/dports/emulators/citra/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls13_legacy.c | 214 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_read_bytes() 248 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_write_bytes() 299 SSL *s = ctx->ssl; in tls13_use_legacy_stack() 343 SSL *s = ctx->ssl; in tls13_use_legacy_client() 360 SSL *s = ctx->ssl; in tls13_use_legacy_server() 387 ctx->ssl = ssl; in tls13_legacy_accept() 402 return ssl->method->internal->ssl_accept(ssl); in tls13_legacy_accept() 419 return ssl->method->internal->ssl_connect(ssl); in tls13_legacy_connect() 429 ctx->ssl = ssl; in tls13_legacy_connect() 444 return ssl->method->internal->ssl_connect(ssl); in tls13_legacy_connect() [all …]
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls13_legacy.c | 214 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_read_bytes() 248 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_write_bytes() 299 SSL *s = ctx->ssl; in tls13_use_legacy_stack() 343 SSL *s = ctx->ssl; in tls13_use_legacy_client() 360 SSL *s = ctx->ssl; in tls13_use_legacy_server() 387 ctx->ssl = ssl; in tls13_legacy_accept() 402 return ssl->method->internal->ssl_accept(ssl); in tls13_legacy_accept() 419 return ssl->method->internal->ssl_connect(ssl); in tls13_legacy_connect() 429 ctx->ssl = ssl; in tls13_legacy_connect() 444 return ssl->method->internal->ssl_connect(ssl); in tls13_legacy_connect() [all …]
|
/dports/lang/mono/mono-5.10.1.57/external/boringssl/ssl/ |
H A D | d1_both.c | 257 BIO_ctrl(ssl->wbio, BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 308 ssl_do_msg_callback(ssl, 1 /* write */, ssl->version, in dtls1_write_change_cipher_spec() 390 (size_t)(ssl->init_off + ssl->init_num)); in dtls1_do_handshake_write() 392 ssl->init_off = 0; in dtls1_do_handshake_write() 393 ssl->init_num = 0; in dtls1_do_handshake_write() 577 ssl->init_num = (int)ssl->init_buf->length - DTLS1_HM_HEADER_LENGTH; in dtls1_get_message() 671 assert(ssl->d1->w_epoch == 0 || ssl->d1->w_epoch == 1); in dtls1_retransmit_message() 768 memcpy(frag->fragment, ssl->init_buf->data, ssl->init_num); in dtls1_buffer_message() 801 ssl->d1->handshake_write_seq = ssl->d1->next_handshake_write_seq; in dtls1_send_change_cipher_spec() 802 dtls1_buffer_change_cipher_spec(ssl, ssl->d1->handshake_write_seq); in dtls1_send_change_cipher_spec() [all …]
|
H A D | t1_lib.c | 672 if (!ssl->hit) { in ext_sni_parse_serverhello() 718 if (!ssl->hit) { in ext_sni_parse_clienthello() 734 if (ssl->hit || in ext_sni_add_serverhello() 1162 if (ssl->hit || in ext_ocsp_add_serverhello() 1353 if (ssl->hit || in ext_sct_add_serverhello() 1730 if (ssl->version < TLS1_VERSION && !SSL_IS_DTLS(ssl)) { in ssl_any_ec_cipher_suites_enabled() 2339 ret = ssl->ctx->tlsext_servername_callback(ssl, &al, in ssl_check_clienthello_tlsext() 2343 ssl, &al, ssl->initial_ctx->tlsext_servername_arg); in ssl_check_clienthello_tlsext() 2369 ret = ssl->ctx->tlsext_servername_callback(ssl, &al, in ssl_check_serverhello_tlsext() 2373 ssl, &al, ssl->initial_ctx->tlsext_servername_arg); in ssl_check_serverhello_tlsext() [all …]
|
H A D | tls_record.c | 154 if (SSL_IS_DTLS(ssl)) { in ssl_record_prefix_len() 164 if (SSL_IS_DTLS(ssl)) { in ssl_seal_align_prefix_len() 180 if (SSL_IS_DTLS(ssl)) { in ssl_max_seal_overhead() 190 if (!SSL_IS_DTLS(ssl) && ssl_needs_record_splitting(ssl)) { in ssl_max_seal_overhead() 404 ssl->d1->r_epoch++; in ssl_set_read_state() 405 memset(&ssl->d1->bitmap, 0, sizeof(ssl->d1->bitmap)); in ssl_set_read_state() 407 memset(ssl->s3->read_sequence, 0, sizeof(ssl->s3->read_sequence)); in ssl_set_read_state() 415 ssl->d1->w_epoch++; in ssl_set_write_state() 416 memcpy(ssl->d1->last_write_sequence, ssl->s3->write_sequence, in ssl_set_write_state() 419 memset(ssl->s3->write_sequence, 0, sizeof(ssl->s3->write_sequence)); in ssl_set_write_state() [all …]
