Home
last modified time | relevance | path

Searched refs:early_data (Results 1 - 25 of 33) sorted by relevance

12

/third_party/openssl/test/
H A Dext_internal_test.c70 EXT_ENTRY(early_data),
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem.c196 if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) in ossl_statem_skip_early_data()
1010 * have accepted early_data. It is present on the client as long in ossl_statem_export_early_allowed()
1011 * as we have sent early_data. in ossl_statem_export_early_allowed()
1013 return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_export_early_allowed()
1014 || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); in ossl_statem_export_early_allowed()
H A Dextensions.c1159 * we also have to do this before we decide whether to accept early_data. in final_alpn()
1538 * that will be used for early_data so that it is in place for sending early in tls_psk_do_binder()
1539 * data. For client side external PSK not being used for early_data we in tls_psk_do_binder()
1680 * If we get here then the server accepted our early_data but we in final_early_data()
1699 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in final_early_data()
1701 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in final_early_data()
H A Dextensions_clnt.c885 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in tls_construct_ctos_early_data()
1643 /* ALPN not consistent with the old session so cannot use early_data */ in tls_parse_stoc_alpn()
1974 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in tls_parse_stoc_early_data()
2014 * If we used the external PSK for sending early_data then s->early_secret in tls_parse_stoc_psk()
H A Dstatem_srvr.c77 } else if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_server13_read_transition()
903 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED in ossl_statem_server_post_work()
969 if (SSL_IS_QUIC(s) && s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in ossl_statem_server_post_work()
2158 /* Not consistent so can't be used for early_data */ in tls_handle_alpn()
2197 /* Not consistent so can't be used for early_data */ in tls_handle_alpn()
2290 * we must handle ALPN before we decide whether to accept early_data. in tls_post_process_client_hello()
H A Dextensions_srvr.c1930 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in tls_construct_stoc_early_data()
/third_party/openssl/ssl/statem/
H A Dstatem.c196 if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) in ossl_statem_skip_early_data()
988 * have accepted early_data. It is present on the client as long in ossl_statem_export_early_allowed()
989 * as we have sent early_data. in ossl_statem_export_early_allowed()
991 return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_export_early_allowed()
992 || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); in ossl_statem_export_early_allowed()
H A Dextensions.c1131 * we also have to do this before we decide whether to accept early_data. in final_alpn()
1506 * that will be used for early_data so that it is in place for sending early in tls_psk_do_binder()
1507 * data. For client side external PSK not being used for early_data we in tls_psk_do_binder()
1648 * If we get here then the server accepted our early_data but we in final_early_data()
1667 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in final_early_data()
1669 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in final_early_data()
H A Dextensions_clnt.c885 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in tls_construct_ctos_early_data()
1628 /* ALPN not consistent with the old session so cannot use early_data */ in tls_parse_stoc_alpn()
1948 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in tls_parse_stoc_early_data()
1988 * If we used the external PSK for sending early_data then s->early_secret in tls_parse_stoc_psk()
H A Dstatem_srvr.c77 } else if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in ossl_statem_server13_read_transition()
902 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED in ossl_statem_server_post_work()
2138 /* Not consistent so can't be used for early_data */ in tls_handle_alpn()
2177 /* Not consistent so can't be used for early_data */ in tls_handle_alpn()
2270 * we must handle ALPN before we decide whether to accept early_data. in tls_post_process_client_hello()
H A Dextensions_srvr.c1889 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in tls_construct_stoc_early_data()
/third_party/mbedtls/programs/ssl/
H A Dssl_client2.c350 " early_data=%%d default: library default\n" \
546 int early_data; /* early data enablement flag */ member
970 opt.early_data = DFL_EARLY_DATA; in main()
1253 else if (strcmp(p, "early_data") == 0) { in main()
1256 opt.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in main()
1259 opt.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED; in main()
2028 if (opt.early_data != DFL_EARLY_DATA) { in main()
2029 mbedtls_ssl_conf_early_data(&conf, opt.early_data); in main()
H A Dssl_server2.c433 " early_data=%%d default: library default\n" \
700 int early_data; /* early data enablement flag */ member
1752 opt.early_data = DFL_EARLY_DATA; in main()
1987 else if (strcmp(p, "early_data") == 0) { in main()
1990 opt.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in main()
1993 opt.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED; in main()
2816 if (opt.early_data != DFL_EARLY_DATA) { in main()
2817 mbedtls_ssl_conf_early_data(&conf, opt.early_data); in main()
/third_party/mbedtls/tests/include/test/
H A Dssl_helpers.h120 int early_data; member
/third_party/nghttp2/src/
H A Dshrpx_http2_downstream_connection.cc334 auto &earlydataconf = httpconf.early_data; in push_request_headers()
H A Dshrpx_config.h803 bool early_data; member
860 } early_data; member
H A Dshrpx_quic_connection_handler.cc402 if (quicconf.upstream.early_data) { in handle_new_connection()
H A Dshrpx_http_downstream_connection.cc532 auto &earlydataconf = httpconf.early_data; in push_request_headers()
H A Dshrpx_config.cc4007 config->http.early_data.strip_incoming = !util::strieq_l("yes", optarg); in parse_config()
4097 config->quic.upstream.early_data = util::strieq_l("yes", optarg); in parse_config()
/third_party/node/deps/openssl/openssl/apps/
H A Ds_server.c115 static int early_data = 0; variable
911 {"early_data", OPT_EARLY_DATA, '-', "Attempt to read early data"},
1628 early_data = 1; in s_server_main()
1692 if (early_data && (www > 0 || rev)) { in s_server_main()
1694 "Can't use -early_data in combination with -www, -WWW, -HTTP, or -rev\n"); in s_server_main()
2476 if (early_data) { in sv_body()
/third_party/openssl/apps/
H A Ds_server.c115 static int early_data = 0; variable
911 {"early_data", OPT_EARLY_DATA, '-', "Attempt to read early data"},
1628 early_data = 1; in s_server_main()
1687 if (early_data && (www > 0 || rev)) { in s_server_main()
1689 "Can't use -early_data in combination with -www, -WWW, -HTTP, or -rev\n"); in s_server_main()
2471 if (early_data) { in sv_body()
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c69 opts->early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in mbedtls_test_init_handshake_options()
828 mbedtls_ssl_conf_early_data(&(ep->conf), options->early_data); in mbedtls_test_ssl_endpoint_init()
/third_party/node/deps/openssl/openssl/ssl/record/
H A Dssl3_record.c126 else if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in early_data_count_ok()
596 * Valid early_data that we cannot decrypt will fail here. We treat in ssl3_get_record()
/third_party/openssl/ssl/record/
H A Dssl3_record.c126 else if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in early_data_count_ok()
596 * Valid early_data that we cannot decrypt will fail here. We treat in ssl3_get_record()
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_lib.c2026 if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in SSL_read_early_data()
2054 return s->ext.early_data; in SSL_get_early_data_status()
3514 * support for early_data, but if a client were to send us some (e.g. in SSL_CTX_new_ex()
3867 * - we are doing early_data, in which case we cache so that we can in ssl_update_cache()

Completed in 70 milliseconds

12