Home
last modified time | relevance | path

Searched refs:role (Results 1 – 24 of 24) sorted by relevance

/openssl/ssl/statem/
H A Dextensions_cust.c82 ENDPOINT role, unsigned int ext_type, in custom_ext_find() argument
90 && (role == ENDPOINT_BOTH || role == meth->role in custom_ext_find()
91 || meth->role == ENDPOINT_BOTH)) { in custom_ext_find()
121 ENDPOINT role = ENDPOINT_BOTH; in custom_ext_parse() local
124 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; in custom_ext_parse()
126 meth = custom_ext_find(exts, role, ext_type, NULL); in custom_ext_parse()
269 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, in custom_exts_copy_flags()
402 if (custom_ext_find(exts, role, ext_type, NULL)) in ossl_tls_add_custom_ext_intern()
412 meth->role = role; in ossl_tls_add_custom_ext_intern()
424 static int add_old_custom_ext(SSL_CTX *ctx, ENDPOINT role, in add_old_custom_ext() argument
[all …]
H A Dextensions.c469 ENDPOINT role = ENDPOINT_BOTH; in tls_validate_all_contexts() local
472 role = ENDPOINT_SERVER; in tls_validate_all_contexts()
474 role = ENDPOINT_CLIENT; in tls_validate_all_contexts()
488 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts()
529 ENDPOINT role = ENDPOINT_BOTH; in verify_extension() local
533 role = ENDPOINT_SERVER; in verify_extension()
535 role = ENDPOINT_CLIENT; in verify_extension()
537 meth = custom_ext_find(meths, role, type, &offset); in verify_extension()
H A Dextensions_clnt.c1549 ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 in tls_parse_stoc_sct() local
1556 if (custom_ext_find(&s->cert->custext, role, in tls_parse_stoc_sct()
/openssl/crypto/hpke/
H A Dhpke.c57 int role; /* sender(0) or receiver(1) */ member
814 if (role != OSSL_HPKE_ROLE_SENDER && role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_CTX_new()
834 ctx->role = role; in OSSL_HPKE_CTX_new()
926 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set1_ikme()
949 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set1_authpriv()
978 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_CTX_set1_authpub()
1048 if (ctx->role == OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set_seq()
1069 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_encap()
1116 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_decap()
1165 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_seal()
[all …]
/openssl/.github/workflows/
H A Drun_quic_interop_server.yml32 , role: "both"
63 , role: "both"
H A Drun_quic_interop.yml32 , role: "client"
/openssl/crypto/bio/
H A Dbss_dgram_pair.c267 unsigned int role : 1; /* Determines lock order */ member
392 b1->role = 0; in dgram_pair_ctrl_make_bio_pair()
393 b2->role = 1; in dgram_pair_ctrl_make_bio_pair()
963 x = (a->role == 1) ? a : b; in dgram_pair_lock_both_write()
964 y = (a->role == 1) ? b : a; in dgram_pair_lock_both_write()
966 if (!ossl_assert(a->role != b->role)) in dgram_pair_lock_both_write()
/openssl/doc/man3/
H A DSSL_in_init.pod56 B<protocol>_ST_B<role>_B<message>
61 B<role> is one of CR, CW, SR or SW to indicate "client reading",
H A DOSSL_HPKE_CTX_new.pod27 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role,
190 HPKE contexts have a role - either sender or receiver. This is used
195 and OSSL_HPKE_CTX_get_seq() can be called regardless of role.
201 An I<OSSL_HPKE_CTX> with this role can be used with
207 An I<OSSL_HPKE_CTX> with this role can be used with OSSL_HPKE_decap(),
212 Calling a function with an incorrect role set on I<OSSL_HPKE_CTX> will result
238 L</OSSL_HPKE_SUITE Identifiers>) and a I<role> (see L</HPKE Roles>). The
/openssl/include/openssl/
H A Dhpke.h108 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role,
/openssl/include/internal/
H A Drecordmethod.h116 int role, int direction,
/openssl/ssl/record/methods/
H A Dktls_meth.c404 int role, int direction, int level, uint16_t epoch, in ktls_new_record_layer() argument
419 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in ktls_new_record_layer()
H A Drecmethod_local.h216 int role; member
441 int role, int direction, int level,
H A Dtls_common.c606 if (rl->role == OSSL_RECORD_ROLE_SERVER in tls_get_more_records()
1252 int role, int direction, int level, in tls_int_new_record_layer() argument
1317 rl->role = role; in tls_int_new_record_layer()
1387 int role, int direction, int level, uint16_t epoch, in tls_new_record_layer() argument
1402 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in tls_new_record_layer()
H A Ddtls_meth.c626 int role, int direction, int level, uint16_t epoch, in dtls_new_record_layer() argument
641 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in dtls_new_record_layer()
/openssl/doc/HOWTO/
H A Dcertificates.txt6 How you handle certificates depends a great deal on what your role is.
7 Your role can be one or several of:
/openssl/
H A DNOTES-ANDROID.md12 role, the goal is to support a range of most recent versions.
/openssl/ssl/quic/
H A Dquic_tls.c93 int role, int direction, int level, uint16_t epoch, in quic_new_record_layer() argument
/openssl/ssl/
H A Dssl_local.h2057 ENDPOINT role; member
2977 ENDPOINT role, unsigned int ext_type,
2983 ENDPOINT role, unsigned int ext_type,
/openssl/crypto/objects/
H A Dobj_mac.num400 role 400
H A Dobjects.txt679 # attention : the following seems to be obsolete, replace by 'role'
680 id-aca 5 : id-aca-role
830 X509 72 : role : role
887 !Cname role-spec-cert-identifier
/openssl/doc/designs/quic-design/
H A Drecord-layer.md369 * set by |vers|. |role| is 0 for client and 1 for server. |direction|
402 int role, int direction,
H A Dquic-api.md1508 the draining state (the same may not be the case for the server role when
/openssl/doc/man1/
H A Dopenssl-ts.pod.in64 TSA can be part of a PKI deployment and its role is to provide long

Completed in 71 milliseconds