Home
last modified time | relevance | path

Searched refs:identity (Results 1 – 25 of 43) sorted by relevance

12

/openssl/doc/man3/
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
19 identity used during the connection setup.
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
20 const unsigned char *identity,
30 const char *identity,
47 an identity in B<identity> of length B<identity_len>. The callback function
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
62 identity hint B<hint> for the SSL connection object B<ssl>. If B<hint> is
65 In the case where PSK identity hint is B<NULL>, the server does not send the
75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of
105 PSK identity was not found. An "unknown_psk_identity" alert message
110 PSK identity was found and the server callback has provided the PSK
[all …]
H A DX509_ACERT_get0_holder_baseCertId.pod50 These routines set and get the holder identity of an X509 attribute certificate.
52 X509_ACERT_set0_holder_entityName() sets the identity as a B<GENERAL_NAME>
53 I<name>, X509_ACERT_set0_holder_baseCertId() sets the identity based on the
57 one of the above methods be used to set the holder identity for a given
60 identity information is specified using different methods.
62 Pointers to the internal structures describing the holder identity of
H A DOSSL_DISPATCH.pod21 This type is a tuple of function identity and function pointer.
33 OpenSSL defined function identity of the implemented function.
49 Any function identity not recognised by the recipient of this type
H A DSSL_CTX_set_psk_client_callback.pod30 char *identity,
105 The purpose of the callback function is to select the PSK identity and
110 connection in parameter B<ssl>, a B<NUL>-terminated PSK identity hint
111 sent by the server in parameter B<hint>, a buffer B<identity> of
113 resulting B<NUL>-terminated identity is to be stored, and a buffer B<psk>
150 On success (callback found a PSK identity and a pre-shared key to use)
H A DSSL_alert_type_string.pod217 =item "UP"/"unknown PSK identity"
220 identity or an SRP identity.
H A DX509_get0_distinguishing_id.pod38 or L<X509_REQ_verify(3)> have easy access to that identity for signature
H A DSSL_get_certificate.pod18 certificate used as the local peer's identity.
H A DX509_ACERT_print_ex.pod44 The identity of the holder of the attribute certificate. If the
H A DSSL_CTX_set_num_tickets.pod38 with the updated client identity (i.e. including their certificate and
H A DSSL_get_stream_id.pod72 identity, and does not indicate whether an operation can currently be
H A DSSL_new.pod91 =item any configured PSK identity hint
/openssl/ssl/statem/
H A Dextensions_clnt.c780 char identity[PSK_MAX_IDENTITY_LEN + 1]; in tls_construct_ctos_early_data() local
806 memset(identity, 0, sizeof(identity)); in tls_construct_ctos_early_data()
808 identity, sizeof(identity) - 1, in tls_construct_ctos_early_data()
818 idlen = strlen(identity); in tls_construct_ctos_early_data()
823 id = (unsigned char *)identity; in tls_construct_ctos_early_data()
2045 unsigned int identity; in tls_parse_stoc_psk() local
2047 if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) { in tls_parse_stoc_psk()
2052 if (identity >= (unsigned int)s->ext.tick_identity) { in tls_parse_stoc_psk()
2062 if (identity == 0 && (s->psksession == NULL || s->ext.tick_identity == 2)) { in tls_parse_stoc_psk()
2091 if (identity != 0) in tls_parse_stoc_psk()
H A Dextensions_srvr.c1051 PACKET identity; in tls_parse_ctos_psk() local
1055 if (!PACKET_get_length_prefixed_2(&identities, &identity) in tls_parse_ctos_psk()
1061 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk()
1063 && !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen, in tls_parse_ctos_psk()
1077 if (!PACKET_strndup(&identity, &pskid)) { in tls_parse_ctos_psk()
1152 ret = tls_get_stateful_ticket(s, &identity, &sess); in tls_parse_ctos_psk()
1154 ret = tls_decrypt_ticket(s, PACKET_data(&identity), in tls_parse_ctos_psk()
1155 PACKET_remaining(&identity), NULL, 0, in tls_parse_ctos_psk()
H A Dstatem_clnt.c2994 char identity[PSK_MAX_IDENTITY_LEN + 1]; in tls_construct_cke_psk_preamble() local
3006 memset(identity, 0, sizeof(identity)); in tls_construct_cke_psk_preamble()
3010 identity, sizeof(identity) - 1, in tls_construct_cke_psk_preamble()
3022 identitylen = strlen(identity); in tls_construct_cke_psk_preamble()
3029 tmpidentity = OPENSSL_strdup(identity); in tls_construct_cke_psk_preamble()
3043 if (!WPACKET_sub_memcpy_u16(pkt, identity, identitylen)) { in tls_construct_cke_psk_preamble()
3052 OPENSSL_cleanse(identity, sizeof(identity)); in tls_construct_cke_psk_preamble()
/openssl/doc/internal/man3/
H A DOSSL_METHOD_STORE.pod46 numeric identity (nid).
51 Numeric identities are expected to be an algorithm identity for the methods.
H A Dossl_algorithm_do_all.pod19 library context I<libctx>, an operation identity I<operation_id> and a
H A Dossl_namemap_new.pod37 dynamic identity that is valid throughout the lifetime of the associated
H A Dossl_method_construct.pod44 =item The operation identity
H A Devp_generic_fetch.pod53 dispatch table I<fns>, with name identity I<name_id>.
/openssl/test/
H A Ddtls_mtu_test.c39 static unsigned int srvr_psk_callback(SSL *ssl, const char *identity, in srvr_psk_callback() argument
H A Dssl_old_test.c97 char *identity,
101 static unsigned int psk_server_callback(SSL *ssl, const char *identity,
2981 char *identity, in psk_client_callback() argument
2989 ret = BIO_snprintf(identity, max_identity_len, "Client_identity"); in psk_client_callback()
2993 fprintf(stderr, "client: created identity '%s' len=%d\n", identity, in psk_client_callback()
3003 static unsigned int psk_server_callback(SSL *ssl, const char *identity, in psk_server_callback() argument
3009 if (strcmp(identity, "Client_identity") != 0) { in psk_server_callback()
/openssl/apps/
H A Dciphers.c79 static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity, in dummy_psk() argument
H A Ds_server.c130 static unsigned int psk_server_cb(SSL *ssl, const char *identity, in psk_server_cb() argument
150 if (identity == NULL) { in psk_server_cb()
156 (int)strlen(identity), identity); in psk_server_cb()
159 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb()
161 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb()
197 static int psk_find_session_cb(SSL *ssl, const unsigned char *identity, in psk_find_session_cb() argument
206 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb()
/openssl/doc/designs/
H A Dfetching-composite-algorithms.md81 2. through a gettable `OSSL_PARAM`, using the param identity "keytype"

Completed in 63 milliseconds

12