Lines Matching refs:con

74     SSL *con;  member
95 static void user_data_init(struct user_data_st *user_data, SSL *con, char *buf,
112 static void print_stuff(BIO *berr, SSL *con, int full);
416 static int tlsa_import_rr(SSL *con, const char *rrdata) in tlsa_import_rr() argument
444 ret = SSL_dane_tlsa_add(con, usage, selector, mtype, data, len); in tlsa_import_rr()
462 static int tlsa_import_rrset(SSL *con, STACK_OF(OPENSSL_STRING) *rrset) in tlsa_import_rrset() argument
470 if (tlsa_import_rr(con, rrdata) > 0) in tlsa_import_rrset()
848 SSL *con = NULL; in s_client_main() local
2069 con = SSL_new(ctx); in s_client_main()
2070 if (con == NULL) in s_client_main()
2074 SSL_set_post_handshake_auth(con, 1); in s_client_main()
2077 if (!SSL_set1_client_cert_type(con, cert_type_rpk, sizeof(cert_type_rpk))) { in s_client_main()
2082 if (!SSL_set1_server_cert_type(con, cert_type_rpk, sizeof(cert_type_rpk))) { in s_client_main()
2103 if (!SSL_set_session(con, sess)) { in s_client_main()
2113 SSL_set_mode(con, SSL_MODE_SEND_FALLBACK_SCSV); in s_client_main()
2120 if (servername != NULL && !SSL_set_tlsext_host_name(con, servername)) { in s_client_main()
2128 if (SSL_dane_enable(con, dane_tlsa_domain) <= 0) { in s_client_main()
2139 if (tlsa_import_rrset(con, dane_tlsa_rrset) <= 0) { in s_client_main()
2145 SSL_dane_set_flags(con, DANE_FLAG_NO_DANE_EE_NAMECHECKS); in s_client_main()
2192 if (isquic && !SSL_set_blocking_mode(con, 0)) in s_client_main()
2238 if (socket_mtu < DTLS_get_link_min_mtu(con)) { in s_client_main()
2240 DTLS_get_link_min_mtu(con)); in s_client_main()
2244 SSL_set_options(con, SSL_OP_NO_QUERY_MTU); in s_client_main()
2245 if (!DTLS_set_link_mtu(con, socket_mtu)) { in s_client_main()
2259 if (!SSL_set1_initial_peer_addr(con, peer_addr)) { in s_client_main()
2299 SSL_set_msg_callback(con, SSL_trace); in s_client_main()
2302 SSL_set_msg_callback(con, msg_cb); in s_client_main()
2303 SSL_set_msg_callback_arg(con, bio_c_msg ? bio_c_msg : bio_c_out); in s_client_main()
2307 SSL_set_tlsext_debug_callback(con, tlsext_cb); in s_client_main()
2308 SSL_set_tlsext_debug_arg(con, bio_c_out); in s_client_main()
2312 SSL_set_tlsext_status_type(con, TLSEXT_STATUSTYPE_ocsp); in s_client_main()
2318 SSL_set_bio(con, sbio, sbio); in s_client_main()
2319 SSL_set_connect_state(con); in s_client_main()
2322 if (fileno_stdin() > SSL_get_fd(con)) in s_client_main()
2325 width = SSL_get_fd(con) + 1; in s_client_main()
2547 width = SSL_get_fd(con) + 1; in s_client_main()
2553 openssl_fdset(SSL_get_fd(con), &readfds); in s_client_main()
2869 && ((SSL_get0_session(con) != NULL in s_client_main()
2870 && SSL_SESSION_get_max_early_data(SSL_get0_session(con)) > 0) in s_client_main()
2886 while (!SSL_write_early_data(con, cbuf, readbytes, &writtenbytes)) { in s_client_main()
2887 switch (SSL_get_error(con, 0)) { in s_client_main()
2905 user_data_init(&user_data, con, cbuf, BUFSIZZ, cmdmode); in s_client_main()
2911 && SSL_get_event_timeout(con, &timeout, &is_infinite) in s_client_main()
