/openssl-master/ssl/record/ |
A D | ssl3_record_tls13.c | 23 int tls13_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument 42 if (sending) { in tls13_enc() 95 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc() 109 if (!sending) { in tls13_enc() 141 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_enc() 142 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_enc() 177 if (sending) { in tls13_enc()
|
A D | ssl3_record.c | 837 if (sending) { in ssl3_enc() 880 if (!sending) { in ssl3_enc() 921 if (!sending) in ssl3_enc() 964 if (sending) { in tls1_enc() 1077 if (sending) { in tls1_enc() 1103 if (!sending) { in tls1_enc() 1174 if (!sending) { in tls1_enc() 1220 if (!sending) { in tls1_enc() 1291 if (sending) { in n_ssl3_mac() 1307 if (!sending in n_ssl3_mac() [all …]
|
A D | record.h | 227 __owur int tls1_enc(SSL *s, SSL3_RECORD *recs, size_t n_recs, int sending,
|
/openssl-master/ssl/statem/ |
A D | statem.c | 215 void ossl_statem_check_finish_init(SSL *s, int sending) in ossl_statem_check_finish_init() argument 217 if (sending == -1) { in ossl_statem_check_finish_init() 230 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init() 233 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init() 239 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
|
/openssl-master/ssl/ |
A D | tls13_enc.c | 329 static int derive_secret_key_and_iv(SSL *s, int sending, const EVP_MD *md, in derive_secret_key_and_iv() argument 387 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv() 742 int tls13_update_key(SSL *s, int sending) in tls13_update_key() argument 757 if (s->server == sending) in tls13_update_key() 762 if (sending) { in tls13_update_key() 773 if (!derive_secret_key_and_iv(s, sending, ssl_handshake_md(s), in tls13_update_key()
|
/openssl-master/doc/man3/ |
A D | SSL_key_update.pod | 27 the sending keys for this connection will be updated and the peer will be 29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be 31 peer to additionally update its sending keys. It is an error if B<updatetype> is
|
A D | SSL_get0_peer_scts.pod | 25 capable of sending.
|
A D | SSL_read_early_data.pod | 21 - functions for sending and receiving early data 73 When a server receives early data it may opt to immediately respond by sending 246 The whole purpose of early data is to enable a client to start sending data to 278 connection while sending early data may want to retry the connection without 279 sending early data as this does not happen automatically. A client will have to 281 connection again but without sending early data. Note that it is inadvisable to
|
A D | TS_VERIFY_CTX_set_certs.pod | 25 In TSP, when a server is sending a response to a client, the server normally
|
A D | SSL_set_shutdown.pod | 53 SSL_set_shutdown() can be used to set this state without sending a
|
A D | BIO_ctrl.pod | 80 sending. Otherwise, it returns zero. It also returns negative values for failure. 106 sending. Otherwise, it returns zero.
|
A D | SSL_CTX_add_extra_chain_cert.pod | 42 When sending a certificate chain, extra chain certificates are sent in order
|
A D | OSSL_CMP_exec_certreq.pod | 80 the given I<ctx>) it starts a new transaction by sending a certificate request 99 aborts the CMP transaction by sending an error message to the server.
|
A D | SSL_CTX_set_psk_client_callback.pod | 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 103 client is sending the ClientKeyExchange message to the server.
|
A D | SSL_in_init.pod | 76 Handshake message sending/processing has completed.
|
A D | SSL_shutdown.pod | 27 The shutdown procedure consists of two steps: sending of the close_notify 109 When it is done sending data, it will send the close_notify alert.
|
A D | SSL_alert_type_string.pod | 42 (The sending party may however decide to send a fatal error.) The 199 handshake is complete, just closing the connection by sending a
|
A D | SSL_get_error.pod | 50 The TLS/SSL peer has closed the connection for writing by sending the 88 again to continue sending the application data. If you get B<SSL_ERROR_WANT_WRITE>
|
A D | OSSL_HTTP_transfer.pod | 131 sending requests, and receiving responses) is allowed to take until completion. 154 BIO will be read on-the-fly while sending the request, which supports streaming. 164 the subsequent HTTP transfer (sending the request and receiving a response)
|
A D | BIO_connect.pod | 54 Enables regular sending of keep-alive messages.
|
A D | OSSL_CMP_SRV_CTX_new.pod | 121 OSSL_CMP_SRV_CTX_set_send_unprotected_errors() enables sending error messages
|
A D | OSSL_HTTP_REQ_CTX.pod | 103 the subsequent HTTP transfer (sending the request and receiving a response) 153 Before sending the request, this could used to modify the HTTP request text.
|
A D | SSL_CTX_add1_chain_cert.pod | 115 sending incorrect certificate chains often cause problems with peers.
|
/openssl-master/doc/man1/ |
A D | openssl-version.pod.in | 84 The output of C<openssl version -a> would typically be used when sending
|
A D | openssl-crl2pkcs7.pod.in | 88 the certificate enrollment process. This involves sending the DER encoded output
|