|
H A D | d1_pkt.c | 128 int dtls1_get_record(SSL *ssl) { in dtls1_get_record() argument 162 ssl_read_buffer(ssl), ssl_read_buffer_len(ssl)); in dtls1_get_record() 201 assert(!SSL_in_init(ssl)); in dtls1_read_app_data() 312 ssl_do_msg_callback(ssl, 0 /* read */, ssl->version, in dtls1_read_change_cipher_spec() 331 assert(!SSL_in_init(ssl)); in dtls1_write_app_data() 365 int ret = ssl->method->ssl_dispatch_alert(ssl); in dtls1_write_record() 396 ssl->s3->alert_dispatch = 0; in dtls1_dispatch_alert() 397 int ret = dtls1_write_record(ssl, SSL3_RT_ALERT, &ssl->s3->send_alert[0], 2, in dtls1_dispatch_alert() 406 BIO_flush(ssl->wbio); in dtls1_dispatch_alert() 409 ssl_do_msg_callback(ssl, 1 /* write */, ssl->version, SSL3_RT_ALERT, in dtls1_dispatch_alert() [all …]
|
/dports/security/boringssl/boringssl-6a71840/ssl/ |
H A D | handshake_client.cc | 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local 284 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local 343 SSL *const ssl = hs->ssl; in parse_supported_versions() local 379 SSL *const ssl = hs->ssl; in do_start_connect() local 442 SSL *const ssl = hs->ssl; in do_enter_early_data() local 508 SSL *const ssl = hs->ssl; in do_read_hello_verify_request() local 552 SSL *const ssl = hs->ssl; in do_read_server_hello() local 802 SSL *const ssl = hs->ssl; in do_read_server_certificate() local 849 SSL *const ssl = hs->ssl; in do_read_certificate_status() local 935 SSL *const ssl = hs->ssl; in do_read_server_key_exchange() local [all …]
|
H A D | tls13_server.cc | 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() local 184 SSL *const ssl = hs->ssl; in do_select_parameters() local 237 SSL *const ssl = hs->ssl; in select_session() local 313 SSL *const ssl = hs->ssl; in do_select_session() local 466 SSL *const ssl = hs->ssl; in do_send_hello_retry_request() local 501 SSL *const ssl = hs->ssl; in do_read_second_client_hello() local 578 SSL *const ssl = hs->ssl; in do_send_server_hello() local 701 SSL *const ssl = hs->ssl; in do_send_server_finished() local 718 SSL *const ssl = hs->ssl; in do_send_half_rtt_ticket() local [all …]
|
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 783 while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) { in send_flight() [all …]
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | handshake_client.cc | 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local 284 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local 343 SSL *const ssl = hs->ssl; in parse_supported_versions() local 378 SSL *const ssl = hs->ssl; in do_start_connect() local 444 SSL *const ssl = hs->ssl; in do_enter_early_data() local 510 SSL *const ssl = hs->ssl; in do_read_hello_verify_request() local 554 SSL *const ssl = hs->ssl; in do_read_server_hello() local 801 SSL *const ssl = hs->ssl; in do_read_server_certificate() local 848 SSL *const ssl = hs->ssl; in do_read_certificate_status() local 934 SSL *const ssl = hs->ssl; in do_read_server_key_exchange() local [all …]
|
