/openssl/ssl/statem/ |
H A D | extensions_cust.c | 82 ENDPOINT role, unsigned int ext_type, in custom_ext_find() argument 90 && (role == ENDPOINT_BOTH || role == meth->role in custom_ext_find() 91 || meth->role == ENDPOINT_BOTH)) { in custom_ext_find() 121 ENDPOINT role = ENDPOINT_BOTH; in custom_ext_parse() local 124 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; in custom_ext_parse() 126 meth = custom_ext_find(exts, role, ext_type, NULL); in custom_ext_parse() 269 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, in custom_exts_copy_flags() 402 if (custom_ext_find(exts, role, ext_type, NULL)) in ossl_tls_add_custom_ext_intern() 412 meth->role = role; in ossl_tls_add_custom_ext_intern() 424 static int add_old_custom_ext(SSL_CTX *ctx, ENDPOINT role, in add_old_custom_ext() argument [all …]
|
H A D | extensions.c | 469 ENDPOINT role = ENDPOINT_BOTH; in tls_validate_all_contexts() local 472 role = ENDPOINT_SERVER; in tls_validate_all_contexts() 474 role = ENDPOINT_CLIENT; in tls_validate_all_contexts() 488 meth = custom_ext_find(&s->cert->custext, role, thisext->type, in tls_validate_all_contexts() 529 ENDPOINT role = ENDPOINT_BOTH; in verify_extension() local 533 role = ENDPOINT_SERVER; in verify_extension() 535 role = ENDPOINT_CLIENT; in verify_extension() 537 meth = custom_ext_find(meths, role, type, &offset); in verify_extension()
|
H A D | extensions_clnt.c | 1549 ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 in tls_parse_stoc_sct() local 1556 if (custom_ext_find(&s->cert->custext, role, in tls_parse_stoc_sct()
|
/openssl/crypto/hpke/ |
H A D | hpke.c | 57 int role; /* sender(0) or receiver(1) */ member 814 if (role != OSSL_HPKE_ROLE_SENDER && role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_CTX_new() 834 ctx->role = role; in OSSL_HPKE_CTX_new() 926 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set1_ikme() 949 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set1_authpriv() 978 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_CTX_set1_authpub() 1048 if (ctx->role == OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_CTX_set_seq() 1069 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_encap() 1116 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { in OSSL_HPKE_decap() 1165 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { in OSSL_HPKE_seal() [all …]
|
/openssl/.github/workflows/ |
H A D | run_quic_interop_server.yml | 32 , role: "both" 63 , role: "both"
|
H A D | run_quic_interop.yml | 32 , role: "client"
|
/openssl/crypto/bio/ |
H A D | bss_dgram_pair.c | 267 unsigned int role : 1; /* Determines lock order */ member 392 b1->role = 0; in dgram_pair_ctrl_make_bio_pair() 393 b2->role = 1; in dgram_pair_ctrl_make_bio_pair() 963 x = (a->role == 1) ? a : b; in dgram_pair_lock_both_write() 964 y = (a->role == 1) ? b : a; in dgram_pair_lock_both_write() 966 if (!ossl_assert(a->role != b->role)) in dgram_pair_lock_both_write()
|
/openssl/doc/man3/ |
H A D | SSL_in_init.pod | 56 B<protocol>_ST_B<role>_B<message> 61 B<role> is one of CR, CW, SR or SW to indicate "client reading",
|
H A D | OSSL_HPKE_CTX_new.pod | 27 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, 190 HPKE contexts have a role - either sender or receiver. This is used 195 and OSSL_HPKE_CTX_get_seq() can be called regardless of role. 201 An I<OSSL_HPKE_CTX> with this role can be used with 207 An I<OSSL_HPKE_CTX> with this role can be used with OSSL_HPKE_decap(), 212 Calling a function with an incorrect role set on I<OSSL_HPKE_CTX> will result 238 L</OSSL_HPKE_SUITE Identifiers>) and a I<role> (see L</HPKE Roles>). The
|
/openssl/include/openssl/ |
H A D | hpke.h | 108 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role,
|
/openssl/include/internal/ |
H A D | recordmethod.h | 116 int role, int direction,
|
/openssl/ssl/record/methods/ |
H A D | ktls_meth.c | 404 int role, int direction, int level, uint16_t epoch, in ktls_new_record_layer() argument 419 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in ktls_new_record_layer()
|
H A D | recmethod_local.h | 216 int role; member 441 int role, int direction, int level,
|
H A D | tls_common.c | 606 if (rl->role == OSSL_RECORD_ROLE_SERVER in tls_get_more_records() 1252 int role, int direction, int level, in tls_int_new_record_layer() argument 1317 rl->role = role; in tls_int_new_record_layer() 1387 int role, int direction, int level, uint16_t epoch, in tls_new_record_layer() argument 1402 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in tls_new_record_layer()
|
H A D | dtls_meth.c | 626 int role, int direction, int level, uint16_t epoch, in dtls_new_record_layer() argument 641 ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, in dtls_new_record_layer()
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 6 How you handle certificates depends a great deal on what your role is. 7 Your role can be one or several of:
|
/openssl/ |
H A D | NOTES-ANDROID.md | 12 role, the goal is to support a range of most recent versions.
|
/openssl/ssl/quic/ |
H A D | quic_tls.c | 93 int role, int direction, int level, uint16_t epoch, in quic_new_record_layer() argument
|
/openssl/ssl/ |
H A D | ssl_local.h | 2057 ENDPOINT role; member 2977 ENDPOINT role, unsigned int ext_type, 2983 ENDPOINT role, unsigned int ext_type,
|
/openssl/crypto/objects/ |
H A D | obj_mac.num | 400 role 400
|
H A D | objects.txt | 679 # attention : the following seems to be obsolete, replace by 'role' 680 id-aca 5 : id-aca-role 830 X509 72 : role : role 887 !Cname role-spec-cert-identifier
|
/openssl/doc/designs/quic-design/ |
H A D | record-layer.md | 369 * set by |vers|. |role| is 0 for client and 1 for server. |direction| 402 int role, int direction,
|
H A D | quic-api.md | 1508 the draining state (the same may not be the case for the server role when
|
/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 64 TSA can be part of a PKI deployment and its role is to provide long
|