Home
last modified time | relevance | path

Searched +full:use +full:- +full:handshake (Results 1 – 25 of 475) sorted by relevance

12345678910>>...19

/freebsd-src/share/man/man4/
H A Dlp.41 .\" -*- nroff -*-
3 .\" Copyright (c) 1996 A.R.Gordon, andrew.gordon@net-tel.co.uk
6 .\" Redistribution and use in source and binary forms, with or without
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 point-to-point network interface between two similarly configured systems.
54 and any standard AT-compatible printer port with working interrupts may be used.
73 .Bl -tag -width Fl
75 (default) Use
91 .Bd -literal
[all …]
H A Dwg.41 .\" SPDX-License-Identifier: BSD-2-Clause
5 .\" Redistribution and use in source and binary forms, with or without
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 .Bd -literal -offset indent
59 .Bl -tag -width indent -offset 3n
71 .It Pre-shared key
73 unique pre-shared symmetric key.
74 This is used in their handshake to guard against future compromise of the
76 Diffie-Hellman exchange becomes feasible.
[all …]
/freebsd-src/crypto/openssl/test/recipes/
H A D70-test_sslmessages.t2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
9 use strict;
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use File::Temp qw(tempfile);
13 use TLSProxy::Proxy;
14 use checkhandshake qw(checkhandshake @handmessages @extensions);
23 if disabled("engine") || disabled("dynamic-engine");
34 my $proxy = TLSProxy::Proxy->new(
[all …]
H A D70-test_tls13messages.t2 # Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
9 use strict;
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use File::Temp qw(tempfile);
13 use TLSProxy::Proxy;
14 use checkhandshake qw(checkhandshake @handmessages @extensions);
23 if disabled("engine") || disabled("dynamic-engine");
198 my $proxy = TLSProxy::Proxy->new(
[all …]
H A D70-test_sslsessiontick.t2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
9 use strict;
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use TLSProxy::Proxy;
13 use File::Temp qw(tempfile);
22 if disabled("engine") || disabled("dynamic-engine");
41 my $proxy = TLSProxy::Proxy->new(
50 # NewSessionTicket message seen; Full handshake
[all …]
H A D70-test_tlsextms.t2 # Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
9 use strict;
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use TLSProxy::Proxy;
13 use File::Temp qw(tempfile);
22 if disabled("engine") || disabled("dynamic-engine");
42 my $proxy = TLSProxy::Proxy->new(
54 # Full handshake
[all …]
/freebsd-src/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_tlsext_servername_callback.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
H A DSSL_CTX_set_verify.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
H A DSSL_connect.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
H A DSSL_do_handshake.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
H A DSSL_CTX_set_ct_validation_callback.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
H A DSSL_in_init.318 .\" Set up some character translations and predefined strings. \*(-- will
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
[all …]
/freebsd-src/crypto/openssl/test/
H A DREADME.ssltest.md4 SSL testcases are configured in the `ssl-tests` directory.
12 However, for verification, we also include checked-in configuration outputs
14 `test/ssl-tests/*.cnf` files.
16 For more details, see `ssl-tests/01-simple.cnf.in` for an example.
19 --------------------
26 name => "test-default",
36 * Method - the method to test. One of DTLS or TLS.
38 * HandshakeMode - which handshake flavour to test:
39 - Simple - plain handshake (default)
40 - Resume - test resumption
[all …]
/freebsd-src/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_servername_callback.pod7 SSL_set_tlsext_host_name - handle server name indication (SNI)
47 handshake will be aborted. The value of the alert to be used should be stored in
54 However, the handshake will continue and send a warning alert instead. The value
67 SSL_CTX_set_tlsext_servername_arg() sets a context-specific argument to be
72 handshake. In TLSv1.2 the servername is only negotiated on initial handshakes
77 =item On the client, before the handshake
83 session from the original handshake had a servername accepted by the server then
88 =item On the client, during or after the handshake and a TLSv1.2 (or below)
91 If the session from the original handshake had a servername accepted by the
97 =item On the client, during or after the handshake and a TLSv1.2 (or below)
[all …]
H A DSSL_CTX_set_ct_validation_callback.pod8 SSL_ct_is_enabled, SSL_CTX_ct_is_enabled -
35 This is accomplished by setting a built-in CT validation callback.
41 TLS handshake with the verification mode set to B<SSL_VERIFY_PEER>, if the peer
42 presents no valid SCTs the handshake will be aborted.
43 If the verification mode is B<SSL_VERIFY_NONE>, the handshake will continue
45 However, in that case if the verification status before the built-in callback
49 handshake completion, even after session resumption since the verification
54 handshake continues, and the verification status is not modified, regardless of
57 handshake completion.
59 the handshake.
[all …]
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
24 handshake has been finished or an error occurred.
28 to continue the handshake, indicating the problem by the return value -1.
41 impacts after a successful TLSv1.3 handshake or a successful TLSv1.2 (or below)
42 resumption handshake, because the last peer to communicate in the handshake is
45 been received for the final handshake message.
61 The TLS/SSL handshake was not successful but was shut down controlled and
67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
