Lines Matching refs:ssl_ctx
152 SSLContextRef ssl_ctx; member
772 err = SSLSetProtocolVersionMin(backend->ssl_ctx, ver_min); in sectransp_set_ssl_version_min_max()
777 err = SSLSetProtocolVersionMax(backend->ssl_ctx, ver_max); in sectransp_set_ssl_version_min_max()
799 SSLSetProtocolVersionEnabled(backend->ssl_ctx, kSSLProtocolAll, FALSE); in sectransp_set_ssl_version_min_max()
800 SSLSetProtocolVersionEnabled(backend->ssl_ctx, kTLSProtocol1, TRUE); in sectransp_set_ssl_version_min_max()
860 static SSLCipherSuite * sectransp_get_supported_ciphers(SSLContextRef ssl_ctx, in sectransp_get_supported_ciphers() argument
867 err = SSLGetNumberSupportedCiphers(ssl_ctx, len); in sectransp_get_supported_ciphers()
875 err = SSLGetSupportedCiphers(ssl_ctx, ciphers, len); in sectransp_get_supported_ciphers()
907 SSLContextRef ssl_ctx) in sectransp_set_default_ciphers() argument
915 ciphers = sectransp_get_supported_ciphers(ssl_ctx, &supported_len); in sectransp_set_default_ciphers()
937 err = SSLSetEnabledCiphers(ssl_ctx, ciphers, count); in sectransp_set_default_ciphers()
950 SSLContextRef ssl_ctx, in sectransp_set_selected_ciphers() argument
961 supported = sectransp_get_supported_ciphers(ssl_ctx, &supported_len); in sectransp_set_selected_ciphers()
1005 err = SSLSetEnabledCiphers(ssl_ctx, selected, count); in sectransp_set_selected_ciphers()
1059 if(backend->ssl_ctx)
1060 CFRelease(backend->ssl_ctx);
1061 backend->ssl_ctx = SSLCreateContext(NULL, kSSLClientSide, kSSLStreamType);
1062 if(!backend->ssl_ctx) {
1070 if(backend->ssl_ctx)
1071 (void)SSLDisposeContext(backend->ssl_ctx);
1072 err = SSLNewContext(FALSE, &(backend->ssl_ctx));
1080 if(backend->ssl_ctx)
1081 (void)SSLDisposeContext(backend->ssl_ctx);
1082 err = SSLNewContext(FALSE, &(backend->ssl_ctx));
1111 err = SSLSetALPNProtocols(backend->ssl_ctx, alpnArr);
1179 err = SSLSetCertificate(backend->ssl_ctx, certs);
1245 err = SSLSetSessionOption(backend->ssl_ctx,
1255 err = SSLSetEnableCertVerify(backend->ssl_ctx,
1264 err = SSLSetEnableCertVerify(backend->ssl_ctx,
1289 err = SSLSetPeerDomainName(backend->ssl_ctx, server, strlen(server));
1308 result = sectransp_set_selected_ciphers(data, backend->ssl_ctx, ciphers);
1311 result = sectransp_set_default_ciphers(data, backend->ssl_ctx);
1323 SSLSetSessionOption(backend->ssl_ctx, kSSLSessionOptionSendOneByteRecord,
1325 SSLSetSessionOption(backend->ssl_ctx, kSSLSessionOptionFalseStart,
1340 err = SSLSetPeerID(backend->ssl_ctx, ssl_sessionid, ssl_sessionid_len);
1359 err = SSLSetPeerID(backend->ssl_ctx, ssl_sessionid, ssl_sessionid_len);
1375 err = SSLSetIOFuncs(backend->ssl_ctx,
1383 err = SSLSetConnection(backend->ssl_ctx, cf);
1815 err = SSLHandshake(backend->ssl_ctx);
1831 backend->ssl_ctx);
2043 pkp_pin_peer_pubkey(data, backend->ssl_ctx,
2053 (void)SSLGetNegotiatedCipher(backend->ssl_ctx, &cipher);
2054 (void)SSLGetNegotiatedProtocolVersion(backend->ssl_ctx, &protocol);
2092 err = SSLCopyALPNProtocols(backend->ssl_ctx, &alpnArr);
2191 if(!backend->ssl_ctx)
2197 err = SSLCopyPeerTrust(backend->ssl_ctx, &trust);
2219 err = SSLCopyPeerTrust(backend->ssl_ctx, &trust);
2235 err = SSLCopyPeerCertificates(backend->ssl_ctx, &server_certs);
2253 err = SSLCopyPeerCertificates(backend->ssl_ctx, &server_certs);
2432 if(!backend->ssl_ctx || cf->shutdown) {
2444 err = SSLClose(backend->ssl_ctx);
2509 if(backend->ssl_ctx) {
2513 CFRelease(backend->ssl_ctx);
2516 (void)SSLDisposeContext(backend->ssl_ctx);
2519 (void)SSLDisposeContext(backend->ssl_ctx);
2521 backend->ssl_ctx = NULL;
2542 if(backend->ssl_ctx) { /* SSL is in use */
2544 err = SSLGetBufferedReadSize(backend->ssl_ctx, &buffer);
2624 err = SSLWrite(backend->ssl_ctx, NULL, 0UL, &processed);
2643 err = SSLWrite(backend->ssl_ctx, mem, len, &processed);
2679 err = SSLRead(backend->ssl_ctx, buf, buffersize, &processed);
2706 backend->ssl_ctx);
2729 return backend->ssl_ctx;