/openssl-master/ssl/statem/ |
A D | statem_local.h | 183 __owur int tls_parse_extension(SSL *s, TLSEXT_INDEX idx, int context, 199 int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context, 209 int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context, 251 unsigned int context, X509 *x, 254 unsigned int context, X509 *x, 257 unsigned int context, X509 *x, 295 unsigned int context, X509 *x, 329 unsigned int context, X509 *x, 335 unsigned int context, X509 *x, 364 unsigned int context, X509 *x, [all …]
|
A D | extensions.c | 71 unsigned int context; member 409 unsigned int context; in tls_validate_all_contexts() local 425 context = ext_defs[i].context; in tls_validate_all_contexts() 433 context = meth->context; in tls_validate_all_contexts() 459 if (!validate_context(s, thisext->context, context)) in verify_extension() 480 if (!validate_context(s, meth->context, context)) in verify_extension() 649 if (thisexd->init != NULL && (thisexd->context & context) != 0 in tls_collect_extensions() 650 && extension_is_relevant(s, thisexd->context, context) in tls_collect_extensions() 700 if (!extension_is_relevant(s, extdef->context, context)) in tls_parse_extension() 752 if (thisexd->final != NULL && (thisexd->context & context) != 0 in tls_parse_all_extensions() [all …]
|
A D | extensions_cust.c | 32 unsigned int context, in custom_ext_add_old_cb_wrap() argument 131 if (!extension_is_relevant(s, meth->context, context)) in custom_ext_parse() 134 if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO in custom_ext_parse() 187 if (!should_add_extension(s, meth->context, context, maxversion)) in custom_ext_add() 190 if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO in custom_ext_add() 226 if ((context & SSL_EXT_CLIENT_HELLO) != 0) { in custom_ext_add() 366 && (context & SSL_EXT_CLIENT_HELLO) != 0 in add_custom_ext_intern() 394 meth->context = context; in add_custom_ext_intern() 407 unsigned int context, in add_old_custom_ext() argument 432 context, in add_old_custom_ext() [all …]
|
A D | extensions_clnt.c | 16 unsigned int context, X509 *x, in tls_construct_ctos_renegotiate() argument 36 unsigned int context, X509 *x, in tls_construct_ctos_server_name() argument 296 unsigned int context, X509 *x, in tls_construct_ctos_sig_algs() argument 432 unsigned int context, X509 *x, in tls_construct_ctos_use_srtp() argument 905 unsigned int context, X509 *x, in tls_construct_ctos_padding() argument 1388 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { in tls_parse_stoc_status_request() 1429 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { in tls_parse_stoc_sct() 1474 if (!custom_ext_parse(s, context, in tls_parse_stoc_sct() 1721 if (context == SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) in tls_parse_stoc_supported_versions() 1750 if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) { in tls_parse_stoc_key_share() [all …]
|
A D | extensions_srvr.c | 41 int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_renegotiate() argument 94 int tls_parse_ctos_server_name(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_server_name() argument 203 int tls_parse_ctos_srp(SSL *s, PACKET *pkt, unsigned int context, X509 *x, in tls_parse_ctos_srp() argument 223 int tls_parse_ctos_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_ec_pt_formats() argument 261 ossl_unused unsigned int context, in tls_parse_ctos_sig_algs_cert() argument 933 int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context, in tls_parse_ctos_early_data() argument 1408 if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) in tls_construct_stoc_status_request() 1493 unsigned int context, X509 *x, in tls_construct_stoc_use_srtp() argument 1578 unsigned int context, X509 *x, in tls_construct_stoc_key_share() argument 1860 unsigned int context, X509 *x, in tls_construct_stoc_early_data() argument [all …]
|
/openssl-master/doc/man3/ |
