/openssl/ssl/record/methods/ |
H A D | ssl3_meth.c | 84 int sending, SSL_MAC_BUF *mac, size_t macsize) in ssl3_cipher() argument 111 if ((bs != 1) && sending && !provided) { in ssl3_cipher() 129 if (!sending) { in ssl3_cipher() 145 if (!sending && mac != NULL) { in ssl3_cipher() 170 if (!sending) in ssl3_cipher() 203 int sending) in ssl3_mac() argument 221 if (!sending in ssl3_mac()
|
H A D | tls1_meth.c | 136 int sending, SSL_MAC_BUF *macs, size_t macsize) in tls1_cipher() argument 167 if (sending) { in tls1_cipher() 245 if (sending) { in tls1_cipher() 249 } else if ((bs != 1) && sending && !provided) { in tls1_cipher() 270 if (!sending) { in tls1_cipher() 311 if (sending && !rl->use_etm) in tls1_cipher() 340 if (!sending) { in tls1_cipher() 386 if (!sending) { in tls1_cipher() 429 int sending) in tls1_mac() argument 479 if (!sending && !rl->use_etm in tls1_mac()
|
H A D | tls13_meth.c | 60 int sending, SSL_MAC_BUF *mac, size_t macsize) in tls13_cipher() argument 103 if (!sending) { in tls13_cipher() 135 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 in tls13_cipher() 136 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, in tls13_cipher() 171 if (sending) { in tls13_cipher()
|
H A D | recmethod_local.h | 53 int sending, SSL_MAC_BUF *macs, size_t macsize); 56 int sending);
|
H A D | tlsany_meth.c | 36 size_t n_recs, int sending, SSL_MAC_BUF *macs, in tls_any_cipher() argument
|
/openssl/ssl/record/ |
H A D | ssl3_record.c | 173 int ssl3_enc(SSL_CONNECTION *s, SSL3_RECORD *inrecs, size_t n_recs, int sending, in ssl3_enc() argument 182 assert(sending); in ssl3_enc() 254 int tls1_enc(SSL_CONNECTION *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls1_enc() argument 271 assert(sending); in tls1_enc() 469 int sending) in n_ssl3_mac() argument 484 assert(sending); in n_ssl3_mac() 529 int sending) in tls1_mac_old() argument 546 assert(sending); in tls1_mac_old()
|
H A D | ssl3_record_tls13.c | 24 int tls13_enc(SSL_CONNECTION *s, SSL3_RECORD *recs, size_t n_recs, int sending, in tls13_enc() argument 44 assert(sending); in tls13_enc() 131 if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0) { in tls13_enc()
|
H A D | record.h | 225 int sending, SSL_MAC_BUF *mac, size_t macsize);
|
/openssl/doc/designs/quic-design/ |
H A D | demuxer.md | 24 - optionally trigger sending stateless reset packets if a received packet 34 - trigger sending version negotiation packets if the server receives a packet 47 - optionally trigger sending stateless reset packets as above for client
|
/openssl/ssl/ |
H A D | tls13_enc.c | 340 static int derive_secret_key_and_iv(SSL_CONNECTION *s, int sending, in derive_secret_key_and_iv() argument 415 if (sending) { in derive_secret_key_and_iv() 416 if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, sending) <= 0 in derive_secret_key_and_iv() 794 int tls13_update_key(SSL_CONNECTION *s, int sending) in tls13_update_key() argument 810 if (s->server == sending) in tls13_update_key() 815 if (sending) { in tls13_update_key() 825 if (!derive_secret_key_and_iv(s, sending, md, in tls13_update_key() 836 if (!sending) { in tls13_update_key()
|
/openssl/ssl/statem/ |
H A D | statem.c | 238 void ossl_statem_check_finish_init(SSL_CONNECTION *s, int sending) in ossl_statem_check_finish_init() argument 240 if (sending == -1) { in ossl_statem_check_finish_init() 253 if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END in ossl_statem_check_finish_init() 256 || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { in ossl_statem_check_finish_init() 262 if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) in ossl_statem_check_finish_init()
|
/openssl/doc/man3/ |
H A D | SSL_key_update.pod | 27 the sending keys for this connection will be updated and the peer will be 29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be 31 peer to additionally update its sending keys. It is an error if B<updatetype> is
|
H A D | SSL_get0_peer_scts.pod | 25 capable of sending.
|
H A D | SSL_read_early_data.pod | 21 - functions for sending and receiving early data 73 When a server receives early data it may opt to immediately respond by sending 246 The whole purpose of early data is to enable a client to start sending data to 278 connection while sending early data may want to retry the connection without 279 sending early data as this does not happen automatically. A client will have to 281 connection again but without sending early data. Note that it is inadvisable to
|
H A D | TS_VERIFY_CTX_set_certs.pod | 25 In TSP, when a server is sending a response to a client, the server normally
|
H A D | SSL_set_shutdown.pod | 53 SSL_set_shutdown() can be used to set this state without sending a
|
H A D | SSL_CTX_add_extra_chain_cert.pod | 42 When sending a certificate chain, extra chain certificates are sent in order
|
H A D | OSSL_CMP_exec_certreq.pod | 80 the given I<ctx>) it starts a new transaction by sending a certificate request 99 aborts the CMP transaction by sending an error message to the server.
|
H A D | SSL_CTX_set_psk_client_callback.pod | 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 103 client is sending the ClientKeyExchange message to the server.
|
H A D | BIO_ctrl.pod | 85 sending. Otherwise, it returns zero. 118 sending. Otherwise, it returns zero.
|
H A D | SSL_in_init.pod | 76 Handshake message sending/processing has completed.
|
H A D | SSL_alert_type_string.pod | 42 (The sending party may however decide to send a fatal error.) The 199 handshake is complete, just closing the connection by sending a
|
H A D | SSL_shutdown.pod | 27 The shutdown procedure consists of two steps: sending of the close_notify 109 When it is done sending data, it will send the close_notify alert.
|
/openssl/doc/man1/ |
H A D | openssl-version.pod.in | 84 The output of C<openssl version -a> would typically be used when sending
|
H A D | openssl-crl2pkcs7.pod.in | 88 the certificate enrollment process. This involves sending the DER encoded output
|