = SSL_write(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/dtls/dtlstest.c
681
return ssl_error(ssl, name, "write", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
685
do_shutdown(SSL *ssl, const char *name, int *done, short *events)
regress/lib/libssl/dtls/dtlstest.c
689
ssl_ret = SSL_shutdown(ssl);
regress/lib/libssl/dtls/dtlstest.c
695
return ssl_error(ssl, name, "shutdown", ssl_ret, events);
regress/lib/libssl/dtls/dtlstest.c
698
typedef int (ssl_func)(SSL *ssl, const char *name, int *done, short *events);
regress/lib/libssl/dtls/dtlstest.c
925
dtlstest_packet_monkey(SSL *ssl, const struct dtls_delay delays[],
regress/lib/libssl/dtls/dtlstest.c
950
if ((bio = SSL_get_wbio(ssl)) == NULL)
regress/lib/libssl/dtls/dtlstest.c
956
SSL_set_bio(ssl, bio, bio);
regress/lib/libssl/exporter/exportertest.c
535
SSL *ssl = NULL;
regress/lib/libssl/exporter/exportertest.c
547
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/exporter/exportertest.c
558
if (!SSL_set_session(ssl, ssl_session)) {
regress/lib/libssl/exporter/exportertest.c
565
memcpy(ssl->s3->client_random, et->client_random,
regress/lib/libssl/exporter/exportertest.c
566
sizeof(ssl->s3->client_random));
regress/lib/libssl/exporter/exportertest.c
567
memcpy(ssl->s3->server_random, et->server_random,
regress/lib/libssl/exporter/exportertest.c
568
sizeof(ssl->s3->server_random));
regress/lib/libssl/exporter/exportertest.c
571
if ((tls13_ctx = tls13_ctx_new(TLS13_HS_CLIENT, ssl)) == NULL) {
regress/lib/libssl/exporter/exportertest.c
575
ssl->tls13 = tls13_ctx;
regress/lib/libssl/exporter/exportertest.c
582
ssl->s3->hs.tls13.secrets = tls13_secrets;
regress/lib/libssl/exporter/exportertest.c
604
ssl->s3->hs.state = SSL_ST_OK;
regress/lib/libssl/exporter/exportertest.c
605
ssl->s3->hs.negotiated_tls_version = et->tls_version;
regress/lib/libssl/exporter/exportertest.c
608
ssl->s3->hs.cipher = SSL_CIPHER_find(ssl, id);
regress/lib/libssl/exporter/exportertest.c
610
ret = SSL_export_keying_material(ssl, export, et->export_len, et->label,
regress/lib/libssl/exporter/exportertest.c
652
SSL_free(ssl);
regress/lib/libssl/interop/client.c
192
ssl = SSL_new(ctx);
regress/lib/libssl/interop/client.c
193
if (ssl == NULL)
regress/lib/libssl/interop/client.c
195
supported_ciphers = SSL_get1_supported_ciphers(ssl);
regress/lib/libssl/interop/client.c
221
ssl = SSL_new(ctx);
regress/lib/libssl/interop/client.c
222
if (ssl == NULL)
regress/lib/libssl/interop/client.c
224
SSL_set_bio(ssl, bio, bio);
regress/lib/libssl/interop/client.c
227
if (SSL_set_session(ssl, session) <= 0)
regress/lib/libssl/interop/client.c
230
if ((error = SSL_connect(ssl)) <= 0)
regress/lib/libssl/interop/client.c
233
SSL_session_reused(ssl) ? "reuse" : "new");
regress/lib/libssl/interop/client.c
239
session = SSL_get1_session(ssl);
regress/lib/libssl/interop/client.c
243
session = SSL_get_session(ssl);
regress/lib/libssl/interop/client.c
251
if ((error = SSL_read(ssl, buf, 9)) <= 0)
regress/lib/libssl/interop/client.c
263
if ((error = SSL_write(ssl, buf, 6)) <= 0)
regress/lib/libssl/interop/client.c
269
if ((error = SSL_shutdown(ssl)) < 0)
regress/lib/libssl/interop/client.c
272
if ((error = SSL_shutdown(ssl)) <= 0)
regress/lib/libssl/interop/client.c
277
SSL_free(ssl);
regress/lib/libssl/interop/client.c
47
SSL *ssl;
regress/lib/libssl/interop/server.c
228
ssl = SSL_new(ctx);
regress/lib/libssl/interop/server.c
229
if (ssl == NULL)
regress/lib/libssl/interop/server.c
231
supported_ciphers = SSL_get1_supported_ciphers(ssl);
regress/lib/libssl/interop/server.c
267
ssl = SSL_new(ctx);
regress/lib/libssl/interop/server.c
268
if (ssl == NULL)
regress/lib/libssl/interop/server.c
270
SSL_set_bio(ssl, cbio, cbio);
regress/lib/libssl/interop/server.c
271
if ((error = SSL_accept(ssl)) <= 0)
regress/lib/libssl/interop/server.c
274
SSL_session_reused(ssl) ? "reuse" : "new");
regress/lib/libssl/interop/server.c
280
session = SSL_get_session(ssl);
regress/lib/libssl/interop/server.c
291
if ((error = SSL_write(ssl, buf, 9)) <= 0)
regress/lib/libssl/interop/server.c
295
if ((error = SSL_read(ssl, buf, 6)) <= 0)
regress/lib/libssl/interop/server.c
305
if ((error = SSL_shutdown(ssl)) < 0)
regress/lib/libssl/interop/server.c
308
if ((error = SSL_shutdown(ssl)) <= 0)
regress/lib/libssl/interop/server.c
313
SSL_free(ssl);
regress/lib/libssl/interop/server.c
48
SSL *ssl;
regress/lib/libssl/quic/quictest.c
109
quic_flush_flight(SSL *ssl)
regress/lib/libssl/quic/quictest.c
115
quic_send_alert(SSL *ssl, enum ssl_encryption_level_t level, uint8_t alert)
regress/lib/libssl/quic/quictest.c
132
SSL *ssl = NULL;
regress/lib/libssl/quic/quictest.c
142
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/quic/quictest.c
145
SSL_set_connect_state(ssl);
regress/lib/libssl/quic/quictest.c
146
SSL_set_app_data(ssl, data);
regress/lib/libssl/quic/quictest.c
151
return ssl;
regress/lib/libssl/quic/quictest.c
158
SSL *ssl = NULL;
regress/lib/libssl/quic/quictest.c
181
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/quic/quictest.c
184
SSL_set_accept_state(ssl);
regress/lib/libssl/quic/quictest.c
185
SSL_set_app_data(ssl, data);
regress/lib/libssl/quic/quictest.c
190
return ssl;
regress/lib/libssl/quic/quictest.c
194
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret)
regress/lib/libssl/quic/quictest.c
198
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/quic/quictest.c
201
if (quic_read_handshake_data(ssl) < 0)
regress/lib/libssl/quic/quictest.c
219
do_handshake(SSL *ssl, const char *name, int *done)
regress/lib/libssl/quic/quictest.c
223
if ((ssl_ret = SSL_do_handshake(ssl)) == 1) {
regress/lib/libssl/quic/quictest.c
229
return ssl_error(ssl, name, "handshake", ssl_ret);
regress/lib/libssl/quic/quictest.c
232
typedef int (*ssl_func)(SSL *ssl, const char *name, int *done);
regress/lib/libssl/quic/quictest.c
50
quic_set_read_secret(SSL *ssl, enum ssl_encryption_level_t level,
regress/lib/libssl/quic/quictest.c
53
struct quic_data *qd = SSL_get_app_data(ssl);
regress/lib/libssl/quic/quictest.c
61
quic_set_write_secret(SSL *ssl, enum ssl_encryption_level_t level,
regress/lib/libssl/quic/quictest.c
64
struct quic_data *qd = SSL_get_app_data(ssl);
regress/lib/libssl/quic/quictest.c
72
quic_read_handshake_data(SSL *ssl)
regress/lib/libssl/quic/quictest.c
74
struct quic_data *qd = SSL_get_app_data(ssl);
regress/lib/libssl/quic/quictest.c
83
if (!SSL_provide_quic_data(ssl, qd->rlevel, buf, ret))
regress/lib/libssl/quic/quictest.c
91
quic_add_handshake_data(SSL *ssl, enum ssl_encryption_level_t level,
regress/lib/libssl/quic/quictest.c
94
struct quic_data *qd = SSL_get_app_data(ssl);
regress/lib/libssl/renegotiation/renegotiation_test.c
100
return ssl;
regress/lib/libssl/renegotiation/renegotiation_test.c
104
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret)
regress/lib/libssl/renegotiation/renegotiation_test.c
108
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
137
do_connect(SSL *ssl, const char *name, int *done)
regress/lib/libssl/renegotiation/renegotiation_test.c
141
if ((ssl_ret = SSL_connect(ssl)) == 1) {
regress/lib/libssl/renegotiation/renegotiation_test.c
147
return ssl_error(ssl, name, "connect", ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
151
do_accept(SSL *ssl, const char *name, int *done)
regress/lib/libssl/renegotiation/renegotiation_test.c
155
if ((ssl_ret = SSL_accept(ssl)) == 1) {
regress/lib/libssl/renegotiation/renegotiation_test.c
161
return ssl_error(ssl, name, "accept", ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
165
do_read(SSL *ssl, const char *name, int *done)
regress/lib/libssl/renegotiation/renegotiation_test.c
170
if ((ssl_ret = SSL_read(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/renegotiation/renegotiation_test.c
178
return ssl_error(ssl, name, "read", ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
182
do_write(SSL *ssl, const char *name, int *done)
regress/lib/libssl/renegotiation/renegotiation_test.c
187
if ((ssl_ret = SSL_write(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/renegotiation/renegotiation_test.c
193
return ssl_error(ssl, name, "write", ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
197
do_shutdown(SSL *ssl, const char *name, int *done)
regress/lib/libssl/renegotiation/renegotiation_test.c
201
ssl_ret = SSL_shutdown(ssl);
regress/lib/libssl/renegotiation/renegotiation_test.c
207
return ssl_error(ssl, name, "shutdown", ssl_ret);
regress/lib/libssl/renegotiation/renegotiation_test.c
210
typedef int (*ssl_func)(SSL *ssl, const char *name, int *done);
regress/lib/libssl/renegotiation/renegotiation_test.c
371
tls_client_info_callback(const SSL *ssl, int where, int value)
regress/lib/libssl/renegotiation/renegotiation_test.c
382
tls_server_info_callback(const SSL *ssl, int where, int value)
regress/lib/libssl/renegotiation/renegotiation_test.c
49
SSL *ssl = NULL;
regress/lib/libssl/renegotiation/renegotiation_test.c
54
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/renegotiation/renegotiation_test.c
60
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/renegotiation/renegotiation_test.c
64
return ssl;
regress/lib/libssl/renegotiation/renegotiation_test.c
71
SSL *ssl = NULL;
regress/lib/libssl/renegotiation/renegotiation_test.c
89
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/renegotiation/renegotiation_test.c
95
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/server/servertest.c
119
SSL *ssl = NULL;
regress/lib/libssl/server/servertest.c
156
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/server/servertest.c
163
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/server/servertest.c
165
if (SSL_accept(ssl) != 0) {
regress/lib/libssl/server/servertest.c
178
SSL_free(ssl);
regress/lib/libssl/shutdown/shutdowntest.c
101
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret)
regress/lib/libssl/shutdown/shutdowntest.c
105
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
123
do_connect(SSL *ssl, const char *name, int *done)
regress/lib/libssl/shutdown/shutdowntest.c
127
if ((ssl_ret = SSL_connect(ssl)) == 1) {
regress/lib/libssl/shutdown/shutdowntest.c
133
return ssl_error(ssl, name, "connect", ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
137
do_accept(SSL *ssl, const char *name, int *done)
regress/lib/libssl/shutdown/shutdowntest.c
141
if ((ssl_ret = SSL_accept(ssl)) == 1) {
regress/lib/libssl/shutdown/shutdowntest.c
147
return ssl_error(ssl, name, "accept", ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
151
do_read(SSL *ssl, const char *name, int *done)
regress/lib/libssl/shutdown/shutdowntest.c
156
if ((ssl_ret = SSL_read(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/shutdown/shutdowntest.c
164
return ssl_error(ssl, name, "read", ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
168
do_write(SSL *ssl, const char *name, int *done)
regress/lib/libssl/shutdown/shutdowntest.c
173
if ((ssl_ret = SSL_write(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/shutdown/shutdowntest.c
179
return ssl_error(ssl, name, "write", ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
183
do_shutdown(SSL *ssl, const char *name, int *done)
regress/lib/libssl/shutdown/shutdowntest.c
187
ssl_ret = SSL_shutdown(ssl);
regress/lib/libssl/shutdown/shutdowntest.c
196
SSL_get_error(ssl, ssl_ret) == SSL_ERROR_SYSCALL && errno == 0) {
regress/lib/libssl/shutdown/shutdowntest.c
202
return ssl_error(ssl, name, "shutdown", ssl_ret);
regress/lib/libssl/shutdown/shutdowntest.c
205
typedef int (*ssl_func)(SSL *ssl, const char *name, int *done);
regress/lib/libssl/shutdown/shutdowntest.c
268
size_t len, SSL *ssl, void *arg)
regress/lib/libssl/shutdown/shutdowntest.c
46
SSL *ssl = NULL;
regress/lib/libssl/shutdown/shutdowntest.c
51
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/shutdown/shutdowntest.c
57
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/shutdown/shutdowntest.c
61
return ssl;
regress/lib/libssl/shutdown/shutdowntest.c
68
SSL *ssl = NULL;
regress/lib/libssl/shutdown/shutdowntest.c
86
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/shutdown/shutdowntest.c
92
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/shutdown/shutdowntest.c
97
return ssl;
regress/lib/libssl/tls/tlstest.c
101
ssl_error(SSL *ssl, const char *name, const char *desc, int ssl_ret)
regress/lib/libssl/tls/tlstest.c
105
ssl_err = SSL_get_error(ssl, ssl_ret);
regress/lib/libssl/tls/tlstest.c
124
do_connect(SSL *ssl, const char *name, int *done)
regress/lib/libssl/tls/tlstest.c
128
if ((ssl_ret = SSL_connect(ssl)) == 1) {
regress/lib/libssl/tls/tlstest.c
134
return ssl_error(ssl, name, "connect", ssl_ret);
regress/lib/libssl/tls/tlstest.c
138
do_accept(SSL *ssl, const char *name, int *done)
regress/lib/libssl/tls/tlstest.c
142
if ((ssl_ret = SSL_accept(ssl)) == 1) {
regress/lib/libssl/tls/tlstest.c
148
return ssl_error(ssl, name, "accept", ssl_ret);
regress/lib/libssl/tls/tlstest.c
152
do_read(SSL *ssl, const char *name, int *done)
regress/lib/libssl/tls/tlstest.c
157
if ((ssl_ret = SSL_read(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/tls/tlstest.c
165
return ssl_error(ssl, name, "read", ssl_ret);
regress/lib/libssl/tls/tlstest.c
169
do_write(SSL *ssl, const char *name, int *done)
regress/lib/libssl/tls/tlstest.c
174
if ((ssl_ret = SSL_write(ssl, buf, sizeof(buf))) > 0) {
regress/lib/libssl/tls/tlstest.c
180
return ssl_error(ssl, name, "write", ssl_ret);
regress/lib/libssl/tls/tlstest.c
184
do_shutdown(SSL *ssl, const char *name, int *done)
regress/lib/libssl/tls/tlstest.c
188
ssl_ret = SSL_shutdown(ssl);
regress/lib/libssl/tls/tlstest.c
194
return ssl_error(ssl, name, "shutdown", ssl_ret);
regress/lib/libssl/tls/tlstest.c
197
typedef int (*ssl_func)(SSL *ssl, const char *name, int *done);
regress/lib/libssl/tls/tlstest.c
46
SSL *ssl = NULL;
regress/lib/libssl/tls/tlstest.c
51
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tls/tlstest.c
57
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/tls/tlstest.c
61
return ssl;
regress/lib/libssl/tls/tlstest.c
68
SSL *ssl = NULL;
regress/lib/libssl/tls/tlstest.c
86
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tls/tlstest.c
92
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/tls/tlstest.c
97
return ssl;
regress/lib/libssl/tlsext/tlsexttest.c
1003
if (ssl->session->tlsext_ecpointformatlist_length !=
regress/lib/libssl/tlsext/tlsexttest.c
1010
if (memcmp(ssl->session->tlsext_ecpointformatlist,
regress/lib/libssl/tlsext/tlsexttest.c
1026
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
1027
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1030
if ((ssl->tlsext_ecpointformatlist = malloc(sizeof(uint8_t) * 3)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
1034
ssl->tlsext_ecpointformatlist[0] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime;
regress/lib/libssl/tlsext/tlsexttest.c
1035
ssl->tlsext_ecpointformatlist[1] = TLSEXT_ECPOINTFORMAT_uncompressed;
regress/lib/libssl/tlsext/tlsexttest.c
1036
ssl->tlsext_ecpointformatlist[2] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2;
regress/lib/libssl/tlsext/tlsexttest.c
1037
ssl->tlsext_ecpointformatlist_length = 3;
regress/lib/libssl/tlsext/tlsexttest.c
1039
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1045
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1078
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
1079
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1083
free(ssl->tlsext_ecpointformatlist);
regress/lib/libssl/tlsext/tlsexttest.c
1084
ssl->tlsext_ecpointformatlist = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1085
ssl->tlsext_ecpointformatlist_length = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1089
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1098
if (ssl->session->tlsext_ecpointformatlist_length !=
regress/lib/libssl/tlsext/tlsexttest.c
1105
if (memcmp(ssl->session->tlsext_ecpointformatlist,
regress/lib/libssl/tlsext/tlsexttest.c
1117
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
1128
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1143
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1150
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1154
if ((ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xcca9)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
1158
if ((ssl->session->tlsext_ecpointformatlist = malloc(sizeof(uint8_t)))
regress/lib/libssl/tlsext/tlsexttest.c
1163
ssl->session->tlsext_ecpointformatlist[0] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime;
regress/lib/libssl/tlsext/tlsexttest.c
1164
ssl->session->tlsext_ecpointformatlist_length = 1;
regress/lib/libssl/tlsext/tlsexttest.c
1166
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1175
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1208
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
1209
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1214
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1232
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
1233
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1237
if ((ssl->session->tlsext_ecpointformatlist = malloc(sizeof(uint8_t)))
regress/lib/libssl/tlsext/tlsexttest.c
1242
ssl->session->tlsext_ecpointformatlist[0] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2;
regress/lib/libssl/tlsext/tlsexttest.c
1243
ssl->session->tlsext_ecpointformatlist_length = 1;
regress/lib/libssl/tlsext/tlsexttest.c
1246
if ((ssl->tlsext_ecpointformatlist = malloc(sizeof(uint8_t) * 3)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
1250
ssl->tlsext_ecpointformatlist[0] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime;
regress/lib/libssl/tlsext/tlsexttest.c
1251
ssl->tlsext_ecpointformatlist[1] = TLSEXT_ECPOINTFORMAT_uncompressed;
regress/lib/libssl/tlsext/tlsexttest.c
1252
ssl->tlsext_ecpointformatlist[2] = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2;
regress/lib/libssl/tlsext/tlsexttest.c
1253
ssl->tlsext_ecpointformatlist_length = 3;
regress/lib/libssl/tlsext/tlsexttest.c
1255
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1260
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1293
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
1294
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1298
free(ssl->tlsext_ecpointformatlist);
regress/lib/libssl/tlsext/tlsexttest.c
1299
ssl->tlsext_ecpointformatlist = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1300
ssl->tlsext_ecpointformatlist_length = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1304
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1313
if (ssl->session->tlsext_ecpointformatlist_length !=
regress/lib/libssl/tlsext/tlsexttest.c
1320
if (memcmp(ssl->session->tlsext_ecpointformatlist,
regress/lib/libssl/tlsext/tlsexttest.c
1332
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
1371
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1387
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1394
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1399
if (!SSL_renegotiate(ssl)) {
regress/lib/libssl/tlsext/tlsexttest.c
1404
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1409
memcpy(ssl->s3->previous_client_finished, tlsext_ri_prev_client,
regress/lib/libssl/tlsext/tlsexttest.c
1411
ssl->s3->previous_client_finished_len = sizeof(tlsext_ri_prev_client);
regress/lib/libssl/tlsext/tlsexttest.c
1413
ssl->s3->renegotiate_seen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1415
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1439
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1448
if (ssl->s3->renegotiate_seen != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1452
if (ssl->s3->send_connection_binding != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1457
memset(ssl->s3->previous_client_finished, 0,
regress/lib/libssl/tlsext/tlsexttest.c
1458
sizeof(ssl->s3->previous_client_finished));
regress/lib/libssl/tlsext/tlsexttest.c
1460
ssl->s3->renegotiate_seen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1463
if (server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1468
if (ssl->s3->renegotiate_seen == 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1478
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
1489
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1505
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1512
ssl->version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
1513
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1518
ssl->s3->send_connection_binding = 1;
regress/lib/libssl/tlsext/tlsexttest.c
1520
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1525
memcpy(ssl->s3->previous_client_finished, tlsext_ri_prev_client,
regress/lib/libssl/tlsext/tlsexttest.c
1527
ssl->s3->previous_client_finished_len = sizeof(tlsext_ri_prev_client);
regress/lib/libssl/tlsext/tlsexttest.c
1529
memcpy(ssl->s3->previous_server_finished, tlsext_ri_prev_server,
regress/lib/libssl/tlsext/tlsexttest.c
1531
ssl->s3->previous_server_finished_len = sizeof(tlsext_ri_prev_server);
regress/lib/libssl/tlsext/tlsexttest.c
1533
ssl->s3->renegotiate_seen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1535
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1559
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1568
if (ssl->s3->renegotiate_seen != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1572
if (ssl->s3->send_connection_binding != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1577
memset(ssl->s3->previous_client_finished, 0,
regress/lib/libssl/tlsext/tlsexttest.c
1578
sizeof(ssl->s3->previous_client_finished));
regress/lib/libssl/tlsext/tlsexttest.c
1579
memset(ssl->s3->previous_server_finished, 0,
regress/lib/libssl/tlsext/tlsexttest.c
1580
sizeof(ssl->s3->previous_server_finished));
regress/lib/libssl/tlsext/tlsexttest.c
1582
ssl->s3->renegotiate_seen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1585
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1590
if (ssl->s3->renegotiate_seen == 1) {
regress/lib/libssl/tlsext/tlsexttest.c
1600
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
162
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1622
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1638
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1645
ssl->s3->hs.our_max_tls_version = TLS1_1_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
1647
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1652
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
1654
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1659
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1683
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1697
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
1709
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1725
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1732
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1737
if (server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
1746
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1756
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
178
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1786
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1802
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1809
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1814
if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) {
regress/lib/libssl/tlsext/tlsexttest.c
1819
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1824
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
185
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1853
if (!SSL_set_tlsext_host_name(ssl, NULL)) {
regress/lib/libssl/tlsext/tlsexttest.c
1858
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1863
if ((ssl->session = SSL_SESSION_new()) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
1868
ssl->hit = 0;
regress/lib/libssl/tlsext/tlsexttest.c
1871
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1880
if (ssl->session->tlsext_hostname == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
1885
if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) ||
regress/lib/libssl/tlsext/tlsexttest.c
1886
strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME,
regress/lib/libssl/tlsext/tlsexttest.c
1889
ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME);
regress/lib/libssl/tlsext/tlsexttest.c
1893
ssl->hit = 1;
regress/lib/libssl/tlsext/tlsexttest.c
1895
free(ssl->session->tlsext_hostname);
regress/lib/libssl/tlsext/tlsexttest.c
1896
if ((ssl->session->tlsext_hostname = strdup("notthesame.libressl.org")) ==
regress/lib/libssl/tlsext/tlsexttest.c
1903
if (server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
1913
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
1924
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1940
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1947
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
1950
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1955
if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) {
regress/lib/libssl/tlsext/tlsexttest.c
1960
if ((ssl->session->tlsext_hostname = strdup(TEST_SNI_SERVERNAME)) ==
regress/lib/libssl/tlsext/tlsexttest.c
1964
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
1969
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
197
if (SSL_set_alpn_protos(ssl, tlsext_alpn_single_proto_val,
regress/lib/libssl/tlsext/tlsexttest.c
1992
free(ssl->session->tlsext_hostname);
regress/lib/libssl/tlsext/tlsexttest.c
1993
ssl->session->tlsext_hostname = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
1996
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2005
if (ssl->session->tlsext_hostname == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
2010
if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) ||
regress/lib/libssl/tlsext/tlsexttest.c
2011
strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME,
regress/lib/libssl/tlsext/tlsexttest.c
2014
ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME);
regress/lib/libssl/tlsext/tlsexttest.c
202
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2023
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2045
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2063
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2070
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2075
if (!SSL_set_quic_transport_params(ssl,
regress/lib/libssl/tlsext/tlsexttest.c
2081
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2086
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
2087
ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
2089
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
209
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2094
ssl->quic_method = &quic_method;
regress/lib/libssl/tlsext/tlsexttest.c
2096
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2101
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2130
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2139
SSL_get_peer_quic_transport_params(ssl, &out_bytes, &out_bytes_len);
regress/lib/libssl/tlsext/tlsexttest.c
2164
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2176
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2194
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2201
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2206
if (!SSL_set_quic_transport_params(ssl,
regress/lib/libssl/tlsext/tlsexttest.c
2212
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_EE)) {
regress/lib/libssl/tlsext/tlsexttest.c
2217
ssl->quic_method = &quic_method;
regress/lib/libssl/tlsext/tlsexttest.c
2219
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_EE)) {
regress/lib/libssl/tlsext/tlsexttest.c
2224
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_EE, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2251
ssl->quic_method = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2253
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_EE, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2258
ssl->quic_method = &quic_method;
regress/lib/libssl/tlsext/tlsexttest.c
2260
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2269
SSL_get_peer_quic_transport_params(ssl, &out_bytes, &out_bytes_len);
regress/lib/libssl/tlsext/tlsexttest.c
2293
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2308
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2324
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2331
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2335
SSL_set_tlsext_status_type(ssl, TLSEXT_STATUSTYPE_ocsp);
regress/lib/libssl/tlsext/tlsexttest.c
2337
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2341
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2365
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2379
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2390
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2404
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
241
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2411
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2416
ssl->tlsext_status_expected = 1;
regress/lib/libssl/tlsext/tlsexttest.c
2418
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2422
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2435
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2456
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2477
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2485
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2492
if ((SSL_set_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) == 0) {
regress/lib/libssl/tlsext/tlsexttest.c
2496
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
250
if (ssl->alpn_client_proto_list_len !=
regress/lib/libssl/tlsext/tlsexttest.c
2502
if ((SSL_clear_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
2506
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2512
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2532
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2534
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2538
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
255
compare_data(ssl->alpn_client_proto_list,
regress/lib/libssl/tlsext/tlsexttest.c
2558
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
2559
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
256
ssl->alpn_client_proto_list_len,
regress/lib/libssl/tlsext/tlsexttest.c
2563
if ((ssl->session->tlsext_tick = malloc(sizeof(dummy))) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
2566
memcpy(ssl->session->tlsext_tick, dummy, sizeof(dummy));
regress/lib/libssl/tlsext/tlsexttest.c
2567
ssl->session->tlsext_ticklen = sizeof(dummy);
regress/lib/libssl/tlsext/tlsexttest.c
2569
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2573
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2597
free(ssl->session->tlsext_tick);
regress/lib/libssl/tlsext/tlsexttest.c
2598
ssl->session->tlsext_tick = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2599
ssl->session->tlsext_ticklen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
2605
if (!SSL_set_session_ticket_ext(ssl, NULL, 0)) {
regress/lib/libssl/tlsext/tlsexttest.c
261
if (memcmp(ssl->alpn_client_proto_list,
regress/lib/libssl/tlsext/tlsexttest.c
2610
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2619
free(ssl->tlsext_session_ticket);
regress/lib/libssl/tlsext/tlsexttest.c
2620
ssl->tlsext_session_ticket = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2622
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2628
if (!SSL_set_session_ticket_ext(ssl, tlsext_sessionticket_hello_max,
regress/lib/libssl/tlsext/tlsexttest.c
2633
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2637