A D | OSSL_LIB_CTX.pod | 8 - OpenSSL library context 28 B<OSSL_LIB_CTX> is an internal OpenSSL library context type. 38 OSSL_LIB_CTX_new() creates a new OpenSSL library context. 50 new library context to the application library context. The new library context 55 child library context. 61 context subsequently loads the same provider. 70 call for that provider in that child library context. 84 library context. 91 default OpenSSL library context. 94 the global default library context. [all …]
|
A D | SSL_CTX_set_session_id_context.pod | 18 SSL_CTX_set_session_id_context() sets the context B<sid_ctx> of length 21 SSL_set_session_id_context() sets the context B<sid_ctx> of length 26 Sessions are generated within a certain context. When exporting/importing 28 to re-import a session generated from another context (e.g. another 36 The session id context becomes part of the session. The session id context 41 OpenSSL clients will check the session id context returned by the server 49 If the session id context is not set on an SSL/TLS server and client 54 If a server returns a different session id context to an OpenSSL client 56 fail. OpenSSL servers will always return the correct session id context, 57 as an OpenSSL server checks the session id context itself before reusing [all …]
|
A D | SSL_export_keying_material.pod | 15 const unsigned char *context, 20 const unsigned char *context, 40 An application may need to securely establish the context within which this 43 the context. The context value is left to the application but must be the same 47 B<out>. The application specific context should be supplied in the location 48 pointed to by B<context> and should be B<contextlen> bytes long. Provision of 49 a context is optional. If the context should be omitted entirely then 51 B<use_context> is 0 then the values of B<context> and B<contextlen> are ignored. 52 Note that in TLSv1.2 and below a zero length context is treated differently from 53 no context at all, and will result in different keying material being returned. [all …]
|
A D | TS_RESP_CTX_new.pod | 6 TS_RESP_CTX_free - Timestamp response context object creation 18 Creates a response context that can be used for generating responses. 21 library context of I<libctx> and a property query of I<propq>. 22 The library context and property query can be used to select which providers 25 TS_RESP_CTX_new() is similar to TS_RESP_CTX_new_ex() but sets the library context 26 and property query to NULL. This results in the default (NULL) library context
|
A D | EVP_PKEY_CTX_new.pod | 8 - public key algorithm context functions 28 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 31 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 35 context using the library context I<libctx> (see L<OSSL_LIB_CTX(3)>), the 42 context using the library context I<libctx> (see L<OSSL_LIB_CTX(3)>) and the 52 EVP_PKEY_CTX_dup() duplicates the context I<ctx>. It is not supported for a 55 EVP_PKEY_CTX_free() frees up the context I<ctx>. 64 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used 66 threads: that is it is not permissible to use the same context simultaneously
|
A D | EVP_VerifyInit.pod | 28 EVP_VerifyInit_ex() sets up verification context I<ctx> to use digest 33 verification context I<ctx>. This function can be called several times on the 38 The library context I<libctx> and property query I<propq> are used when creating 39 a context to use with the key I<pkey>. 42 values of NULL for the library context I<libctx> and the property query I<propq>. 44 EVP_VerifyInit() initializes verification context I<ctx> to use the default 63 The call to EVP_VerifyFinal() internally finalizes a copy of the digest context. 67 Since only a copy of the digest context is ever finalized the context must
|
/openssl-master/test/ssl-tests/ |
