/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslapi.c | 48 static kssl_status_t kssl_build_single_record(ssl_t *ssl, mblk_t *mp); 62 * 2. in_port is a proxy port for another ssl port. The ssl port is then 299 ssl_t *ssl = (ssl_t *)ksslctx; local 301 mutex_enter(&ssl->kssl_lock); 302 if (--ssl->async_ops_pending == 0) 303 cv_signal(&ssl->async_cv); 304 mutex_exit(&ssl->kssl_lock); 329 ssl_t *ssl; local 341 ssl 532 ssl_t *ssl; local 795 ssl_t *ssl; local 1141 ssl_t *ssl = kmem_cache_alloc(kssl_cache, KM_NOSLEEP); local 1171 ssl_t *ssl = (ssl_t *)ctx; local 1186 ssl_t *ssl = (ssl_t *)ctx; local 1257 kssl_build_single_record(ssl_t *ssl, mblk_t *mp) argument [all...] |
H A D | ksslrec.c | 163 ssl_t *ssl, 179 spec = &ssl->spec[direction]; 196 if (IS_TLS(ssl)) { 203 if (IS_TLS(ssl) || (spec->hmac_mech.cm_type != CRYPTO_MECH_INVALID && 246 !IS_TLS(ssl)); 257 bcopy(&(ssl->mac_ctx[direction][0]), ctx, 263 bcopy(&(ssl->mac_ctx[direction][1]), ctx, 277 kssl_handle_handshake_message(ssl_t *ssl, mblk_t *mp, int *err, argument 283 ASSERT(ssl->msg.state == MSG_BODY); 284 ASSERT(ssl 162 kssl_compute_record_mac( ssl_t *ssl, int direction, uint64_t seq_num, SSL3ContentType ct, uchar_t *versionp, uchar_t *buf, int len, uchar_t *digest) argument 362 kssl_update_handshake_hashes(ssl_t *ssl, uchar_t *buf, uint_t len) argument 369 kssl_compute_handshake_hashes( ssl_t *ssl, SSL3Hashes *hashes, uint32_t sender) argument 458 kssl_handle_client_hello(ssl_t *ssl, mblk_t *mp, int msglen) argument 970 kssl_send_server_hello(ssl_t *ssl) argument 1140 kssl_tls_PRF(ssl_t *ssl, uchar_t *secret, size_t secret_len, uchar_t *label, size_t label_len, uchar_t *seed, size_t seed_len, uchar_t *prfresult, size_t prfresult_len) argument 1218 kssl_generate_tls_ms(ssl_t *ssl, uchar_t *pms, size_t pmslen) argument 1250 kssl_generate_ssl_ms(ssl_t *ssl, uchar_t *pms, size_t pmslen) argument 1271 kssl_generate_tls_keyblock(ssl_t *ssl) argument 1290 kssl_generate_keyblock(ssl_t *ssl) argument 1313 kssl_ssl3_key_material_derive_step( ssl_t *ssl, uchar_t *secret, size_t secretlen, int step, uchar_t *dst, int sr_first) argument 1353 kssl_send_certificate_and_server_hello_done(ssl_t *ssl) argument 1439 kssl_send_change_cipher_specs(ssl_t *ssl) argument 1483 kssl_spec_init(ssl_t *ssl, int dir) argument 1618 kssl_send_finished(ssl_t *ssl, int update_hsh) argument 1700 kssl_mac_encrypt_record(ssl_t *ssl, SSL3ContentType ct, uchar_t *versionp, uchar_t *rstart, mblk_t *mp) argument 1773 kssl_send_alert(ssl_t *ssl, SSL3AlertLevel level, SSL3AlertDescription desc) argument 1847 kssl_handle_client_key_exchange(ssl_t *ssl, mblk_t *mp, int msglen, kssl_callback_t cbfn, void *arg) argument 2009 kssl_handle_finished(ssl_t *ssl, mblk_t *mp, int msglen) argument 2074 kssl_handle_v2client_hello(ssl_t *ssl, mblk_t *mp, int recsz) argument 2249 ssl_t *ssl = (ssl_t *)arg; local 2321 kssl_get_next_record(ssl_t *ssl) argument 2424 kssl_mblksfree(ssl_t *ssl) argument 2452 kssl_specsfree(ssl_t *ssl) argument 2475 kssl_free_context(ssl_t *ssl) argument [all...] |
H A D | ksslimpl.h | 145 #define KSSL_ENQUEUE_MP(ssl, mp) { \ 147 if ((ssl)->rec_ass_tail == NULL) { \ 148 (ssl)->rec_ass_head = (mp); \ 151 (ssl)->rec_ass_tail = (mp); \ 153 (ssl)->rec_ass_tail->b_cont = (mp); \ 156 (ssl)->rec_ass_tail = (mp); \
|
H A D | kssl.c | 619 ssl_t *ssl = buf; local 621 mutex_init(&ssl->kssl_lock, NULL, MUTEX_DEFAULT, NULL); 622 cv_init(&ssl->async_cv, NULL, CV_DEFAULT, NULL); 631 ssl_t *ssl = buf; local 632 mutex_destroy(&ssl->kssl_lock); 633 cv_destroy(&ssl->async_cv);
|
H A D | ksslproto.h | 151 struct ssl_s *ssl; member in struct:KSSLJOBStr
|
/illumos-gate/usr/src/common/net/wanboot/ |
H A D | p12access.h | 37 #include <openssl/ssl.h>
|
H A D | http_errorstr.c | 34 #include <openssl/ssl.h>
|