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2664
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
2675
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2690
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2701
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2707
if ((SSL_set_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) == 0) {
regress/lib/libssl/tlsext/tlsexttest.c
2711
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2717
if ((SSL_clear_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
272
if (SSL_set_alpn_protos(ssl, tlsext_alpn_multiple_protos_val,
regress/lib/libssl/tlsext/tlsexttest.c
2721
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2727
ssl->tlsext_ticket_expected = 1;
regress/lib/libssl/tlsext/tlsexttest.c
2728
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2734
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2752
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
277
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2813
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
282
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2830
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
2838
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2843
if (SSL_set_tlsext_use_srtp(ssl, tlsext_srtp_single_profile) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
2847
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2854
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2884
if (SSL_get_selected_srtp_profile(ssl) != NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
2890
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2899
if ((prof = SSL_get_selected_srtp_profile(ssl)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
2908
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2915
if (SSL_set_tlsext_use_srtp(ssl, tlsext_srtp_multiple_profiles) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
2919
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2924
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
2954
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2958
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2967
if ((prof = SSL_get_selected_srtp_profile(ssl)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
2976
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
2985
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
2989
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
2998
if ((prof = SSL_get_selected_srtp_profile(ssl)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3007
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3014
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3018
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3028
if (SSL_get_selected_srtp_profile(ssl) != NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3032
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3042
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3053
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3070
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3078
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
308
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3088
ssl->srtp_profile = prof;
regress/lib/libssl/tlsext/tlsexttest.c
3089
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3096
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3125
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3127
if (SSL_get_selected_srtp_profile(ssl) != NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3133
if (SSL_set_tlsext_use_srtp(ssl, tlsext_srtp_multiple_profiles) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
3139
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3148
if ((prof = SSL_get_selected_srtp_profile(ssl)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3158
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3162
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3168
ssl->srtp_profile = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
317
if (ssl->alpn_client_proto_list_len !=
regress/lib/libssl/tlsext/tlsexttest.c
3172
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3182
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3211
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
322
compare_data(ssl->alpn_client_proto_list,
regress/lib/libssl/tlsext/tlsexttest.c
3228
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
323
ssl->alpn_client_proto_list_len,
regress/lib/libssl/tlsext/tlsexttest.c
3233
if (!tlsext_linearize_build_order(ssl)) {
regress/lib/libssl/tlsext/tlsexttest.c
3242
ssl->s3->hs.our_min_tls_version = TLS1_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3243
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3245
if (!tlsext_client_build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3276
ssl->s3->hs.our_max_tls_version = TLS1_1_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3277
if (!SSL_set_cipher_list(ssl, "TLSv1.2:!ECDHE:!ECDSA")) {
regress/lib/libssl/tlsext/tlsexttest.c
328
if (memcmp(ssl->alpn_client_proto_list,
regress/lib/libssl/tlsext/tlsexttest.c
3281
if ((SSL_set_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) == 0) {
regress/lib/libssl/tlsext/tlsexttest.c
3286
if (!tlsext_client_build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3315
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3336
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3350
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3354
if (!tlsext_linearize_build_order(ssl)) {
regress/lib/libssl/tlsext/tlsexttest.c
3358
if ((ssl->session = SSL_SESSION_new()) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3363
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3364
ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3365
ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0x003c);
regress/lib/libssl/tlsext/tlsexttest.c
3367
if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
339
free(ssl->alpn_client_proto_list);
regress/lib/libssl/tlsext/tlsexttest.c
3398
ssl->s3->send_connection_binding = 1;
regress/lib/libssl/tlsext/tlsexttest.c
3399
ssl->s3->hs.cipher = ssl3_get_cipher_by_value(0xc027);
regress/lib/libssl/tlsext/tlsexttest.c
340
ssl->alpn_client_proto_list = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3400
ssl->tlsext_status_expected = 1;
regress/lib/libssl/tlsext/tlsexttest.c
3401
ssl->tlsext_ticket_expected = 1;
regress/lib/libssl/tlsext/tlsexttest.c
3402
if ((ssl->session->tlsext_ecpointformatlist = malloc(1)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3406
ssl->session->tlsext_ecpointformatlist_length = 1;
regress/lib/libssl/tlsext/tlsexttest.c
3407
ssl->session->tlsext_ecpointformatlist[0] =
regress/lib/libssl/tlsext/tlsexttest.c
341
ssl->alpn_client_proto_list_len = 0;
regress/lib/libssl/tlsext/tlsexttest.c
3410
if (!tlsext_server_build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
343
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3439
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3459
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3475
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3482
ssl->s3->hs.our_max_tls_version = TLS1_1_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3484
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3489
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3491
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3496
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3498
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3503
ssl->s3->hs.our_min_tls_version = TLS1_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3504
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3506
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3523
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
353
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3537
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3548
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3564
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3571
ssl->s3->hs.negotiated_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3573
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3578
ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3580
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3585
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3602
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3616
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
363
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3643
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3660
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3667
if ((ssl->s3->hs.key_share =
regress/lib/libssl/tlsext/tlsexttest.c
3670
if (!tls_key_share_client_generate(ssl->s3->hs.key_share))
regress/lib/libssl/tlsext/tlsexttest.c
3673
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3674
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3679
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3680
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3685
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3686
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3702
ssl->version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3705
tls_key_share_free(ssl->s3->hs.key_share);
regress/lib/libssl/tlsext/tlsexttest.c
3706
ssl->session = SSL_SESSION_new();
regress/lib/libssl/tlsext/tlsexttest.c
3707
if (ssl->session == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3711
memset(ssl->s3, 0, sizeof(*ssl->s3));
regress/lib/libssl/tlsext/tlsexttest.c
3712
ssl->session->tlsext_supportedgroups = calloc(4,
regress/lib/libssl/tlsext/tlsexttest.c
3714
if (ssl->session->tlsext_supportedgroups == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3718
ssl->session->tlsext_supportedgroups[0] = 29;
regress/lib/libssl/tlsext/tlsexttest.c
3719
ssl->session->tlsext_supportedgroups[1] = 23;
regress/lib/libssl/tlsext/tlsexttest.c
3720
ssl->session->tlsext_supportedgroups[2] = 24;
regress/lib/libssl/tlsext/tlsexttest.c
3721
ssl->session->tlsext_supportedgroups[3] = 25;
regress/lib/libssl/tlsext/tlsexttest.c
3722
ssl->session->tlsext_supportedgroups_length = 4;
regress/lib/libssl/tlsext/tlsexttest.c
3724
ssl->s3->hs.extensions_processed |= (1 << idx);
regress/lib/libssl/tlsext/tlsexttest.c
3725
ssl->s3->hs.extensions_seen |= (1 << idx);
regress/lib/libssl/tlsext/tlsexttest.c
3726
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3733
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3741
if (ssl->s3->hs.key_share == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3745
if (tls_key_share_group(ssl->s3->hs.key_share) != 29) {
regress/lib/libssl/tlsext/tlsexttest.c
3747
tls_key_share_group(ssl->s3->hs.key_share));
regress/lib/libssl/tlsext/tlsexttest.c
3755
ssl->s3->hs.extensions_seen = 0;
regress/lib/libssl/tlsext/tlsexttest.c
3756
tls_key_share_free(ssl->s3->hs.key_share);
regress/lib/libssl/tlsext/tlsexttest.c
3757
ssl->s3->hs.key_share = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3759
if (server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3763
ssl->s3->hs.extensions_seen |= (1 << idx);
regress/lib/libssl/tlsext/tlsexttest.c
3769
ssl->s3->hs.extensions_processed = 0;
regress/lib/libssl/tlsext/tlsexttest.c
3770
ssl->s3->hs.key_share = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3772
if (server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3776
ssl->s3->hs.extensions_processed |= (1 << idx);
regress/lib/libssl/tlsext/tlsexttest.c
3782
ssl->session->tlsext_supportedgroups[0] = 0xbeef;
regress/lib/libssl/tlsext/tlsexttest.c
3783
ssl->s3->hs.key_share = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3785
if (server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
379
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3795
ssl->session->tlsext_supportedgroups[0] = 25;
regress/lib/libssl/tlsext/tlsexttest.c
3796
ssl->session->tlsext_supportedgroups[3] = 29;
regress/lib/libssl/tlsext/tlsexttest.c
3797
ssl->s3->hs.key_share = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3799
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3807
if (ssl->s3->hs.key_share != NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3811
ssl->session->tlsext_supportedgroups[0] = 29;
regress/lib/libssl/tlsext/tlsexttest.c
3812
ssl->session->tlsext_supportedgroups[3] = 25;
regress/lib/libssl/tlsext/tlsexttest.c
3819
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
3837
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3854
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
386
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3861
ssl->s3->hs.negotiated_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3862
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3867
ssl->s3->hs.negotiated_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3868
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3877
ssl->s3->hs.extensions_seen |= (1 << idx);
regress/lib/libssl/tlsext/tlsexttest.c
3879
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
3884
if (server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3889
if ((ssl->s3->hs.key_share =
regress/lib/libssl/tlsext/tlsexttest.c
3895
if (!tls_key_share_server_generate(ssl->s3->hs.key_share)) {
regress/lib/libssl/tlsext/tlsexttest.c
3902
if (!tls_key_share_server_peer_public(ssl->s3->hs.key_share, &cbs,
regress/lib/libssl/tlsext/tlsexttest.c
3908
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
3924
tls_key_share_free(ssl->s3->hs.key_share);
regress/lib/libssl/tlsext/tlsexttest.c
3926
if ((ssl->s3->hs.key_share =
regress/lib/libssl/tlsext/tlsexttest.c
3931
if (!tls_key_share_server_generate(ssl->s3->hs.key_share)) {
regress/lib/libssl/tlsext/tlsexttest.c
3938
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
3953
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
397
if ((ssl->s3->alpn_selected = malloc(sizeof(tlsext_alpn_single_proto_name))) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
3973
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
3989
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
3996
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
3997
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
400
memcpy(ssl->s3->alpn_selected, tlsext_alpn_single_proto_name,
regress/lib/libssl/tlsext/tlsexttest.c
4003
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4004
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4010
ssl->s3->hs.tls13.cookie = strdup(cookie);
regress/lib/libssl/tlsext/tlsexttest.c
4011
ssl->s3->hs.tls13.cookie_len = strlen(cookie);
regress/lib/libssl/tlsext/tlsexttest.c
4013
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4018
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
402
ssl->s3->alpn_selected_len = sizeof(tlsext_alpn_single_proto_name);
regress/lib/libssl/tlsext/tlsexttest.c
4038
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
404
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4053
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4064
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
4080
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
4087
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4088
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4093
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4094
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4100
ssl->s3->hs.tls13.cookie = strdup(cookie);
regress/lib/libssl/tlsext/tlsexttest.c
4101
ssl->s3->hs.tls13.cookie_len = strlen(cookie);
regress/lib/libssl/tlsext/tlsexttest.c
4103
if (!server_funcs->needs(ssl, SSL_TLSEXT_MSG_HRR)) {
regress/lib/libssl/tlsext/tlsexttest.c
4108
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_HRR, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
411
if (!server_funcs->build(ssl, SSL_TLSEXT_MSG_SH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
4127
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4132
freezero(ssl->s3->hs.tls13.cookie, ssl->s3->hs.tls13.cookie_len);
regress/lib/libssl/tlsext/tlsexttest.c
4133
ssl->s3->hs.tls13.cookie = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
4134
ssl->s3->hs.tls13.cookie_len = 0;
regress/lib/libssl/tlsext/tlsexttest.c
4136
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4141
if (memcmp(cookie, ssl->s3->hs.tls13.cookie,
regress/lib/libssl/tlsext/tlsexttest.c
4142
ssl->s3->hs.tls13.cookie_len) != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
4157
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4179
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
4196
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
4204
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4214
ssl->s3->hs.tls13.use_psk_dhe_ke = 1;
regress/lib/libssl/tlsext/tlsexttest.c
4215
ssl->s3->hs.our_max_tls_version = TLS1_2_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4217
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4222
ssl->s3->hs.tls13.use_psk_dhe_ke = 0;
regress/lib/libssl/tlsext/tlsexttest.c
4223
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4225
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4231
ssl->s3->hs.tls13.use_psk_dhe_ke = 1;
regress/lib/libssl/tlsext/tlsexttest.c
4232
ssl->s3->hs.our_max_tls_version = TLS1_3_VERSION;
regress/lib/libssl/tlsext/tlsexttest.c
4234
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4241
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
4273
ssl->s3->hs.tls13.use_psk_dhe_ke = 0;
regress/lib/libssl/tlsext/tlsexttest.c
4277
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4286
if (ssl->s3->hs.tls13.use_psk_dhe_ke != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
4296
ssl->s3->hs.tls13.use_psk_dhe_ke = 0;
regress/lib/libssl/tlsext/tlsexttest.c
4299
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4308
if (ssl->s3->hs.tls13.use_psk_dhe_ke != 0) {
regress/lib/libssl/tlsext/tlsexttest.c
4318
ssl->s3->hs.tls13.use_psk_dhe_ke = 0;
regress/lib/libssl/tlsext/tlsexttest.c
4321
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4330
if (ssl->s3->hs.tls13.use_psk_dhe_ke != 1) {
regress/lib/libssl/tlsext/tlsexttest.c
4340
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4350
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
4359
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
4366
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
4375
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
445
if (client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
451
if (SSL_set_alpn_protos(ssl, tlsext_alpn_single_proto_val,
regress/lib/libssl/tlsext/tlsexttest.c
4552
test_tlsext_check_psk_is_last_extension(SSL *ssl)
regress/lib/libssl/tlsext/tlsexttest.c
4557
if (ssl->tlsext_build_order_len == 0) {
regress/lib/libssl/tlsext/tlsexttest.c
456
if (!client_funcs->process(ssl, SSL_TLSEXT_MSG_SH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
4562
ext = ssl->tlsext_build_order[ssl->tlsext_build_order_len - 1];
regress/lib/libssl/tlsext/tlsexttest.c
4572
test_tlsext_randomized_extensions(SSL *ssl)
regress/lib/libssl/tlsext/tlsexttest.c
4578
if (!tlsext_randomize_build_order(ssl))
regress/lib/libssl/tlsext/tlsexttest.c
4580
failed |= test_tlsext_check_psk_is_last_extension(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4590
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
4597
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
4600
failure |= test_tlsext_randomized_extensions(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4603
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4607
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
4610
failure |= test_tlsext_randomized_extensions(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
4613
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
465
if (ssl->s3->alpn_selected_len !=
regress/lib/libssl/tlsext/tlsexttest.c
470
compare_data(ssl->s3->alpn_selected,
regress/lib/libssl/tlsext/tlsexttest.c
471
ssl->s3->alpn_selected_len,
regress/lib/libssl/tlsext/tlsexttest.c
476
if (memcmp(ssl->s3->alpn_selected,
regress/lib/libssl/tlsext/tlsexttest.c
480
compare_data(ssl->s3->alpn_selected,
regress/lib/libssl/tlsext/tlsexttest.c
481
ssl->s3->alpn_selected_len,
regress/lib/libssl/tlsext/tlsexttest.c
495
free(ssl->s3->alpn_selected);
regress/lib/libssl/tlsext/tlsexttest.c
496
ssl->s3->alpn_selected = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
497
ssl->s3->alpn_selected_len = 0;
regress/lib/libssl/tlsext/tlsexttest.c
499
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
509
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
554
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
569
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
579
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
588
if (!SSL_set_cipher_list(ssl, "TLSv1.2:!ECDHE:!ECDSA")) {
regress/lib/libssl/tlsext/tlsexttest.c
592
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
600
if (!SSL_set_cipher_list(ssl, "TLSv1.2+AEAD+ECDHE")) {
regress/lib/libssl/tlsext/tlsexttest.c
604
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
612
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
615
if ((ssl->session->tlsext_supportedgroups = malloc(sizeof(uint16_t)))
regress/lib/libssl/tlsext/tlsexttest.c
621
&ssl->session->tlsext_supportedgroups[0]))
regress/lib/libssl/tlsext/tlsexttest.c
623
ssl->session->tlsext_supportedgroups_length = 1;
regress/lib/libssl/tlsext/tlsexttest.c
625
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
630
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
663
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
664
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
669
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
678
if (ssl->session->tlsext_supportedgroups_length !=
regress/lib/libssl/tlsext/tlsexttest.c
685
if (memcmp(ssl->session->tlsext_supportedgroups,
regress/lib/libssl/tlsext/tlsexttest.c
690
compare_data2(ssl->session->tlsext_supportedgroups,
regress/lib/libssl/tlsext/tlsexttest.c
691
ssl->session->tlsext_supportedgroups_length * 2,
regress/lib/libssl/tlsext/tlsexttest.c
704
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
705
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
708
if ((ssl->tlsext_supportedgroups = malloc(sizeof(uint16_t) * 2)) == NULL) {
regress/lib/libssl/tlsext/tlsexttest.c
713
&ssl->tlsext_supportedgroups[0]))
regress/lib/libssl/tlsext/tlsexttest.c
716
&ssl->tlsext_supportedgroups[1]))
regress/lib/libssl/tlsext/tlsexttest.c
718
ssl->tlsext_supportedgroups_length = 2;
regress/lib/libssl/tlsext/tlsexttest.c
720
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
725
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
764
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
765
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
769
free(ssl->tlsext_supportedgroups);
regress/lib/libssl/tlsext/tlsexttest.c
770
ssl->tlsext_supportedgroups = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
771
ssl->tlsext_supportedgroups_length = 0;
regress/lib/libssl/tlsext/tlsexttest.c
775
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlsext/tlsexttest.c
784
if (ssl->session->tlsext_supportedgroups_length !=
regress/lib/libssl/tlsext/tlsexttest.c
790
if (memcmp(ssl->session->tlsext_supportedgroups,
regress/lib/libssl/tlsext/tlsexttest.c
794
compare_data2(ssl->session->tlsext_supportedgroups,
regress/lib/libssl/tlsext/tlsexttest.c
795
ssl->session->tlsext_supportedgroups_length * 2,
regress/lib/libssl/tlsext/tlsexttest.c
806
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
818
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
827
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
834
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
839
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
842
if (server_funcs->needs(ssl, SSL_TLSEXT_MSG_SH)) {
regress/lib/libssl/tlsext/tlsexttest.c
851
SSL_free(ssl);
regress/lib/libssl/tlsext/tlsexttest.c
894
SSL *ssl = NULL;
regress/lib/libssl/tlsext/tlsexttest.c
909
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
919
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
928
if (!SSL_set_cipher_list(ssl, "ALL:!ECDHE:!ECDH")) {
regress/lib/libssl/tlsext/tlsexttest.c
932
if (client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
940
if (!SSL_set_cipher_list(ssl, "TLSv1.2+AEAD+ECDHE")) {
regress/lib/libssl/tlsext/tlsexttest.c
944
if (!client_funcs->needs(ssl, SSL_TLSEXT_MSG_CH)) {
regress/lib/libssl/tlsext/tlsexttest.c
952
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
955
if (!client_funcs->build(ssl, SSL_TLSEXT_MSG_CH, &cbb)) {
regress/lib/libssl/tlsext/tlsexttest.c
988
SSL_SESSION_free(ssl->session);
regress/lib/libssl/tlsext/tlsexttest.c
989
if ((ssl->session = SSL_SESSION_new()) == NULL)
regress/lib/libssl/tlsext/tlsexttest.c
994
if (!server_funcs->process(ssl, SSL_TLSEXT_MSG_CH, &cbs, &alert)) {
regress/lib/libssl/tlslegacy/tlslegacytest.c
563
SSL *ssl = NULL;
regress/lib/libssl/tlslegacy/tlslegacytest.c
583
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/tlslegacy/tlslegacytest.c
590
SSL_set_bio(ssl, rbio, wbio);
regress/lib/libssl/tlslegacy/tlslegacytest.c
592
if (SSL_connect(ssl) == 1) {
regress/lib/libssl/tlslegacy/tlslegacytest.c
597
if (SSL_state(ssl) != tct->want_state) {
regress/lib/libssl/tlslegacy/tlslegacytest.c
599
SSL_state(ssl), tct->want_state);
regress/lib/libssl/tlslegacy/tlslegacytest.c
607
SSL_free(ssl);
regress/lib/libssl/unit/ssl_get_shared_ciphers.c
295
push_data_to_peer(SSL *ssl, int *ret, int (*func)(SSL *), const char *func_name,
regress/lib/libssl/unit/ssl_get_shared_ciphers.c
309
if ((*ret = func(ssl)) <= 0)
regress/lib/libssl/unit/ssl_get_shared_ciphers.c
310
ssl_err = SSL_get_error(ssl, *ret);
regress/lib/libssl/unit/ssl_methods.c
192
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_methods.c
200
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/unit/ssl_methods.c
205
if (SSL_is_server(ssl) != testcase->server) {
regress/lib/libssl/unit/ssl_methods.c
207
testcase->name, testcase->server, SSL_is_server(ssl));
regress/lib/libssl/unit/ssl_methods.c
214
SSL_free(ssl);
regress/lib/libssl/unit/ssl_methods.c
224
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_methods.c
232
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/unit/ssl_methods.c
237
if (SSL_is_dtls(ssl) != testcase->dtls) {
regress/lib/libssl/unit/ssl_methods.c
239
testcase->name, testcase->dtls, SSL_is_dtls(ssl));
regress/lib/libssl/unit/ssl_methods.c
246
SSL_free(ssl);
regress/lib/libssl/unit/ssl_set_alpn_protos.c
117
SSL *ssl;
regress/lib/libssl/unit/ssl_set_alpn_protos.c
131
if ((ssl = SSL_new(ctx)) == NULL)
regress/lib/libssl/unit/ssl_set_alpn_protos.c
134
ret = SSL_set_alpn_protos(ssl, tc->protocols, tc->protocols_len);
regress/lib/libssl/unit/ssl_set_alpn_protos.c
142
SSL_free(ssl);
regress/lib/libssl/unit/ssl_set_alpn_protos.c
151
SSL *ssl;
regress/lib/libssl/unit/ssl_set_alpn_protos.c
178
if ((ssl = SSL_new(ctx)) == NULL)
regress/lib/libssl/unit/ssl_set_alpn_protos.c
181
if (SSL_set_alpn_protos(ssl, valid, sizeof(valid)) != 0) {
regress/lib/libssl/unit/ssl_set_alpn_protos.c
185
if (SSL_set_alpn_protos(ssl, NULL, 0) != 0) {
regress/lib/libssl/unit/ssl_set_alpn_protos.c
189
if (SSL_set_alpn_protos(ssl, valid, 0) != 0) {
regress/lib/libssl/unit/ssl_set_alpn_protos.c
193
if (SSL_set_alpn_protos(ssl, NULL, 43) != 0) {
regress/lib/libssl/unit/ssl_set_alpn_protos.c
199
SSL_free(ssl);
regress/lib/libssl/unit/ssl_verify_param.c
30
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_verify_param.c
59
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/unit/ssl_verify_param.c
62
if ((param = SSL_get0_param(ssl)) == NULL) {
regress/lib/libssl/unit/ssl_verify_param.c
73
SSL_set_hostflags(ssl, defaultflags);
regress/lib/libssl/unit/ssl_verify_param.c
85
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
192
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_versions.c
202
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/unit/ssl_versions.c
212
SSL_clear_options(ssl, SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 |
regress/lib/libssl/unit/ssl_versions.c
214
SSL_set_options(ssl, vrt->options);
regress/lib/libssl/unit/ssl_versions.c
217
ssl->min_tls_version = vrt->minver;
regress/lib/libssl/unit/ssl_versions.c
218
ssl->max_tls_version = vrt->maxver;
regress/lib/libssl/unit/ssl_versions.c
220
if (ssl_enabled_tls_version_range(ssl, &minver, &maxver) != 1) {
regress/lib/libssl/unit/ssl_versions.c
242
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
491
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_versions.c
508
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/unit/ssl_versions.c
514
SSL_clear_options(ssl, SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 |
regress/lib/libssl/unit/ssl_versions.c
516
SSL_set_options(ssl, svt->options);
regress/lib/libssl/unit/ssl_versions.c
519
ssl->min_tls_version = svt->minver;
regress/lib/libssl/unit/ssl_versions.c
520
ssl->max_tls_version = svt->maxver;
regress/lib/libssl/unit/ssl_versions.c
522
if (!ssl_max_shared_version(ssl, svt->peerver, &maxver)) {
regress/lib/libssl/unit/ssl_versions.c
530
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
532
ssl = NULL;
regress/lib/libssl/unit/ssl_versions.c
543
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
545
ssl = NULL;
regress/lib/libssl/unit/ssl_versions.c
550
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
768
SSL *ssl = NULL;
regress/lib/libssl/unit/ssl_versions.c
829
if ((ssl = SSL_new(ssl_ctx)) == NULL) {
regress/lib/libssl/unit/ssl_versions.c
834
if (SSL_get_min_proto_version(ssl) != mmvt->want_minver) {
regress/lib/libssl/unit/ssl_versions.c
837
SSL_get_min_proto_version(ssl), mmvt->want_minver);
regress/lib/libssl/unit/ssl_versions.c
841
if (SSL_get_max_proto_version(ssl) != mmvt->want_maxver) {
regress/lib/libssl/unit/ssl_versions.c
844
SSL_get_max_proto_version(ssl), mmvt->want_maxver);
regress/lib/libssl/unit/ssl_versions.c
849
if (!SSL_set_min_proto_version(ssl, mmvt->minver)) {
regress/lib/libssl/unit/ssl_versions.c
857
if (!SSL_set_max_proto_version(ssl, mmvt->maxver)) {
regress/lib/libssl/unit/ssl_versions.c
879
if (SSL_get_min_proto_version(ssl) != mmvt->want_minver) {
regress/lib/libssl/unit/ssl_versions.c
882
SSL_get_min_proto_version(ssl), mmvt->want_minver);
regress/lib/libssl/unit/ssl_versions.c
886
if (SSL_get_max_proto_version(ssl) != mmvt->want_maxver) {
regress/lib/libssl/unit/ssl_versions.c
889
SSL_get_max_proto_version(ssl), mmvt->want_maxver);
regress/lib/libssl/unit/ssl_versions.c
896
SSL_free(ssl);
regress/lib/libssl/unit/ssl_versions.c
899
ssl = NULL;
regress/lib/libssl/unit/tls_ext_alpn.c
330
static int dummy_alpn_cb(SSL *ssl, const unsigned char **out,
regress/lib/libssl/unit/tls_ext_alpn.c
406
dummy_alpn_cb(SSL *ssl __attribute__((unused)), const unsigned char **out,
regress/lib/libssl/unit/tls_prf.c
112
SSL *ssl = NULL;
regress/lib/libssl/unit/tls_prf.c
123
if ((ssl = SSL_new(ssl_ctx)) == NULL)
regress/lib/libssl/unit/tls_prf.c
131
ssl->s3->hs.cipher = cipher;
regress/lib/libssl/unit/tls_prf.c
136
if (tls1_PRF(ssl, TLS_PRF_SECRET, sizeof(TLS_PRF_SECRET),
regress/lib/libssl/unit/tls_prf.c
161
SSL_free(ssl);
regress/lib/libssl/verify/verify.c
226
push_data_to_peer(SSL *ssl, int *ret, int (*func)(SSL *), const char *func_name,
regress/lib/libssl/verify/verify.c
240
if ((*ret = func(ssl)) <= 0)
regress/lib/libssl/verify/verify.c
241
ssl_err = SSL_get_error(ssl, *ret);
sbin/unwind/libunbound/daemon/remote.h
116
SSL* ssl;
sbin/unwind/libunbound/daemon/remote.h
317
int ssl_print_text(RES* ssl, const char* text);
sbin/unwind/libunbound/daemon/remote.h
325
int ssl_printf(RES* ssl, const char* format, ...)