H A D | tls13_server.cc | 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() local 187 SSL *const ssl = hs->ssl; in do_select_parameters() local 245 SSL *const ssl = hs->ssl; in select_session() local 338 SSL *const ssl = hs->ssl; in do_select_session() local 525 SSL *const ssl = hs->ssl; in do_send_hello_retry_request() local 560 SSL *const ssl = hs->ssl; in do_read_second_client_hello() local 637 SSL *const ssl = hs->ssl; in do_send_server_hello() local 798 SSL *const ssl = hs->ssl; in do_send_server_finished() local 815 SSL *const ssl = hs->ssl; in do_send_half_rtt_ticket() local [all …]
|
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 783 while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) { in send_flight() [all …]
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | handshake_client.cc | 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local 284 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local 343 SSL *const ssl = hs->ssl; in parse_supported_versions() local 378 SSL *const ssl = hs->ssl; in do_start_connect() local 444 SSL *const ssl = hs->ssl; in do_enter_early_data() local 510 SSL *const ssl = hs->ssl; in do_read_hello_verify_request() local 554 SSL *const ssl = hs->ssl; in do_read_server_hello() local 801 SSL *const ssl = hs->ssl; in do_read_server_certificate() local 848 SSL *const ssl = hs->ssl; in do_read_certificate_status() local 934 SSL *const ssl = hs->ssl; in do_read_server_key_exchange() local [all …]
|
H A D | tls13_server.cc | 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() local 187 SSL *const ssl = hs->ssl; in do_select_parameters() local 245 SSL *const ssl = hs->ssl; in select_session() local 338 SSL *const ssl = hs->ssl; in do_select_session() local 525 SSL *const ssl = hs->ssl; in do_send_hello_retry_request() local 560 SSL *const ssl = hs->ssl; in do_read_second_client_hello() local 637 SSL *const ssl = hs->ssl; in do_send_server_hello() local 798 SSL *const ssl = hs->ssl; in do_send_server_finished() local 815 SSL *const ssl = hs->ssl; in do_send_half_rtt_ticket() local [all …]
|
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 783 while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) { in send_flight() [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/ssl/ |
H A D | handshake_client.cc | 217 SSL *const ssl = hs->ssl; in ssl_write_client_cipher_list() local 284 SSL *const ssl = hs->ssl; in ssl_write_client_hello() local 343 SSL *const ssl = hs->ssl; in parse_supported_versions() local 379 SSL *const ssl = hs->ssl; in do_start_connect() local 441 SSL *const ssl = hs->ssl; in do_enter_early_data() local 507 SSL *const ssl = hs->ssl; in do_read_hello_verify_request() local 551 SSL *const ssl = hs->ssl; in do_read_server_hello() local 801 SSL *const ssl = hs->ssl; in do_read_server_certificate() local 848 SSL *const ssl = hs->ssl; in do_read_certificate_status() local 934 SSL *const ssl = hs->ssl; in do_read_server_key_exchange() local [all …]
|
H A D | tls13_server.cc | 46 SSL *const ssl = hs->ssl; in resolve_ecdhe_secret() local 100 SSL *const ssl = hs->ssl; in add_new_session_tickets() local 184 SSL *const ssl = hs->ssl; in do_select_parameters() local 237 SSL *const ssl = hs->ssl; in select_session() local 313 SSL *const ssl = hs->ssl; in do_select_session() local 466 SSL *const ssl = hs->ssl; in do_send_hello_retry_request() local 501 SSL *const ssl = hs->ssl; in do_read_second_client_hello() local 578 SSL *const ssl = hs->ssl; in do_send_server_hello() local 701 SSL *const ssl = hs->ssl; in do_send_server_finished() local 718 SSL *const ssl = hs->ssl; in do_send_half_rtt_ticket() local [all …]
|
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 783 while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) { in send_flight() [all …]
