/third_party/openssl/test/ |
H A D | ext_internal_test.c | 70 EXT_ENTRY(early_data),
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem.c | 196 if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) in ossl_statem_skip_early_data() 1010 * have accepted early_data. It is present on the client as long in ossl_statem_export_early_allowed() 1011 * as we have sent early_data. in ossl_statem_export_early_allowed() 1013 return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_export_early_allowed() 1014 || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); in ossl_statem_export_early_allowed()
|
H A D | extensions.c | 1159 * we also have to do this before we decide whether to accept early_data. in final_alpn() 1538 * that will be used for early_data so that it is in place for sending early in tls_psk_do_binder() 1539 * data. For client side external PSK not being used for early_data we in tls_psk_do_binder() 1680 * If we get here then the server accepted our early_data but we in final_early_data() 1699 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in final_early_data() 1701 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in final_early_data()
|
H A D | extensions_clnt.c | 885 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in tls_construct_ctos_early_data() 1643 /* ALPN not consistent with the old session so cannot use early_data */ in tls_parse_stoc_alpn() 1974 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in tls_parse_stoc_early_data() 2014 * If we used the external PSK for sending early_data then s->early_secret in tls_parse_stoc_psk()
|
H A D | statem_srvr.c | 77 } else if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_server13_read_transition() 903 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED in ossl_statem_server_post_work() 969 if (SSL_IS_QUIC(s) && s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in ossl_statem_server_post_work() 2158 /* Not consistent so can't be used for early_data */ in tls_handle_alpn() 2197 /* Not consistent so can't be used for early_data */ in tls_handle_alpn() 2290 * we must handle ALPN before we decide whether to accept early_data. in tls_post_process_client_hello()
|
H A D | extensions_srvr.c | 1930 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in tls_construct_stoc_early_data()
|
/third_party/openssl/ssl/statem/ |
H A D | statem.c | 196 if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) in ossl_statem_skip_early_data() 988 * have accepted early_data. It is present on the client as long in ossl_statem_export_early_allowed() 989 * as we have sent early_data. in ossl_statem_export_early_allowed() 991 return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_export_early_allowed() 992 || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); in ossl_statem_export_early_allowed()
|
H A D | extensions.c | 1131 * we also have to do this before we decide whether to accept early_data. in final_alpn() 1506 * that will be used for early_data so that it is in place for sending early in tls_psk_do_binder() 1507 * data. For client side external PSK not being used for early_data we in tls_psk_do_binder() 1648 * If we get here then the server accepted our early_data but we in final_early_data() 1667 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in final_early_data() 1669 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in final_early_data()
|
H A D | extensions_clnt.c | 885 s->ext.early_data = SSL_EARLY_DATA_REJECTED; in tls_construct_ctos_early_data() 1628 /* ALPN not consistent with the old session so cannot use early_data */ in tls_parse_stoc_alpn() 1948 s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; in tls_parse_stoc_early_data() 1988 * If we used the external PSK for sending early_data then s->early_secret in tls_parse_stoc_psk()
|
H A D | statem_srvr.c | 77 } else if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in ossl_statem_server13_read_transition() 902 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED in ossl_statem_server_post_work() 2138 /* Not consistent so can't be used for early_data */ in tls_handle_alpn() 2177 /* Not consistent so can't be used for early_data */ in tls_handle_alpn() 2270 * we must handle ALPN before we decide whether to accept early_data. in tls_post_process_client_hello()
|
H A D | extensions_srvr.c | 1889 if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in tls_construct_stoc_early_data()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_client2.c | 350 " early_data=%%d default: library default\n" \ 546 int early_data; /* early data enablement flag */ member 970 opt.early_data = DFL_EARLY_DATA; in main() 1253 else if (strcmp(p, "early_data") == 0) { in main() 1256 opt.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in main() 1259 opt.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED; in main() 2028 if (opt.early_data != DFL_EARLY_DATA) { in main() 2029 mbedtls_ssl_conf_early_data(&conf, opt.early_data); in main()
|
H A D | ssl_server2.c | 433 " early_data=%%d default: library default\n" \ 700 int early_data; /* early data enablement flag */ member 1752 opt.early_data = DFL_EARLY_DATA; in main() 1987 else if (strcmp(p, "early_data") == 0) { in main() 1990 opt.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in main() 1993 opt.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED; in main() 2816 if (opt.early_data != DFL_EARLY_DATA) { in main() 2817 mbedtls_ssl_conf_early_data(&conf, opt.early_data); in main()
|
/third_party/mbedtls/tests/include/test/ |
H A D | ssl_helpers.h | 120 int early_data; member
|
/third_party/nghttp2/src/ |
H A D | shrpx_http2_downstream_connection.cc | 334 auto &earlydataconf = httpconf.early_data; in push_request_headers()
|
H A D | shrpx_config.h | 803 bool early_data; member 860 } early_data; member
|
H A D | shrpx_quic_connection_handler.cc | 402 if (quicconf.upstream.early_data) { in handle_new_connection()
|
H A D | shrpx_http_downstream_connection.cc | 532 auto &earlydataconf = httpconf.early_data; in push_request_headers()
|
H A D | shrpx_config.cc | 4007 config->http.early_data.strip_incoming = !util::strieq_l("yes", optarg); in parse_config() 4097 config->quic.upstream.early_data = util::strieq_l("yes", optarg); in parse_config()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_server.c | 115 static int early_data = 0; variable 911 {"early_data", OPT_EARLY_DATA, '-', "Attempt to read early data"}, 1628 early_data = 1; in s_server_main() 1692 if (early_data && (www > 0 || rev)) { in s_server_main() 1694 "Can't use -early_data in combination with -www, -WWW, -HTTP, or -rev\n"); in s_server_main() 2476 if (early_data) { in sv_body()
|
/third_party/openssl/apps/ |
H A D | s_server.c | 115 static int early_data = 0; variable 911 {"early_data", OPT_EARLY_DATA, '-', "Attempt to read early data"}, 1628 early_data = 1; in s_server_main() 1687 if (early_data && (www > 0 || rev)) { in s_server_main() 1689 "Can't use -early_data in combination with -www, -WWW, -HTTP, or -rev\n"); in s_server_main() 2471 if (early_data) { in sv_body()
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 69 opts->early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED; in mbedtls_test_init_handshake_options() 828 mbedtls_ssl_conf_early_data(&(ep->conf), options->early_data); in mbedtls_test_ssl_endpoint_init()
|
/third_party/node/deps/openssl/openssl/ssl/record/ |
H A D | ssl3_record.c | 126 else if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in early_data_count_ok() 596 * Valid early_data that we cannot decrypt will fail here. We treat in ssl3_get_record()
|
/third_party/openssl/ssl/record/ |
H A D | ssl3_record.c | 126 else if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) in early_data_count_ok() 596 * Valid early_data that we cannot decrypt will fail here. We treat in ssl3_get_record()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_lib.c | 2026 if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { in SSL_read_early_data() 2054 return s->ext.early_data; in SSL_get_early_data_status() 3514 * support for early_data, but if a client were to send us some (e.g. in SSL_CTX_new_ex() 3867 * - we are doing early_data, in which case we cache so that we can in ssl_update_cache()
|