sbin/unwind/libunbound/daemon/remote.h
336
int ssl_read_line(RES* ssl, char* buf, size_t max);
sbin/unwind/libunbound/daemon/remote.h
351
void fast_reload_thread_start(RES* ssl, struct worker* worker,
sbin/unwind/libunbound/daemon/remote.h
76
SSL* ssl;
sbin/unwind/libunbound/services/authzone.c
5535
&addr, addrlen, -1, master->ssl, master->host,
sbin/unwind/libunbound/services/authzone.c
7226
parse_url(char* url, char** host, char** file, int* port, int* ssl)
sbin/unwind/libunbound/services/authzone.c
7232
*ssl = 1;
sbin/unwind/libunbound/services/authzone.c
7238
*ssl = 0;
sbin/unwind/libunbound/services/authzone.c
7311
if(!parse_url(p->str, &m->host, &m->file, &m->port, &m->ssl))
sbin/unwind/libunbound/services/authzone.h
461
int ssl;
sbin/unwind/libunbound/services/listen_dnsport.c
1637
cp->ssl = NULL;
sbin/unwind/libunbound/services/listen_dnsport.c
1639
cp->ssl = quic_sslctx;
sbin/unwind/libunbound/services/listen_dnsport.c
1641
cp->ssl = doh_sslctx;
sbin/unwind/libunbound/services/listen_dnsport.c
1643
cp->ssl = dot_sslctx;
sbin/unwind/libunbound/services/listen_dnsport.c
3595
lock_protect(&conn->lock, &conn->ssl, sizeof(conn->ssl));
sbin/unwind/libunbound/services/listen_dnsport.c
3637
SSL_set_app_data(conn->ssl, NULL);
sbin/unwind/libunbound/services/listen_dnsport.c
3642
SSL_free(conn->ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4304
SSL_get_cipher_name(doq_conn->ssl));
sbin/unwind/libunbound/services/listen_dnsport.c
4309
SSL_get0_alpn_selected(doq_conn->ssl, &alpn, &alpnlen);
sbin/unwind/libunbound/services/listen_dnsport.c
4527
doq_set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
sbin/unwind/libunbound/services/listen_dnsport.c
4531
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4576
doq_add_handshake_data(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
sbin/unwind/libunbound/services/listen_dnsport.c
4579
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4609
doq_flush_flight(SSL* ATTR_UNUSED(ssl))
sbin/unwind/libunbound/services/listen_dnsport.c
4616
doq_send_alert(SSL *ssl, enum ssl_encryption_level_t ATTR_UNUSED(level),
sbin/unwind/libunbound/services/listen_dnsport.c
4619
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4627
doq_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
sbin/unwind/libunbound/services/listen_dnsport.c
4756
SSL* ssl = SSL_new(ctx);
sbin/unwind/libunbound/services/listen_dnsport.c
4757
if(!ssl) {
sbin/unwind/libunbound/services/listen_dnsport.c
4765
SSL_free(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4768
ngtcp2_crypto_ossl_ctx_set_ssl(conn->ossl_ctx, ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4769
if(ngtcp2_crypto_ossl_configure_server_session(ssl) != 0) {
sbin/unwind/libunbound/services/listen_dnsport.c
4771
SSL_free(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4778
SSL_set_app_data(ssl, &conn->conn_ref);
sbin/unwind/libunbound/services/listen_dnsport.c
4780
SSL_set_app_data(ssl, conn);
sbin/unwind/libunbound/services/listen_dnsport.c
4782
SSL_set_accept_state(ssl);
sbin/unwind/libunbound/services/listen_dnsport.c
4784
SSL_set_quic_tls_early_data_enabled(ssl, 1);
sbin/unwind/libunbound/services/listen_dnsport.c
4786
SSL_set_quic_early_data_enabled(ssl, 1);
sbin/unwind/libunbound/services/listen_dnsport.c
4788
return ssl;
sbin/unwind/libunbound/services/listen_dnsport.c
4902
conn->ssl = doq_ssl_server_setup((SSL_CTX*)conn->doq_socket->ctx,
sbin/unwind/libunbound/services/listen_dnsport.c
4904
if(!conn->ssl) {
sbin/unwind/libunbound/services/listen_dnsport.c
4911
ngtcp2_conn_set_tls_native_handle(conn->conn, conn->ssl);
sbin/unwind/libunbound/services/listen_dnsport.h
611
void* ssl;
sbin/unwind/libunbound/services/mesh.c
1582
r->query_reply.c->type, r->query_reply.c->ssl);
sbin/unwind/libunbound/services/outside_network.c
1203
if(pend->c->ssl) {
sbin/unwind/libunbound/services/outside_network.c
1205
SSL_shutdown(pend->c->ssl);
sbin/unwind/libunbound/services/outside_network.c
1206
SSL_free(pend->c->ssl);
sbin/unwind/libunbound/services/outside_network.c
1207
pend->c->ssl = NULL;
sbin/unwind/libunbound/services/outside_network.c
3119
&pi->addr, c->type, c->ssl, sq->zone, sq->zonelen, sq->qbuf,
sbin/unwind/libunbound/services/outside_network.c
3333
&p->pc->pif->addr, c->type, c->ssl, sq->zone, sq->zonelen,
sbin/unwind/libunbound/services/outside_network.c
3678
cp->ssl = outgoing_ssl_fd(outnet->sslctx, fd);
sbin/unwind/libunbound/services/outside_network.c
3679
if(!cp->ssl) {
sbin/unwind/libunbound/services/outside_network.c
3684
comm_point_tcp_win_bio_cb(cp, cp->ssl);
sbin/unwind/libunbound/services/outside_network.c
3690
(void)SSL_set_tlsext_host_name(cp->ssl, host);
sbin/unwind/libunbound/services/outside_network.c
3705
if(!SSL_set1_host(cp->ssl, host)) {
sbin/unwind/libunbound/services/outside_network.c
3714
X509_VERIFY_PARAM* param = SSL_get0_param(cp->ssl);
sbin/unwind/libunbound/services/outside_network.c
3733
sldns_buffer* query, int timeout, int ssl, char* host)
sbin/unwind/libunbound/services/outside_network.c
3737
outnet->ip_dscp, ssl);
sbin/unwind/libunbound/services/outside_network.c
3756
if(ssl) {
sbin/unwind/libunbound/services/outside_network.c
3808
int ssl, char* host, char* path, struct config_file* cfg)
sbin/unwind/libunbound/services/outside_network.c
3813
outnet->ip_dscp, ssl);
sbin/unwind/libunbound/services/outside_network.c
3833
if(ssl) {
sbin/unwind/libunbound/services/outside_network.c
737
pend->c->ssl = outgoing_ssl_fd(w->outnet->sslctx, s);
sbin/unwind/libunbound/services/outside_network.c
738
if(!pend->c->ssl) {
sbin/unwind/libunbound/services/outside_network.c
746
comm_point_tcp_win_bio_cb(pend->c, pend->c->ssl);
sbin/unwind/libunbound/services/outside_network.c
749
if(!set_auth_name_on_ssl(pend->c->ssl, w->tls_auth_name,
sbin/unwind/libunbound/services/outside_network.c
753
SSL_free(pend->c->ssl);
sbin/unwind/libunbound/services/outside_network.c
755
pend->c->ssl = NULL;
sbin/unwind/libunbound/services/outside_network.c
781
if(pend->c->ssl)
sbin/unwind/libunbound/services/outside_network.h
787
struct sldns_buffer* query, int timeout, int ssl, char* host);
sbin/unwind/libunbound/services/outside_network.h
810
int ssl, char* host, char* path, struct config_file* cfg);
sbin/unwind/libunbound/util/data/msgparse.c
1030
!c || c->type != comm_tcp ||!c->ssl)
sbin/unwind/libunbound/util/data/msgreply.c
1003
if(tp == comm_tcp) comm = (ssl?"dot":"tcp");
sbin/unwind/libunbound/util/data/msgreply.c
1004
else if(tp == comm_tcp_accept) comm = (ssl?"dot":"tcp");
sbin/unwind/libunbound/util/data/msgreply.c
968
enum comm_point_type tp, void* ssl)
sbin/unwind/libunbound/util/data/msgreply.h
563
enum comm_point_type tp, void* ssl);
sbin/unwind/libunbound/util/net_help.c
1176
dot_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
sbin/unwind/libunbound/util/net_help.c
1196
static int doh_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
sbin/unwind/libunbound/util/net_help.c
1634
SSL* ssl = SSL_new((SSL_CTX*)sslctx);
sbin/unwind/libunbound/util/net_help.c
1635
if(!ssl) {
sbin/unwind/libunbound/util/net_help.c
1639
SSL_set_accept_state(ssl);
sbin/unwind/libunbound/util/net_help.c
1640
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
sbin/unwind/libunbound/util/net_help.c
1641
if(!SSL_set_fd(ssl, fd)) {
sbin/unwind/libunbound/util/net_help.c
1643
SSL_free(ssl);
sbin/unwind/libunbound/util/net_help.c
1646
return ssl;
sbin/unwind/libunbound/util/net_help.c
1656
SSL* ssl = SSL_new((SSL_CTX*)sslctx);
sbin/unwind/libunbound/util/net_help.c
1657
if(!ssl) {
sbin/unwind/libunbound/util/net_help.c
1661
SSL_set_connect_state(ssl);
sbin/unwind/libunbound/util/net_help.c
1662
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
sbin/unwind/libunbound/util/net_help.c
1663
if(!SSL_set_fd(ssl, fd)) {
sbin/unwind/libunbound/util/net_help.c
1665
SSL_free(ssl);
sbin/unwind/libunbound/util/net_help.c
1668
return ssl;
sbin/unwind/libunbound/util/net_help.c
1689
int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni)
sbin/unwind/libunbound/util/net_help.c
1694
(void)SSL_set_tlsext_host_name(ssl, auth_name);
sbin/unwind/libunbound/util/net_help.c
1697
(void)ssl;
sbin/unwind/libunbound/util/net_help.c
1701
SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
sbin/unwind/libunbound/util/net_help.c
1705
if(!SSL_set1_host(ssl, auth_name)) {
sbin/unwind/libunbound/util/net_help.c
1713
X509_VERIFY_PARAM* param = SSL_get0_param(ssl);
sbin/unwind/libunbound/util/net_help.c
1721
SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
sbin/unwind/libunbound/util/net_help.h
550
int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni);
sbin/unwind/libunbound/util/netevent.c
3116
SSL* ssl = (SSL*)thessl;
sbin/unwind/libunbound/util/netevent.c
3119
BIO_set_callback_ex(SSL_get_rbio(ssl), &win_bio_cb);
sbin/unwind/libunbound/util/netevent.c
3121
BIO_set_callback(SSL_get_rbio(ssl), &win_bio_cb);
sbin/unwind/libunbound/util/netevent.c
3123
BIO_set_callback_arg(SSL_get_rbio(ssl), (char*)c->ev->ev);
sbin/unwind/libunbound/util/netevent.c
3125
BIO_set_callback_ex(SSL_get_wbio(ssl), &win_bio_cb);
sbin/unwind/libunbound/util/netevent.c
3127
BIO_set_callback(SSL_get_wbio(ssl), &win_bio_cb);
sbin/unwind/libunbound/util/netevent.c
3129
BIO_set_callback_arg(SSL_get_wbio(ssl), (char*)c->ev->ev);
sbin/unwind/libunbound/util/netevent.c
3247
if(!c->ssl) {
sbin/unwind/libunbound/util/netevent.c
3285
if(c->ssl) {
sbin/unwind/libunbound/util/netevent.c
3286
c_hdl->ssl = incoming_ssl_fd(c->ssl, new_fd);
sbin/unwind/libunbound/util/netevent.c
3287
if(!c_hdl->ssl) {
sbin/unwind/libunbound/util/netevent.c
3294
comm_point_tcp_win_bio_cb(c_hdl, c_hdl->ssl);
sbin/unwind/libunbound/util/netevent.c
3319
if(c->ssl) {
sbin/unwind/libunbound/util/netevent.c
3321
SSL_shutdown(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3322
SSL_free(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3323
c->ssl = NULL;
sbin/unwind/libunbound/util/netevent.c
3447
r = SSL_do_handshake(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3449
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3490
if((vr=SSL_get_verify_result(c->ssl)) != 0)
sbin/unwind/libunbound/util/netevent.c
3502
if((SSL_get_verify_mode(c->ssl)&SSL_VERIFY_PEER)) {
sbin/unwind/libunbound/util/netevent.c
3504
if(SSL_get_verify_result(c->ssl) == X509_V_OK) {
sbin/unwind/libunbound/util/netevent.c
3506
X509* x = SSL_get1_peer_certificate(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3508
X509* x = SSL_get_peer_certificate(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3519
if(SSL_get0_peername(c->ssl)) {
sbin/unwind/libunbound/util/netevent.c
3523
SSL_get0_peername(c->ssl));
sbin/unwind/libunbound/util/netevent.c
3537
X509* x = SSL_get1_peer_certificate(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3539
X509* x = SSL_get_peer_certificate(c->ssl);
sbin/unwind/libunbound/util/netevent.c
3563
SSL_get0_alpn_selected(c->ssl, &alpn, &alpnlen);
sbin/unwind/libunbound/util/netevent.c
3618
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(
sbin/unwind/libunbound/util/netevent.c
3622
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3686
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(
sbin/unwind/libunbound/util/netevent.c
3690
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3748
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(c->buffer,
sbin/unwind/libunbound/util/netevent.c
3751
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3798
r = SSL_read(c->ssl, (void*)sldns_buffer_current(c->buffer),
sbin/unwind/libunbound/util/netevent.c
3801
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3853
(void)SSL_set_mode(c->ssl, (long)SSL_MODE_ENABLE_PARTIAL_WRITE);
sbin/unwind/libunbound/util/netevent.c
3866
r = SSL_write(c->ssl,
sbin/unwind/libunbound/util/netevent.c
3871
r = SSL_write(c->ssl,
sbin/unwind/libunbound/util/netevent.c
3884
r = SSL_write(c->ssl, (void*)(buf+c->tcp_byte_count),
sbin/unwind/libunbound/util/netevent.c
3889
r = SSL_write(c->ssl,
sbin/unwind/libunbound/util/netevent.c
3894
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
3939
r = SSL_write(c->ssl, (void*)(c->tcp_write_pkt + c->tcp_write_byte_count - 2),
sbin/unwind/libunbound/util/netevent.c
3942
r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer),
sbin/unwind/libunbound/util/netevent.c
3946
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
4017
if(c->ssl)
sbin/unwind/libunbound/util/netevent.c
4268
if(c->tcp_is_reading && !c->ssl && !c->tcp_write_and_read)
sbin/unwind/libunbound/util/netevent.c
4313
if(c->ssl)
sbin/unwind/libunbound/util/netevent.c
4712
if(c->ssl) {
sbin/unwind/libunbound/util/netevent.c
4714
SSL_shutdown(c->ssl);
sbin/unwind/libunbound/util/netevent.c
4715
SSL_free(c->ssl);
sbin/unwind/libunbound/util/netevent.c
4716
c->ssl = NULL;
sbin/unwind/libunbound/util/netevent.c
4743
r = SSL_read(c->ssl, (void*)sldns_buffer_current(c->buffer),
sbin/unwind/libunbound/util/netevent.c
4746
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
4968
remainbufferlen >= (size_t)(c->ssl?16384:2048)) {
sbin/unwind/libunbound/util/netevent.c
5175
if(h2_session->c->ssl) {
sbin/unwind/libunbound/util/netevent.c
5178
r = SSL_read(h2_session->c->ssl, buf, len);
sbin/unwind/libunbound/util/netevent.c
5180
int want = SSL_get_error(h2_session->c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
5289
if(c->ssl && c->ssl_shake_state != comm_ssl_shake_none) {
sbin/unwind/libunbound/util/netevent.c
5312
if(c->ssl) {
sbin/unwind/libunbound/util/netevent.c
5432
r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer),
sbin/unwind/libunbound/util/netevent.c
5435
int want = SSL_get_error(c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
5503
if(h2_session->c->ssl) {
sbin/unwind/libunbound/util/netevent.c
5506
r = SSL_write(h2_session->c->ssl, buf, len);
sbin/unwind/libunbound/util/netevent.c
5508
int want = SSL_get_error(h2_session->c->ssl, r);
sbin/unwind/libunbound/util/netevent.c
5625
if(c->ssl && c->ssl_shake_state != comm_ssl_shake_none) {
sbin/unwind/libunbound/util/netevent.c
5647
if(c->ssl) {
sbin/unwind/libunbound/util/netevent.c
6417
SSL_free(c->ssl);
sbin/unwind/libunbound/util/netevent.c
6608
if((c->type == comm_tcp || c->type == comm_http) && c->ssl) {
sbin/unwind/libunbound/util/netevent.c
6610
SSL_shutdown(c->ssl);
sbin/unwind/libunbound/util/netevent.c
6611
SSL_free(c->ssl);
sbin/unwind/libunbound/util/netevent.c
6654
enum comm_point_type type, void* ssl, sldns_buffer* buffer)
sbin/unwind/libunbound/util/netevent.c
6659
(struct sockaddr_storage*)addr, type, ssl, buffer);
sbin/unwind/libunbound/util/netevent.c
6695
repinfo->c->type, repinfo->c->ssl,
sbin/unwind/libunbound/util/netevent.c
6723
repinfo->c->type, repinfo->c->ssl,
sbin/unwind/libunbound/util/netevent.h
1187
void comm_point_tcp_win_bio_cb(struct comm_point* c, void* ssl);
sbin/unwind/libunbound/util/netevent.h
246
void* ssl;
usr.bin/openssl/apps.h
392
size_t len, SSL *ssl, void *arg);
usr.bin/openssl/apps.h
396
int generate_cookie_callback(SSL *ssl, unsigned char *cookie,
usr.bin/openssl/apps.h
398
int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
usr.bin/openssl/ciphers.c
137
if ((ssl = SSL_new(ssl_ctx)) == NULL)
usr.bin/openssl/ciphers.c
142
SSL_get1_supported_ciphers(ssl)) == NULL)
usr.bin/openssl/ciphers.c
146
if ((ciphers = SSL_get_ciphers(ssl)) == NULL)
usr.bin/openssl/ciphers.c
182
SSL_free(ssl);
usr.bin/openssl/ciphers.c
97
SSL *ssl = NULL;
usr.bin/openssl/s_cb.c
358
msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL * ssl, void *arg)
usr.bin/openssl/s_cb.c
793
generate_cookie_callback(SSL * ssl, unsigned char *cookie,
usr.bin/openssl/s_cb.c
810
(void) BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
usr.bin/openssl/s_cb.c
861
verify_cookie_callback(SSL * ssl, const unsigned char *cookie,
usr.bin/openssl/s_cb.c
877
(void) BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
usr.bin/openssl/s_server.c
187
static int generate_session_id(const SSL *ssl, unsigned char *id,
usr.bin/openssl/s_server.c
2204
generate_session_id(const SSL *ssl, unsigned char *id, unsigned int *id_len)
usr.bin/openssl/s_server.c
2220
while (SSL_has_matching_session_id(ssl, id, *id_len) &&
usr.bin/sort/radixsort.c
117
struct sort_level *ssl;
usr.bin/sort/radixsort.c
119
ssl = sl->sublevels[indx];
usr.bin/sort/radixsort.c
121
if (ssl == NULL) {
usr.bin/sort/radixsort.c
122
ssl = sort_calloc(1, sizeof(struct sort_level));
usr.bin/sort/radixsort.c
123
ssl->level = sl->level + 1;
usr.bin/sort/radixsort.c
124
sl->sublevels[indx] = ssl;
usr.bin/sort/radixsort.c
129
if (++(ssl->tosort_num) > ssl->tosort_sz) {
usr.bin/sort/radixsort.c
130
ssl->tosort_sz = ssl->tosort_num + 128;
usr.bin/sort/radixsort.c
131
ssl->tosort = sort_reallocarray(ssl->tosort, ssl->tosort_sz,
usr.bin/sort/radixsort.c
135
ssl->tosort[ssl->tosort_num - 1] = item;
usr.sbin/ldapd/ldapd.h
207
struct ssl *ssl;
usr.sbin/ldapd/ldapd.h
235
SPLAY_ENTRY(ssl) ssl_nodes;
usr.sbin/ldapd/ldapd.h
249
SPLAY_HEAD(ssltree, ssl) *sc_ssl;
usr.sbin/ldapd/ldapd.h
459
int ssl_cmp(struct ssl *, struct ssl *);
usr.sbin/ldapd/ldapd.h
460
SPLAY_PROTOTYPE(ssltree, ssl, ssl_nodes, ssl_cmp);
usr.sbin/ldapd/ldape.c
350
struct ssl key;
usr.sbin/ldapd/ldape.c
432
l->ssl = SPLAY_FIND(ssltree, conf->sc_ssl, &key);
usr.sbin/ldapd/ldape.c
433
if (l->ssl == NULL)
usr.sbin/ldapd/ldape.c
440
if (tls_configure(l->tls, l->ssl->config)) {
usr.sbin/ldapd/parse.y
101
SPLAY_GENERATE(ssltree, ssl, ssl_nodes, ssl_cmp);
usr.sbin/ldapd/parse.y
1047
h->ssl = NULL;
usr.sbin/ldapd/parse.y
1092
h->ssl = NULL;
usr.sbin/ldapd/parse.y
1135
h->ssl = NULL;
usr.sbin/ldapd/parse.y
1156
h->ssl = NULL;
usr.sbin/ldapd/parse.y
1228
ssl_cmp(struct ssl *s1, struct ssl *s2)
usr.sbin/ldapd/parse.y
1237
struct ssl *s;
usr.sbin/ldapd/parse.y
1238
struct ssl key;
usr.sbin/ldapd/parse.y
126
%type <v.number> port ssl boolean comp_level legacy protocol
usr.sbin/ldapd/parse.y
156
ssl : legacy protocol { $$ = $1 | $2; }
usr.sbin/ldapd/parse.y
187
conf_main : LISTEN ON STRING port ssl certname {
usr.sbin/lpd/io.c
124
char ssl[128];
usr.sbin/lpd/io.c
126
ssl[0] = '\0';
usr.sbin/lpd/io.c
129
(void)snprintf(ssl, sizeof ssl, " ssl=%s:%s:%d",
usr.sbin/lpd/io.c
138
io_strflags(io->flags), ssl, io_datalen(io), io_queued(io));
usr.sbin/lpd/io.c
345
io_starttls(struct io *io, void *ssl)
usr.sbin/lpd/io.c
356
io->tls = ssl;
usr.sbin/lpd/iobuf.c
394
iobuf_flush_ssl(struct iobuf *io, void *ssl)
usr.sbin/lpd/iobuf.c
399
if ((s = iobuf_write_ssl(io, ssl)) < 0)
usr.sbin/lpd/iobuf.c
406
iobuf_write_ssl(struct iobuf *io, void *ssl)
usr.sbin/lpd/iobuf.c
413
n = SSL_write(ssl, q->buf + q->rpos, q->wpos - q->rpos);
usr.sbin/lpd/iobuf.c
415
switch ((r = SSL_get_error(ssl, n))) {
usr.sbin/lpd/iobuf.c
438
iobuf_read_ssl(struct iobuf *io, void *ssl)
usr.sbin/lpd/iobuf.c
443
n = SSL_read(ssl, io->buf + io->wpos, iobuf_left(io));
usr.sbin/lpd/iobuf.c
445
switch ((r = SSL_get_error(ssl, n))) {
usr.sbin/nsd/dnstap/dnstap.c
144
SSL* ssl;
usr.sbin/nsd/dnstap/dnstap.c
262
if(dtw->ssl)
usr.sbin/nsd/dnstap/dnstap.c
263
SSL_shutdown(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
264
SSL_free(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
265
dtw->ssl = NULL;
usr.sbin/nsd/dnstap/dnstap.c
361
dtw->ssl = SSL_new(dtw->ctx);
usr.sbin/nsd/dnstap/dnstap.c
362
if(!dtw->ssl) {
usr.sbin/nsd/dnstap/dnstap.c
366
SSL_set_connect_state(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
367
(void)SSL_set_mode(dtw->ssl, SSL_MODE_AUTO_RETRY);
usr.sbin/nsd/dnstap/dnstap.c
368
if(!SSL_set_fd(dtw->ssl, dtw->fd)) {
usr.sbin/nsd/dnstap/dnstap.c
373
if(!SSL_set1_host(dtw->ssl, dtw->tls_server_name)) {
usr.sbin/nsd/dnstap/dnstap.c
384
if( (r=SSL_do_handshake(dtw->ssl)) == 1)
usr.sbin/nsd/dnstap/dnstap.c
386
r = SSL_get_error(dtw->ssl, r);
usr.sbin/nsd/dnstap/dnstap.c
403
if(SSL_get_verify_result(dtw->ssl) != X509_V_OK) {
usr.sbin/nsd/dnstap/dnstap.c
408
x = SSL_get1_peer_certificate(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
410
x = SSL_get_peer_certificate(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
428
if(dtw->ssl)
usr.sbin/nsd/dnstap/dnstap.c
429
SSL_shutdown(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
430
SSL_free(dtw->ssl);
usr.sbin/nsd/dnstap/dnstap.c
431
dtw->ssl = NULL;
usr.sbin/nsd/dnstap/dnstap.c
453
if((r = SSL_read(dtw->ssl, ((char*)buf)+nread, nbytes-nread)) <= 0) {
usr.sbin/nsd/dnstap/dnstap.c
454
r = SSL_get_error(dtw->ssl, r);
usr.sbin/nsd/dnstap/dnstap.c
487
if(SSL_write(dtw->ssl, iov[i].iov_base, (int)(iov[i].iov_len)) <= 0) {
usr.sbin/nsd/nsd-control.c
377
SSL* ssl;
usr.sbin/nsd/nsd-control.c
382
ssl = SSL_new(ctx);
usr.sbin/nsd/nsd-control.c
383
if(!ssl)
usr.sbin/nsd/nsd-control.c
385
SSL_set_connect_state(ssl);
usr.sbin/nsd/nsd-control.c
386
(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
usr.sbin/nsd/nsd-control.c
387
if(!SSL_set_fd(ssl, fd))
usr.sbin/nsd/nsd-control.c
391
if( (r=SSL_do_handshake(ssl)) == 1)
usr.sbin/nsd/nsd-control.c
393
r = SSL_get_error(ssl, r);
usr.sbin/nsd/nsd-control.c
400
if(SSL_get_verify_result(ssl) != X509_V_OK)
usr.sbin/nsd/nsd-control.c
403
x = SSL_get1_peer_certificate(ssl);
usr.sbin/nsd/nsd-control.c
405
x = SSL_get_peer_certificate(ssl);
usr.sbin/nsd/nsd-control.c
410
return ssl;
usr.sbin/nsd/nsd-control.c
416
remote_read(SSL* ssl, int fd, char* buf, size_t len)
usr.sbin/nsd/nsd-control.c
418
if(ssl) {
usr.sbin/nsd/nsd-control.c
422
if((r = SSL_read(ssl, buf, (int)len-1)) <= 0) {
usr.sbin/nsd/nsd-control.c
423
if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/nsd/nsd-control.c
449
remote_write(SSL* ssl, int fd, const char* buf, size_t len)
usr.sbin/nsd/nsd-control.c
451
if(ssl) {
usr.sbin/nsd/nsd-control.c
453
if(SSL_write(ssl, buf, (int)len) <= 0)
usr.sbin/nsd/nsd-control.c
467
send_file(SSL* ssl, int fd, FILE* in, char* buf, size_t sz)
usr.sbin/nsd/nsd-control.c
471
remote_write(ssl, fd, buf, strlen(buf));
usr.sbin/nsd/nsd-control.c
474