2917 if (!SSL_is_init_finished(con) && SSL_total_renegotiations(con) == 0 in s_client_main()
2918 && SSL_get_key_update_type(con) == SSL_KEY_UPDATE_NONE) { in s_client_main()
2927 print_ssl_summary(con); in s_client_main()
2930 print_stuff(bio_c_out, con, full_log); in s_client_main()
2945 do_ssl_shutdown(con); in s_client_main()
2946 SSL_set_connect_state(con); in s_client_main()
2947 BIO_closesocket(SSL_get_fd(con)); in s_client_main()
2985 ssl_pending = read_ssl && SSL_has_pending(con); in s_client_main()
3010 || (isquic && SSL_net_read_desired(con))) in s_client_main()
3011 openssl_fdset(SSL_get_fd(con), &readfds); in s_client_main()
3013 || (isquic && (first_loop || SSL_net_write_desired(con)))) in s_client_main()
3014 openssl_fdset(SSL_get_fd(con), &writefds); in s_client_main()
3018 || (isquic && SSL_net_read_desired(con))) in s_client_main()
3019 openssl_fdset(SSL_get_fd(con), &readfds); in s_client_main()
3021 || (isquic && (first_loop || SSL_net_write_desired(con)))) in s_client_main()
3022 openssl_fdset(SSL_get_fd(con), &writefds); in s_client_main()
3066 SSL_handle_events(con); in s_client_main()
3068 && !FD_ISSET(SSL_get_fd(con), &readfds) in s_client_main()
3069 && !FD_ISSET(SSL_get_fd(con), &writefds)) in s_client_main()
3074 && ((!isquic && FD_ISSET(SSL_get_fd(con), &writefds)) in s_client_main()
3076 k = SSL_write(con, &(cbuf[cbuf_off]), (unsigned int)cbuf_len); in s_client_main()
3077 switch (SSL_get_error(con, k)) { in s_client_main()
3100 wait_for_async(con); in s_client_main()
3169 || (!isquic && FD_ISSET(SSL_get_fd(con), &readfds))) { in s_client_main()
3174 SSL_renegotiate(con); in s_client_main()
3179 k = SSL_read(con, sbuf, BUFSIZZ); in s_client_main()
3181 switch (SSL_get_error(con, k)) { in s_client_main()
3193 wait_for_async(con); in s_client_main()
3288 print_stuff(bio_c_out, con, full_log); in s_client_main()
3289 do_ssl_shutdown(con); in s_client_main()
3301 shutdown(SSL_get_fd(con), 1); /* SHUT_WR */ in s_client_main()
3315 BIO_closesocket(SSL_get_fd(con)); in s_client_main()
3317 if (con != NULL) { in s_client_main()
3319 print_stuff(bio_c_out, con, 1); in s_client_main()
3320 SSL_free(con); in s_client_main()
3792 static void user_data_init(struct user_data_st *user_data, SSL *con, char *buf, in user_data_init() argument
3795 user_data->con = con; in user_data_init()
3834 if (SSL_is_quic(user_data->con)) { in user_data_execute()
3836 } else if(SSL_version(user_data->con) == TLS1_3_VERSION) { in user_data_execute()
3853 do_ssl_shutdown(user_data->con); in user_data_execute()
3854 SSL_set_connect_state(user_data->con); in user_data_execute()
3855 BIO_closesocket(SSL_get_fd(user_data->con)); in user_data_execute()
3860 if (!SSL_renegotiate(user_data->con)) in user_data_execute()
3874 if (!SSL_key_update(user_data->con, updatetype)) in user_data_execute()
3880 if (!SSL_stream_conclude(user_data->con, 0)) in user_data_execute()
3982 } else if(SSL_is_quic(user_data->con)) { in user_data_process()
3985 } if (SSL_version(user_data->con) == TLS1_3_VERSION) { in user_data_process()