/openssl/util/perl/TLSProxy/ |
H A D | Record.pm | 83 print " Content type: ".$record_type{$content_type}."\n"; 89 $content_type, 99 if ($content_type != RT_CCS 101 || $content_type != RT_ALERT)) { 168 $content_type, 179 content_type => $content_type, 234 if ($self->content_type() == RT_ALERT) { 262 $self->content_type($content_type); 365 sub content_type subroutine 369 $self->{content_type} = shift; [all …]
|
H A D | Message.pm | 180 if ($record->content_type == TLSProxy::Record::RT_CCS) { 192 } elsif ($record->content_type == TLSProxy::Record::RT_HANDSHAKE) { 270 } elsif ($record->content_type == TLSProxy::Record::RT_APPLICATION_DATA) { 278 } elsif ($record->content_type == TLSProxy::Record::RT_ALERT) {
|
/openssl/test/ |
H A D | http_test.c | 24 const char *content_type; member 38 const char *content_type, const char *txt, in mock_http_server() argument 113 args->content_type, args->txt, in http_bio_cb_ex() 130 const char *content_type; in test_http_method() local 135 content_type = "text/plain"; in test_http_method() 145 content_type = "application/x-x509-ca-cert"; in test_http_method() 153 mock_args.content_type = content_type; in test_http_method() 171 0 /* buf_size */, headers, content_type, in test_http_method() 172 req, content_type, !do_txt /* expect_asn1 */, in test_http_method() 210 const char *const content_type = "application/x-x509-ca-cert"; in test_http_keep_alive() local [all …]
|
/openssl/include/openssl/ |
H A D | http.h | 48 const char *content_type, int asn1, 50 int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, 74 const char *content_type, BIO *req, 91 const char *content_type, BIO *req,
|
H A D | pkcs7.h.in | 101 ASN1_OBJECT *content_type; member
|
H A D | ssl.h.in | 621 int content_type, const void *buf, 625 int content_type, const void *buf, 2261 void SSL_trace(int write_p, int version, int content_type,
|
/openssl/crypto/http/ |
H A D | http_client.c | 237 const char *content_type, int asn1, in OSSL_HTTP_REQ_CTX_set_expected() argument 253 if (content_type != NULL in OSSL_HTTP_REQ_CTX_set_expected() 254 && (rctx->expected_ct = OPENSSL_strdup(content_type)) == NULL) in OSSL_HTTP_REQ_CTX_set_expected() 267 const char *content_type, BIO *req) in set1_content() argument 274 if (rctx == NULL || (req == NULL && content_type != NULL)) { in set1_content() 292 if (content_type != NULL in set1_content() 338 res = res && set1_content(rctx, content_type, mem); in OSSL_HTTP_REQ_CTX_set1_req() 1037 const char *content_type, BIO *req, in OSSL_HTTP_set1_request() argument 1060 && set1_content(rctx, content_type, req); in OSSL_HTTP_set1_request() 1234 const char *content_type, BIO *req, in OSSL_HTTP_transfer() argument [all …]
|
/openssl/test/recipes/ |
H A D | 70-test_sslrecords.t | 42 my $content_type = TLSProxy::Record::RT_APPLICATION_DATA; 52 $content_type = TLSProxy::Record::RT_HANDSHAKE; 283 $content_type, 588 last if $record->content_type == TLSProxy::Record::RT_CCS; 612 if ($record->content_type == TLSProxy::Record::RT_HANDSHAKE) {
|
H A D | 70-test_tls13hrr.t | 120 $hrr_record->content_type(),
|
/openssl/apps/include/ |
H A D | http_server.h | 104 const char *content_type,
|
H A D | s_apps.h | 48 void msg_cb(int write_p, int version, int content_type, const void *buf,
|
H A D | apps.h | 302 const char *content_type,
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_msg_callback.pod | 17 int content_type, const void *buf, 23 int content_type, const void *buf, 59 =item I<content_type>
|
H A D | OSSL_HTTP_REQ_CTX.pod | 37 const char *content_type, int asn1, 39 int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, 93 If the I<content_type> argument is not NULL, 100 For instance, if the I<content_type> argument specifies C<text/html>, 132 I<content_type> must be NULL if I<req> is NULL. 133 If I<content_type> isn't NULL,
|
H A D | OSSL_HTTP_transfer.pod | 31 const char *content_type, BIO *req, 48 const char *content_type, BIO *req, 168 else HTTP POST with the contents of I<req> and optional I<content_type>, where
|
/openssl/apps/lib/ |
H A D | http_server.c | 524 const char *content_type, in http_server_send_asn1_resp() argument 531 content_type, in http_server_send_asn1_resp()
|
H A D | s_cb.c | 569 void msg_cb(int write_p, int version, int content_type, const void *buf, in msg_cb() argument 585 switch (content_type) { in msg_cb() 626 BIO_snprintf(tmpbuf, sizeof(tmpbuf)-1, ", Unknown (content_type=%d)", content_type); in msg_cb() 630 …tmpbuf)-1, "Not TLS data or unknown version (version=%d, content_type=%d)", version, content_type); in msg_cb()
|
H A D | apps.c | 2577 const char *content_type, in app_http_post_asn1() argument 2599 0 /* buf_size */, headers, content_type, req_mem, in app_http_post_asn1()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 142 p7->d.signed_and_enveloped->enc_data->content_type in PKCS7_set_type() 152 p7->d.enveloped->enc_data->content_type = OBJ_nid2obj(NID_pkcs7_data); in PKCS7_set_type() 161 p7->d.encrypted->enc_data->content_type = OBJ_nid2obj(NID_pkcs7_data); in PKCS7_set_type()
|
H A D | pk7_asn1.c | 201 ASN1_SIMPLE(PKCS7_ENC_CONTENT, content_type, ASN1_OBJECT),
|
/openssl/ssl/record/ |
H A D | record.h | 264 int content_type,
|
H A D | rec_layer_s3.c | 1682 int content_type, const void *buf, in rlayer_msg_callback_wrapper() argument 1689 s->msg_callback(write_p, version, content_type, buf, len, ssl, in rlayer_msg_callback_wrapper()
|
/openssl/ssl/ |
H A D | t1_trce.c | 1534 void SSL_trace(int write_p, int version, int content_type, in SSL_trace() argument 1544 switch (content_type) { in SSL_trace()
|
H A D | ssl_local.h | 987 void (*msg_callback) (int write_p, int version, int content_type, 1465 void (*msg_callback) (int write_p, int version, int content_type,
|
H A D | ssl_lib.c | 2848 (int write_p, int version, int content_type, in SSL_callback_ctrl() 2997 (int write_p, int version, int content_type, in SSL_CTX_callback_ctrl() 5313 int content_type, const void *buf, in SSL_CTX_set_msg_callback() argument 5321 int content_type, const void *buf, in SSL_set_msg_callback() argument
|