remote_write(ssl, fd, e, sizeof(e));
usr.sbin/nsd/nsd-control.c
479
go_cmd(SSL* ssl, int fd, int argc, char* argv[])
usr.sbin/nsd/nsd-control.c
488
remote_write(ssl, fd, pre, strlen(pre));
usr.sbin/nsd/nsd-control.c
490
remote_write(ssl, fd, space, strlen(space));
usr.sbin/nsd/nsd-control.c
491
remote_write(ssl, fd, argv[i], strlen(argv[i]));
usr.sbin/nsd/nsd-control.c
493
remote_write(ssl, fd, newline, strlen(newline));
usr.sbin/nsd/nsd-control.c
498
send_file(ssl, fd, stdin, buf, sizeof(buf));
usr.sbin/nsd/nsd-control.c
502
if(remote_read(ssl, fd, buf, sizeof(buf)) == 0) {
usr.sbin/nsd/nsd-control.c
522
SSL* ssl = NULL;
usr.sbin/nsd/nsd-control.c
549
ssl = setup_ssl(ctx, fd);
usr.sbin/nsd/nsd-control.c
553
ret = go_cmd(ssl, fd, argc, argv);
usr.sbin/nsd/nsd-control.c
556
if(ssl) SSL_free(ssl);
usr.sbin/nsd/options.h
599
int acl_tls_hostname_matches(SSL* ssl, const char* acl_cert_cn);
usr.sbin/nsd/remote.c
1005
send_ok(ssl);
usr.sbin/nsd/remote.c
1007
(void)ssl_printf(ssl, "error zone not secondary\n");
usr.sbin/nsd/remote.c
1013
(void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count);
usr.sbin/nsd/remote.c
1018
print_soa_status(RES* ssl, const char* str, xfrd_soa_type* soa, time_t acq)
usr.sbin/nsd/remote.c
1021
if(!ssl_printf(ssl, " %s: \"%u since %s\"\n", str,
usr.sbin/nsd/remote.c
1025
if(!ssl_printf(ssl, " %s: none\n", str))
usr.sbin/nsd/remote.c
1033
print_zonestatus(RES* ssl, xfrd_state_type* xfrd, struct zone_options* zo)
usr.sbin/nsd/remote.c
1039
if(!ssl_printf(ssl, "zone: %s\n", zo->name))
usr.sbin/nsd/remote.c
1042
if(!ssl_printf(ssl, " pattern: %s\n", zo->pattern->pname))
usr.sbin/nsd/remote.c
1054
if(!ssl_printf(ssl, " catalog: consumer"))
usr.sbin/nsd/remote.c
1062
if(!ssl_printf(ssl, " (serial: %u, # members: %zu)\n",
usr.sbin/nsd/remote.c
1068
} else if(!ssl_printf(ssl, "\n"))
usr.sbin/nsd/remote.c
1071
if(!ssl_printf(ssl, " catalog-invalid: %s\n",
usr.sbin/nsd/remote.c
1081
if(!ssl_printf(ssl, " catalog: producer"))
usr.sbin/nsd/remote.c
1084
if(!ssl_printf(ssl, " (serial: %u, # members: %zu)\n",
usr.sbin/nsd/remote.c
1088
} else if(!ssl_printf(ssl, "\n"))
usr.sbin/nsd/remote.c
1091
if(!ssl_printf(ssl, " catalog-invalid: a catalog "
usr.sbin/nsd/remote.c
1097
if(!ssl_printf(ssl, " catalog-member-id: %s\n",
usr.sbin/nsd/remote.c
1105
if(!ssl_printf(ssl, " notify: \"waiting-for-fd\"\n"))
usr.sbin/nsd/remote.c
1109
if(!ssl_printf(ssl, " notify: \"send"))
usr.sbin/nsd/remote.c
1113
if(!ssl_printf(ssl, " %s",
usr.sbin/nsd/remote.c
1117
if(!ssl_printf(ssl, " with serial %u\"\n",
usr.sbin/nsd/remote.c
1123
if(!ssl_printf(ssl, " state: primary\n"))
usr.sbin/nsd/remote.c
1127
if(!ssl_printf(ssl, " state: %s\n",
usr.sbin/nsd/remote.c
1136
if(!print_soa_status(ssl, "served-serial", &xz->soa_nsd,
usr.sbin/nsd/remote.c
1139
if(!print_soa_status(ssl, "commit-serial", &xz->soa_disk,
usr.sbin/nsd/remote.c
1143
if(!print_soa_status(ssl, "notified-serial", &xz->soa_notified,
usr.sbin/nsd/remote.c
1147
if(!ssl_printf(ssl, "\twait: \"%lu sec between attempts\"\n",
usr.sbin/nsd/remote.c
1154
if(!ssl_printf(ssl, " transfer: \"waiting-for-UDP-fd\"\n"))
usr.sbin/nsd/remote.c
1157
if(!ssl_printf(ssl, " transfer: \"sent UDP to %s\"\n",
usr.sbin/nsd/remote.c
1164
if(!ssl_printf(ssl, " transfer: \"waiting-for-TCP-fd\"\n"))
usr.sbin/nsd/remote.c
1167
if(!ssl_printf(ssl, " transfer: \"TCP connected to %s\"\n",
usr.sbin/nsd/remote.c
1177
do_zonestatus(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1180
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.c
1182
if(zo) (void)print_zonestatus(ssl, xfrd, zo);
usr.sbin/nsd/remote.c
1186
if(!print_zonestatus(ssl, xfrd, zo))
usr.sbin/nsd/remote.c
1194
do_verbosity(RES* ssl, char* str)
usr.sbin/nsd/remote.c
1198
(void)ssl_printf(ssl, "verbosity %d\n", verbosity);
usr.sbin/nsd/remote.c
1202
(void)ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
usr.sbin/nsd/remote.c
1209
send_ok(ssl);
usr.sbin/nsd/remote.c
1214
find_arg2(RES* ssl, char* arg, char** arg2)
usr.sbin/nsd/remote.c
1226
(void)ssl_printf(ssl, "error could not find next argument "
usr.sbin/nsd/remote.c
1235
find_arg3(RES* ssl, char* arg, char** arg2, char** arg3)
usr.sbin/nsd/remote.c
1237
if(find_arg2(ssl, arg, arg2)) {
usr.sbin/nsd/remote.c
1256
do_status(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
1258
if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
usr.sbin/nsd/remote.c
1260
if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
usr.sbin/nsd/remote.c
1263
if(!ssl_printf(ssl, "ratelimit: %d\n",
usr.sbin/nsd/remote.c
1273
do_stats(RES* ssl, xfrd_state_type* xfrd, int peek)
usr.sbin/nsd/remote.c
1276
process_stats(ssl, NULL, xfrd, peek);
usr.sbin/nsd/remote.c
1279
(void)ssl_printf(ssl, "error no stats enabled at compile time\n");
usr.sbin/nsd/remote.c
1299
perform_changezone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1304
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/nsd/remote.c
1317
(void)ssl_printf(ssl, "error pattern %s does not exist\n",
usr.sbin/nsd/remote.c
1324
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1331
(void)ssl_printf(ssl, "error zone defined in nsd.conf, "
usr.sbin/nsd/remote.c
1339
(void)ssl_printf(ssl, "Error: Zone is a catalog "
usr.sbin/nsd/remote.c
136
SSL* ssl;
usr.sbin/nsd/remote.c
1368
(void)ssl_printf(ssl, "zone %s did not exist, creating", arg);
usr.sbin/nsd/remote.c
1378
(void)ssl_printf(ssl, "error could not add zonelist entry\n");
usr.sbin/nsd/remote.c
1402
perform_addzone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1407
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/nsd/remote.c
1420
(void)ssl_printf(ssl, "error pattern %s does not exist\n",
usr.sbin/nsd/remote.c
1427
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1435
(void)ssl_printf(ssl, "zone %s already exists\n", arg);
usr.sbin/nsd/remote.c
1446
(void)ssl_printf(ssl, "error could not add zonelist entry\n");
usr.sbin/nsd/remote.c
1470
perform_delzone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1479
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1489
(void)ssl_printf(ssl, "warning zone %s not present\n", arg);
usr.sbin/nsd/remote.c
1497
(void)ssl_printf(ssl, "error zone defined in nsd.conf, "
usr.sbin/nsd/remote.c
1504
(void)ssl_printf(ssl, "Error: Zone is a catalog consumer "
usr.sbin/nsd/remote.c
1539
do_addzone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1541
if(!perform_addzone(ssl, xfrd, arg))
usr.sbin/nsd/remote.c
1543
send_ok(ssl);
usr.sbin/nsd/remote.c
1548
do_delzone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1550
if(!perform_delzone(ssl, xfrd, arg))
usr.sbin/nsd/remote.c
1552
send_ok(ssl);
usr.sbin/nsd/remote.c
1557
do_changezone(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
1559
if(!perform_changezone(ssl, xfrd, arg))
usr.sbin/nsd/remote.c
1561
send_ok(ssl);
usr.sbin/nsd/remote.c
1566
do_addzones(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
1570
while(ssl_read_line(ssl, buf, sizeof(buf))) {
usr.sbin/nsd/remote.c
1573
if(!perform_addzone(ssl, xfrd, buf)) {
usr.sbin/nsd/remote.c
1574
if(!ssl_printf(ssl, "error for input line '%s'\n",
usr.sbin/nsd/remote.c
1578
if(!ssl_printf(ssl, "added: %s\n", buf))
usr.sbin/nsd/remote.c
1583
(void)ssl_printf(ssl, "added %d zones\n", num);
usr.sbin/nsd/remote.c
1588
do_delzones(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
1592
while(ssl_read_line(ssl, buf, sizeof(buf))) {
usr.sbin/nsd/remote.c
1595
if(!perform_delzone(ssl, xfrd, buf)) {
usr.sbin/nsd/remote.c
1596
if(!ssl_printf(ssl, "error for input line '%s'\n",
usr.sbin/nsd/remote.c
1600
if(!ssl_printf(ssl, "removed: %s\n", buf))
usr.sbin/nsd/remote.c
1605
(void)ssl_printf(ssl, "deleted %d zones\n", num);
usr.sbin/nsd/remote.c
187
SSL* ssl;
usr.sbin/nsd/remote.c
2146
RES** ssl = (RES**)arg;
usr.sbin/nsd/remote.c
2147
if(!*ssl) return;
usr.sbin/nsd/remote.c
2148
if(!ssl_printf(*ssl, "%s", str))
usr.sbin/nsd/remote.c
2149
*ssl = NULL; /* failed, stop printing */
usr.sbin/nsd/remote.c
2154
do_repattern(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
2167
(void)ssl_printf(ssl, "error %s is not relative to %s: "
usr.sbin/nsd/remote.c
2176
(void)ssl_printf(ssl, "reconfig start, read %s\n", cfgfile);
usr.sbin/nsd/remote.c
2178
if(!parse_options_file(opt, cfgfile, &print_ssl_cfg_err, &ssl,
usr.sbin/nsd/remote.c
2193
(void)ssl_printf(ssl, "reconfig completed: no changes detected\n");
usr.sbin/nsd/remote.c
2195
(void)ssl_printf(ssl, "reconfig completed: changes applied\n");
usr.sbin/nsd/remote.c
2197
send_ok(ssl);
usr.sbin/nsd/remote.c
2245
do_serverpid(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
2247
(void)ssl_printf(ssl, "%u\n", (unsigned)xfrd->reload_pid);
usr.sbin/nsd/remote.c
2252
do_print_tsig(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
2257
if(!ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", key->name, key->secret, key->algorithm))
usr.sbin/nsd/remote.c
2264
(void)ssl_printf(ssl, "error: no such key with name: %s\n", arg);
usr.sbin/nsd/remote.c
2267
(void)ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", arg, key_opts->secret, key_opts->algorithm);
usr.sbin/nsd/remote.c
2274
do_update_tsig(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
2282
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2285
if(!find_arg2(ssl, arg, &arg2)) {
usr.sbin/nsd/remote.c
2286
(void)ssl_printf(ssl, "error: missing argument (secret)\n");
usr.sbin/nsd/remote.c
2291
(void)ssl_printf(ssl, "error: no such key with name: %s\n", arg);
usr.sbin/nsd/remote.c
2296
(void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2);
usr.sbin/nsd/remote.c
2320
send_ok(ssl);
usr.sbin/nsd/remote.c
2325
do_add_tsig(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
2336
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2339
if(!find_arg3(ssl, arg, &arg2, &arg3)) {
usr.sbin/nsd/remote.c
2345
(void)ssl_printf(ssl, "error: missing argument (secret)\n");
usr.sbin/nsd/remote.c
2349
(void)ssl_printf(ssl, "error: key %s already exists\n", arg);
usr.sbin/nsd/remote.c
2354
(void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2);
usr.sbin/nsd/remote.c
2361
(void)ssl_printf(ssl, "error: could not parse key name: %s\n", arg);
usr.sbin/nsd/remote.c
2366
(void)ssl_printf(ssl, "error: unknown algorithm: %s\n", algo);
usr.sbin/nsd/remote.c
2379
send_ok(ssl);
usr.sbin/nsd/remote.c
2404
do_assoc_tsig(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
2412
(void)ssl_printf(ssl, "error: missing argument (zonename)\n");
usr.sbin/nsd/remote.c
2415
if(!find_arg2(ssl, arg, &arg2)) {
usr.sbin/nsd/remote.c
2416
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2420
if(!get_zone_arg(ssl, xfrd, arg, &zone))
usr.sbin/nsd/remote.c
2423
(void)ssl_printf(ssl, "error: missing argument (zone)\n");
usr.sbin/nsd/remote.c
2428
(void)ssl_printf(ssl, "error: key: %s does not exist\n", arg2);
usr.sbin/nsd/remote.c
2446
send_ok(ssl);
usr.sbin/nsd/remote.c
2463
do_del_tsig(RES* ssl, xfrd_state_type* xfrd, char* arg) {
usr.sbin/nsd/remote.c
2469
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2474
(void)ssl_printf(ssl, "key %s does not exist, nothing to be deleted\n", arg);
usr.sbin/nsd/remote.c
2484
if(!ssl_printf(ssl, "zone %s uses key %s\n",
usr.sbin/nsd/remote.c
2493
(void)ssl_printf(ssl, "error: key: %s is in use and cannot be deleted\n", arg);
usr.sbin/nsd/remote.c
2500
send_ok(ssl);
usr.sbin/nsd/remote.c
2505
can_dump_cookie_secrets(RES* ssl, nsd_type* const nsd)
usr.sbin/nsd/remote.c
2508
(void)ssl_printf(ssl, "error: empty cookie-secret-file\n");
usr.sbin/nsd/remote.c
2511
(void)ssl_printf(ssl, "error: cookie secrets are already "
usr.sbin/nsd/remote.c
2524
cookie_secret_file_dump_and_reload(RES* ssl, nsd_type* const nsd) {
usr.sbin/nsd/remote.c
2531
(void)ssl_printf(ssl, "cookie-secret-file empty\n");
usr.sbin/nsd/remote.c
2535
(void)ssl_printf( ssl
usr.sbin/nsd/remote.c
2558
send_ok(ssl);
usr.sbin/nsd/remote.c
2563
do_activate_cookie_secret(RES* ssl, xfrd_state_type* xrfd, char* arg) {
usr.sbin/nsd/remote.c
2569
if(!can_dump_cookie_secrets(ssl, xfrd->nsd))
usr.sbin/nsd/remote.c
2573
(void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
usr.sbin/nsd/remote.c
2580
if(!cookie_secret_file_dump_and_reload(ssl, nsd)) {
usr.sbin/nsd/remote.c
2589
do_drop_cookie_secret(RES* ssl, xfrd_state_type* xrfd, char* arg) {
usr.sbin/nsd/remote.c
2595
if(!can_dump_cookie_secrets(ssl, xfrd->nsd))
usr.sbin/nsd/remote.c
2599
(void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
usr.sbin/nsd/remote.c
2606
if(!cookie_secret_file_dump_and_reload(ssl, nsd)) {
usr.sbin/nsd/remote.c
2615
do_add_cookie_secret(RES* ssl, xfrd_state_type* xrfd, char* arg) {
usr.sbin/nsd/remote.c
2621
if(!can_dump_cookie_secrets(ssl, xfrd->nsd))
usr.sbin/nsd/remote.c
2625
(void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
usr.sbin/nsd/remote.c
2630
(void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
usr.sbin/nsd/remote.c
2631
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/nsd/remote.c
2637
(void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
usr.sbin/nsd/remote.c
2638
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/nsd/remote.c
2652
if(!cookie_secret_file_dump_and_reload(ssl, nsd)) {
usr.sbin/nsd/remote.c
2654
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n"
usr.sbin/nsd/remote.c
2664
do_print_cookie_secrets(RES* ssl, xfrd_state_type* xrfd, char* arg) {
usr.sbin/nsd/remote.c
2674
if(!ssl_printf(ssl, "source : random generated\n"))
usr.sbin/nsd/remote.c
2678
if(!ssl_printf( ssl, "source : \"%s\"\n"
usr.sbin/nsd/remote.c
2683
if(!ssl_printf(ssl, "source : configuration\n"))
usr.sbin/nsd/remote.c
2687
if(!ssl_printf(ssl, "source : unknown\n"))
usr.sbin/nsd/remote.c
2699
(void)ssl_printf(ssl, "active : %s\n", secret_hex);
usr.sbin/nsd/remote.c
2701
(void)ssl_printf(ssl, "staging: %s\n", secret_hex);
usr.sbin/nsd/remote.c
2703
(void)ssl_printf(ssl, "staging[%d]: %s\n", i, secret_hex);
usr.sbin/nsd/remote.c
2717
execute_cmd(struct daemon_remote* rc, RES* ssl, char* cmd)
usr.sbin/nsd/remote.c
2722
do_stop(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2724
do_reload(ssl, rc->xfrd, skipwhite(p+6));
usr.sbin/nsd/remote.c
2726
do_write(ssl, rc->xfrd, skipwhite(p+5));
usr.sbin/nsd/remote.c
2728
do_status(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2730
do_stats(ssl, rc->xfrd, 1);
usr.sbin/nsd/remote.c
2732
do_stats(ssl, rc->xfrd, 0);
usr.sbin/nsd/remote.c
2734
do_log_reopen(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2736
do_addzone(ssl, rc->xfrd, skipwhite(p+7));
usr.sbin/nsd/remote.c
2738
do_delzone(ssl, rc->xfrd, skipwhite(p+7));
usr.sbin/nsd/remote.c
2740
do_changezone(ssl, rc->xfrd, skipwhite(p+10));
usr.sbin/nsd/remote.c
2742
do_addzones(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2744
do_delzones(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2746
do_notify(ssl, rc->xfrd, skipwhite(p+6));
usr.sbin/nsd/remote.c
2748
do_transfer(ssl, rc->xfrd, skipwhite(p+8));
usr.sbin/nsd/remote.c
2750
do_force_transfer(ssl, rc->xfrd, skipwhite(p+14));
usr.sbin/nsd/remote.c
2752
do_zonestatus(ssl, rc->xfrd, skipwhite(p+10));
usr.sbin/nsd/remote.c
2754
do_verbosity(ssl, skipwhite(p+9));
usr.sbin/nsd/remote.c
2756
do_repattern(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2758
do_repattern(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2760
do_serverpid(ssl, rc->xfrd);
usr.sbin/nsd/remote.c
2762
do_print_tsig(ssl, rc->xfrd, skipwhite(p+10));
usr.sbin/nsd/remote.c
2764
do_update_tsig(ssl, rc->xfrd, skipwhite(p+11));
usr.sbin/nsd/remote.c
2766
do_add_tsig(ssl, rc->xfrd, skipwhite(p+8));
usr.sbin/nsd/remote.c
2768
do_assoc_tsig(ssl, rc->xfrd, skipwhite(p+10));
usr.sbin/nsd/remote.c
2770
do_del_tsig(ssl, rc->xfrd, skipwhite(p+8));
usr.sbin/nsd/remote.c
2772
do_add_cookie_secret(ssl, rc->xfrd, skipwhite(p+17));
usr.sbin/nsd/remote.c
2774
do_drop_cookie_secret(ssl, rc->xfrd, skipwhite(p+18));
usr.sbin/nsd/remote.c
2776
do_print_cookie_secrets(ssl, rc->xfrd, skipwhite(p+20));
usr.sbin/nsd/remote.c
2778
do_activate_cookie_secret(ssl, rc->xfrd, skipwhite(p+22));
usr.sbin/nsd/remote.c
2780
(void)ssl_printf(ssl, "error unknown command '%s'\n", p);
usr.sbin/nsd/remote.c
2798
if(res->ssl) {
usr.sbin/nsd/remote.c
2800
if((r=SSL_read(res->ssl, magic, (int)sizeof(magic)-1)) <= 0) {
usr.sbin/nsd/remote.c
2801
if(SSL_get_error(res->ssl, r) == SSL_ERROR_ZERO_RETURN)
usr.sbin/nsd/remote.c
2909
if(s->ssl) {
usr.sbin/nsd/remote.c
2913
r = SSL_do_handshake(s->ssl);
usr.sbin/nsd/remote.c
2915
int r2 = SSL_get_error(s->ssl, r);
usr.sbin/nsd/remote.c
2927
} else if(SSL_get_verify_result(s->ssl) == X509_V_OK) {
usr.sbin/nsd/remote.c
2929
X509* x = SSL_get1_peer_certificate(s->ssl);
usr.sbin/nsd/remote.c
2931
X509* x = SSL_get_peer_certificate(s->ssl);
usr.sbin/nsd/remote.c
2951
res.ssl = s->ssl;
usr.sbin/nsd/remote.c
2976
print_longnum(RES* ssl, char* desc, uint64_t x)
usr.sbin/nsd/remote.c
2982
return ssl_printf(ssl, "%s%lu%6.6lu\n", desc,
usr.sbin/nsd/remote.c
2985
return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
usr.sbin/nsd/remote.c
2991
print_stat_block(RES* ssl, char* n, char* d, struct nsdst* st)
usr.sbin/nsd/remote.c
3003
if(!ssl_printf(ssl, "%s%snum.type.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3012
if(!ssl_printf(ssl, "%s%snum.opcode.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3021
if(!ssl_printf(ssl, "%s%snum.class.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3031
if(!ssl_printf(ssl, "%s%snum.rcode.%s=%lu\n", n, d, rcstr[i],
usr.sbin/nsd/remote.c
3037
if(!ssl_printf(ssl, "%s%snum.edns=%lu\n", n, d, (unsigned long)st->edns))
usr.sbin/nsd/remote.c
3041
if(!ssl_printf(ssl, "%s%snum.ednserr=%lu\n", n, d,
usr.sbin/nsd/remote.c
3046
if(!ssl_printf(ssl, "%s%snum.udp=%lu\n", n, d, (unsigned long)st->qudp))
usr.sbin/nsd/remote.c
3049
if(!ssl_printf(ssl, "%s%snum.udp6=%lu\n", n, d, (unsigned long)st->qudp6))
usr.sbin/nsd/remote.c
3052
if(!ssl_printf(ssl, "%s%snum.tcp=%lu\n", n, d, (unsigned long)st->ctcp))
usr.sbin/nsd/remote.c
3055
if(!ssl_printf(ssl, "%s%snum.tcp6=%lu\n", n, d, (unsigned long)st->ctcp6))
usr.sbin/nsd/remote.c
3058
if(!ssl_printf(ssl, "%s%snum.tls=%lu\n", n, d, (unsigned long)st->ctls))
usr.sbin/nsd/remote.c
3061
if(!ssl_printf(ssl, "%s%snum.tls6=%lu\n", n, d, (unsigned long)st->ctls6))
usr.sbin/nsd/remote.c
3065
if(!ssl_printf(ssl, "%s%snum.answer_wo_aa=%lu\n", n, d,
usr.sbin/nsd/remote.c
3070
if(!ssl_printf(ssl, "%s%snum.rxerr=%lu\n", n, d, (unsigned long)st->rxerr))
usr.sbin/nsd/remote.c
3074
if(!ssl_printf(ssl, "%s%snum.txerr=%lu\n", n, d, (unsigned long)st->txerr))
usr.sbin/nsd/remote.c
3078
if(!ssl_printf(ssl, "%s%snum.raxfr=%lu\n", n, d, (unsigned long)st->raxfr))
usr.sbin/nsd/remote.c
3082
if(!ssl_printf(ssl, "%s%snum.rixfr=%lu\n", n, d, (unsigned long)st->rixfr))
usr.sbin/nsd/remote.c
3086
if(!ssl_printf(ssl, "%s%snum.truncated=%lu\n", n, d,
usr.sbin/nsd/remote.c
3091
if(!ssl_printf(ssl, "%s%snum.dropped=%lu\n", n, d,
usr.sbin/nsd/remote.c
3110
zonestat_print(RES *ssl, struct evbuffer *evbuf, xfrd_state_type *xfrd,
usr.sbin/nsd/remote.c
3153
if (ssl) {
usr.sbin/nsd/remote.c
3154
if(!ssl_printf(ssl, "%s%snum.queries=%lu\n", name, ".",
usr.sbin/nsd/remote.c
3158
print_stat_block(ssl, name, ".", &stat0);
usr.sbin/nsd/remote.c
3173
print_stats(RES* ssl, xfrd_state_type* xfrd, struct timeval* now, int clear,
usr.sbin/nsd/remote.c
3182
if(!ssl_printf(ssl, "server%d.queries=%lu\n", (int)i,
usr.sbin/nsd/remote.c
3187
if(!ssl_printf(ssl, "num.queries=%lu\n", (unsigned long)total))
usr.sbin/nsd/remote.c
3193
if(!ssl_printf(ssl, "time.boot=%lu.%6.6lu\n",
usr.sbin/nsd/remote.c
3196
if(!ssl_printf(ssl, "time.elapsed=%lu.%6.6lu\n",
usr.sbin/nsd/remote.c
3201
if(!print_longnum(ssl, "size.db.disk=", st->db_disk))
usr.sbin/nsd/remote.c
3203
if(!print_longnum(ssl, "size.db.mem=", st->db_mem))
usr.sbin/nsd/remote.c
3205
if(!print_longnum(ssl, "size.xfrd.mem=", region_get_mem(xfrd->region)))
usr.sbin/nsd/remote.c
3207
if(!print_longnum(ssl, "size.config.disk=",
usr.sbin/nsd/remote.c
3210
if(!print_longnum(ssl, "size.config.mem=", region_get_mem(
usr.sbin/nsd/remote.c
3213
print_stat_block(ssl, "", "", st);
usr.sbin/nsd/remote.c
3216
if(!ssl_printf(ssl, "zone.primary=%lu\n",
usr.sbin/nsd/remote.c
3219
if(!ssl_printf(ssl, "zone.secondary=%lu\n", (unsigned long)xfrd->zones->count))
usr.sbin/nsd/remote.c
3221
if(!ssl_printf(ssl, "zone.master=%lu\n",
usr.sbin/nsd/remote.c
3224
if(!ssl_printf(ssl, "zone.slave=%lu\n", (unsigned long)xfrd->zones->count))
usr.sbin/nsd/remote.c
3227
zonestat_print(ssl, NULL, xfrd, clear, zonestats); /* per-zone statistics */
usr.sbin/nsd/remote.c
3342
process_stats(RES* ssl, struct evbuffer *evbuf, struct xfrd_state* xfrd, int peek)
usr.sbin/nsd/remote.c
3349
assert((ssl && !evbuf) || (!ssl && evbuf));
usr.sbin/nsd/remote.c
3356
if (ssl) {
usr.sbin/nsd/remote.c
3357
print_stats(ssl, xfrd, &stattime, !peek, &total, zonestats);
usr.sbin/nsd/remote.c
351
if(p->ssl)
usr.sbin/nsd/remote.c
352
SSL_free(p->ssl);
usr.sbin/nsd/remote.c
668
n->ssl = SSL_new(rc->ctx);
usr.sbin/nsd/remote.c
669
if(!n->ssl) {
usr.sbin/nsd/remote.c
676
SSL_set_accept_state(n->ssl);
usr.sbin/nsd/remote.c
677
(void)SSL_set_mode(n->ssl, SSL_MODE_AUTO_RETRY);
usr.sbin/nsd/remote.c
678
if(!SSL_set_fd(n->ssl, newfd)) {
usr.sbin/nsd/remote.c
682
SSL_free(n->ssl);
usr.sbin/nsd/remote.c
687
n->ssl = NULL;
usr.sbin/nsd/remote.c
722
if(s->ssl) {
usr.sbin/nsd/remote.c
723
SSL_shutdown(s->ssl);
usr.sbin/nsd/remote.c
724
SSL_free(s->ssl);
usr.sbin/nsd/remote.c
737
if(res->ssl) {
usr.sbin/nsd/remote.c
740
if((r=SSL_write(res->ssl, text, (int)strlen(text))) <= 0) {
usr.sbin/nsd/remote.c
741
if(SSL_get_error(res->ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/nsd/remote.c
764
ssl_print_vmsg(RES* ssl, const char* format, va_list args)
usr.sbin/nsd/remote.c
768
return ssl_print_text(ssl, msg);
usr.sbin/nsd/remote.c
773
ssl_printf(RES* ssl, const char* format, ...)
