Home
last modified time | relevance | path

Searched refs:context (Results 1 – 25 of 297) sorted by relevance

12345678910>>...12

/openssl-master/ssl/statem/
A Dstatem_local.h183 __owur int tls_parse_extension(SSL *s, TLSEXT_INDEX idx, int context,
199 int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
209 int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context,
251 unsigned int context, X509 *x,
254 unsigned int context, X509 *x,
257 unsigned int context, X509 *x,
295 unsigned int context, X509 *x,
329 unsigned int context, X509 *x,
335 unsigned int context, X509 *x,
364 unsigned int context, X509 *x,
[all …]
A Dextensions.c71 unsigned int context; member
409 unsigned int context; in tls_validate_all_contexts() local
425 context = ext_defs[i].context; in tls_validate_all_contexts()
433 context = meth->context; in tls_validate_all_contexts()
459 if (!validate_context(s, thisext->context, context)) in verify_extension()
480 if (!validate_context(s, meth->context, context)) in verify_extension()
649 if (thisexd->init != NULL && (thisexd->context & context) != 0 in tls_collect_extensions()
650 && extension_is_relevant(s, thisexd->context, context) in tls_collect_extensions()
700 if (!extension_is_relevant(s, extdef->context, context)) in tls_parse_extension()
752 if (thisexd->final != NULL && (thisexd->context & context) != 0 in tls_parse_all_extensions()
[all …]
A Dextensions_cust.c32 unsigned int context, in custom_ext_add_old_cb_wrap() argument
131 if (!extension_is_relevant(s, meth->context, context)) in custom_ext_parse()
134 if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO in custom_ext_parse()
187 if (!should_add_extension(s, meth->context, context, maxversion)) in custom_ext_add()
190 if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO in custom_ext_add()
226 if ((context & SSL_EXT_CLIENT_HELLO) != 0) { in custom_ext_add()
366 && (context & SSL_EXT_CLIENT_HELLO) != 0 in add_custom_ext_intern()
394 meth->context = context; in add_custom_ext_intern()
407 unsigned int context, in add_old_custom_ext() argument
432 context, in add_old_custom_ext()
[all …]
A Dextensions_clnt.c16 unsigned int context, X509 *x, in tls_construct_ctos_renegotiate() argument
36 unsigned int context, X509 *x, in tls_construct_ctos_server_name() argument
296 unsigned int context, X509 *x, in tls_construct_ctos_sig_algs() argument
432 unsigned int context, X509 *x, in tls_construct_ctos_use_srtp() argument
905 unsigned int context, X509 *x, in tls_construct_ctos_padding() argument
1388 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { in tls_parse_stoc_status_request()
1429 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { in tls_parse_stoc_sct()
1474 if (!custom_ext_parse(s, context, in tls_parse_stoc_sct()
1721 if (context == SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) in tls_parse_stoc_supported_versions()
1750 if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) { in tls_parse_stoc_key_share()
[all …]
A Dextensions_srvr.c41 int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_renegotiate() argument
94 int tls_parse_ctos_server_name(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_server_name() argument
203 int tls_parse_ctos_srp(SSL *s, PACKET *pkt, unsigned int context, X509 *x, in tls_parse_ctos_srp() argument
223 int tls_parse_ctos_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_ec_pt_formats() argument
261 ossl_unused unsigned int context, in tls_parse_ctos_sig_algs_cert() argument
933 int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_early_data() argument
1408 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) in tls_construct_stoc_status_request()
1493 unsigned int context, X509 *x, in tls_construct_stoc_use_srtp() argument
1578 unsigned int context, X509 *x, in tls_construct_stoc_key_share() argument
1860 unsigned int context, X509 *x, in tls_construct_stoc_early_data() argument
[all …]
/openssl-master/doc/man3/
A DOSSL_LIB_CTX.pod8 - OpenSSL library context
28 B<OSSL_LIB_CTX> is an internal OpenSSL library context type.
38 OSSL_LIB_CTX_new() creates a new OpenSSL library context.
50 new library context to the application library context. The new library context
55 child library context.
