Home
last modified time | relevance | path

Searched full:handshake (Results 1 – 25 of 505) sorted by relevance

12345678910>>...21

/freebsd/crypto/openssl/test/ssl-tests/
H A D26-tls13_client_auth.cnf11 test-6 = 6-client-auth-TLSv1.3-request-post-handshake
12 test-7 = 7-client-auth-TLSv1.3-require-fail-post-handshake
13 test-8 = 8-client-auth-TLSv1.3-require-post-handshake
14 test-9 = 9-client-auth-TLSv1.3-require-non-empty-names-post-handshake
15 test-10 = 10-client-auth-TLSv1.3-noroot-post-handshake
16 test-11 = 11-client-auth-TLSv1.3-request-force-client-post-handshake
17 test-12 = 12-client-auth-TLSv1.3-request-force-server-post-handshake
18 test-13 = 13-client-auth-TLSv1.3-request-force-both-post-handshake
210 [6-client-auth-TLSv1.3-request-post-handshake]
211 ssl_conf = 6-client-auth-TLSv1.3-request-post-handshake-ssl
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslmessages.t174 #Test 1: Check we get all the right messages for a default handshake
182 "Default handshake test");
184 #Test 2: Resumption handshake
191 "Resumption handshake test");
198 #Test 3: A status_request handshake (client request only)
205 "status_request handshake test (client)");
207 #Test 4: A status_request handshake (server support only)
215 "status_request handshake test (server)");
217 #Test 5: A status_request handshake (client and server)
227 "status_request handshake test");
[all …]
H A D70-test_tls13messages.t205 #Test 1: Check we get all the right messages for a default handshake
214 "Default handshake test");
216 #Test 2: Resumption handshake
224 "Resumption handshake test");
229 #Test 3: A status_request handshake (client request only)
236 "status_request handshake test (client)");
238 #Test 4: A status_request handshake (server support only)
245 "status_request handshake test (server)");
247 #Test 5: A status_request handshake (client and server)
257 "status_request handshake test");
[all …]
H A D70-test_sslsessiontick.t50 # NewSessionTicket message seen; Full handshake
56 #Test 2: If the server does not accept tickets we should get a normal handshake
59 # NewSessionTicket message not seen; Full handshake
66 #Test 3: If the client does not accept tickets we should get a normal handshake
69 # NewSessionTicket message not seen; Full handshake
77 # NewSessionTicket message not seen; Abbreviated handshake
91 # NewSessionTicket message seen; Abbreviated handshake
106 # NewSessionTicket message seen; Full handshake.
125 # NewSessionTicket message seen; Abbreviated handshake.
132 # NewSessionTicket message not seen; Abbreviated handshake.
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_servername_callback.pod47 handshake will be aborted. The value of the alert to be used should be stored in
54 However, the handshake will continue and send a warning alert instead. The value
72 handshake. In TLSv1.2 the servername is only negotiated on initial handshakes
77 =item On the client, before the handshake
83 session from the original handshake had a servername accepted by the server then
88 =item On the client, during or after the handshake and a TLSv1.2 (or below)
91 If the session from the original handshake had a servername accepted by the
97 =item On the client, during or after the handshake and a TLSv1.2 (or below)
103 =item On the server, before the handshake
105 The function will always return NULL before the handshake
[all …]
H A DSSL_connect.pod5 SSL_connect - initiate the TLS/SSL handshake with an TLS/SSL server
15 SSL_connect() initiates the TLS/SSL handshake with a server. The communication
24 handshake has been finished or an error occurred.
28 to continue the handshake, indicating the problem by the return value -1.
41 impacts after a successful TLSv1.3 handshake or a successful TLSv1.2 (or below)
42 resumption handshake, because the last peer to communicate in the handshake is
45 been received for the final handshake message.
61 The TLS/SSL handshake was not successful but was shut down controlled and
67 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
72 The TLS/SSL handshake was not successful, because a fatal error occurred either
H A DSSL_do_handshake.pod5 SSL_do_handshake - perform a TLS/SSL handshake
15 SSL_do_handshake() will wait for a SSL/TLS handshake to take place. If the
16 connection is in client mode, the handshake will be started. The handshake
26 once the handshake has been finished or an error occurred.
30 to continue the handshake. In this case a call to SSL_get_error() with the
47 The TLS/SSL handshake was not successful but was shut down controlled and
53 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
58 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_CTX_set_verify.pod52 This makes the handshake suspend and return control to the calling application
59 Note that the handshake may still be aborted if a subsequent invocation of the
69 Post-Handshake Authentication extension to be added to the ClientHello such that
70 post-handshake authentication can be requested by the server. If B<val> is 0
93 certificate verification process can be checked after the TLS/SSL handshake