usr.sbin/nsd/remote.c
778
ret = ssl_print_vmsg(ssl, format, args);
usr.sbin/nsd/remote.c
793
if(res->ssl) {
usr.sbin/nsd/remote.c
796
if((r=SSL_read(res->ssl, buf+len, 1)) <= 0) {
usr.sbin/nsd/remote.c
797
if(SSL_get_error(res->ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/nsd/remote.c
848
send_ok(RES* ssl)
usr.sbin/nsd/remote.c
850
(void)ssl_printf(ssl, "ok\n");
usr.sbin/nsd/remote.c
855
get_zone_arg(RES* ssl, xfrd_state_type* xfrd, char* arg,
usr.sbin/nsd/remote.c
866
(void)ssl_printf(ssl, "error cannot parse zone name '%s'\n", arg);
usr.sbin/nsd/remote.c
873
(void)ssl_printf(ssl, "error zone %s not configured\n", arg);
usr.sbin/nsd/remote.c
881
do_stop(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
889
send_ok(ssl);
usr.sbin/nsd/remote.c
894
do_log_reopen(RES* ssl, xfrd_state_type* xfrd)
usr.sbin/nsd/remote.c
897
send_ok(ssl);
usr.sbin/nsd/remote.c
902
do_reload(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
905
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.c
910
send_ok(ssl);
usr.sbin/nsd/remote.c
915
do_write(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
918
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.c
923
send_ok(ssl);
usr.sbin/nsd/remote.c
928
do_notify(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
931
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.c
938
send_ok(ssl);
usr.sbin/nsd/remote.c
940
(void)ssl_printf(ssl, "error zone does not have notify\n");
usr.sbin/nsd/remote.c
947
send_ok(ssl);
usr.sbin/nsd/remote.c
953
do_transfer(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
957
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.c
964
send_ok(ssl);
usr.sbin/nsd/remote.c
966
(void)ssl_printf(ssl, "error zone not secondary\n");
usr.sbin/nsd/remote.c
972
(void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count);
usr.sbin/nsd/remote.c
994
do_force_transfer(RES* ssl, xfrd_state_type* xfrd, char* arg)
usr.sbin/nsd/remote.c
998
if(!get_zone_arg(ssl, xfrd, arg, &zo))
usr.sbin/nsd/remote.h
172
void process_stats(struct remote_stream* ssl,
usr.sbin/nsd/remote.h
186
void zonestat_print(struct remote_stream *ssl, struct evbuffer *evbuf,
usr.sbin/nsd/server.c
4931
SSL* ssl = SSL_new((SSL_CTX*)ctx);
usr.sbin/nsd/server.c
4932
if(!ssl) {
usr.sbin/nsd/server.c
4936
SSL_set_accept_state(ssl);
usr.sbin/nsd/server.c
4937
(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
usr.sbin/nsd/server.c
4938
if(!SSL_set_fd(ssl, fd)) {
usr.sbin/nsd/server.c
4940
SSL_free(ssl);
usr.sbin/nsd/server.c
4943
return ssl;
usr.sbin/nsd/xfrd-tcp.c
1080
( !tp->ssl
usr.sbin/nsd/xfrd-tcp.c
113
version_name = SSL_get_version(ssl);
usr.sbin/nsd/xfrd-tcp.c
1155
conn_write_ssl(struct xfrd_tcp* tcp, SSL* ssl)
usr.sbin/nsd/xfrd-tcp.c
1165
sent = SSL_write(ssl, (const char*)&sendlen + tcp->total_bytes,
usr.sbin/nsd/xfrd-tcp.c
1167
switch(SSL_get_error(ssl,sent)) {
usr.sbin/nsd/xfrd-tcp.c
117
int version = SSL_version(ssl);
usr.sbin/nsd/xfrd-tcp.c
1197
sent = SSL_write(ssl, buffer_current(tcp->packet), request_length);
usr.sbin/nsd/xfrd-tcp.c
1198
switch(SSL_get_error(ssl,sent)) {
usr.sbin/nsd/xfrd-tcp.c
1323
if (tp->ssl) {
usr.sbin/nsd/xfrd-tcp.c
1325
ret = conn_write_ssl(tcp, tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
1370
if (tp->ssl)
usr.sbin/nsd/xfrd-tcp.c
1371
ret = conn_write_ssl(tcp, tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
1394
conn_read_ssl(struct xfrd_tcp* tcp, SSL* ssl)
usr.sbin/nsd/xfrd-tcp.c
1400
received = SSL_read(ssl,
usr.sbin/nsd/xfrd-tcp.c
1404
int err = SSL_get_error(ssl, received);
usr.sbin/nsd/xfrd-tcp.c
1455
received = SSL_read(ssl, buffer_current(tcp->packet),
usr.sbin/nsd/xfrd-tcp.c
1459
int err = SSL_get_error(ssl, received);
usr.sbin/nsd/xfrd-tcp.c
1584
if(tp->ssl) {
usr.sbin/nsd/xfrd-tcp.c
1586
ret = conn_read_ssl(tcp, tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
1743
if (tp->ssl) {
usr.sbin/nsd/xfrd-tcp.c
1745
SSL_shutdown(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
1746
SSL_free(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
1747
tp->ssl = NULL;
usr.sbin/nsd/xfrd-tcp.c
181
tp->ssl = SSL_new((SSL_CTX*)tcp_set->ssl_ctx);
usr.sbin/nsd/xfrd-tcp.c
182
if(!tp->ssl) {
usr.sbin/nsd/xfrd-tcp.c
186
SSL_set_connect_state(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
187
(void)SSL_set_mode(tp->ssl, SSL_MODE_AUTO_RETRY);
usr.sbin/nsd/xfrd-tcp.c
188
if(!SSL_set_fd(tp->ssl, tp->tcp_w->fd)) {
usr.sbin/nsd/xfrd-tcp.c
190
SSL_free(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
191
tp->ssl = NULL;
usr.sbin/nsd/xfrd-tcp.c
195
SSL_set_verify(tp->ssl, SSL_VERIFY_PEER, tls_verify_callback);
usr.sbin/nsd/xfrd-tcp.c
196
if(!SSL_set1_host(tp->ssl, auth_domain_name)) {
usr.sbin/nsd/xfrd-tcp.c
199
SSL_free(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
200
tp->ssl = NULL;
usr.sbin/nsd/xfrd-tcp.c
212
ret = SSL_do_handshake(tp->ssl);
usr.sbin/nsd/xfrd-tcp.c
218
tp->handshake_want = SSL_get_error(tp->ssl, ret);
usr.sbin/nsd/xfrd-tcp.c
39
get_cert_info(SSL* ssl, region_type* region, char** cert_serial,
usr.sbin/nsd/xfrd-tcp.c
59
cert = SSL_get1_peer_certificate(ssl);
usr.sbin/nsd/xfrd-tcp.c
61
cert = SSL_get_peer_certificate(ssl);
usr.sbin/nsd/xfrd-tcp.c
753
( tp->ssl
usr.sbin/nsd/xfrd-tcp.h
145
SSL *ssl;
usr.sbin/nsd/xfrd-tcp.h
254
void get_cert_info(SSL* ssl, region_type* region, char** cert_serial,
usr.sbin/nsd/xfrd.c
2577
if (test_tp && test_tp->ssl && test_tp->handshake_done) {
usr.sbin/nsd/xfrd.c
2591
if(tp && tp->ssl) {
usr.sbin/nsd/xfrd.c
2592
get_cert_info(tp->ssl, tmpregion, &cert_serial,
usr.sbin/nsd/xfrd.c
447
xfrd->tcp_set->tcp_state[i]->ssl) {
usr.sbin/nsd/xfrd.c
448
SSL_free(xfrd->tcp_set->tcp_state[i]->ssl);
usr.sbin/nsd/xfrd.c
449
xfrd->tcp_set->tcp_state[i]->ssl = NULL;
usr.sbin/smtpd/ioev.c
104
char ssl[128];
usr.sbin/smtpd/ioev.c
106
ssl[0] = '\0';
usr.sbin/smtpd/ioev.c
109
(void)snprintf(ssl, sizeof ssl, " tls=%s:%s",
usr.sbin/smtpd/ioev.c
117
io, io->sock, io->timeout, io_strflags(io->flags), ssl,
usr.sbin/smtpd/mta_session.c
1780
mta_report_link_tls(struct mta_session *s, const char *ssl)
usr.sbin/smtpd/mta_session.c
1785
report_smtp_link_tls("smtp-out", s->id, ssl);
usr.sbin/smtpd/parse.y
124
uint16_t ssl;
usr.sbin/smtpd/parse.y
2331
listen_opts.ssl = F_SMTPS;
usr.sbin/smtpd/parse.y
2339
listen_opts.ssl = F_SMTPS|F_TLS_VERIFY;
usr.sbin/smtpd/parse.y
2347
listen_opts.ssl = F_STARTTLS;
usr.sbin/smtpd/parse.y
2355
listen_opts.ssl = F_STARTTLS|F_STARTTLS_REQUIRE;
usr.sbin/smtpd/parse.y
2363
listen_opts.ssl = F_STARTTLS|F_STARTTLS_REQUIRE|F_TLS_VERIFY;
usr.sbin/smtpd/parse.y
3285
if (lo->port != 0 && lo->ssl == F_SSL)
usr.sbin/smtpd/parse.y
3288
if (lo->auth != 0 && !lo->ssl)
usr.sbin/smtpd/parse.y
3291
if (lo->pkicount && !lo->ssl)
usr.sbin/smtpd/parse.y
3293
if (lo->pkicount == 0 && lo->ssl)
usr.sbin/smtpd/parse.y
3299
lo->flags = lo->ssl|lo->auth|flags;
usr.sbin/smtpd/parse.y
3303
if (lo->ssl & F_SMTPS) {
usr.sbin/smtpd/parse.y
3308
if (!lo->ssl || (lo->ssl & F_STARTTLS)) {
usr.sbin/smtpd/parse.y
3311
if (lo->ssl & F_STARTTLS)
usr.sbin/smtpd/parse.y
3396
if (lo->ssl & F_TLS_VERIFY)
usr.sbin/smtpd/parse.y
3399
if (lo->ssl & F_STARTTLS_REQUIRE)
usr.sbin/smtpd/report_smtp.c
74
report_smtp_link_tls(const char *direction, uint64_t qid, const char *ssl)
usr.sbin/smtpd/report_smtp.c
84
m_add_string(p_lka, ssl);
usr.sbin/smtpd/smtp_session.c
2952
smtp_report_link_tls(struct smtp_session *s, const char *ssl)
usr.sbin/smtpd/smtp_session.c
2957
report_smtp_link_tls("smtp-in", s->id, ssl);
usr.sbin/snmpd/parse.y
1057
struct sockaddr_storage ss, ssl = {};
usr.sbin/snmpd/parse.y
1104
tr->ta_sslocal = ssl;
usr.sbin/unbound/daemon/cachedump.c
1001
return ssl_printf(ssl, "no delegation from "
usr.sbin/unbound/daemon/cachedump.c
1009
print_dp_main(ssl, dp, msg);
usr.sbin/unbound/daemon/cachedump.c
1010
print_dp_details(ssl, worker, dp);
usr.sbin/unbound/daemon/cachedump.c
1011
if(!ssl_printf(ssl, "cache delegation was "
usr.sbin/unbound/daemon/cachedump.c
1016
return ssl_printf(ssl, "no delegation from "
usr.sbin/unbound/daemon/cachedump.c
1024
if(!ssl_printf(ssl, "going up, lookup %s\n", b))
usr.sbin/unbound/daemon/cachedump.c
1033
if(!ssl_printf(ssl, "The noprime stub servers "
usr.sbin/unbound/daemon/cachedump.c
1039
if(!ssl_printf(ssl, "The stub is primed "
usr.sbin/unbound/daemon/cachedump.c
1045
print_dp_main(ssl, stub->dp, NULL);
usr.sbin/unbound/daemon/cachedump.c
1046
print_dp_details(ssl, worker, stub->dp);
usr.sbin/unbound/daemon/cachedump.c
1049
print_dp_main(ssl, dp, msg);
usr.sbin/unbound/daemon/cachedump.c
1050
print_dp_details(ssl, worker, dp);
usr.sbin/unbound/daemon/cachedump.c
135
spool_strlist(RES* ssl, struct config_strlist* list)
usr.sbin/unbound/daemon/cachedump.c
139
if(!ssl_printf(ssl, "%s", s->str))
usr.sbin/unbound/daemon/cachedump.c
149
RES* ssl, void* arg)
usr.sbin/unbound/daemon/cachedump.c
214
if(!spool_strlist(ssl, txt.first)) {
usr.sbin/unbound/daemon/cachedump.c
224
if(!spool_strlist(ssl, txt.first)) {
usr.sbin/unbound/daemon/cachedump.c
237
RES* ssl, void* arg)
usr.sbin/unbound/daemon/cachedump.c
246
if(!dump_lruhash(sh->array[slab], func, ssl, arg))
usr.sbin/unbound/daemon/cachedump.c
257
RES* ssl;
usr.sbin/unbound/daemon/cachedump.c
275
dump_rrset_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
280
dump_info.ssl = ssl;
usr.sbin/unbound/daemon/cachedump.c
281
if(!ssl_printf(ssl, "START_RRSET_CACHE\n")) return 0;
usr.sbin/unbound/daemon/cachedump.c
282
if(!dump_slabhash(&r->table, &dump_rrset_entry, ssl, &dump_info))
usr.sbin/unbound/daemon/cachedump.c
284
return ssl_printf(ssl, "END_RRSET_CACHE\n");
usr.sbin/unbound/daemon/cachedump.c
407
dump_msg_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
411
dump_info.ssl = ssl;
usr.sbin/unbound/daemon/cachedump.c
412
if(!ssl_printf(ssl, "START_MSG_CACHE\n")) return 0;
usr.sbin/unbound/daemon/cachedump.c
413
if(!dump_slabhash(worker->env.msg_cache, &dump_msg_entry, ssl,
usr.sbin/unbound/daemon/cachedump.c
416
return ssl_printf(ssl, "END_MSG_CACHE\n");
usr.sbin/unbound/daemon/cachedump.c
420
dump_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
422
if(!dump_rrset_cache(ssl, worker))
usr.sbin/unbound/daemon/cachedump.c
424
if(!dump_msg_cache(ssl, worker))
usr.sbin/unbound/daemon/cachedump.c
426
return ssl_printf(ssl, "EOF\n");
usr.sbin/unbound/daemon/cachedump.c
431
ssl_read_buf(RES* ssl, sldns_buffer* buf)
usr.sbin/unbound/daemon/cachedump.c
433
return ssl_read_line(ssl, (char*)sldns_buffer_begin(buf),
usr.sbin/unbound/daemon/cachedump.c
439
read_fixed(RES* ssl, sldns_buffer* buf, const char* str)
usr.sbin/unbound/daemon/cachedump.c
441
if(!ssl_read_buf(ssl, buf)) return 0;
usr.sbin/unbound/daemon/cachedump.c
447
load_rr(RES* ssl, sldns_buffer* buf, struct regional* region,
usr.sbin/unbound/daemon/cachedump.c
456
if(!ssl_read_buf(ssl, buf))
usr.sbin/unbound/daemon/cachedump.c
565
load_rrset(RES* ssl, sldns_buffer* buf, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
626
if(!load_rr(ssl, buf, region, rk, d, i, 0,
usr.sbin/unbound/daemon/cachedump.c
633
if(!load_rr(ssl, buf, region, rk, d, i+rr_count, 1,
usr.sbin/unbound/daemon/cachedump.c
649
load_rrset_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
652
if(!read_fixed(ssl, buf, "START_RRSET_CACHE")) return 0;
usr.sbin/unbound/daemon/cachedump.c
653
while(ssl_read_buf(ssl, buf) &&
usr.sbin/unbound/daemon/cachedump.c
655
if(!load_rrset(ssl, buf, worker))
usr.sbin/unbound/daemon/cachedump.c
705
load_ref(RES* ssl, sldns_buffer* buf, struct worker* worker,
usr.sbin/unbound/daemon/cachedump.c
715
if(!ssl_read_buf(ssl, buf))
usr.sbin/unbound/daemon/cachedump.c
750
load_msg(RES* ssl, sldns_buffer* buf, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
808
if(!load_ref(ssl, buf, worker, region, &rep.rrsets[i],
usr.sbin/unbound/daemon/cachedump.c
827
load_msg_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
830
if(!read_fixed(ssl, buf, "START_MSG_CACHE")) return 0;
usr.sbin/unbound/daemon/cachedump.c
831
while(ssl_read_buf(ssl, buf) &&
usr.sbin/unbound/daemon/cachedump.c
833
if(!load_msg(ssl, buf, worker))
usr.sbin/unbound/daemon/cachedump.c
840
load_cache(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/cachedump.c
842
if(!load_rrset_cache(ssl, worker))
usr.sbin/unbound/daemon/cachedump.c
844
if(!load_msg_cache(ssl, worker))
usr.sbin/unbound/daemon/cachedump.c
846
return read_fixed(ssl, worker->env.scratch_buffer, "EOF");
usr.sbin/unbound/daemon/cachedump.c
851
print_dp_details(RES* ssl, struct worker* worker, struct delegpt* dp)
usr.sbin/unbound/daemon/cachedump.c
862
if(!ssl_printf(ssl, "%-16s\t", buf))
usr.sbin/unbound/daemon/cachedump.c
865
if(!ssl_printf(ssl, "Address is BOGUS. "))
usr.sbin/unbound/daemon/cachedump.c
874
if(!ssl_printf(ssl, "expired, rto %d msec, tA %d "
usr.sbin/unbound/daemon/cachedump.c
881
if(!ssl_printf(ssl, "not in infra cache.\n"))
usr.sbin/unbound/daemon/cachedump.c
892
if(!ssl_printf(ssl, "not in infra cache.\n"))
usr.sbin/unbound/daemon/cachedump.c
896
if(!ssl_printf(ssl, "%s%s%s%srto %d msec, ttl " ARG_LL "d, "
usr.sbin/unbound/daemon/cachedump.c
905
if(!ssl_printf(ssl, ", probedelay %d", delay))
usr.sbin/unbound/daemon/cachedump.c
911
if(!ssl_printf(ssl, ", noEDNS%s.",
usr.sbin/unbound/daemon/cachedump.c
915
if(!ssl_printf(ssl, ", EDNS %d%s.", edns_vs,
usr.sbin/unbound/daemon/cachedump.c
920
if(!ssl_printf(ssl, "\n"))
usr.sbin/unbound/daemon/cachedump.c
927
print_dp_main(RES* ssl, struct delegpt* dp, struct dns_msg* msg)
usr.sbin/unbound/daemon/cachedump.c
940
if(!ssl_printf(ssl, "Address is BOGUS:\n"))
usr.sbin/unbound/daemon/cachedump.c
944
if(!spool_strlist(ssl, txt.first)) {
usr.sbin/unbound/daemon/cachedump.c
953
if(!ssl_printf(ssl, "Delegation with %d names, of which %d "
usr.sbin/unbound/daemon/cachedump.c
961
int print_deleg_lookup(RES* ssl, struct worker* worker, uint8_t* nm,
usr.sbin/unbound/daemon/cachedump.c
980
if(!ssl_printf(ssl, "The following name servers are used for lookup "
usr.sbin/unbound/daemon/cachedump.c
986
if(!ssl_printf(ssl, "forwarding request:\n")) {
usr.sbin/unbound/daemon/cachedump.c
990
print_dp_main(ssl, dp, NULL);
usr.sbin/unbound/daemon/cachedump.c
991
print_dp_details(ssl, worker, dp);
usr.sbin/unbound/daemon/cachedump.h
105
int print_deleg_lookup(RES* ssl, struct worker* worker, uint8_t* nm,
usr.sbin/unbound/daemon/cachedump.h
84
int dump_cache(RES* ssl, struct worker* worker);
usr.sbin/unbound/daemon/cachedump.h
93
int load_cache(RES* ssl, struct worker* worker);
usr.sbin/unbound/daemon/remote.c
1006
if(!ssl_printf(ssl,
usr.sbin/unbound/daemon/remote.c
1023
print_ext(RES* ssl, struct ub_stats_info* s, int inhibit_zero)
usr.sbin/unbound/daemon/remote.c
1049
if(!ssl_printf(ssl, "num.query.type.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1053
if(!ssl_printf(ssl, "num.query.type.other"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1066
if(!ssl_printf(ssl, "num.query.class.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1070
if(!ssl_printf(ssl, "num.query.class.other"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1083
if(!ssl_printf(ssl, "num.query.opcode.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1087
if(!ssl_printf(ssl, "num.query.tcp"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1089
if(!ssl_printf(ssl, "num.query.tcpout"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1091
if(!ssl_printf(ssl, "num.query.udpout"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1093
if(!ssl_printf(ssl, "num.query.tls"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1095
if(!ssl_printf(ssl, "num.query.tls.resume"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1097
if(!ssl_printf(ssl, "num.query.ipv6"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1099
if(!ssl_printf(ssl, "num.query.https"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1102
if(!ssl_printf(ssl, "num.query.quic"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1106
if(!ssl_printf(ssl, "num.query.flags.QR"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1108
if(!ssl_printf(ssl, "num.query.flags.AA"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1110
if(!ssl_printf(ssl, "num.query.flags.TC"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1112
if(!ssl_printf(ssl, "num.query.flags.RD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1114
if(!ssl_printf(ssl, "num.query.flags.RA"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1116
if(!ssl_printf(ssl, "num.query.flags.Z"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1118
if(!ssl_printf(ssl, "num.query.flags.AD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1120
if(!ssl_printf(ssl, "num.query.flags.CD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1122
if(!ssl_printf(ssl, "num.query.edns.present"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1124
if(!ssl_printf(ssl, "num.query.edns.DO"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1138
if(!ssl_printf(ssl, "num.answer.rcode.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1142
if(!ssl_printf(ssl, "num.answer.rcode.nodata"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1146
if(!ssl_printf(ssl, "num.query.ratelimited"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1149
if(!ssl_printf(ssl, "num.answer.secure"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1151
if(!ssl_printf(ssl, "num.answer.bogus"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1153
if(!ssl_printf(ssl, "num.rrset.bogus"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1155
if(!ssl_printf(ssl, "num.valops"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1157
if(!ssl_printf(ssl, "num.query.aggressive.NOERROR"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1159
if(!ssl_printf(ssl, "num.query.aggressive.NXDOMAIN"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1162
if(!ssl_printf(ssl, "unwanted.queries"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1164
if(!ssl_printf(ssl, "unwanted.replies"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1167
if(!ssl_printf(ssl, "msg.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1169
if(!ssl_printf(ssl, "rrset.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1171
if(!ssl_printf(ssl, "infra.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1173
if(!ssl_printf(ssl, "key.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1176
if(!ssl_printf(ssl, "msg.cache.max_collisions"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1178
if(!ssl_printf(ssl, "rrset.cache.max_collisions"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1186
if(!ssl_printf(ssl, "num.rpz.action.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1191
if(!ssl_printf(ssl, "dnscrypt_shared_secret.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1193
if(!ssl_printf(ssl, "dnscrypt_nonce.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1195
if(!ssl_printf(ssl, "num.query.dnscrypt.shared_secret.cachemiss"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1197
if(!ssl_printf(ssl, "num.query.dnscrypt.replay"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1200
if(!ssl_printf(ssl, "num.query.authzone.up"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1202
if(!ssl_printf(ssl, "num.query.authzone.down"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1205
if(!ssl_printf(ssl, "num.query.subnet"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1207
if(!ssl_printf(ssl, "num.query.subnet_cache"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1211
if(!ssl_printf(ssl, "num.query.cachedb"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1219
do_stats(RES* ssl, struct worker* worker, int reset)
usr.sbin/unbound/daemon/remote.c
1230
if(!print_thread_stats(ssl, i, &s))
usr.sbin/unbound/daemon/remote.c
1238
if(!print_stats(ssl, "total", &total))
usr.sbin/unbound/daemon/remote.c
1240
if(!print_uptime(ssl, worker, reset))
usr.sbin/unbound/daemon/remote.c
1243
if(!print_mem(ssl, worker, daemon, &total))
usr.sbin/unbound/daemon/remote.c
1245
if(!print_hist(ssl, &total))
usr.sbin/unbound/daemon/remote.c
1247
if(!print_ext(ssl, &total, daemon->cfg->stat_inhibit_zero))
usr.sbin/unbound/daemon/remote.c
1254
parse_arg_name(RES* ssl, char* str, uint8_t** res, size_t* len, int* labs)
usr.sbin/unbound/daemon/remote.c
1263
ssl_printf(ssl, "error: this option requires a domain name\n");
usr.sbin/unbound/daemon/remote.c
1268
ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str,
usr.sbin/unbound/daemon/remote.c
1275
ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1284
find_arg2(RES* ssl, char* arg, char** arg2)
usr.sbin/unbound/daemon/remote.c
1300
ssl_printf(ssl, "error could not find next argument "
usr.sbin/unbound/daemon/remote.c
1309
perform_zone_add(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1317
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
1319
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
1322
ssl_printf(ssl, "error not a zone type. %s\n", arg2);
usr.sbin/unbound/daemon/remote.c
1340
ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1349
do_zone_add(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1351
if(!perform_zone_add(ssl, zones, arg))
usr.sbin/unbound/daemon/remote.c
1353
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1358
do_zones_add(struct daemon_remote* rc, RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
1363
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1369
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1373
if(!perform_zone_add(ssl, worker->daemon->local_zones,
usr.sbin/unbound/daemon/remote.c
1375
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1381
(void)ssl_printf(ssl, "added %d zones\n", num);
usr.sbin/unbound/daemon/remote.c
1386
perform_zone_remove(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1392
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
1407
do_zone_remove(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1409
if(!perform_zone_remove(ssl, zones, arg))
usr.sbin/unbound/daemon/remote.c
1411
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1416
do_zones_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
1421
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1427
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1431
if(!perform_zone_remove(ssl, worker->daemon->local_zones,
usr.sbin/unbound/daemon/remote.c
1433
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1439
(void)ssl_printf(ssl, "removed %d zones\n", num);
usr.sbin/unbound/daemon/remote.c
1444
check_RR_syntax(RES* ssl, char* str, int line)
usr.sbin/unbound/daemon/remote.c
1455
if(!ssl_printf(ssl, "error parsing local-data at %sposition %d '%s': %s\n",
usr.sbin/unbound/daemon/remote.c
1466
perform_data_add(RES* ssl, struct local_zones* zones, char* arg, int line)
usr.sbin/unbound/daemon/remote.c
1468
if(!check_RR_syntax(ssl, arg, line)) {
usr.sbin/unbound/daemon/remote.c
1472
ssl_printf(ssl,"error in syntax or out of memory, %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1480
do_data_add(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1482
if(!perform_data_add(ssl, zones, arg, 0))
usr.sbin/unbound/daemon/remote.c
1484
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1489
do_datas_add(struct daemon_remote* rc, RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
1494
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1500
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1505
if(perform_data_add(ssl, worker->daemon->local_zones,
usr.sbin/unbound/daemon/remote.c
1509
(void)ssl_printf(ssl, "added %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1514
perform_data_remove(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1519
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
1529
do_data_remove(RES* ssl, struct local_zones* zones, char* arg)
usr.sbin/unbound/daemon/remote.c
1531
if(!perform_data_remove(ssl, zones, arg))
usr.sbin/unbound/daemon/remote.c
1533
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1538
do_datas_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
1543
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1549
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1553
if(!perform_data_remove(ssl, worker->daemon->local_zones,
usr.sbin/unbound/daemon/remote.c
1555
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1561
(void)ssl_printf(ssl, "removed %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1566
do_view_zone_add(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
1570
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
1574
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1580
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1592
do_zone_add(ssl, v->local_zones, arg2);
usr.sbin/unbound/daemon/remote.c
1598
do_view_zone_remove(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
1602
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
1606
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1611
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1614
do_zone_remove(ssl, v->local_zones, arg2);
usr.sbin/unbound/daemon/remote.c
1620
do_view_data_add(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
1624
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
1628
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1634
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1638
do_data_add(ssl, v->local_zones, arg2);
usr.sbin/unbound/daemon/remote.c
1644
do_view_datas_add(struct daemon_remote* rc, RES* ssl, struct worker* worker,
usr.sbin/unbound/daemon/remote.c
1653
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1659
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1666
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1672
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1677
if(perform_data_add(ssl, v->local_zones, buf+cmd_len, line))
usr.sbin/unbound/daemon/remote.c
1681
(void)ssl_printf(ssl, "added %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1686
do_view_data_remove(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
1690
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
1694
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1699
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
1702
do_data_remove(ssl, v->local_zones, arg2);
usr.sbin/unbound/daemon/remote.c
1708
do_view_datas_remove(struct daemon_remote* rc, RES* ssl, struct worker* worker,
usr.sbin/unbound/daemon/remote.c
1717
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1722
ssl_printf(ssl, "removed 0 datas\n");
usr.sbin/unbound/daemon/remote.c
1728
while(ssl_read_line(ssl, buf+cmd_len, MAX_STDIN_STRLINE)) {
usr.sbin/unbound/daemon/remote.c
1734
if(rc) distribute_cmd(rc, ssl, buf);
usr.sbin/unbound/daemon/remote.c
1738
if(!perform_data_remove(ssl, v->local_zones, buf+cmd_len)) {
usr.sbin/unbound/daemon/remote.c
1739
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1746
(void)ssl_printf(ssl, "removed %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1752
RES* ssl;
usr.sbin/unbound/daemon/remote.c
1804
if(!ssl_printf(inf->ssl, "subnet %s/%d%s %s %s %s " ARG_LL "d\n", astr,
usr.sbin/unbound/daemon/remote.c