61 context subsequently loads the same provider.
70 call for that provider in that child library context.
84 library context.
91 default OpenSSL library context.
94 the global default library context.
[all …]
A DSSL_CTX_set_session_id_context.pod18 SSL_CTX_set_session_id_context() sets the context B<sid_ctx> of length
21 SSL_set_session_id_context() sets the context B<sid_ctx> of length
26 Sessions are generated within a certain context. When exporting/importing
28 to re-import a session generated from another context (e.g. another
36 The session id context becomes part of the session. The session id context
41 OpenSSL clients will check the session id context returned by the server
49 If the session id context is not set on an SSL/TLS server and client
54 If a server returns a different session id context to an OpenSSL client
56 fail. OpenSSL servers will always return the correct session id context,
57 as an OpenSSL server checks the session id context itself before reusing
[all …]
A DSSL_export_keying_material.pod15 const unsigned char *context,
20 const unsigned char *context,
40 An application may need to securely establish the context within which this
43 the context. The context value is left to the application but must be the same
47 B<out>. The application specific context should be supplied in the location
48 pointed to by B<context> and should be B<contextlen> bytes long. Provision of
49 a context is optional. If the context should be omitted entirely then
51 B<use_context> is 0 then the values of B<context> and B<contextlen> are ignored.
52 Note that in TLSv1.2 and below a zero length context is treated differently from
53 no context at all, and will result in different keying material being returned.
[all …]
A DTS_RESP_CTX_new.pod6 TS_RESP_CTX_free - Timestamp response context object creation
18 Creates a response context that can be used for generating responses.
21 library context of I<libctx> and a property query of I<propq>.
22 The library context and property query can be used to select which providers
25 TS_RESP_CTX_new() is similar to TS_RESP_CTX_new_ex() but sets the library context
26 and property query to NULL. This results in the default (NULL) library context
A DEVP_PKEY_CTX_new.pod8 - public key algorithm context functions
28 The EVP_PKEY_CTX_new() function allocates public key algorithm context using
31 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context
35 context using the library context I<libctx> (see L<OSSL_LIB_CTX(3)>), the
42 context using the library context I<libctx> (see L<OSSL_LIB_CTX(3)>) and the
52 EVP_PKEY_CTX_dup() duplicates the context I<ctx>. It is not supported for a
55 EVP_PKEY_CTX_free() frees up the context I<ctx>.
64 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used
66 threads: that is it is not permissible to use the same context simultaneously
A DEVP_VerifyInit.pod28 EVP_VerifyInit_ex() sets up verification context I<ctx> to use digest
33 verification context I<ctx>. This function can be called several times on the
38 The library context I<libctx> and property query I<propq> are used when creating
39 a context to use with the key I<pkey>.
42 values of NULL for the library context I<libctx> and the property query I<propq>.