72 The TLS/SSL handshake was not successful, because a fatal error occurred either
[all …]
H A DSSL_CTX_set_verify.pod12 - set various SSL/TLS parameters for peer certificate verification
52 This makes the handshake suspend and return control to the calling application
59 Note that the handshake may still be aborted if a subsequent invocation of the
69 Post-Handshake Authentication extension to be added to the ClientHello such that
70 post-handshake authentication can be requested by the server. If B<val> is 0
93 certificate verification process can be checked after the TLS/SSL handshake
95 The handshake will be continued regardless of the verification result.
101 fails, the TLS/SSL handshake is
109 fails, the TLS/SSL handshake is
117 handshake is immediately terminated with a "handshake failure" alert.
[all …]
H A DSSL_do_handshake.pod5 SSL_do_handshake - perform a TLS/SSL handshake
15 SSL_do_handshake() will wait for a SSL/TLS handshake to take place. If the
16 connection is in client mode, the handshake will be started. The handshake
26 once the handshake has been finished or an error occurred.
30 to continue the handshake. In this case a call to SSL_get_error() with the
47 The TLS/SSL handshake was not successful but was shut down controlled and
53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
58 The TLS/SSL handshake was not successful because a fatal error occurred either
74 Copyright 2002-2020 The OpenSSL Project Authors. All Rights Reserved.
76 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
41 A client application wishing to use TLSv1.3 PSKs should use either
49 case the server will have specified a ciphersuite to use already and the PSK
57 be freed by it as required at any point after the handshake is complete.
71 Only the handshake digest associated with the ciphersuite is relevant for the
73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is
74 not NULL the handshake digest for the ciphersuite should be the same.
76 handshake digest of an SSL_CIPHER object can be checked using
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
97 case no PSK will be sent to the server but the handshake will continue. To do
[all …]
H A DSSL_in_init.pod11 - retrieve information about the handshake state machine
29 awaiting handshake messages, or 0 otherwise.
31 SSL_in_before() returns 1 if no SSL/TLS handshake has yet been initiated, or 0
48 SSL_get_state() returns a value indicating the current state of the handshake
62 B<message> is the name of a handshake message that is being or has been sent, or
72 No handshake messages have yet been been sent or received.
76 Handshake message sending/processing has completed.
93 SSL_get_state() returns the current handshake state.
103 Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
105 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
24 handshake has been finished or an error occurred.
28 to continue the handshake, indicating the problem by the return value -1.
46 The TLS/SSL handshake was not successful but was shut down controlled and
52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
57 The TLS/SSL handshake was not successful because a fatal error occurred either
75 Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
77 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_key_update.pod10 - initiate and obtain information about updating connection keys
34 SSL_key_update() must only be called after the initial handshake has been
51 handshake over an existing SSL/TLS connection. The next time an IO operation
56 handshake.
60 session associated with the current connection in the new handshake.
64 for a new handshake to be sent to the client. The next time an IO operation is
67 handshake and it may or may not attempt to resume an existing session. If
68 a new handshake is started then this will be handled transparently by calling
74 new handshake. For historical reasons, DTLS clients will not attempt to resume
75 the session in the new handshake.
[all …]
H A DSSL_CTX_set_num_tickets.pod10 - control the number of TLSv1.3 session tickets that are issued
26 the client after a full handshake. Set the desired value (which could be 0) in
28 the start of the handshake.
35 Tickets are also issued on receipt of a post-handshake certificate from the
40 was used for the initial handshake. If the initial handshake was a full
41 handshake then SSL_set_num_tickets() can be called again prior to calling
45 To issue tickets after other events (such as application-layer changes),
48 sent in this manner after the initial handshake has completed, and only for
61 ticket itself is sent, a new-session callback can be registered with
89 Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved.
[all …]
/freebsd-src/crypto/openssl/test/helpers/
H A Dssl_test_ctx.h2 * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
21 /* Couldn't test resumption/renegotiation: original handshake failed. */
100 /* One of a number of predefined server names use by the client */
104 /* Supported NPN and ALPN protocols. A comma-separated list. */
119 /* SNI callback (server-side). */
121 /* Supported NPN and ALPN protocols. A comma-separated list. */
146 /* Whether the server/client CTX should use DTLS or TLS. */
148 /* Whether to test a resumed/renegotiated handshake. */
161 * Extra server/client configurations. Per-handshake.
[all …]
/freebsd-src/crypto/openssl/test/ssl-tests/
H A D26-tls13_client_auth.cnf.in1 # -*- mode: perl; -*-
2 # Copyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
11 ## Similar to 04-client_auth.cnf.in output, but specific for
12 ## TLSv1.3 and post-handshake authentication
14 use strict;
15 use warnings;
18 use OpenSSL::Test::Utils;
22 name => "server-auth-TLSv1.3",
36 name => "client-auth-TLSv1.3-request",
[all …]

12345678910>>...19