1810
ssl_printf(inf->ssl,
usr.sbin/unbound/daemon/remote.c
1828
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1830
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1835
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
1928
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1931
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1933
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
1967
ssl_printf(inf->ssl,
usr.sbin/unbound/daemon/remote.c
1986
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1989
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1993
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
1999
do_cache_lookup_domain(RES* ssl, struct worker* worker, uint8_t* nm,
usr.sbin/unbound/daemon/remote.c
2007
inf.ssl = ssl;
usr.sbin/unbound/daemon/remote.c
2030
do_cache_lookup(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2061
ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", s,
usr.sbin/unbound/daemon/remote.c
2067
ssl_printf(ssl, "error name too short: '%s'. Need example.com. or longer, short names take very long, use +t to allow them.\n", s);
usr.sbin/unbound/daemon/remote.c
2071
do_cache_lookup_domain(ssl, worker, nm, nmlen);
usr.sbin/unbound/daemon/remote.c
2079
do_lookup(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2084
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2086
(void)print_deleg_lookup(ssl, worker, nm, nmlen, nmlabs);
usr.sbin/unbound/daemon/remote.c
2123
parse_remcachedb(RES* ssl, char** arg, int* pc)
usr.sbin/unbound/daemon/remote.c
2129
if(!find_arg2(ssl, *arg, &arg2))
usr.sbin/unbound/daemon/remote.c
2140
do_flush_type(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2148
if(!parse_remcachedb(ssl, &arg, &pc))
usr.sbin/unbound/daemon/remote.c
2150
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
2152
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2156
(void)ssl_printf(ssl, "error parsing RRset type: '%s'\n", arg2);
usr.sbin/unbound/daemon/remote.c
2163
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2168
do_flush_stats(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
2171
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2225
do_flush_infra(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2232
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2236
(void)ssl_printf(ssl, "error parsing ip addr: '%s'\n", arg);
usr.sbin/unbound/daemon/remote.c
2255
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2260
do_flush_requestlist(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
2263
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2323
do_flush_zone(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2330
if(!parse_remcachedb(ssl, &arg, &pc))
usr.sbin/unbound/daemon/remote.c
2332
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2359
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2412
do_flush_bogus(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2416
if(!parse_remcachedb(ssl, &arg, &pc))
usr.sbin/unbound/daemon/remote.c
242
if(p->ssl)
usr.sbin/unbound/daemon/remote.c
243
SSL_free(p->ssl);
usr.sbin/unbound/daemon/remote.c
2437
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2500
do_flush_negative(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2504
if(!parse_remcachedb(ssl, &arg, &pc))
usr.sbin/unbound/daemon/remote.c
2525
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2532
do_flush_name(RES* ssl, struct worker* w, char* arg)
usr.sbin/unbound/daemon/remote.c
2538
if(!parse_remcachedb(ssl, &arg, &pc))
usr.sbin/unbound/daemon/remote.c
2540
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2556
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2561
ssl_print_name_dp(RES* ssl, const char* str, uint8_t* nm, uint16_t dclass,
usr.sbin/unbound/daemon/remote.c
2571
if(!ssl_printf(ssl, "%s %s %s ", buf, (c?c:"CLASS??"), str)) {
usr.sbin/unbound/daemon/remote.c
2579
if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
usr.sbin/unbound/daemon/remote.c
2585
if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
usr.sbin/unbound/daemon/remote.c
2589
return ssl_printf(ssl, "\n");
usr.sbin/unbound/daemon/remote.c
2595
print_root_fwds(RES* ssl, struct iter_forwards* fwds, uint8_t* root)
usr.sbin/unbound/daemon/remote.c
2601
return ssl_printf(ssl, "off (using root hints)\n");
usr.sbin/unbound/daemon/remote.c
2605
if(!ssl_print_name_dp(ssl, NULL, root, LDNS_RR_CLASS_IN, dp)) {
usr.sbin/unbound/daemon/remote.c
2615
parse_delegpt(RES* ssl, char* args, uint8_t* nm)
usr.sbin/unbound/daemon/remote.c
2625
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2641
(void)ssl_printf(ssl, "error cannot parse"
usr.sbin/unbound/daemon/remote.c
2652
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2666
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2678
do_forward(RES* ssl, struct worker* worker, char* args)
usr.sbin/unbound/daemon/remote.c
2684
(void)ssl_printf(ssl, "error: structure not allocated\n");
usr.sbin/unbound/daemon/remote.c
2688
(void)print_root_fwds(ssl, fwd, root);
usr.sbin/unbound/daemon/remote.c
2699
if(!(dp = parse_delegpt(ssl, args, root)))
usr.sbin/unbound/daemon/remote.c
2702
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2706
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2710
parse_fs_args(RES* ssl, char* args, uint8_t** nm, struct delegpt** dp,
usr.sbin/unbound/daemon/remote.c
2719
if(!find_arg2(ssl, args, &rest))
usr.sbin/unbound/daemon/remote.c
2729
(void)ssl_printf(ssl, "error: unknown option %s\n", args);
usr.sbin/unbound/daemon/remote.c
2737
if(!find_arg2(ssl, args, &rest))
usr.sbin/unbound/daemon/remote.c
2742
if(!parse_arg_name(ssl, zonename, nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2747
if(!(*dp = parse_delegpt(ssl, args, *nm))) {
usr.sbin/unbound/daemon/remote.c
2757
do_forward_add(RES* ssl, struct worker* worker, char* args)
usr.sbin/unbound/daemon/remote.c
2764
if(!parse_fs_args(ssl, args, &nm, &dp, &insecure, NULL, &tls))
usr.sbin/unbound/daemon/remote.c
2774
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2782
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2788
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2793
do_forward_remove(RES* ssl, struct worker* worker, char* args)
usr.sbin/unbound/daemon/remote.c
2799
if(!parse_fs_args(ssl, args, &nm, NULL, &insecure, NULL, NULL))
usr.sbin/unbound/daemon/remote.c
2809
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2814
do_stub_add(RES* ssl, struct worker* worker, char* args)
usr.sbin/unbound/daemon/remote.c
2821
if(!parse_fs_args(ssl, args, &nm, &dp, &insecure, &prime, &tls))
usr.sbin/unbound/daemon/remote.c
2833
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2845
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2852
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2865
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2870
do_stub_remove(RES* ssl, struct worker* worker, char* args)
usr.sbin/unbound/daemon/remote.c
2876
if(!parse_fs_args(ssl, args, &nm, NULL, &insecure, NULL, NULL))
usr.sbin/unbound/daemon/remote.c
2889
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2894
do_insecure_add(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2899
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2904
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2910
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2915
do_insecure_remove(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
2920
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
2926
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
2930
do_insecure_list(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
2938
ssl_printf(ssl, "%s\n", buf);
usr.sbin/unbound/daemon/remote.c
2946
do_status(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
2950
if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
usr.sbin/unbound/daemon/remote.c
2952
if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
usr.sbin/unbound/daemon/remote.c
2954
if(!ssl_printf(ssl, "threads: %d\n", worker->daemon->num))
usr.sbin/unbound/daemon/remote.c
2956
if(!ssl_printf(ssl, "modules: %d [", worker->daemon->mods.num))
usr.sbin/unbound/daemon/remote.c
2959
if(!ssl_printf(ssl, " %s", worker->daemon->mods.mod[i]->name))
usr.sbin/unbound/daemon/remote.c
2962
if(!ssl_printf(ssl, " ]\n"))
usr.sbin/unbound/daemon/remote.c
2965
if(!ssl_printf(ssl, "uptime: " ARG_LL "d seconds\n", (long long)uptime))
usr.sbin/unbound/daemon/remote.c
2967
if(!ssl_printf(ssl, "options:%s%s%s%s\n" ,
usr.sbin/unbound/daemon/remote.c
2974
if(!ssl_printf(ssl, "unbound (pid %d) is running...\n",
usr.sbin/unbound/daemon/remote.c
3054
do_dump_requestlist(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
3062
if(!ssl_printf(ssl, "thread #%d\n", worker->thread_num))
usr.sbin/unbound/daemon/remote.c
3064
if(!ssl_printf(ssl, "# type cl name seconds module status\n"))
usr.sbin/unbound/daemon/remote.c
3075
if(!ssl_printf(ssl, "%3d %4s %2s %s %s %s\n",
usr.sbin/unbound/daemon/remote.c
3093
RES* ssl;
usr.sbin/unbound/daemon/remote.c
3123
if(!ssl_printf(a->ssl, "%s %s expired rto %d\n", ip_str,
usr.sbin/unbound/daemon/remote.c
3131
if(!ssl_printf(a->ssl, "%s %s ttl %lu ping %d var %d rtt %d rto %d "
usr.sbin/unbound/daemon/remote.c
3148
do_dump_infra(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
3152
arg.ssl = ssl;
usr.sbin/unbound/daemon/remote.c
3160
do_log_reopen(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
3163
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3169
do_auth_zone_reload(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3178
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
3197
(void)ssl_printf(ssl, "error no auth-zone %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3205
(void)ssl_printf(ssl, "error failed to read %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3216
(void)ssl_printf(ssl, "zone %s has no contents\n", arg);
usr.sbin/unbound/daemon/remote.c
3221
(void)ssl_printf(ssl, "error: no SOA in zone after read %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3236
(void)ssl_printf(ssl, "error zonemd for %s failed: %s\n",
usr.sbin/unbound/daemon/remote.c
3242
(void)ssl_printf(ssl, "%s: %s\n", arg, reason);
usr.sbin/unbound/daemon/remote.c
3246
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3251
do_auth_zone_transfer(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3257
if(!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
3261
(void)ssl_printf(ssl, "error zone xfr task not found %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3266
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3271
do_set_option(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3274
if(!find_arg2(ssl, arg, &arg2))
usr.sbin/unbound/daemon/remote.c
3277
(void)ssl_printf(ssl, "error setting option\n");
usr.sbin/unbound/daemon/remote.c
3288
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3294
RES* ssl = (RES*)arg;
usr.sbin/unbound/daemon/remote.c
3295
(void)ssl_printf(ssl, "%s\n", line);
usr.sbin/unbound/daemon/remote.c
3300
do_get_option(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3303
r = config_get_option(worker->env.cfg, arg, remote_get_opt_ssl, ssl);
usr.sbin/unbound/daemon/remote.c
3305
(void)ssl_printf(ssl, "error unknown option\n");
usr.sbin/unbound/daemon/remote.c
3312
do_list_forwards(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
3333
if(!ssl_print_name_dp(ssl, (insecure?"forward +i":"forward"),
usr.sbin/unbound/daemon/remote.c
3344
do_list_stubs(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
3365
if(!ssl_print_name_dp(ssl, str, z->node.name,
usr.sbin/unbound/daemon/remote.c
3376
do_list_auth_zones(RES* ssl, struct auth_zones* az)
usr.sbin/unbound/daemon/remote.c
3418
if(!ssl_printf(ssl, "%s\t%s%s\n", buf, buf2, buf3)) {
usr.sbin/unbound/daemon/remote.c
3429
do_list_local_zones(RES* ssl, struct local_zones* zones)
usr.sbin/unbound/daemon/remote.c
3437
if(!ssl_printf(ssl, "%s %s\n", buf,
usr.sbin/unbound/daemon/remote.c
3451
do_list_local_data(RES* ssl, struct worker* worker, struct local_zones* zones)
usr.sbin/unbound/daemon/remote.c
3469
if(!ssl_printf(ssl, "BADRR\n")) {
usr.sbin/unbound/daemon/remote.c
3475
if(!ssl_printf(ssl, "%s\n", s)) {
usr.sbin/unbound/daemon/remote.c
3490
do_view_list_local_zones(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3495
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3499
do_list_local_zones(ssl, v->local_zones);
usr.sbin/unbound/daemon/remote.c
3506
do_view_list_local_data(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3511
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3515
do_list_local_data(ssl, worker, v->local_zones);
usr.sbin/unbound/daemon/remote.c
3525
RES* ssl;
usr.sbin/unbound/daemon/remote.c
3551
ssl_printf(a->ssl, "%s %d limit %d\n", buf, max, lim);
usr.sbin/unbound/daemon/remote.c
3569
ssl_printf(a->ssl, "%s %d limit %d\n", ip, max, lim);
usr.sbin/unbound/daemon/remote.c
3574
do_ratelimit_list(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3580
a.ssl = ssl;
usr.sbin/unbound/daemon/remote.c
3593
do_ip_ratelimit_list(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3599
a.ssl = ssl;
usr.sbin/unbound/daemon/remote.c
3612
do_rpz_enable_disable(RES* ssl, struct worker* worker, char* arg, int enable) {
usr.sbin/unbound/daemon/remote.c
3618
if (!parse_arg_name(ssl, arg, &nm, &nmlen, &nmlabs))
usr.sbin/unbound/daemon/remote.c
3630
(void) ssl_printf(ssl, "error no auth-zone %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3634
(void) ssl_printf(ssl, "error auth-zone %s not RPZ\n", arg);
usr.sbin/unbound/daemon/remote.c
3644
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3649
do_rpz_enable(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3651
do_rpz_enable_disable(ssl, worker, arg, 1);
usr.sbin/unbound/daemon/remote.c
3656
do_rpz_disable(RES* ssl, struct worker* worker, char* arg)
usr.sbin/unbound/daemon/remote.c
3658
do_rpz_enable_disable(ssl, worker, arg, 0);
usr.sbin/unbound/daemon/remote.c
3664
cookie_secret_file_dump(RES* ssl, struct worker* worker) {
usr.sbin/unbound/daemon/remote.c
3671
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3678
(void)ssl_printf(ssl, "unable to open cookie secret file %s: %s",
usr.sbin/unbound/daemon/remote.c
3706
do_activate_cookie_secret(RES* ssl, struct worker* worker) {
usr.sbin/unbound/daemon/remote.c
3711
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3715
(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
usr.sbin/unbound/daemon/remote.c
3722
(void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
usr.sbin/unbound/daemon/remote.c
3726
if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
usr.sbin/unbound/daemon/remote.c
3728
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3734
(void)cookie_secret_file_dump(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3736
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3741
do_drop_cookie_secret(RES* ssl, struct worker* worker) {
usr.sbin/unbound/daemon/remote.c
3746
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3750
(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
usr.sbin/unbound/daemon/remote.c
3757
(void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
usr.sbin/unbound/daemon/remote.c
3761
if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
usr.sbin/unbound/daemon/remote.c
3763
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3769
(void)cookie_secret_file_dump(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3771
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3776
do_add_cookie_secret(RES* ssl, struct worker* worker, char* arg) {
usr.sbin/unbound/daemon/remote.c
3782
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3788
(void)ssl_printf(ssl, "error: out of memory");
usr.sbin/unbound/daemon/remote.c
3797
(void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
usr.sbin/unbound/daemon/remote.c
3803
(void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
usr.sbin/unbound/daemon/remote.c
3804
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/unbound/daemon/remote.c
3812
(void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
usr.sbin/unbound/daemon/remote.c
3813
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/unbound/daemon/remote.c
3817
if(worker->thread_num == 0 && !cookie_secret_file_dump(ssl, worker)) {
usr.sbin/unbound/daemon/remote.c
3821
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3828
(void)cookie_secret_file_dump(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3831
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3836
do_print_cookie_secrets(RES* ssl, struct worker* worker) {
usr.sbin/unbound/daemon/remote.c
3854
(void)ssl_printf(ssl, "active : %s\n", secret_hex);
usr.sbin/unbound/daemon/remote.c
3856
(void)ssl_printf(ssl, "staging: %s\n", secret_hex);
usr.sbin/unbound/daemon/remote.c
3858
(void)ssl_printf(ssl, "staging[%d]: %s\n", i,
usr.sbin/unbound/daemon/remote.c
3867
cmd_no_args(RES* ssl, char* cmd, char* p)
usr.sbin/unbound/daemon/remote.c
3882
(void)ssl_printf(ssl, "error command %s takes no arguments,"
usr.sbin/unbound/daemon/remote.c
3898
execute_cmd(struct daemon_remote* rc, struct rc_state* s, RES* ssl, char* cmd,
usr.sbin/unbound/daemon/remote.c
3904
if(cmd_no_args(ssl, p, skipwhite(p+4)))
usr.sbin/unbound/daemon/remote.c
3906
do_stop(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3909
if(cmd_no_args(ssl, p, skipwhite(p+17)))
usr.sbin/unbound/daemon/remote.c
3911
do_reload(ssl, worker, 1);
usr.sbin/unbound/daemon/remote.c
3914
if(cmd_no_args(ssl, p, skipwhite(p+6)))
usr.sbin/unbound/daemon/remote.c
3916
do_reload(ssl, worker, 0);
usr.sbin/unbound/daemon/remote.c
3919
do_fast_reload(ssl, worker, s, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
3922
if(cmd_no_args(ssl, p, skipwhite(p+13)))
usr.sbin/unbound/daemon/remote.c
3924
do_stats(ssl, worker, 0);
usr.sbin/unbound/daemon/remote.c
3927
if(cmd_no_args(ssl, p, skipwhite(p+5)))
usr.sbin/unbound/daemon/remote.c
3929
do_stats(ssl, worker, 1);
usr.sbin/unbound/daemon/remote.c
3932
if(cmd_no_args(ssl, p, skipwhite(p+6)))
usr.sbin/unbound/daemon/remote.c
3934
do_status(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3937
if(cmd_no_args(ssl, p, skipwhite(p+10)))
usr.sbin/unbound/daemon/remote.c
3941
(void)ssl_printf(ssl, "dump_cache/load_cache is not "
usr.sbin/unbound/daemon/remote.c
3946
(void)dump_cache(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3949
if(cmd_no_args(ssl, p, skipwhite(p+10)))
usr.sbin/unbound/daemon/remote.c
3958
if(load_cache(ssl, worker)) send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
3961
if(cmd_no_args(ssl, p, skipwhite(p+13)))
usr.sbin/unbound/daemon/remote.c
3963
do_list_forwards(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3966
if(cmd_no_args(ssl, p, skipwhite(p+10)))
usr.sbin/unbound/daemon/remote.c
3968
do_list_stubs(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3971
if(cmd_no_args(ssl, p, skipwhite(p+13)))
usr.sbin/unbound/daemon/remote.c
3973
do_insecure_list(ssl, worker);
usr.sbin/unbound/daemon/remote.c
3976
if(cmd_no_args(ssl, p, skipwhite(p+16)))
usr.sbin/unbound/daemon/remote.c
3978
do_list_local_zones(ssl, worker->daemon->local_zones);
usr.sbin/unbound/daemon/remote.c
3981
if(cmd_no_args(ssl, p, skipwhite(p+15)))
usr.sbin/unbound/daemon/remote.c
3983
do_list_local_data(ssl, worker, worker->daemon->local_zones);
usr.sbin/unbound/daemon/remote.c
3986
do_view_list_local_zones(ssl, worker, skipwhite(p+21));
usr.sbin/unbound/daemon/remote.c
3989
do_view_list_local_data(ssl, worker, skipwhite(p+20));
usr.sbin/unbound/daemon/remote.c
3992
do_ratelimit_list(ssl, worker, p+14);
usr.sbin/unbound/daemon/remote.c
3995
do_ip_ratelimit_list(ssl, worker, p+17);
usr.sbin/unbound/daemon/remote.c
3998
if(cmd_no_args(ssl, p, skipwhite(p+15)))
usr.sbin/unbound/daemon/remote.c
4000
do_list_auth_zones(ssl, worker->env.auth_zones);
usr.sbin/unbound/daemon/remote.c
4003
do_auth_zone_reload(ssl, worker, skipwhite(p+16));
usr.sbin/unbound/daemon/remote.c
4006
do_auth_zone_transfer(ssl, worker, skipwhite(p+18));
usr.sbin/unbound/daemon/remote.c
4010
if(rc) distribute_cmd(rc, ssl, cmd);
usr.sbin/unbound/daemon/remote.c
4011
do_insecure_add(ssl, worker, skipwhite(p+12));
usr.sbin/unbound/daemon/remote.c
4015
if(rc) distribute_cmd(rc, ssl, cmd);
usr.sbin/unbound/daemon/remote.c
4016
do_insecure_remove(ssl, worker, skipwhite(p+15));
usr.sbin/unbound/daemon/remote.c
4020
if(cmd_no_args(ssl, p, skipwhite(p+11)))
usr.sbin/unbound/daemon/remote.c
4022
if(rc) distribute_cmd(rc, ssl, cmd);
usr.sbin/unbound/daemon/remote.c
4023
do_flush_stats(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4027
if(cmd_no_args(ssl, p, skipwhite(p+17)))
usr.sbin/unbound/daemon/remote.c
4029
if(rc) distribute_cmd(rc, ssl, cmd);
usr.sbin/unbound/daemon/remote.c
4030
do_flush_requestlist(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4033
do_cache_lookup(ssl, worker, skipwhite(p+12));
usr.sbin/unbound/daemon/remote.c
4036
do_lookup(ssl, worker, skipwhite(p+6));
usr.sbin/unbound/daemon/remote.c
4042
if(cmd_no_args(ssl, p, skipwhite(p+18)))
usr.sbin/unbound/daemon/remote.c
4044
do_zones_remove(rc, ssl, worker);
usr.sbin/unbound/daemon/remote.c
4047
if(cmd_no_args(ssl, p, skipwhite(p+11)))
usr.sbin/unbound/daemon/remote.c
4049
do_zones_add(rc, ssl, worker);
usr.sbin/unbound/daemon/remote.c
4052
if(cmd_no_args(ssl, p, skipwhite(p+18)))
usr.sbin/unbound/daemon/remote.c
4054
do_datas_remove(rc, ssl, worker);
usr.sbin/unbound/daemon/remote.c
4057
if(cmd_no_args(ssl, p, skipwhite(p+11)))
usr.sbin/unbound/daemon/remote.c
4059
do_datas_add(rc, ssl, worker);
usr.sbin/unbound/daemon/remote.c
4062
do_view_datas_remove(rc, ssl, worker, skipwhite(p+23));
usr.sbin/unbound/daemon/remote.c
4065
do_view_datas_add(rc, ssl, worker, skipwhite(p+16));
usr.sbin/unbound/daemon/remote.c
4068
if(cmd_no_args(ssl, p, skipwhite(p+20)))
usr.sbin/unbound/daemon/remote.c
4070
do_print_cookie_secrets(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4079
distribute_cmd(rc, ssl, cmd);
usr.sbin/unbound/daemon/remote.c
4083
do_verbosity(ssl, skipwhite(p+9));
usr.sbin/unbound/daemon/remote.c
4085
do_zone_remove(ssl, worker->daemon->local_zones, skipwhite(p+17));
usr.sbin/unbound/daemon/remote.c
4087
do_zone_add(ssl, worker->daemon->local_zones, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4089
do_data_remove(ssl, worker->daemon->local_zones, skipwhite(p+17));
usr.sbin/unbound/daemon/remote.c
4091
do_data_add(ssl, worker->daemon->local_zones, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4093
do_forward_add(ssl, worker, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
4095
do_forward_remove(ssl, worker, skipwhite(p+14));
usr.sbin/unbound/daemon/remote.c
4097
do_forward(ssl, worker, skipwhite(p+7));
usr.sbin/unbound/daemon/remote.c
4099
do_stub_add(ssl, worker, skipwhite(p+8));
usr.sbin/unbound/daemon/remote.c
4101
do_stub_remove(ssl, worker, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
4103
do_view_zone_remove(ssl, worker, skipwhite(p+22));
usr.sbin/unbound/daemon/remote.c
4105
do_view_zone_add(ssl, worker, skipwhite(p+15));
usr.sbin/unbound/daemon/remote.c
4107
do_view_data_remove(ssl, worker, skipwhite(p+22));
usr.sbin/unbound/daemon/remote.c
4109
do_view_data_add(ssl, worker, skipwhite(p+15));
usr.sbin/unbound/daemon/remote.c
4111
do_flush_zone(ssl, worker, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4113
do_flush_type(ssl, worker, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4115
do_flush_infra(ssl, worker, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
4117
do_flush_name(ssl, worker, skipwhite(p+5));
usr.sbin/unbound/daemon/remote.c
4119
if(cmd_no_args(ssl, p, skipwhite(p+16)))
usr.sbin/unbound/daemon/remote.c
4121
do_dump_requestlist(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4123
if(cmd_no_args(ssl, p, skipwhite(p+10)))
usr.sbin/unbound/daemon/remote.c
4125
do_dump_infra(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4127
if(cmd_no_args(ssl, p, skipwhite(p+10)))
usr.sbin/unbound/daemon/remote.c
4129
do_log_reopen(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4131
do_set_option(ssl, worker, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4133
do_get_option(ssl, worker, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4135
do_flush_bogus(ssl, worker, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
4137
do_flush_negative(ssl, worker, skipwhite(p+14));
usr.sbin/unbound/daemon/remote.c
4139
do_rpz_enable(ssl, worker, skipwhite(p+10));
usr.sbin/unbound/daemon/remote.c
4141
do_rpz_disable(ssl, worker, skipwhite(p+11));
usr.sbin/unbound/daemon/remote.c
4143
do_add_cookie_secret(ssl, worker, skipwhite(p+17));
usr.sbin/unbound/daemon/remote.c
4145
if(cmd_no_args(ssl, p, skipwhite(p+18)))
usr.sbin/unbound/daemon/remote.c
4147
do_drop_cookie_secret(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4149
if(cmd_no_args(ssl, p, skipwhite(p+22)))
usr.sbin/unbound/daemon/remote.c
4151
do_activate_cookie_secret(ssl, worker);
usr.sbin/unbound/daemon/remote.c
4153
(void)ssl_printf(ssl, "error unknown command '%s'\n", p);
usr.sbin/unbound/daemon/remote.c
4188
if(res->ssl) {
usr.sbin/unbound/daemon/remote.c
4190
if((r=SSL_read(res->ssl, magic, (int)sizeof(magic)-1)) <= 0) {
usr.sbin/unbound/daemon/remote.c
4192
if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN)
usr.sbin/unbound/daemon/remote.c
4280
if(s->ssl) {
usr.sbin/unbound/daemon/remote.c
4283
r = SSL_do_handshake(s->ssl);
usr.sbin/unbound/daemon/remote.c
4285
int r2 = SSL_get_error(s->ssl, r);
usr.sbin/unbound/daemon/remote.c
4294
} else if(SSL_get_verify_result(s->ssl) == X509_V_OK) {
usr.sbin/unbound/daemon/remote.c
4296
X509* x = SSL_get1_peer_certificate(s->ssl);
usr.sbin/unbound/daemon/remote.c
4298
X509* x = SSL_get_peer_certificate(s->ssl);
usr.sbin/unbound/daemon/remote.c
4316
res.ssl = s->ssl;
usr.sbin/unbound/daemon/remote.c
495
n->ssl = SSL_new(rc->ctx);
usr.sbin/unbound/daemon/remote.c
496
if(!n->ssl) {
usr.sbin/unbound/daemon/remote.c
502
SSL_set_accept_state(n->ssl);
usr.sbin/unbound/daemon/remote.c
503
(void)SSL_set_mode(n->ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/daemon/remote.c
504
if(!SSL_set_fd(n->ssl, newfd)) {
usr.sbin/unbound/daemon/remote.c
506
SSL_free(n->ssl);
usr.sbin/unbound/daemon/remote.c
512
n->ssl = NULL;
usr.sbin/unbound/daemon/remote.c
5383
if((m1->ssl && !m2->ssl) || (!m1->ssl && m2->ssl))
usr.sbin/unbound/daemon/remote.c
550
if(s->ssl) {
usr.sbin/unbound/daemon/remote.c
551
SSL_shutdown(s->ssl);
usr.sbin/unbound/daemon/remote.c
552
SSL_free(s->ssl);
usr.sbin/unbound/daemon/remote.c
564
if(res->ssl) {
usr.sbin/unbound/daemon/remote.c
566
if((r=SSL_write(res->ssl, text, (int)strlen(text))) <= 0) {
usr.sbin/unbound/daemon/remote.c
568
if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/daemon/remote.c
595
ssl_print_vmsg(RES* ssl, const char* format, va_list args)
usr.sbin/unbound/daemon/remote.c
599
return ssl_print_text(ssl, msg);
usr.sbin/unbound/daemon/remote.c
603
int ssl_printf(RES* ssl, const char* format, ...)
