Home
last modified time | relevance | path

Searched refs:updatetype (Results 1 – 5 of 5) sorted by relevance

/openssl/doc/man3/
H A DSSL_key_update.pod16 int SSL_key_update(SSL *s, int updatetype);
26 If the B<updatetype> parameter is set to B<SSL_KEY_UPDATE_NOT_REQUESTED> then
28 informed of the change. If the B<updatetype> parameter is set to
31 peer to additionally update its sending keys. It is an error if B<updatetype> is
86 B<SSL_KEY_UPDATE_NOT_REQUESTED> as B<updatetype> has the same effect as passing
/openssl/ssl/statem/
H A Dstatem_lib.c704 unsigned int updatetype; in tls_process_key_update() local
715 if (!PACKET_get_1(pkt, &updatetype) in tls_process_key_update()
725 if (updatetype != SSL_KEY_UPDATE_NOT_REQUESTED in tls_process_key_update()
726 && updatetype != SSL_KEY_UPDATE_REQUESTED) { in tls_process_key_update()
736 if (updatetype == SSL_KEY_UPDATE_REQUESTED) in tls_process_key_update()
/openssl/apps/
H A Ds_client.c3865 int updatetype; in user_data_execute() local
3868 updatetype = SSL_KEY_UPDATE_REQUESTED; in user_data_execute()
3870 updatetype = SSL_KEY_UPDATE_NOT_REQUESTED; in user_data_execute()
3874 if (!SSL_key_update(user_data->con, updatetype)) in user_data_execute()
/openssl/ssl/
H A Dssl_lib.c2776 int SSL_key_update(SSL *s, int updatetype) in SSL_key_update() argument
2782 return ossl_quic_key_update(s, updatetype); in SSL_key_update()
2793 if (updatetype != SSL_KEY_UPDATE_NOT_REQUESTED in SSL_key_update()
2794 && updatetype != SSL_KEY_UPDATE_REQUESTED) { in SSL_key_update()
2810 sc->key_update = updatetype; in SSL_key_update()
/openssl/include/openssl/
H A Dssl.h.in2048 int SSL_key_update(SSL *s, int updatetype);

Completed in 49 milliseconds