|
/dports/net/libwebsockets/libwebsockets-v4.2.2/lib/tls/mbedtls/wrapper/include/openssl/ |
H A D | ssl.h | 90 void SSL_free(SSL *ssl); 101 int SSL_connect(SSL *ssl); 112 int SSL_accept(SSL *ssl); 161 int SSL_shutdown(SSL *ssl); 173 int SSL_set_fd(SSL *ssl, int fd); 451 int SSL_do_handshake(SSL *ssl); 634 void SSL_set_info_callback(SSL *ssl, void (*cb) (const SSL *ssl, int type, int val)); 840 int SSL_want(const SSL *ssl); 862 int SSL_clear(SSL *ssl); 1615 int SSL_up_ref(SSL *ssl); [all …]
|
/dports/lang/ruby26/ruby-2.6.9/test/openssl/ |
H A D | test_ssl.rb | 51 ssl.puts "abc"; assert_equal "abc\n", ssl.gets 71 ssl.puts "abc"; assert_equal "abc\n", ssl.gets 164 ssl.puts "abc"; assert_equal "abc\n", ssl.gets 176 ssl.puts "abc"; assert_equal "abc\n", ssl.gets 203 server_connect(port) { |ssl| ssl.puts("abc"); ssl.gets } 242 server_connect(port, ctx) { |ssl| ssl.puts("abc"); ssl.gets } 250 server_connect(port, ctx) { |ssl| ssl.puts("abc"); ssl.gets } 270 ssl.puts "abc"; assert_equal "abc\n", ssl.gets 348 ssls.each{|ssl| ssl.close } 832 ssl.close if ssl [all …]
|
/dports/net/ssldump/ssldump-0.9b3/ssl/ |
H A D | sslprint.c | 64 ssl_obj *ssl; in process_beginning_plaintext() 94 ssl_obj *ssl; in process_v2_hello() 205 ssl_obj *ssl; in ssl_decode_switch() 231 ssl_obj *ssl; in ssl_expand_record() 284 ssl_obj *ssl; in ssl_decode_uintX() 316 ssl_obj *ssl; in ssl_decode_opaque_array() 561 if(ssl->process_ciphertext & ssl->direction) 592 ssl->client_name,ssl->client_port,ssl->server_name,ssl->server_port); 596 ssl->client_name,ssl->client_port,ssl->server_name,ssl->server_port); 644 ssl->record_count,ssl->record_count<10?" ":""); [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/ |
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 783 while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) { in send_flight() [all …]
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 779 dtls1_update_mtu(ssl); in send_flight() [all …]
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | d1_both.cc | 373 if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) { in dtls1_open_handshake() 580 &ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len]; in add_outgoing() 612 BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL); in dtls1_update_mtu() 633 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_message() 634 assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]); in seal_next_message() 637 if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) { in seal_next_message() 729 assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len); in seal_next_packet() 730 for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len; in seal_next_packet() 733 &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]; in seal_next_packet() 779 dtls1_update_mtu(ssl); in send_flight() [all …]
|
/dports/security/libressl/libressl-3.4.3/ssl/ |
H A D | tls13_legacy.c | 230 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_read_bytes() 264 if ((ret = ssl->internal->handshake_func(ssl)) <= 0) in tls13_legacy_write_bytes() 315 SSL *s = ctx->ssl; in tls13_use_legacy_stack() 380 SSL *s = ctx->ssl; in tls13_use_legacy_client() 394 SSL *s = ctx->ssl; in tls13_use_legacy_server() 418 ctx->ssl = ssl; in tls13_legacy_accept() 432 return ssl->method->ssl_accept(ssl); in tls13_legacy_accept() 452 return ssl->method->ssl_connect(ssl); in tls13_legacy_connect() 462 ctx->ssl = ssl; in tls13_legacy_connect() 476 return ssl->method->ssl_connect(ssl); in tls13_legacy_connect() [all …]
|