/openssl/doc/man3/ |
H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 19 identity used during the connection setup. 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 27 no PSK identity hint was used during the connection setup.
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 20 const unsigned char *identity, 30 const char *identity, 47 an identity in B<identity> of length B<identity_len>. The callback function 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 62 identity hint B<hint> for the SSL connection object B<ssl>. If B<hint> is 65 In the case where PSK identity hint is B<NULL>, the server does not send the 75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of 105 PSK identity was not found. An "unknown_psk_identity" alert message 110 PSK identity was found and the server callback has provided the PSK [all …]
|
H A D | X509_ACERT_get0_holder_baseCertId.pod | 50 These routines set and get the holder identity of an X509 attribute certificate. 52 X509_ACERT_set0_holder_entityName() sets the identity as a B<GENERAL_NAME> 53 I<name>, X509_ACERT_set0_holder_baseCertId() sets the identity based on the 57 one of the above methods be used to set the holder identity for a given 60 identity information is specified using different methods. 62 Pointers to the internal structures describing the holder identity of
|
H A D | OSSL_DISPATCH.pod | 21 This type is a tuple of function identity and function pointer. 33 OpenSSL defined function identity of the implemented function. 49 Any function identity not recognised by the recipient of this type
|
H A D | SSL_CTX_set_psk_client_callback.pod | 30 char *identity, 105 The purpose of the callback function is to select the PSK identity and 110 connection in parameter B<ssl>, a B<NUL>-terminated PSK identity hint 111 sent by the server in parameter B<hint>, a buffer B<identity> of 113 resulting B<NUL>-terminated identity is to be stored, and a buffer B<psk> 150 On success (callback found a PSK identity and a pre-shared key to use)
|
H A D | SSL_alert_type_string.pod | 217 =item "UP"/"unknown PSK identity" 220 identity or an SRP identity.
|
H A D | X509_get0_distinguishing_id.pod | 38 or L<X509_REQ_verify(3)> have easy access to that identity for signature
|
H A D | SSL_get_certificate.pod | 18 certificate used as the local peer's identity.
|
H A D | X509_ACERT_print_ex.pod | 44 The identity of the holder of the attribute certificate. If the
|
H A D | SSL_CTX_set_num_tickets.pod | 38 with the updated client identity (i.e. including their certificate and
|
H A D | SSL_get_stream_id.pod | 72 identity, and does not indicate whether an operation can currently be
|
H A D | SSL_new.pod | 91 =item any configured PSK identity hint
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 780 char identity[PSK_MAX_IDENTITY_LEN + 1]; in tls_construct_ctos_early_data() local 806 memset(identity, 0, sizeof(identity)); in tls_construct_ctos_early_data() 808 identity, sizeof(identity) - 1, in tls_construct_ctos_early_data() 818 idlen = strlen(identity); in tls_construct_ctos_early_data() 823 id = (unsigned char *)identity; in tls_construct_ctos_early_data() 2045 unsigned int identity; in tls_parse_stoc_psk() local 2047 if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) { in tls_parse_stoc_psk() 2052 if (identity >= (unsigned int)s->ext.tick_identity) { in tls_parse_stoc_psk() 2062 if (identity == 0 && (s->psksession == NULL || s->ext.tick_identity == 2)) { in tls_parse_stoc_psk() 2091 if (identity != 0) in tls_parse_stoc_psk()
|
H A D | extensions_srvr.c | 1051 PACKET identity; in tls_parse_ctos_psk() local 1055 if (!PACKET_get_length_prefixed_2(&identities, &identity) in tls_parse_ctos_psk() 1061 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk() 1063 && !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen, in tls_parse_ctos_psk() 1077 if (!PACKET_strndup(&identity, &pskid)) { in tls_parse_ctos_psk() 1152 ret = tls_get_stateful_ticket(s, &identity, &sess); in tls_parse_ctos_psk() 1154 ret = tls_decrypt_ticket(s, PACKET_data(&identity), in tls_parse_ctos_psk() 1155 PACKET_remaining(&identity), NULL, 0, in tls_parse_ctos_psk()
|
H A D | statem_clnt.c | 2994 char identity[PSK_MAX_IDENTITY_LEN + 1]; in tls_construct_cke_psk_preamble() local 3006 memset(identity, 0, sizeof(identity)); in tls_construct_cke_psk_preamble() 3010 identity, sizeof(identity) - 1, in tls_construct_cke_psk_preamble() 3022 identitylen = strlen(identity); in tls_construct_cke_psk_preamble() 3029 tmpidentity = OPENSSL_strdup(identity); in tls_construct_cke_psk_preamble() 3043 if (!WPACKET_sub_memcpy_u16(pkt, identity, identitylen)) { in tls_construct_cke_psk_preamble() 3052 OPENSSL_cleanse(identity, sizeof(identity)); in tls_construct_cke_psk_preamble()
|
/openssl/doc/internal/man3/ |
H A D | OSSL_METHOD_STORE.pod | 46 numeric identity (nid). 51 Numeric identities are expected to be an algorithm identity for the methods.
|
H A D | ossl_algorithm_do_all.pod | 19 library context I<libctx>, an operation identity I<operation_id> and a
|
H A D | ossl_namemap_new.pod | 37 dynamic identity that is valid throughout the lifetime of the associated
|
H A D | ossl_method_construct.pod | 44 =item The operation identity
|
H A D | evp_generic_fetch.pod | 53 dispatch table I<fns>, with name identity I<name_id>.
|
/openssl/test/ |
H A D | dtls_mtu_test.c | 39 static unsigned int srvr_psk_callback(SSL *ssl, const char *identity, in srvr_psk_callback() argument
|
H A D | ssl_old_test.c | 97 char *identity, 101 static unsigned int psk_server_callback(SSL *ssl, const char *identity, 2981 char *identity, in psk_client_callback() argument 2989 ret = BIO_snprintf(identity, max_identity_len, "Client_identity"); in psk_client_callback() 2993 fprintf(stderr, "client: created identity '%s' len=%d\n", identity, in psk_client_callback() 3003 static unsigned int psk_server_callback(SSL *ssl, const char *identity, in psk_server_callback() argument 3009 if (strcmp(identity, "Client_identity") != 0) { in psk_server_callback()
|
/openssl/apps/ |
H A D | ciphers.c | 79 static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity, in dummy_psk() argument
|
H A D | s_server.c | 130 static unsigned int psk_server_cb(SSL *ssl, const char *identity, in psk_server_cb() argument 150 if (identity == NULL) { in psk_server_cb() 156 (int)strlen(identity), identity); in psk_server_cb() 159 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb() 161 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb() 197 static int psk_find_session_cb(SSL *ssl, const unsigned char *identity, in psk_find_session_cb() argument 206 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb()
|
/openssl/doc/designs/ |
H A D | fetching-composite-algorithms.md | 81 2. through a gettable `OSSL_PARAM`, using the param identity "keytype"
|