Home
last modified time | relevance | path

Searched refs:sending (Results 1 – 25 of 53) sorted by relevance

123

/openssl/ssl/record/methods/
H A Dssl3_meth.c84 int sending, SSL_MAC_BUF *mac, size_t macsize) in ssl3_cipher() argument
111 if ((bs != 1) && sending && !provided) { in ssl3_cipher()
129 if (!sending) { in ssl3_cipher()
145 if (!sending && mac != NULL) { in ssl3_cipher()
170 if (!sending) in ssl3_cipher()
203 int sending) in ssl3_mac() argument
221 if (!sending in ssl3_mac()
H A Dtls1_meth.c136 int sending, SSL_MAC_BUF *macs, size_t macsize) in tls1_cipher() argument
167 if (sending) { in tls1_cipher()
245 if (sending) { in tls1_cipher()
249 } else if ((bs != 1) && sending && !provided) { in tls1_cipher()
270 if (!sending) { in tls1_cipher()
311 if (sending && !rl->use_etm) in tls1_cipher()
340 if (!sending) { in tls1_cipher()
386 if (!sending) { in tls1_cipher()
429 int sending) in tls1_mac() argument
479 if (!sending && !rl->use_etm in tls1_mac()
H A Dtls13_meth.c60 int sending, SSL_MAC_BUF *mac, size_t macsize) in tls13_cipher() argument
103 if (!sending) { in tls13_cipher()
135 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_cipher()
136 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_cipher()
171 if (sending) { in tls13_cipher()
H A Drecmethod_local.h53 int sending, SSL_MAC_BUF *macs, size_t macsize);
56 int sending);
H A Dtlsany_meth.c36 size_t n_recs, int sending, SSL_MAC_BUF *macs, in tls_any_cipher() argument
/openssl/ssl/record/
H A Dssl3_record.c173 int ssl3_enc(SSL_CONNECTION *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, in ssl3_enc() argument
182 assert(sending); in ssl3_enc()
254 int tls1_enc(SSL_CONNECTION *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls1_enc() argument
271 assert(sending); in tls1_enc()
469 int sending) in n_ssl3_mac() argument
484 assert(sending); in n_ssl3_mac()
529 int sending) in tls1_mac_old() argument
546 assert(sending); in tls1_mac_old()
H A Dssl3_record_tls13.c24 int tls13_enc(SSL_CONNECTION *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument
44 assert(sending); in tls13_enc()
131 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0) { in tls13_enc()
H A Drecord.h225 int sending, SSL_MAC_BUF *mac, size_t macsize);
/openssl/doc/designs/quic-design/
H A Ddemuxer.md24 - optionally trigger sending stateless reset packets if a received packet
34 - trigger sending version negotiation packets if the server receives a packet
47 - optionally trigger sending stateless reset packets as above for client
/openssl/ssl/
H A Dtls13_enc.c340 static int derive_secret_key_and_iv(SSL_CONNECTION *s, int sending, in derive_secret_key_and_iv() argument
415 if (sending) { in derive_secret_key_and_iv()
416 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv()
794 int tls13_update_key(SSL_CONNECTION *s, int sending) in tls13_update_key() argument
810 if (s->server == sending) in tls13_update_key()
815 if (sending) { in tls13_update_key()
825 if (!derive_secret_key_and_iv(s, sending, md, in tls13_update_key()
836 if (!sending) { in tls13_update_key()
/openssl/ssl/statem/
H A Dstatem.c238 void ossl_statem_check_finish_init(SSL_CONNECTION *s, int sending) in ossl_statem_check_finish_init() argument
240 if (sending == -1) { in ossl_statem_check_finish_init()
253 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init()
256 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init()
262 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
/openssl/doc/man3/
H A DSSL_key_update.pod27 the sending keys for this connection will be updated and the peer will be
29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
31 peer to additionally update its sending keys. It is an error if B<updatetype> is
H A DSSL_get0_peer_scts.pod25 capable of sending.
H A DSSL_read_early_data.pod21 - functions for sending and receiving early data
73 When a server receives early data it may opt to immediately respond by sending
246 The whole purpose of early data is to enable a client to start sending data to
278 connection while sending early data may want to retry the connection without
279 sending early data as this does not happen automatically. A client will have to
281 connection again but without sending early data. Note that it is inadvisable to
H A DTS_VERIFY_CTX_set_certs.pod25 In TSP, when a server is sending a response to a client, the server normally
H A DSSL_set_shutdown.pod53 SSL_set_shutdown() can be used to set this state without sending a
H A DSSL_CTX_add_extra_chain_cert.pod42 When sending a certificate chain, extra chain certificates are sent in order
H A DOSSL_CMP_exec_certreq.pod80 the given I<ctx>) it starts a new transaction by sending a certificate request
99 aborts the CMP transaction by sending an error message to the server.
H A DSSL_CTX_set_psk_client_callback.pod87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
103 client is sending the ClientKeyExchange message to the server.
H A DBIO_ctrl.pod85 sending. Otherwise, it returns zero.
118 sending. Otherwise, it returns zero.
H A DSSL_in_init.pod76 Handshake message sending/processing has completed.
H A DSSL_alert_type_string.pod42 (The sending party may however decide to send a fatal error.) The
199 handshake is complete, just closing the connection by sending a
H A DSSL_shutdown.pod27 The shutdown procedure consists of two steps: sending of the close_notify
109 When it is done sending data, it will send the close_notify alert.
/openssl/doc/man1/
H A Dopenssl-version.pod.in84 The output of C<openssl version -a> would typically be used when sending
H A Dopenssl-crl2pkcs7.pod.in88 the certificate enrollment process. This involves sending the DER encoded output

Completed in 51 milliseconds

123