Home
last modified time | relevance | path

Searched refs:sending (Results 1 – 25 of 43) sorted by relevance

12

/openssl-master/ssl/record/
A Dssl3_record_tls13.c23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument
42 if (sending) { in tls13_enc()
95 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc()
109 if (!sending) { in tls13_enc()
141 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_enc()
142 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_enc()
177 if (sending) { in tls13_enc()
A Dssl3_record.c837 if (sending) { in ssl3_enc()
880 if (!sending) { in ssl3_enc()
921 if (!sending) in ssl3_enc()
964 if (sending) { in tls1_enc()
1077 if (sending) { in tls1_enc()
1103 if (!sending) { in tls1_enc()
1174 if (!sending) { in tls1_enc()
1220 if (!sending) { in tls1_enc()
1291 if (sending) { in n_ssl3_mac()
1307 if (!sending in n_ssl3_mac()
[all …]
A Drecord.h227 __owur int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
/openssl-master/ssl/statem/
A Dstatem.c215 void ossl_statem_check_finish_init(SSL *s, int sending) in ossl_statem_check_finish_init() argument
217 if (sending == -1) { in ossl_statem_check_finish_init()
230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init()
233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init()
239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
/openssl-master/ssl/
A Dtls13_enc.c329 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, in derive_secret_key_and_iv() argument
387 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv()
742 int tls13_update_key(SSL *s, int sending) in tls13_update_key() argument
757 if (s->server == sending) in tls13_update_key()
762 if (sending) { in tls13_update_key()
773 if (!derive_secret_key_and_iv(s, sending, ssl_handshake_md(s), in tls13_update_key()
/openssl-master/doc/man3/
A DSSL_key_update.pod27 the sending keys for this connection will be updated and the peer will be
29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
31 peer to additionally update its sending keys. It is an error if B<updatetype> is
A DSSL_get0_peer_scts.pod25 capable of sending.
A DSSL_read_early_data.pod21 - functions for sending and receiving early data
73 When a server receives early data it may opt to immediately respond by sending
246 The whole purpose of early data is to enable a client to start sending data to
278 connection while sending early data may want to retry the connection without
279 sending early data as this does not happen automatically. A client will have to
281 connection again but without sending early data. Note that it is inadvisable to
A DTS_VERIFY_CTX_set_certs.pod25 In TSP, when a server is sending a response to a client, the server normally
A DSSL_set_shutdown.pod53 SSL_set_shutdown() can be used to set this state without sending a
A DBIO_ctrl.pod80 sending. Otherwise, it returns zero. It also returns negative values for failure.
106 sending. Otherwise, it returns zero.
A DSSL_CTX_add_extra_chain_cert.pod42 When sending a certificate chain, extra chain certificates are sent in order
A DOSSL_CMP_exec_certreq.pod80 the given I<ctx>) it starts a new transaction by sending a certificate request
99 aborts the CMP transaction by sending an error message to the server.
A DSSL_CTX_set_psk_client_callback.pod87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
103 client is sending the ClientKeyExchange message to the server.
A DSSL_in_init.pod76 Handshake message sending/processing has completed.
A DSSL_shutdown.pod27 The shutdown procedure consists of two steps: sending of the close_notify
109 When it is done sending data, it will send the close_notify alert.
A DSSL_alert_type_string.pod42 (The sending party may however decide to send a fatal error.) The
199 handshake is complete, just closing the connection by sending a
A DSSL_get_error.pod50 The TLS/SSL peer has closed the connection for writing by sending the
88 again to continue sending the application data. If you get B<SSL_ERROR_WANT_WRITE>
A DOSSL_HTTP_transfer.pod131 sending requests, and receiving responses) is allowed to take until completion.
154 BIO will be read on-the-fly while sending the request, which supports streaming.
164 the subsequent HTTP transfer (sending the request and receiving a response)
A DBIO_connect.pod54 Enables regular sending of keep-alive messages.
A DOSSL_CMP_SRV_CTX_new.pod121 OSSL_CMP_SRV_CTX_set_send_unprotected_errors() enables sending error messages
A DOSSL_HTTP_REQ_CTX.pod103 the subsequent HTTP transfer (sending the request and receiving a response)
153 Before sending the request, this could used to modify the HTTP request text.
A DSSL_CTX_add1_chain_cert.pod115 sending incorrect certificate chains often cause problems with peers.
/openssl-master/doc/man1/
A Dopenssl-version.pod.in84 The output of C<openssl version -a> would typically be used when sending
A Dopenssl-crl2pkcs7.pod.in88 the certificate enrollment process. This involves sending the DER encoded output

Completed in 28 milliseconds

12