A D | 05-sni.cnf | 5 test-0 = 0-SNI-switch-context 6 test-1 = 1-SNI-keep-context 16 [0-SNI-switch-context] 17 ssl_conf = 0-SNI-switch-context-ssl 19 [0-SNI-switch-context-ssl] 24 [0-SNI-switch-context-server] 29 [0-SNI-switch-context-client] 50 [1-SNI-keep-context] 53 [1-SNI-keep-context-ssl] 58 [1-SNI-keep-context-server] [all …]
|
A D | 09-alpn.cnf | 11 test-6 = 6-alpn-with-sni-no-context-switch 12 test-7 = 7-alpn-with-sni-context-switch 200 [6-alpn-with-sni-no-context-switch] 203 [6-alpn-with-sni-no-context-switch-ssl] 208 [6-alpn-with-sni-no-context-switch-server] 218 [6-alpn-with-sni-no-context-switch-client] 244 [7-alpn-with-sni-context-switch] 247 [7-alpn-with-sni-context-switch-ssl] 252 [7-alpn-with-sni-context-switch-server] 257 [7-alpn-with-sni-context-switch-server2] [all …]
|
/openssl-master/crypto/ec/curve448/ |
A D | eddsa.c | 60 const uint8_t *context, in hash_init_with_dom() argument 87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom() 164 uint8_t prehashed, const uint8_t *context, in ossl_c448_ed448_sign() argument 193 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, in ossl_c448_ed448_sign() 276 context, context_len, propq); in ossl_c448_ed448_sign_prehash() 285 uint8_t prehashed, const uint8_t *context, in ossl_c448_ed448_verify() argument 368 const uint8_t hash[64], const uint8_t *context, in ossl_c448_ed448_verify_prehash() argument 378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign() argument 382 message_len, 0, context, context_len, in ossl_ed448_sign() 402 hash, context, context_len, in ossl_ed448ph_sign() [all …]
|
/openssl-master/crypto/md5/asm/ |
A D | md5-x86_64.pl | 294 my $context="%r8"; 313 mov 120($context),%rax # pull context->Rax 314 mov 248($context),%rbx # pull context->Rip 320 mov 152($context),%rax # pull context->Rsp 333 mov %rbx,144($context) # restore context->Rbx 334 mov %rbp,160($context) # restore context->Rbp 335 mov %r12,216($context) # restore context->R12 336 mov %r14,232($context) # restore context->R14 337 mov %r15,240($context) # restore context->R15 342 mov %rax,152($context) # restore context->Rsp [all …]
|
/openssl-master/util/perl/TLSProxy/ |
A D | Certificate.pm | 45 my $context = substr($self->data, 1, $context_len); 91 $self->context($context); 96 print " Context:".$context."\n"; 142 $data = pack('C', length($self->context())); 143 $data .= $self->context; 172 sub context subroutine 176 $self->{context} = shift; 178 return $self->{context};
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_ctx_set1_caPubs.pod | 13 - internal functions for managing the CMP client context datastructure 34 to the caPubs field of the context. 37 ossl_cmp_ctx_set0_validatedSrvCert() sets the validatedSrvCert of the context, 40 ossl_cmp_ctx_set_status() sets the status field of the context. 42 ossl_cmp_ctx_set0_statusString() sets the statusString field of the context. 45 field of the context based on the given OSSL_CMP_PKIFAILUREINFO structure. 48 in the context. 50 ossl_cmp_ctx_set1_extraCertsIn() sets the extraCertsIn field of the context. 53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
|
A D | ossl_lib_ctx_get_data.pod | 31 Internally, the OpenSSL library context B<OSSL_LIB_CTX> is implemented 41 the library context I<ctx> associated with the given I<index>. An 45 context is created or freed, meaning that the code that use a data item of that 49 context is freed. 52 exactly once per library context I<ctx> object. Each initialisation routine 57 the library context I<ctx>. When I<ctx> is freed all associated "on free" 60 ossl_lib_ctx_is_child() returns 1 if this library context is a child and 0 72 For a type C<FOO> that should end up in the OpenSSL library context, a 94 * Include a reference to this in the methods table in context.c 99 * method's destructor will be called when the library context is cleaned up. [all …]
|
/openssl-master/crypto/bn/asm/ |