44 EVP_VerifyInit() initializes verification context I<ctx> to use the default
63 The call to EVP_VerifyFinal() internally finalizes a copy of the digest context.
67 Since only a copy of the digest context is ever finalized the context must
/openssl-master/test/ssl-tests/
A D05-sni.cnf5 test-0 = 0-SNI-switch-context
6 test-1 = 1-SNI-keep-context
16 [0-SNI-switch-context]
17 ssl_conf = 0-SNI-switch-context-ssl
19 [0-SNI-switch-context-ssl]
24 [0-SNI-switch-context-server]
29 [0-SNI-switch-context-client]
50 [1-SNI-keep-context]
53 [1-SNI-keep-context-ssl]
58 [1-SNI-keep-context-server]
[all …]
A D09-alpn.cnf11 test-6 = 6-alpn-with-sni-no-context-switch
12 test-7 = 7-alpn-with-sni-context-switch
200 [6-alpn-with-sni-no-context-switch]
203 [6-alpn-with-sni-no-context-switch-ssl]
208 [6-alpn-with-sni-no-context-switch-server]
218 [6-alpn-with-sni-no-context-switch-client]
244 [7-alpn-with-sni-context-switch]
247 [7-alpn-with-sni-context-switch-ssl]
252 [7-alpn-with-sni-context-switch-server]
257 [7-alpn-with-sni-context-switch-server2]
[all …]
/openssl-master/crypto/ec/curve448/
A Deddsa.c60 const uint8_t *context, in hash_init_with_dom() argument
87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom()
164 uint8_t prehashed, const uint8_t *context, in ossl_c448_ed448_sign() argument
193 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, in ossl_c448_ed448_sign()
276 context, context_len, propq); in ossl_c448_ed448_sign_prehash()
285 uint8_t prehashed, const uint8_t *context, in ossl_c448_ed448_verify() argument
368 const uint8_t hash[64], const uint8_t *context, in ossl_c448_ed448_verify_prehash() argument
378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign() argument
382 message_len, 0, context, context_len, in ossl_ed448_sign()
402 hash, context, context_len, in ossl_ed448ph_sign()
[all …]
/openssl-master/crypto/md5/asm/
A Dmd5-x86_64.pl294 my $context="%r8";
313 mov 120($context),%rax # pull context->Rax
314 mov 248($context),%rbx # pull context->Rip
320 mov 152($context),%rax # pull context->Rsp
333 mov %rbx,144($context) # restore context->Rbx
334 mov %rbp,160($context) # restore context->Rbp
335 mov %r12,216($context) # restore context->R12
336 mov %r14,232($context) # restore context->R14
337 mov %r15,240($context) # restore context->R15
342 mov %rax,152($context) # restore context->Rsp
[all …]
/openssl-master/util/perl/TLSProxy/
A DCertificate.pm45 my $context = substr($self->data, 1, $context_len);
91 $self->context($context);
96 print " Context:".$context."\n";
142 $data = pack('C', length($self->context()));
143 $data .= $self->context;
172 sub context subroutine
176 $self->{context} = shift;
178 return $self->{context};
/openssl-master/doc/internal/man3/
A Dossl_cmp_ctx_set1_caPubs.pod13 - internal functions for managing the CMP client context datastructure
34 to the caPubs field of the context.
37 ossl_cmp_ctx_set0_validatedSrvCert() sets the validatedSrvCert of the context,
40 ossl_cmp_ctx_set_status() sets the status field of the context.
42 ossl_cmp_ctx_set0_statusString() sets the statusString field of the context.
45 field of the context based on the given OSSL_CMP_PKIFAILUREINFO structure.
48 in the context.
50 ossl_cmp_ctx_set1_extraCertsIn() sets the extraCertsIn field of the context.
53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
A Dossl_lib_ctx_get_data.pod31 Internally, the OpenSSL library context B<OSSL_LIB_CTX> is implemented
41 the library context I<ctx> associated with the given I<index>. An
45 context is created or freed, meaning that the code that use a data item of that
49 context is freed.
52 exactly once per library context I<ctx> object. Each initialisation routine
57 the library context I<ctx>. When I<ctx> is freed all associated "on free"
60 ossl_lib_ctx_is_child() returns 1 if this library context is a child and 0
72 For a type C<FOO> that should end up in the OpenSSL library context, a
94 * Include a reference to this in the methods table in context.c
99 * method's destructor will be called when the library context is cleaned up.