usr.sbin/unbound/daemon/remote.c
608
ret = ssl_print_vmsg(ssl, format, args);
usr.sbin/unbound/daemon/remote.c
621
if(res->ssl) {
usr.sbin/unbound/daemon/remote.c
623
if((r=SSL_read(res->ssl, buf+len, 1)) <= 0) {
usr.sbin/unbound/daemon/remote.c
625
if((r2=SSL_get_error(res->ssl, r)) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/daemon/remote.c
672
static void send_ok(RES* ssl)
usr.sbin/unbound/daemon/remote.c
674
(void)ssl_printf(ssl, "ok\n");
usr.sbin/unbound/daemon/remote.c
679
distribute_cmd(struct daemon_remote* rc, RES* ssl, char* cmd)
usr.sbin/unbound/daemon/remote.c
682
if(!cmd || !ssl)
usr.sbin/unbound/daemon/remote.c
690
(void)ssl_printf(ssl, "error could not distribute cmd\n");
usr.sbin/unbound/daemon/remote.c
698
do_stop(RES* ssl, struct worker* worker)
usr.sbin/unbound/daemon/remote.c
702
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
707
do_reload(RES* ssl, struct worker* worker, int reuse_cache)
usr.sbin/unbound/daemon/remote.c
712
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
718
fr_parse_options(RES* ssl, char* arg, int* fr_verb, int* fr_nopause,
usr.sbin/unbound/daemon/remote.c
732
if(!ssl_printf(ssl,
usr.sbin/unbound/daemon/remote.c
743
if(!ssl_printf(ssl, "error: unknown option '%s'\n", argp))
usr.sbin/unbound/daemon/remote.c
753
do_fast_reload(RES* ssl, struct worker* worker, struct rc_state* s, char* arg)
usr.sbin/unbound/daemon/remote.c
756
if(!ssl_printf(ssl, "error: no threads for fast_reload, compiled without threads.\n"))
usr.sbin/unbound/daemon/remote.c
763
if(!fr_parse_options(ssl, arg, &fr_verb, &fr_nopause, &fr_drop_mesh))
usr.sbin/unbound/daemon/remote.c
766
if(!ssl_printf(ssl, "start fast_reload\n"))
usr.sbin/unbound/daemon/remote.c
769
fast_reload_thread_start(ssl, worker, s, fr_verb, fr_nopause,
usr.sbin/unbound/daemon/remote.c
776
do_verbosity(RES* ssl, char* str)
usr.sbin/unbound/daemon/remote.c
780
ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
usr.sbin/unbound/daemon/remote.c
784
send_ok(ssl);
usr.sbin/unbound/daemon/remote.c
7848
r = SSL_write(printq->remote.ssl,
usr.sbin/unbound/daemon/remote.c
7852
int want = SSL_get_error(printq->remote.ssl, r);
usr.sbin/unbound/daemon/remote.c
789
print_stats(RES* ssl, const char* nm, struct ub_stats_info* s)
usr.sbin/unbound/daemon/remote.c
792
if(!ssl_printf(ssl, "%s.num.queries"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
7928
if(printq->remote.ssl) {
usr.sbin/unbound/daemon/remote.c
794
if(!ssl_printf(ssl, "%s.num.queries_ip_ratelimited"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
796
if(!ssl_printf(ssl, "%s.num.queries_cookie_valid"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
798
if(!ssl_printf(ssl, "%s.num.queries_cookie_client"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
800
if(!ssl_printf(ssl, "%s.num.queries_cookie_invalid"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
802
if(!ssl_printf(ssl, "%s.num.queries_discard_timeout"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
804
if(!ssl_printf(ssl, "%s.num.queries_wait_limit"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
806
if(!ssl_printf(ssl, "%s.num.cachehits"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8077
if(printq->remote.ssl) {
usr.sbin/unbound/daemon/remote.c
8078
SSL_shutdown(printq->remote.ssl);
usr.sbin/unbound/daemon/remote.c
8079
SSL_free(printq->remote.ssl);
usr.sbin/unbound/daemon/remote.c
809
if(!ssl_printf(ssl, "%s.num.cachemiss"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
811
if(!ssl_printf(ssl, "%s.num.prefetch"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
813
if(!ssl_printf(ssl, "%s.num.queries_timed_out"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
815
if(!ssl_printf(ssl, "%s.query.queue_time_us.max"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8162
fast_reload_thread_start(RES* ssl, struct worker* worker, struct rc_state* s,
usr.sbin/unbound/daemon/remote.c
817
if(!ssl_printf(ssl, "%s.num.expired"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8171
if(!ssl_printf(ssl, "error could not setup thread\n"))
usr.sbin/unbound/daemon/remote.c
819
if(!ssl_printf(ssl, "%s.num.recursivereplies"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8193
if(!ssl_printf(ssl, "error out of memory\n"))
usr.sbin/unbound/daemon/remote.c
8200
if(!ssl_printf(ssl, "error out of memory adding service event\n"))
usr.sbin/unbound/daemon/remote.c
822
if(!ssl_printf(ssl, "%s.num.dnscrypt.crypted"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8220
if(!ssl_printf(ssl, "error out of memory create printq\n"))
usr.sbin/unbound/daemon/remote.c
8224
worker->daemon->fast_reload_thread->printq->remote = *ssl;
usr.sbin/unbound/daemon/remote.c
824
if(!ssl_printf(ssl, "%s.num.dnscrypt.cert"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
826
if(!ssl_printf(ssl, "%s.num.dnscrypt.cleartext"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
828
if(!ssl_printf(ssl, "%s.num.dnscrypt.malformed"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
831
if(!ssl_printf(ssl, "%s.num.dns_error_reports"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
833
if(!ssl_printf(ssl, "%s.requestlist.avg"SQ"%g\n", nm,
usr.sbin/unbound/daemon/remote.c
838
if(!ssl_printf(ssl, "%s.requestlist.max"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
840
if(!ssl_printf(ssl, "%s.requestlist.overwritten"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
842
if(!ssl_printf(ssl, "%s.requestlist.exceeded"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
844
if(!ssl_printf(ssl, "%s.requestlist.current.all"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
846
if(!ssl_printf(ssl, "%s.requestlist.current.user"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
853
if(!ssl_printf(ssl, "%s.recursion.time.avg"SQ ARG_LL "d.%6.6d\n", nm,
usr.sbin/unbound/daemon/remote.c
855
if(!ssl_printf(ssl, "%s.recursion.time.median"SQ"%g\n", nm,
usr.sbin/unbound/daemon/remote.c
857
if(!ssl_printf(ssl, "%s.tcpusage"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
864
print_thread_stats(RES* ssl, int i, struct ub_stats_info* s)
usr.sbin/unbound/daemon/remote.c
869
return print_stats(ssl, nm, s);
usr.sbin/unbound/daemon/remote.c
874
print_longnum(RES* ssl, const char* desc, size_t x)
usr.sbin/unbound/daemon/remote.c
880
return ssl_printf(ssl, "%s%u%6.6u\n", desc,
usr.sbin/unbound/daemon/remote.c
883
return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
usr.sbin/unbound/daemon/remote.c
889
print_mem(RES* ssl, struct worker* worker, struct daemon* daemon,
usr.sbin/unbound/daemon/remote.c
928
if(!print_longnum(ssl, "mem.cache.rrset"SQ, rrset))
usr.sbin/unbound/daemon/remote.c
930
if(!print_longnum(ssl, "mem.cache.message"SQ, msg))
usr.sbin/unbound/daemon/remote.c
932
if(!print_longnum(ssl, "mem.mod.iterator"SQ, iter))
usr.sbin/unbound/daemon/remote.c
934
if(!print_longnum(ssl, "mem.mod.validator"SQ, val))
usr.sbin/unbound/daemon/remote.c
936
if(!print_longnum(ssl, "mem.mod.respip"SQ, respip))
usr.sbin/unbound/daemon/remote.c
939
if(!print_longnum(ssl, "mem.mod.subnet"SQ, subnet))
usr.sbin/unbound/daemon/remote.c
943
if(!print_longnum(ssl, "mem.mod.ipsecmod"SQ, ipsecmod))
usr.sbin/unbound/daemon/remote.c
947
if(!print_longnum(ssl, "mem.cache.dnscrypt_shared_secret"SQ,
usr.sbin/unbound/daemon/remote.c
950
if(!print_longnum(ssl, "mem.cache.dnscrypt_nonce"SQ,
usr.sbin/unbound/daemon/remote.c
955
if(!print_longnum(ssl, "mem.mod.dynlibmod"SQ, dynlib))
usr.sbin/unbound/daemon/remote.c
958
if(!print_longnum(ssl, "mem.streamwait"SQ,
usr.sbin/unbound/daemon/remote.c
961
if(!print_longnum(ssl, "mem.http.query_buffer"SQ,
usr.sbin/unbound/daemon/remote.c
964
if(!print_longnum(ssl, "mem.http.response_buffer"SQ,
usr.sbin/unbound/daemon/remote.c
968
if(!print_longnum(ssl, "mem.quic"SQ, (size_t)s->svr.mem_quic))
usr.sbin/unbound/daemon/remote.c
976
print_uptime(RES* ssl, struct worker* worker, int reset)
usr.sbin/unbound/daemon/remote.c
984
if(!ssl_printf(ssl, "time.now"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.c
986
if(!ssl_printf(ssl, "time.up"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.c
988
if(!ssl_printf(ssl, "time.elapsed"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.c
995
print_hist(RES* ssl, struct ub_stats_info* s)
usr.sbin/unbound/daemon/remote.h
116
SSL* ssl;
usr.sbin/unbound/daemon/remote.h
317
int ssl_print_text(RES* ssl, const char* text);
usr.sbin/unbound/daemon/remote.h
325
int ssl_printf(RES* ssl, const char* format, ...)
usr.sbin/unbound/daemon/remote.h
336
int ssl_read_line(RES* ssl, char* buf, size_t max);
usr.sbin/unbound/daemon/remote.h
351
void fast_reload_thread_start(RES* ssl, struct worker* worker,
usr.sbin/unbound/daemon/remote.h
76
SSL* ssl;
usr.sbin/unbound/daemon/stats.c
547
if(c->ssl != NULL) {
usr.sbin/unbound/daemon/stats.c
550
if(SSL_session_reused(c->ssl))
usr.sbin/unbound/daemon/worker.c
1550
dt_msg_send_client_query(&worker->dtenv, &repinfo->client_addr, (void*)repinfo->c->socket->addr, c->type, c->ssl, c->buffer,
usr.sbin/unbound/daemon/worker.c
2035
dt_msg_send_client_response(&worker->dtenv, &repinfo->client_addr, (void*)repinfo->c->socket->addr, c->type, c->ssl, c->buffer);
usr.sbin/unbound/daemon/worker.c
2051
c->type, c->ssl);
usr.sbin/unbound/daemon/worker.c
2057
c->type, c->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1009
r = SSL_read(dtio->ssl, buf, len);
usr.sbin/unbound/dnstap/dtstream.c
1011
int want = SSL_get_error(dtio->ssl, r);
usr.sbin/unbound/dnstap/dtstream.c
1083
if(dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.c
1129
if(dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.c
1335
if((SSL_get_verify_mode(dtio->ssl)&SSL_VERIFY_PEER)) {
usr.sbin/unbound/dnstap/dtstream.c
1337
if(SSL_get_verify_result(dtio->ssl) == X509_V_OK) {
usr.sbin/unbound/dnstap/dtstream.c
1339
X509* x = SSL_get1_peer_certificate(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1341
X509* x = SSL_get_peer_certificate(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1352
if(SSL_get0_peername(dtio->ssl)) {
usr.sbin/unbound/dnstap/dtstream.c
1356
SSL_get0_peername(dtio->ssl));
usr.sbin/unbound/dnstap/dtstream.c
1368
X509* x = SSL_get1_peer_certificate(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1370
X509* x = SSL_get_peer_certificate(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1410
r = SSL_do_handshake(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
1412
int want = SSL_get_error(dtio->ssl, r);
usr.sbin/unbound/dnstap/dtstream.c
1505
if(dtio->ssl &&
usr.sbin/unbound/dnstap/dtstream.c
1757
if(dtio->ssl &&
usr.sbin/unbound/dnstap/dtstream.c
1817
if(dtio->ssl && !dtio->ssl_handshake_done) {
usr.sbin/unbound/dnstap/dtstream.c
2043
dtio->ssl = outgoing_ssl_fd(dtio->ssl_ctx, dtio->fd);
usr.sbin/unbound/dnstap/dtstream.c
2044
if(!dtio->ssl) return 0;
usr.sbin/unbound/dnstap/dtstream.c
2048
if(!set_auth_name_on_ssl(dtio->ssl, dtio->tls_server_name,
usr.sbin/unbound/dnstap/dtstream.c
2086
if(dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.c
2088
SSL_free(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
2089
dtio->ssl = NULL;
usr.sbin/unbound/dnstap/dtstream.c
2104
if(dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.c
2106
SSL_free(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
2107
dtio->ssl = NULL;
usr.sbin/unbound/dnstap/dtstream.c
687
if(dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.c
689
SSL_shutdown(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
690
SSL_free(dtio->ssl);
usr.sbin/unbound/dnstap/dtstream.c
691
dtio->ssl = NULL;
usr.sbin/unbound/dnstap/dtstream.c
769
r = SSL_write(dtio->ssl, buf, len);
usr.sbin/unbound/dnstap/dtstream.c
771
int want = SSL_get_error(dtio->ssl, r);
usr.sbin/unbound/dnstap/dtstream.c
814
if(dtio->ssl)
usr.sbin/unbound/dnstap/dtstream.c
895
if(!dtio->ssl) {
usr.sbin/unbound/dnstap/dtstream.h
152
void* ssl;
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
1052
if(data->ssl && (!data->ssl_handshake_done ||
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
121
SSL* ssl;
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
1220
data->ssl = incoming_ssl_fd(tap_sock->sslctx, data->fd);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
1221
if(!data->ssl) fatal_exit("could not SSL_new");
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
212
SSL_free(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
780
r = SSL_read(data->ssl, buf, len);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
782
int want = SSL_get_error(data->ssl, r);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
821
if(data->ssl)
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
842
if(data->ssl) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
845
if((r=SSL_write(data->ssl, acceptframe, len)) <= 0) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
847
if((r2=SSL_get_error(data->ssl, r)) == SSL_ERROR_ZERO_RETURN)
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
890
if(data->ssl) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
893
if((r=SSL_write(data->ssl, finishframe, len)) <= 0) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
895
if((r2=SSL_get_error(data->ssl, r)) == SSL_ERROR_ZERO_RETURN)
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
928
if((SSL_get_verify_mode(data->ssl)&SSL_VERIFY_PEER)) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
930
if(SSL_get_verify_result(data->ssl) == X509_V_OK) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
932
X509* x = SSL_get1_peer_certificate(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
934
X509* x = SSL_get_peer_certificate(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
944
if(SSL_get0_peername(data->ssl)) {
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
947
SSL_get0_peername(data->ssl));
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
958
X509* x = SSL_get1_peer_certificate(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
960
X509* x = SSL_get_peer_certificate(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
993
r = SSL_do_handshake(data->ssl);
usr.sbin/unbound/dnstap/unbound-dnstap-socket.c
995
int want = SSL_get_error(data->ssl, r);
usr.sbin/unbound/services/authzone.c
5535
&addr, addrlen, -1, master->ssl, master->host,
usr.sbin/unbound/services/authzone.c
7226
parse_url(char* url, char** host, char** file, int* port, int* ssl)
usr.sbin/unbound/services/authzone.c
7232
*ssl = 1;
usr.sbin/unbound/services/authzone.c
7238
*ssl = 0;
usr.sbin/unbound/services/authzone.c
7311
if(!parse_url(p->str, &m->host, &m->file, &m->port, &m->ssl))
usr.sbin/unbound/services/authzone.h
461
int ssl;
usr.sbin/unbound/services/listen_dnsport.c
1637
cp->ssl = NULL;
usr.sbin/unbound/services/listen_dnsport.c
1639
cp->ssl = quic_sslctx;
usr.sbin/unbound/services/listen_dnsport.c
1641
cp->ssl = doh_sslctx;
usr.sbin/unbound/services/listen_dnsport.c
1643
cp->ssl = dot_sslctx;
usr.sbin/unbound/services/listen_dnsport.c
3595
lock_protect(&conn->lock, &conn->ssl, sizeof(conn->ssl));
usr.sbin/unbound/services/listen_dnsport.c
3637
SSL_set_app_data(conn->ssl, NULL);
usr.sbin/unbound/services/listen_dnsport.c
3642
SSL_free(conn->ssl);
usr.sbin/unbound/services/listen_dnsport.c
4304
SSL_get_cipher_name(doq_conn->ssl));
usr.sbin/unbound/services/listen_dnsport.c
4309
SSL_get0_alpn_selected(doq_conn->ssl, &alpn, &alpnlen);
usr.sbin/unbound/services/listen_dnsport.c
4527
doq_set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
usr.sbin/unbound/services/listen_dnsport.c
4531
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4576
doq_add_handshake_data(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
usr.sbin/unbound/services/listen_dnsport.c
4579
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4609
doq_flush_flight(SSL* ATTR_UNUSED(ssl))
usr.sbin/unbound/services/listen_dnsport.c
4616
doq_send_alert(SSL *ssl, enum ssl_encryption_level_t ATTR_UNUSED(level),
usr.sbin/unbound/services/listen_dnsport.c
4619
struct doq_conn* doq_conn = (struct doq_conn*)SSL_get_app_data(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4627
doq_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
usr.sbin/unbound/services/listen_dnsport.c
4756
SSL* ssl = SSL_new(ctx);
usr.sbin/unbound/services/listen_dnsport.c
4757
if(!ssl) {
usr.sbin/unbound/services/listen_dnsport.c
4765
SSL_free(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4768
ngtcp2_crypto_ossl_ctx_set_ssl(conn->ossl_ctx, ssl);
usr.sbin/unbound/services/listen_dnsport.c
4769
if(ngtcp2_crypto_ossl_configure_server_session(ssl) != 0) {
usr.sbin/unbound/services/listen_dnsport.c
4771
SSL_free(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4778
SSL_set_app_data(ssl, &conn->conn_ref);
usr.sbin/unbound/services/listen_dnsport.c
4780
SSL_set_app_data(ssl, conn);
usr.sbin/unbound/services/listen_dnsport.c
4782
SSL_set_accept_state(ssl);
usr.sbin/unbound/services/listen_dnsport.c
4784
SSL_set_quic_tls_early_data_enabled(ssl, 1);
usr.sbin/unbound/services/listen_dnsport.c
4786
SSL_set_quic_early_data_enabled(ssl, 1);
usr.sbin/unbound/services/listen_dnsport.c
4788
return ssl;
usr.sbin/unbound/services/listen_dnsport.c
4902
conn->ssl = doq_ssl_server_setup((SSL_CTX*)conn->doq_socket->ctx,
usr.sbin/unbound/services/listen_dnsport.c
4904
if(!conn->ssl) {
usr.sbin/unbound/services/listen_dnsport.c
4911
ngtcp2_conn_set_tls_native_handle(conn->conn, conn->ssl);
usr.sbin/unbound/services/listen_dnsport.h
611
void* ssl;
usr.sbin/unbound/services/mesh.c
1582
r->query_reply.c->type, r->query_reply.c->ssl);
usr.sbin/unbound/services/outside_network.c
1203
if(pend->c->ssl) {
usr.sbin/unbound/services/outside_network.c
1205
SSL_shutdown(pend->c->ssl);
usr.sbin/unbound/services/outside_network.c
1206
SSL_free(pend->c->ssl);
usr.sbin/unbound/services/outside_network.c
1207
pend->c->ssl = NULL;
usr.sbin/unbound/services/outside_network.c
3119
&pi->addr, c->type, c->ssl, sq->zone, sq->zonelen, sq->qbuf,
usr.sbin/unbound/services/outside_network.c
3333
&p->pc->pif->addr, c->type, c->ssl, sq->zone, sq->zonelen,
usr.sbin/unbound/services/outside_network.c
3678
cp->ssl = outgoing_ssl_fd(outnet->sslctx, fd);
usr.sbin/unbound/services/outside_network.c
3679
if(!cp->ssl) {
usr.sbin/unbound/services/outside_network.c
3684
comm_point_tcp_win_bio_cb(cp, cp->ssl);
usr.sbin/unbound/services/outside_network.c
3690
(void)SSL_set_tlsext_host_name(cp->ssl, host);
usr.sbin/unbound/services/outside_network.c
3705
if(!SSL_set1_host(cp->ssl, host)) {
usr.sbin/unbound/services/outside_network.c
3714
X509_VERIFY_PARAM* param = SSL_get0_param(cp->ssl);
usr.sbin/unbound/services/outside_network.c
3733
sldns_buffer* query, int timeout, int ssl, char* host)
usr.sbin/unbound/services/outside_network.c
3737
outnet->ip_dscp, ssl);
usr.sbin/unbound/services/outside_network.c
3756
if(ssl) {
usr.sbin/unbound/services/outside_network.c
3808
int ssl, char* host, char* path, struct config_file* cfg)
usr.sbin/unbound/services/outside_network.c
3813
outnet->ip_dscp, ssl);
usr.sbin/unbound/services/outside_network.c
3833
if(ssl) {
usr.sbin/unbound/services/outside_network.c
737
pend->c->ssl = outgoing_ssl_fd(w->outnet->sslctx, s);
usr.sbin/unbound/services/outside_network.c
738
if(!pend->c->ssl) {
usr.sbin/unbound/services/outside_network.c
746
comm_point_tcp_win_bio_cb(pend->c, pend->c->ssl);
usr.sbin/unbound/services/outside_network.c
749
if(!set_auth_name_on_ssl(pend->c->ssl, w->tls_auth_name,
usr.sbin/unbound/services/outside_network.c
753
SSL_free(pend->c->ssl);
usr.sbin/unbound/services/outside_network.c
755
pend->c->ssl = NULL;
usr.sbin/unbound/services/outside_network.c
781
if(pend->c->ssl)
usr.sbin/unbound/services/outside_network.h
787
struct sldns_buffer* query, int timeout, int ssl, char* host);
usr.sbin/unbound/services/outside_network.h
810
int ssl, char* host, char* path, struct config_file* cfg);
usr.sbin/unbound/smallapp/unbound-anchor.c
1008
do_chunked_read(SSL* ssl)
usr.sbin/unbound/smallapp/unbound-anchor.c
1019
while(read_ssl_line(ssl, buf, sizeof(buf))) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1034
if(!read_ssl_line(ssl, buf, sizeof(buf))) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1048
body = read_data_chunk(ssl, len);
usr.sbin/unbound/smallapp/unbound-anchor.c
1061
if(!read_ssl_line(ssl, buf, sizeof(buf))) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1072
write_http_get(SSL* ssl, const char* pathname, const char* urlname)
usr.sbin/unbound/smallapp/unbound-anchor.c
1074
if(write_ssl_line(ssl, "GET /%s HTTP/1.1", pathname) &&
usr.sbin/unbound/smallapp/unbound-anchor.c
1075
write_ssl_line(ssl, "Host: %s", urlname) &&
usr.sbin/unbound/smallapp/unbound-anchor.c
1076
write_ssl_line(ssl, "User-Agent: unbound-anchor/%s",
usr.sbin/unbound/smallapp/unbound-anchor.c
1081
write_ssl_line(ssl, "", NULL)) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1089
read_chunked_zero_terminate(SSL* ssl, size_t* len)
usr.sbin/unbound/smallapp/unbound-anchor.c
1092
BIO* tmp = do_chunked_read(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
1118
read_http_result(SSL* ssl)
usr.sbin/unbound/smallapp/unbound-anchor.c
1123
if(!read_http_headers(ssl, &len)) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1127
data = read_chunked_zero_terminate(ssl, &len);
usr.sbin/unbound/smallapp/unbound-anchor.c
1129
data = read_data_chunk(ssl, len);
usr.sbin/unbound/smallapp/unbound-anchor.c
1150
SSL* ssl;
usr.sbin/unbound/smallapp/unbound-anchor.c
1161
ssl = TLS_initiate(sslctx, fd, urlname, use_sni);
usr.sbin/unbound/smallapp/unbound-anchor.c
1162
if(!ssl) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1167
if(!write_http_get(ssl, pathname, urlname)) {
usr.sbin/unbound/smallapp/unbound-anchor.c
1169
SSL_free(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
1174
bio = read_http_result(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
1175
TLS_shutdown(fd, ssl, sslctx);
usr.sbin/unbound/smallapp/unbound-anchor.c
793
SSL* ssl = SSL_new(sslctx);
usr.sbin/unbound/smallapp/unbound-anchor.c
794
if(!ssl) {
usr.sbin/unbound/smallapp/unbound-anchor.c