A D | x86_64-gf2m.pl | 317 $context="%r8"; 337 mov 120($context),%rax # pull context->Rax 338 mov 248($context),%rbx # pull context->Rip 344 mov 152($context),%rax # pull context->Rsp 358 mov %rbx,144($context) # restore context->Rbx 359 mov %rbp,160($context) # restore context->Rbp 360 mov %rsi,168($context) # restore context->Rsi 361 mov %rdi,176($context) # restore context->Rdi 362 mov %r12,216($context) # restore context->R12 363 mov %r13,224($context) # restore context->R13 [all …]
|
A D | rsaz-avx512.pl | 597 $context="%r8"; 616 mov 120($context),%rax # pull context->Rax 617 mov 248($context),%rbx # pull context->Rip 627 mov 152($context),%rax # pull context->Rsp 642 mov %rbx,144($context) # restore context->Rbx 643 mov %rbp,160($context) # restore context->Rbp 644 mov %r12,216($context) # restore context->R12 645 mov %r13,224($context) # restore context->R13 646 mov %r14,232($context) # restore context->R14 647 mov %r15,240($context) # restore context->R14 [all …]
|
/openssl-master/crypto/camellia/asm/ |
A D | cmll-x86_64.pl | 947 $context="%r8"; 966 mov 120($context),%rax # pull context->Rax 967 mov 248($context),%rbx # pull context->Rip 977 mov 152($context),%rax # pull context->Rsp 990 mov %rbx,144($context) # restore context->Rbx 991 mov %rbp,160($context) # restore context->Rbp 992 mov %r13,224($context) # restore context->R13 1020 mov 120($context),%rax # pull context->Rax 1021 mov 248($context),%rbx # pull context->Rip 1031 mov 152($context),%rax # pull context->Rsp [all …]
|
/openssl-master/crypto/rc4/asm/ |
A D | rc4-x86_64.pl | 565 $context="%r8"; 584 mov 120($context),%rax # pull context->Rax 585 mov 248($context),%rbx # pull context->Rip 591 mov 152($context),%rax # pull context->Rsp 602 mov %rbx,144($context) # restore context->Rbx 603 mov %r12,216($context) # restore context->R12 604 mov %r13,224($context) # restore context->R13 609 mov %rax,152($context) # restore context->Rsp 610 mov %rsi,168($context) # restore context->Rsi 630 mov 152($context),%rax # pull context->Rsp [all …]
|
/openssl-master/crypto/whrlpool/asm/ |
A D | wp-x86_64.pl | 516 $context="%r8"; 535 mov 120($context),%rax # pull context->Rax 536 mov 248($context),%rbx # pull context->Rip 542 mov 152($context),%rax # pull context->Rsp 556 mov %rbx,144($context) # restore context->Rbx 557 mov %rbp,160($context) # restore context->Rbp 558 mov %r12,216($context) # restore context->R12 559 mov %r13,224($context) # restore context->R13 560 mov %r14,232($context) # restore context->R14 561 mov %r15,240($context) # restore context->R15 [all …]
|
/openssl-master/doc/man7/ |
A D | provider-signature.pod | 182 structure for holding context information during a signature operation. 185 The parameter I<provctx> is the provider context generated during provider 191 context in the I<ctx> parameter. 192 This function should free any resources associated with that context. 209 A previously initialised signature context is passed in the I<ctx> 261 provider side signature context in the I<ctx> parameter, and a pointer to a 314 verification context is passed in the I<ctx> parameter. This function may be 321 verification context is passed in the I<ctx> parameter. The signature to be 336 given provider side signature context I<ctx> and stored them in I<params>. 340 given provider side signature context I<ctx> to I<params>. [all …]
|
A D | provider-kem.pod | 106 A pointer to this context will be passed back in a number of the other 112 kem context in the I<ctx> parameter. 113 This function should free any resources associated with that context. 116 context in the I<ctx> parameter and return the duplicate copy. 120 OSSL_FUNC_kem_encapsulate_init() initialises a context for an asymmetric 121 encapsulation given a provider side asymmetric kem context in the I<ctx> 131 A previously initialised asymmetric kem context is passed in the I<ctx> 146 OSSL_FUNC_kem_decapsulate_init() initialises a context for an asymmetric 147 decapsulation given a provider side asymmetric kem context in the I<ctx> 155 A previously initialised asymmetric kem context is passed in the I<ctx> [all …]
|