[all …]
/openssl-master/crypto/bn/asm/
A Dx86_64-gf2m.pl317 $context="%r8";
337 mov 120($context),%rax # pull context->Rax
338 mov 248($context),%rbx # pull context->Rip
344 mov 152($context),%rax # pull context->Rsp
358 mov %rbx,144($context) # restore context->Rbx
359 mov %rbp,160($context) # restore context->Rbp
360 mov %rsi,168($context) # restore context->Rsi
361 mov %rdi,176($context) # restore context->Rdi
362 mov %r12,216($context) # restore context->R12
363 mov %r13,224($context) # restore context->R13
[all …]
A Drsaz-avx512.pl597 $context="%r8";
616 mov 120($context),%rax # pull context->Rax
617 mov 248($context),%rbx # pull context->Rip
627 mov 152($context),%rax # pull context->Rsp
642 mov %rbx,144($context) # restore context->Rbx
643 mov %rbp,160($context) # restore context->Rbp
644 mov %r12,216($context) # restore context->R12
645 mov %r13,224($context) # restore context->R13
646 mov %r14,232($context) # restore context->R14
647 mov %r15,240($context) # restore context->R14
[all …]
/openssl-master/crypto/camellia/asm/
A Dcmll-x86_64.pl947 $context="%r8";
966 mov 120($context),%rax # pull context->Rax
967 mov 248($context),%rbx # pull context->Rip
977 mov 152($context),%rax # pull context->Rsp
990 mov %rbx,144($context) # restore context->Rbx
991 mov %rbp,160($context) # restore context->Rbp
992 mov %r13,224($context) # restore context->R13
1020 mov 120($context),%rax # pull context->Rax
1021 mov 248($context),%rbx # pull context->Rip
1031 mov 152($context),%rax # pull context->Rsp
[all …]
/openssl-master/crypto/rc4/asm/
A Drc4-x86_64.pl565 $context="%r8";
584 mov 120($context),%rax # pull context->Rax
585 mov 248($context),%rbx # pull context->Rip
591 mov 152($context),%rax # pull context->Rsp
602 mov %rbx,144($context) # restore context->Rbx
603 mov %r12,216($context) # restore context->R12
604 mov %r13,224($context) # restore context->R13
609 mov %rax,152($context) # restore context->Rsp
610 mov %rsi,168($context) # restore context->Rsi
630 mov 152($context),%rax # pull context->Rsp
[all …]
/openssl-master/crypto/whrlpool/asm/
A Dwp-x86_64.pl516 $context="%r8";
535 mov 120($context),%rax # pull context->Rax
536 mov 248($context),%rbx # pull context->Rip
542 mov 152($context),%rax # pull context->Rsp
556 mov %rbx,144($context) # restore context->Rbx
557 mov %rbp,160($context) # restore context->Rbp
558 mov %r12,216($context) # restore context->R12
559 mov %r13,224($context) # restore context->R13
560 mov %r14,232($context) # restore context->R14
561 mov %r15,240($context) # restore context->R15
[all …]
/openssl-master/doc/man7/
A Dprovider-signature.pod182 structure for holding context information during a signature operation.
185 The parameter I<provctx> is the provider context generated during provider
191 context in the I<ctx> parameter.
192 This function should free any resources associated with that context.
209 A previously initialised signature context is passed in the I<ctx>
261 provider side signature context in the I<ctx> parameter, and a pointer to a
314 verification context is passed in the I<ctx> parameter. This function may be
321 verification context is passed in the I<ctx> parameter. The signature to be
336 given provider side signature context I<ctx> and stored them in I<params>.
340 given provider side signature context I<ctx> to I<params>.
[all …]
A Dprovider-kem.pod106 A pointer to this context will be passed back in a number of the other
112 kem context in the I<ctx> parameter.
113 This function should free any resources associated with that context.
116 context in the I<ctx> parameter and return the duplicate copy.
120 OSSL_FUNC_kem_encapsulate_init() initialises a context for an asymmetric
121 encapsulation given a provider side asymmetric kem context in the I<ctx>
131 A previously initialised asymmetric kem context is passed in the I<ctx>
146 OSSL_FUNC_kem_decapsulate_init() initialises a context for an asymmetric
147 decapsulation given a provider side asymmetric kem context in the I<ctx>
155 A previously initialised asymmetric kem context is passed in the I<ctx>
[all …]

Completed in 50 milliseconds

12345678910>>...12