798
SSL_set_connect_state(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
799
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/smallapp/unbound-anchor.c
800
if(!SSL_set_fd(ssl, fd)) {
usr.sbin/unbound/smallapp/unbound-anchor.c
802
SSL_free(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
806
(void)SSL_set_tlsext_host_name(ssl, urlname);
usr.sbin/unbound/smallapp/unbound-anchor.c
810
if( (r=SSL_do_handshake(ssl)) == 1)
usr.sbin/unbound/smallapp/unbound-anchor.c
812
r = SSL_get_error(ssl, r);
usr.sbin/unbound/smallapp/unbound-anchor.c
815
SSL_free(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
821
x = SSL_get1_peer_certificate(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
823
x = SSL_get_peer_certificate(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
827
SSL_free(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
832
return ssl;
usr.sbin/unbound/smallapp/unbound-anchor.c
837
TLS_shutdown(int fd, SSL* ssl, SSL_CTX* sslctx)
usr.sbin/unbound/smallapp/unbound-anchor.c
840
if(SSL_shutdown(ssl) == 0) {
usr.sbin/unbound/smallapp/unbound-anchor.c
841
SSL_shutdown(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
843
SSL_free(ssl);
usr.sbin/unbound/smallapp/unbound-anchor.c
850
write_ssl_line(SSL* ssl, const char* str, const char* sec)
usr.sbin/unbound/smallapp/unbound-anchor.c
869
if(SSL_write(ssl, buf, (int)strlen(buf)) <= 0) {
usr.sbin/unbound/smallapp/unbound-anchor.c
907
read_ssl_line(SSL* ssl, char* buf, size_t len)
usr.sbin/unbound/smallapp/unbound-anchor.c
917
if((r = SSL_read(ssl, buf+n, 1)) <= 0) {
usr.sbin/unbound/smallapp/unbound-anchor.c
918
if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/smallapp/unbound-anchor.c
946
read_http_headers(SSL* ssl, size_t* clen)
usr.sbin/unbound/smallapp/unbound-anchor.c
951
while(read_ssl_line(ssl, buf, sizeof(buf))) {
usr.sbin/unbound/smallapp/unbound-anchor.c
962
read_data_chunk(SSL* ssl, size_t len)
usr.sbin/unbound/smallapp/unbound-anchor.c
975
if((r = SSL_read(ssl, data+got, (int)(len-got))) <= 0) {
usr.sbin/unbound/smallapp/unbound-anchor.c
976
if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/smallapp/unbound-control.c
764
SSL* ssl;
usr.sbin/unbound/smallapp/unbound-control.c
769
ssl = SSL_new(ctx);
usr.sbin/unbound/smallapp/unbound-control.c
770
if(!ssl)
usr.sbin/unbound/smallapp/unbound-control.c
772
SSL_set_connect_state(ssl);
usr.sbin/unbound/smallapp/unbound-control.c
773
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/smallapp/unbound-control.c
774
if(!SSL_set_fd(ssl, fd))
usr.sbin/unbound/smallapp/unbound-control.c
778
if( (r=SSL_do_handshake(ssl)) == 1)
usr.sbin/unbound/smallapp/unbound-control.c
780
r = SSL_get_error(ssl, r);
usr.sbin/unbound/smallapp/unbound-control.c
787
if(SSL_get_verify_result(ssl) != X509_V_OK)
usr.sbin/unbound/smallapp/unbound-control.c
790
x = SSL_get1_peer_certificate(ssl);
usr.sbin/unbound/smallapp/unbound-control.c
792
x = SSL_get_peer_certificate(ssl);
usr.sbin/unbound/smallapp/unbound-control.c
798
return ssl;
usr.sbin/unbound/smallapp/unbound-control.c
803
remote_read(SSL* ssl, int fd, char* buf, size_t len)
usr.sbin/unbound/smallapp/unbound-control.c
805
if(ssl) {
usr.sbin/unbound/smallapp/unbound-control.c
808
if((r = SSL_read(ssl, buf, (int)len-1)) <= 0) {
usr.sbin/unbound/smallapp/unbound-control.c
809
if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/smallapp/unbound-control.c
832
remote_write(SSL* ssl, int fd, const char* buf, size_t len)
usr.sbin/unbound/smallapp/unbound-control.c
834
if(ssl) {
usr.sbin/unbound/smallapp/unbound-control.c
835
if(SSL_write(ssl, buf, (int)len) <= 0)
usr.sbin/unbound/smallapp/unbound-control.c
868
send_file(SSL* ssl, int fd, FILE* in, char* buf, size_t sz)
usr.sbin/unbound/smallapp/unbound-control.c
871
remote_write(ssl, fd, buf, strlen(buf));
usr.sbin/unbound/smallapp/unbound-control.c
877
send_eof(SSL* ssl, int fd)
usr.sbin/unbound/smallapp/unbound-control.c
880
remote_write(ssl, fd, e, sizeof(e));
usr.sbin/unbound/smallapp/unbound-control.c
885
go_cmd(SSL* ssl, int fd, int quiet, int argc, char* argv[])
usr.sbin/unbound/smallapp/unbound-control.c
894
remote_write(ssl, fd, pre, strlen(pre));
usr.sbin/unbound/smallapp/unbound-control.c
896
remote_write(ssl, fd, space, strlen(space));
usr.sbin/unbound/smallapp/unbound-control.c
897
remote_write(ssl, fd, argv[i], strlen(argv[i]));
usr.sbin/unbound/smallapp/unbound-control.c
899
remote_write(ssl, fd, newline, strlen(newline));
usr.sbin/unbound/smallapp/unbound-control.c
902
send_file(ssl, fd, stdin, buf, sizeof(buf));
usr.sbin/unbound/smallapp/unbound-control.c
910
send_file(ssl, fd, stdin, buf, sizeof(buf));
usr.sbin/unbound/smallapp/unbound-control.c
911
send_eof(ssl, fd);
usr.sbin/unbound/smallapp/unbound-control.c
915
if(remote_read(ssl, fd, buf, sizeof(buf)) == 0) {
usr.sbin/unbound/smallapp/unbound-control.c
937
SSL* ssl;
usr.sbin/unbound/smallapp/unbound-control.c
953
ssl = setup_ssl(ctx, fd);
usr.sbin/unbound/smallapp/unbound-control.c
956
ret = go_cmd(ssl, fd, quiet, argc, argv);
usr.sbin/unbound/smallapp/unbound-control.c
958
if(ssl) SSL_free(ssl);
usr.sbin/unbound/testcode/dohclient.c
189
if(h2_session->ssl)
usr.sbin/unbound/testcode/dohclient.c
282
if(h2_session->ssl) {
usr.sbin/unbound/testcode/dohclient.c
283
r = SSL_read(h2_session->ssl, buf, len);
usr.sbin/unbound/testcode/dohclient.c
285
int want = SSL_get_error(h2_session->ssl, r);
usr.sbin/unbound/testcode/dohclient.c
311
if(h2_session->ssl) {
usr.sbin/unbound/testcode/dohclient.c
314
r = SSL_write(h2_session->ssl, buf, len);
usr.sbin/unbound/testcode/dohclient.c
316
int want = SSL_get_error(h2_session->ssl, r);
usr.sbin/unbound/testcode/dohclient.c
502
SSL* ssl = NULL;
usr.sbin/unbound/testcode/dohclient.c
515
ssl = outgoing_ssl_fd(ctx, fd);
usr.sbin/unbound/testcode/dohclient.c
516
if(!ssl) {
usr.sbin/unbound/testcode/dohclient.c
520
h2_session->ssl = ssl;
usr.sbin/unbound/testcode/dohclient.c
524
if( (r=SSL_do_handshake(ssl)) == 1)
usr.sbin/unbound/testcode/dohclient.c
526
r = SSL_get_error(ssl, r);
usr.sbin/unbound/testcode/dohclient.c
554
if(ssl) {
usr.sbin/unbound/testcode/dohclient.c
555
SSL_shutdown(ssl);
usr.sbin/unbound/testcode/dohclient.c
556
SSL_free(ssl);
usr.sbin/unbound/testcode/dohclient.c
62
SSL* ssl;
usr.sbin/unbound/testcode/doqclient.c
112
SSL* ssl;
usr.sbin/unbound/testcode/doqclient.c
1245
set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
usr.sbin/unbound/testcode/doqclient.c
1249
struct doq_client_data* data = get_app_data(ssl);
usr.sbin/unbound/testcode/doqclient.c
1286
add_handshake_data(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
usr.sbin/unbound/testcode/doqclient.c
1289
struct doq_client_data* doqdata = get_app_data(ssl);
usr.sbin/unbound/testcode/doqclient.c
1315
flush_flight(SSL* ATTR_UNUSED(ssl))
usr.sbin/unbound/testcode/doqclient.c
1322
send_alert(SSL *ssl, enum ssl_encryption_level_t ATTR_UNUSED(level),
usr.sbin/unbound/testcode/doqclient.c
1325
struct doq_client_data* data = get_app_data(ssl);
usr.sbin/unbound/testcode/doqclient.c
1333
new_session_cb(SSL* ssl, SSL_SESSION* session)
usr.sbin/unbound/testcode/doqclient.c
1335
struct doq_client_data* data = get_app_data(ssl);
usr.sbin/unbound/testcode/doqclient.c
1388
SSL* ssl = SSL_new(data->ctx);
usr.sbin/unbound/testcode/doqclient.c
1389
if(!ssl) {
usr.sbin/unbound/testcode/doqclient.c
1399
ngtcp2_crypto_ossl_ctx_set_ssl(data->ossl_ctx, ssl);
usr.sbin/unbound/testcode/doqclient.c
1400
if(ngtcp2_crypto_ossl_configure_client_session(ssl) != 0) {
usr.sbin/unbound/testcode/doqclient.c
1405
set_app_data(ssl, data);
usr.sbin/unbound/testcode/doqclient.c
1406
SSL_set_connect_state(ssl);
usr.sbin/unbound/testcode/doqclient.c
1407
if(!SSL_set_fd(ssl, data->fd)) {
usr.sbin/unbound/testcode/doqclient.c
1413
SSL_set_quic_use_legacy_codepoint(ssl, 1);
usr.sbin/unbound/testcode/doqclient.c
1415
SSL_set_quic_use_legacy_codepoint(ssl, 0);
usr.sbin/unbound/testcode/doqclient.c
1418
SSL_set_alpn_protos(ssl, (const unsigned char *)"\x03""doq", 4);
usr.sbin/unbound/testcode/doqclient.c
1420
SSL_set_tlsext_host_name(ssl, "localhost");
usr.sbin/unbound/testcode/doqclient.c
1421
return ssl;
usr.sbin/unbound/testcode/doqclient.c
2091
if(!SSL_set_session(data->ssl, session)) {
usr.sbin/unbound/testcode/doqclient.c
2102
SSL_set_quic_tls_early_data_enabled(data->ssl, 1);
usr.sbin/unbound/testcode/doqclient.c
2104
SSL_set_quic_early_data_enabled(data->ssl, 1);
usr.sbin/unbound/testcode/doqclient.c
224
set_app_data(SSL* ssl, struct doq_client_data* data)
usr.sbin/unbound/testcode/doqclient.c
229
SSL_set_app_data(ssl, &data->conn_ref);
usr.sbin/unbound/testcode/doqclient.c
2296
data->ssl = ssl_client_setup(data);
usr.sbin/unbound/testcode/doqclient.c
2300
ngtcp2_conn_set_tls_native_handle(data->conn, data->ssl);
usr.sbin/unbound/testcode/doqclient.c
231
SSL_set_app_data(ssl, data);
usr.sbin/unbound/testcode/doqclient.c
2349
SSL_set_app_data(data->ssl, NULL);
usr.sbin/unbound/testcode/doqclient.c
2350
SSL_free(data->ssl);
usr.sbin/unbound/testcode/doqclient.c
236
get_app_data(SSL* ssl)
usr.sbin/unbound/testcode/doqclient.c
241
SSL_get_app_data(ssl))->user_data;
usr.sbin/unbound/testcode/doqclient.c
243
data = (struct doq_client_data*) SSL_get_app_data(ssl);
usr.sbin/unbound/testcode/doqclient.c
883
SSL_get_cipher_name(data->ssl));
usr.sbin/unbound/testcode/doqclient.c
888
SSL_get0_alpn_selected(data->ssl, &alpn, &alpnlen);
usr.sbin/unbound/testcode/doqclient.c
898
if(SSL_get_early_data_status(data->ssl) !=
usr.sbin/unbound/testcode/fake_event.c
1807
struct sldns_buffer* query, int timeout, int ATTR_UNUSED(ssl),
usr.sbin/unbound/testcode/fake_event.c
1880
int ssl, char* host, char* path, struct config_file* cfg)
usr.sbin/unbound/testcode/fake_event.c
1899
(void)ssl;
usr.sbin/unbound/testcode/petal.c
152
read_ssl_line(SSL* ssl, char* buf, size_t len)
usr.sbin/unbound/testcode/petal.c
162
if((r = SSL_read(ssl, buf+n, 1)) <= 0) {
usr.sbin/unbound/testcode/petal.c
163
if(SSL_get_error(ssl, r) == SSL_ERROR_ZERO_RETURN) {
usr.sbin/unbound/testcode/petal.c
215
read_http_headers(SSL* ssl, char* file, size_t flen, char* host, size_t hlen,
usr.sbin/unbound/testcode/petal.c
221
while(read_ssl_line(ssl, buf, sizeof(buf))) {
usr.sbin/unbound/testcode/petal.c
312
SSL* ssl = SSL_new(ctx);
usr.sbin/unbound/testcode/petal.c
313
if(!ssl) return NULL;
usr.sbin/unbound/testcode/petal.c
314
SSL_set_accept_state(ssl);
usr.sbin/unbound/testcode/petal.c
315
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/testcode/petal.c
316
if(!SSL_set_fd(ssl, s)) {
usr.sbin/unbound/testcode/petal.c
317
SSL_free(ssl);
usr.sbin/unbound/testcode/petal.c
320
return ssl;
usr.sbin/unbound/testcode/petal.c
376
provide_file_10(SSL* ssl, char* fname)
usr.sbin/unbound/testcode/petal.c
394
if(SSL_write(ssl, hdr, (int)r) <= 0) {
usr.sbin/unbound/testcode/petal.c
439
if(SSL_write(ssl, buf, at-buf) <= 0) {
usr.sbin/unbound/testcode/petal.c
447
provide_file_chunked(SSL* ssl, char* fname)
usr.sbin/unbound/testcode/petal.c
530
if(SSL_write(ssl, buf, at-buf) <= 0) {
usr.sbin/unbound/testcode/petal.c
546
service_ssl(SSL* ssl, struct sockaddr_storage* from, socklen_t falen)
usr.sbin/unbound/testcode/petal.c
552
if(!read_http_headers(ssl, file, sizeof(file), host, sizeof(host),
usr.sbin/unbound/testcode/petal.c
575
provide_file_10(ssl, combined);
usr.sbin/unbound/testcode/petal.c
576
else provide_file_chunked(ssl, combined);
usr.sbin/unbound/testcode/petal.c
595
SSL* ssl = setup_ssl(s, sslctx);
usr.sbin/unbound/testcode/petal.c
597
if(ssl) {
usr.sbin/unbound/testcode/petal.c
598
service_ssl(ssl, &from, flen);
usr.sbin/unbound/testcode/petal.c
600
SSL_shutdown(ssl);
usr.sbin/unbound/testcode/petal.c
601
SSL_free(ssl);
usr.sbin/unbound/testcode/streamtcp.c
145
write_q(int fd, int udp, SSL* ssl, sldns_buffer* buf, uint16_t id,
usr.sbin/unbound/testcode/streamtcp.c
244
if(ssl) {
usr.sbin/unbound/testcode/streamtcp.c
245
if(SSL_write(ssl, (void*)&len, (int)sizeof(len)) <= 0) {
usr.sbin/unbound/testcode/streamtcp.c
262
if(ssl) {
usr.sbin/unbound/testcode/streamtcp.c
263
if(SSL_write(ssl, (void*)sldns_buffer_begin(buf),
usr.sbin/unbound/testcode/streamtcp.c
289
recv_one(int fd, int udp, SSL* ssl, sldns_buffer* buf)
usr.sbin/unbound/testcode/streamtcp.c
295
if(ssl) {
usr.sbin/unbound/testcode/streamtcp.c
296
int sr = SSL_read(ssl, (void*)&len, (int)sizeof(len));
usr.sbin/unbound/testcode/streamtcp.c
324
if(ssl) {
usr.sbin/unbound/testcode/streamtcp.c
325
int r = SSL_read(ssl, (void*)sldns_buffer_begin(buf),
usr.sbin/unbound/testcode/streamtcp.c
377
print_any_answers(int fd, int udp, SSL* ssl, sldns_buffer* buf,
usr.sbin/unbound/testcode/streamtcp.c
402
recv_one(fd, udp, ssl, buf);
usr.sbin/unbound/testcode/streamtcp.c
447
SSL* ssl = NULL;
usr.sbin/unbound/testcode/streamtcp.c
459
ssl = outgoing_ssl_fd(ctx, fd);
usr.sbin/unbound/testcode/streamtcp.c
460
if(!ssl) fatal_exit("cannot create ssl");
usr.sbin/unbound/testcode/streamtcp.c
464
if( (r=SSL_do_handshake(ssl)) == 1)
usr.sbin/unbound/testcode/streamtcp.c
466
r = SSL_get_error(ssl, r);
usr.sbin/unbound/testcode/streamtcp.c
475
X509* x = SSL_get1_peer_certificate(ssl);
usr.sbin/unbound/testcode/streamtcp.c
477
X509* x = SSL_get_peer_certificate(ssl);
usr.sbin/unbound/testcode/streamtcp.c
488
if(ssl) {
usr.sbin/unbound/testcode/streamtcp.c
489
if(SSL_write(ssl, (void*)sldns_buffer_begin(proxy_buf),
usr.sbin/unbound/testcode/streamtcp.c
517
write_q(fd, udp, ssl, buf, (uint16_t)get_random(), proxy_buf,
usr.sbin/unbound/testcode/streamtcp.c
523
print_any_answers(fd, udp, ssl, buf, &wait_results, 0);
usr.sbin/unbound/testcode/streamtcp.c
525
recv_one(fd, udp, ssl, buf);
usr.sbin/unbound/testcode/streamtcp.c
529
print_any_answers(fd, udp, ssl, buf, &wait_results, 1);
usr.sbin/unbound/testcode/streamtcp.c
532
SSL_shutdown(ssl);
usr.sbin/unbound/testcode/streamtcp.c
533
SSL_free(ssl);
usr.sbin/unbound/util/data/msgparse.c
1030
!c || c->type != comm_tcp ||!c->ssl)
usr.sbin/unbound/util/data/msgreply.c
1003
if(tp == comm_tcp) comm = (ssl?"dot":"tcp");
usr.sbin/unbound/util/data/msgreply.c
1004
else if(tp == comm_tcp_accept) comm = (ssl?"dot":"tcp");
usr.sbin/unbound/util/data/msgreply.c
968
enum comm_point_type tp, void* ssl)
usr.sbin/unbound/util/data/msgreply.h
563
enum comm_point_type tp, void* ssl);
usr.sbin/unbound/util/net_help.c
1176
dot_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
usr.sbin/unbound/util/net_help.c
1196
static int doh_alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
usr.sbin/unbound/util/net_help.c
1634
SSL* ssl = SSL_new((SSL_CTX*)sslctx);
usr.sbin/unbound/util/net_help.c
1635
if(!ssl) {
usr.sbin/unbound/util/net_help.c
1639
SSL_set_accept_state(ssl);
usr.sbin/unbound/util/net_help.c
1640
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/util/net_help.c
1641
if(!SSL_set_fd(ssl, fd)) {
usr.sbin/unbound/util/net_help.c
1643
SSL_free(ssl);
usr.sbin/unbound/util/net_help.c
1646
return ssl;
usr.sbin/unbound/util/net_help.c
1656
SSL* ssl = SSL_new((SSL_CTX*)sslctx);
usr.sbin/unbound/util/net_help.c
1657
if(!ssl) {
usr.sbin/unbound/util/net_help.c
1661
SSL_set_connect_state(ssl);
usr.sbin/unbound/util/net_help.c
1662
(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
usr.sbin/unbound/util/net_help.c
1663
if(!SSL_set_fd(ssl, fd)) {
usr.sbin/unbound/util/net_help.c
1665
SSL_free(ssl);
usr.sbin/unbound/util/net_help.c
1668
return ssl;
usr.sbin/unbound/util/net_help.c
1689
int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni)
usr.sbin/unbound/util/net_help.c
1694
(void)SSL_set_tlsext_host_name(ssl, auth_name);
usr.sbin/unbound/util/net_help.c
1697
(void)ssl;
usr.sbin/unbound/util/net_help.c
1701
SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
usr.sbin/unbound/util/net_help.c
1705
if(!SSL_set1_host(ssl, auth_name)) {
usr.sbin/unbound/util/net_help.c
1713
X509_VERIFY_PARAM* param = SSL_get0_param(ssl);
usr.sbin/unbound/util/net_help.c
1721
SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
usr.sbin/unbound/util/net_help.h
550
int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni);
usr.sbin/unbound/util/netevent.c
3116
SSL* ssl = (SSL*)thessl;
usr.sbin/unbound/util/netevent.c
3119
BIO_set_callback_ex(SSL_get_rbio(ssl), &win_bio_cb);
usr.sbin/unbound/util/netevent.c
3121
BIO_set_callback(SSL_get_rbio(ssl), &win_bio_cb);
usr.sbin/unbound/util/netevent.c
3123
BIO_set_callback_arg(SSL_get_rbio(ssl), (char*)c->ev->ev);
usr.sbin/unbound/util/netevent.c
3125
BIO_set_callback_ex(SSL_get_wbio(ssl), &win_bio_cb);
usr.sbin/unbound/util/netevent.c
3127
BIO_set_callback(SSL_get_wbio(ssl), &win_bio_cb);
usr.sbin/unbound/util/netevent.c
3129
BIO_set_callback_arg(SSL_get_wbio(ssl), (char*)c->ev->ev);
usr.sbin/unbound/util/netevent.c
3247
if(!c->ssl) {
usr.sbin/unbound/util/netevent.c
3285
if(c->ssl) {
usr.sbin/unbound/util/netevent.c
3286
c_hdl->ssl = incoming_ssl_fd(c->ssl, new_fd);
usr.sbin/unbound/util/netevent.c
3287
if(!c_hdl->ssl) {
usr.sbin/unbound/util/netevent.c
3294
comm_point_tcp_win_bio_cb(c_hdl, c_hdl->ssl);
usr.sbin/unbound/util/netevent.c
3319
if(c->ssl) {
usr.sbin/unbound/util/netevent.c
3321
SSL_shutdown(c->ssl);
usr.sbin/unbound/util/netevent.c
3322
SSL_free(c->ssl);
usr.sbin/unbound/util/netevent.c
3323
c->ssl = NULL;
usr.sbin/unbound/util/netevent.c
3447
r = SSL_do_handshake(c->ssl);
usr.sbin/unbound/util/netevent.c
3449
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3490
if((vr=SSL_get_verify_result(c->ssl)) != 0)
usr.sbin/unbound/util/netevent.c
3502
if((SSL_get_verify_mode(c->ssl)&SSL_VERIFY_PEER)) {
usr.sbin/unbound/util/netevent.c
3504
if(SSL_get_verify_result(c->ssl) == X509_V_OK) {
usr.sbin/unbound/util/netevent.c
3506
X509* x = SSL_get1_peer_certificate(c->ssl);
usr.sbin/unbound/util/netevent.c
3508
X509* x = SSL_get_peer_certificate(c->ssl);
usr.sbin/unbound/util/netevent.c
3519
if(SSL_get0_peername(c->ssl)) {
usr.sbin/unbound/util/netevent.c
3523
SSL_get0_peername(c->ssl));
usr.sbin/unbound/util/netevent.c
3537
X509* x = SSL_get1_peer_certificate(c->ssl);
usr.sbin/unbound/util/netevent.c
3539
X509* x = SSL_get_peer_certificate(c->ssl);
usr.sbin/unbound/util/netevent.c
3563
SSL_get0_alpn_selected(c->ssl, &alpn, &alpnlen);
usr.sbin/unbound/util/netevent.c
3618
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(
usr.sbin/unbound/util/netevent.c
3622
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3686
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(
usr.sbin/unbound/util/netevent.c
3690
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3748
if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(c->buffer,
usr.sbin/unbound/util/netevent.c
3751
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3798
r = SSL_read(c->ssl, (void*)sldns_buffer_current(c->buffer),
usr.sbin/unbound/util/netevent.c
3801
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3853
(void)SSL_set_mode(c->ssl, (long)SSL_MODE_ENABLE_PARTIAL_WRITE);
usr.sbin/unbound/util/netevent.c
3866
r = SSL_write(c->ssl,
usr.sbin/unbound/util/netevent.c
3871
r = SSL_write(c->ssl,
usr.sbin/unbound/util/netevent.c
3884
r = SSL_write(c->ssl, (void*)(buf+c->tcp_byte_count),
usr.sbin/unbound/util/netevent.c
3889
r = SSL_write(c->ssl,
usr.sbin/unbound/util/netevent.c
3894
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
3939
r = SSL_write(c->ssl, (void*)(c->tcp_write_pkt + c->tcp_write_byte_count - 2),
usr.sbin/unbound/util/netevent.c
3942
r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer),
usr.sbin/unbound/util/netevent.c
3946
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
4017
if(c->ssl)
usr.sbin/unbound/util/netevent.c
4268
if(c->tcp_is_reading && !c->ssl && !c->tcp_write_and_read)
usr.sbin/unbound/util/netevent.c
4313
if(c->ssl)
usr.sbin/unbound/util/netevent.c
4712
if(c->ssl) {
usr.sbin/unbound/util/netevent.c
4714
SSL_shutdown(c->ssl);
usr.sbin/unbound/util/netevent.c
4715
SSL_free(c->ssl);
usr.sbin/unbound/util/netevent.c
4716
c->ssl = NULL;
usr.sbin/unbound/util/netevent.c
4743
r = SSL_read(c->ssl, (void*)sldns_buffer_current(c->buffer),
usr.sbin/unbound/util/netevent.c
4746
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
4968
remainbufferlen >= (size_t)(c->ssl?16384:2048)) {
usr.sbin/unbound/util/netevent.c
5175
if(h2_session->c->ssl) {
usr.sbin/unbound/util/netevent.c
5178
r = SSL_read(h2_session->c->ssl, buf, len);
usr.sbin/unbound/util/netevent.c
5180
int want = SSL_get_error(h2_session->c->ssl, r);
usr.sbin/unbound/util/netevent.c
5289
if(c->ssl && c->ssl_shake_state != comm_ssl_shake_none) {
usr.sbin/unbound/util/netevent.c
5312
if(c->ssl) {
usr.sbin/unbound/util/netevent.c
5432
r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer),
usr.sbin/unbound/util/netevent.c
5435
int want = SSL_get_error(c->ssl, r);
usr.sbin/unbound/util/netevent.c
5503
if(h2_session->c->ssl) {
usr.sbin/unbound/util/netevent.c
5506
r = SSL_write(h2_session->c->ssl, buf, len);
usr.sbin/unbound/util/netevent.c
5508
int want = SSL_get_error(h2_session->c->ssl, r);
usr.sbin/unbound/util/netevent.c
5625
if(c->ssl && c->ssl_shake_state != comm_ssl_shake_none) {
usr.sbin/unbound/util/netevent.c
5647
if(c->ssl) {
usr.sbin/unbound/util/netevent.c
6417
SSL_free(c->ssl);
usr.sbin/unbound/util/netevent.c
6608
if((c->type == comm_tcp || c->type == comm_http) && c->ssl) {
usr.sbin/unbound/util/netevent.c
6610
SSL_shutdown(c->ssl);
usr.sbin/unbound/util/netevent.c
6611
SSL_free(c->ssl);
usr.sbin/unbound/util/netevent.c
6654
enum comm_point_type type, void* ssl, sldns_buffer* buffer)
usr.sbin/unbound/util/netevent.c
6659
(struct sockaddr_storage*)addr, type, ssl, buffer);
usr.sbin/unbound/util/netevent.c
6695
repinfo->c->type, repinfo->c->ssl,
usr.sbin/unbound/util/netevent.c
6723
repinfo->c->type, repinfo->c->ssl,
usr.sbin/unbound/util/netevent.h
1187
void comm_point_tcp_win_bio_cb(struct comm_point* c, void* ssl);
usr.sbin/unbound/util/netevent.h
246
void* ssl;
usr.sbin/ypldap/parse.y
117
%type <v.number> ssl
usr.sbin/ypldap/parse.y
370
ssl : /* empty */ { $$ = 0; }
usr.sbin/ypldap/parse.y
375
directory : DIRECTORY STRING port ssl {