H A D | boot_http.c | 38 #include <openssl/ssl.h> 43 /* this must be included after ssl.h to avoid re-defining 'offsetof' */ 93 void *ssl; /* Handle to ssl data structure */ member in struct:http_conn_t 159 static int ssl_init = 0; /* 1 when ssl has been initialized */ 739 if ((c_id->ssl = SSL_new(ctx)) == NULL) { 750 print_ciphers(c_id->ssl); 753 SSL_set_connect_state(c_id->ssl); 755 if (SSL_set_fd(c_id->ssl, c_id->fd) == 0) { 765 if ((retval = SSL_connect(c_id->ssl)) < 2242 print_ciphers(SSL *ssl) argument [all...] |
H A D | p12access.c | 52 #include <openssl/ssl.h> 65 * sunw_use_x509cert - pass an x509 client certificate to ssl 93 * sunw_use_pkey - pass an EVP_PKEY private key to ssl
|
H A D | p12misc.c | 74 #include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/libwanboot/common/ |
H A D | llib-lwanboot | 38 #include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/print/libhttp-core/common/ |
H A D | http-private.h | 65 # include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/libshell/common/scripts/ |
H A D | rssread.sh | 70 compound ssl=( 167 wait ${_.ssl.openssl_client_pid} || { print -u2 -f "%s: openssl failed.\n" ; return 1 ; } 168 (( _.ssl.openssl_client_pid=-1 )) 170 rm -r \"${_.ssl.fifo.dir}\" 171 _.ssl.fifo.dir="" 180 _.ssl.fifo.dir="$(mktemp -t -d)" 181 _.ssl.fifo.in="${_.ssl.fifo.dir}/in" 182 _.ssl.fifo.out="${_.ssl [all...] |
/illumos-gate/usr/src/lib/fm/libldom/sparc/ |
H A D | ldom_xmpp_client.c | 50 #include <openssl/ssl.h> 67 SSL *ssl; member in struct:xmpp_conn 103 typedef int (*SSL_write_pt)(SSL *ssl, const void *buf, int num); 107 typedef int (*SSL_get_error_pt)(const SSL *ssl, int ret); 110 typedef int (*SSL_connect_pt)(SSL *ssl); 113 typedef int (*SSL_set_fd_pt)(SSL *ssl, int fd); 114 typedef void (*SSL_free_pt)(SSL *ssl); 115 typedef int (*SSL_read_pt)(SSL *ssl, void *buf, int num); 117 typedef SSL_CTX *(*SSL_get_SSL_CTX_pt)(const SSL *ssl); 274 SSL_free_f(conn->ssl); [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 295 ** ssl -- TLS structure 314 tls_set_verify(ctx, ssl, vrfy) 316 SSL *ssl; 320 SSL_set_verify(ssl, vrfy ? SSL_VERIFY_PEER : SSL_VERIFY_NONE, NULL); 1149 ** ssl -- TLS connection structure 1165 tls_get_info(ssl, srv, host, mac, certreq) 1166 SSL *ssl; 1179 c = SSL_get_current_cipher(ssl); 1195 cert = SSL_get_peer_certificate(ssl); 1196 verifyok = SSL_get_verify_result(ssl); 1594 SSL *ssl; local [all...] |
H A D | sfsasl.c | 562 ** ssl -- TLS structure 577 tls_retry(ssl, rfd, wfd, tlsstart, timeout, err, where) 578 SSL *ssl;
|
H A D | sendmail.h | 125 # include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/fm/topo/modules/common/ses/ |
H A D | ses.c | 380 ses_stp_list_t *ssl; local 383 ssl = topo_mod_zalloc(mod, sizeof (*ssl)); 385 ssl->ssl_tgt = stp; 386 ssl->ssl_next = ses_sslh; 387 ses_sslh = ssl; 394 ses_stp_list_t *ssl, *prev_ssl; local 398 for (ssl = ses_sslh; ssl != NULL; ssl 416 ses_stp_list_t *ssl; local [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | security.c | 54 #include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/libipsecutil/common/ |
H A D | ipsec_libssl_setup.c | 79 #include <openssl/ssl.h>
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/ssldap/ |
H A D | errormap.c | 58 #include <ssl.h>
|
H A D | clientinit.c | 44 #include <ssl.h>
|
H A D | ldapsinit.c | 56 #include <ssl.h> 411 * Set hostname which will be retrieved (depending on ssl strength) when 542 * This is part of a hack to allow the ssl portion of the 874 * XXXmcs: could perform additional checks... see servers/slapd/ssl.c 877 * see ns/netsite/ldap/servers/slapd/ssl.c:slapd_ssl_init() for example code. 1156 * libldap when ssl will need to determine the fully qualified 1216 * gethostbyaddr calls when an ip address is given to ssl. This ip address
|
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldaptool.h | 85 #include <ssl.h>
|