95 The handshake will be continued regardless of the verification result.
101 fails, the TLS/SSL handshake is
109 fails, the TLS/SSL handshake is
117 handshake is immediately terminated with a "handshake failur
[all...]
H A DSSL_in_init.pod11 - retrieve information about the handshake state machine
29 awaiting handshake messages, or 0 otherwise.
31 SSL_in_before() returns 1 if no SSL/TLS handshake has yet been initiated, or 0
48 SSL_get_state() returns a value indicating the current state of the handshake
62 B<message> is the name of a handshake message that is being or has been sent, or
72 No handshake messages have yet been been sent or received.
76 Handshake message sending/processing has completed.
93 SSL_get_state() returns the current handshake state.
H A DSSL_CTX_set_ct_validation_callback.pod41 TLS handshake with the verification mode set to B<SSL_VERIFY_PEER>, if the peer
42 presents no valid SCTs the handshake will be aborted.
43 If the verification mode is B<SSL_VERIFY_NONE>, the handshake will continue
49 handshake completion, even after session resumption since the verification
54 handshake continues, and the verification status is not modified, regardless of
57 handshake completion.
59 the handshake.
61 handshake completion, such delayed SCT checks should only be performed when the
69 The TLS handshake is aborted if the verification mode is not B<SSL_VERIFY_NONE>
82 In that case the handshake continues as it would had no callback been
H A DSSL_key_update.pod34 SSL_key_update() must only be called after the initial handshake has been
51 handshake over an existing SSL/TLS connection. The next time an IO operation
56 handshake.
60 session associated with the current connection in the new handshake.
64 for a new handshake to be sent to the client. The next time an IO operation is
67 handshake and it may or may not attempt to resume an existing session. If
68 a new handshake is started then this will be handled transparently by calling
74 new handshake. For historical reasons, DTLS clients will not attempt to resume
75 the session in the new handshake.
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
24 handshake has been finished or an error occurred.
28 to continue the handshake, indicating the problem by the return value -1.
46 The TLS/SSL handshake was not successful but was shut down controlled and
52 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
57 The TLS/SSL handshake was not successful because a fatal error occurred either
H A DSSL_CTX_set_num_tickets.pod26 the client after a full handshake. Set the desired value (which could be 0) in
28 the start of the handshake.
35 Tickets are also issued on receipt of a post-handshake certificate from the
40 was used for the initial handshake. If the initial handshake was a full
41 handshake then SSL_set_num_tickets() can be called again prior to calling
48 sent in this manner after the initial handshake has completed, and only for
H A DSSL_CTX_set_cert_cb.pod26 been set. A zero is returned on error which will abort the handshake with a
27 fatal internal error alert. A negative return value will suspend the handshake
28 and the handshake function will return immediately.
30 indicate, that the handshake was suspended. The next call to the handshake
50 A more advanced callback might examine the handshake parameters and set
/freebsd/share/man/man4/
H A Dlp.4110 data plus one handshake).
112 different choice of which line to use as handshake.
123 Handshake out.
135 Handshake in.
140 sender writes the 4 most significant bits and raises the handshake line;
141 receiver reads the 4 bits and raises its handshake to acknowledge;
143 the handshake; receiver reads the data and lowers its handshake.
152 to be transmitted) without changing the state of the handshake.
154 Note that the end-of-packet marker assumes that the handshake signal and
172 Handshake out.
[all …]
H A Dwg.474 This is used in their handshake to guard against future compromise of the
99 .It Handshake
100 Two peers handshake to mutually authenticate each other and to
102 Either peer may initiate a handshake.
106 Due to the handshake behavior, there is no connected or disconnected
171 .It "Handshake for peer X did not complete after 5 seconds, retrying"
182 .It "Invalid handshake initiation"
183 The incoming handshake packet could not be processed.
187 The incoming handshake initiation packet had an invalid MAC.
189 for the handshake receive
[all...]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_tlsext_servername_callback.3178 handshake will be aborted. The value of the alert to be used should be stored in
184 However, the handshake will continue and send a warning alert instead. The value
199 handshake. In TLSv1.2 the servername is only negotiated on initial handshakes
201 .IP "On the client, before the handshake" 4
202 .IX Item "On the client, before the handshake"
207 session from the original handshake had a servername accepted by the server then
211 .IP "On the client, during or after the handshake and a TLSv1.2 (or below) resumption occurred" 4
212 .IX Item "On the client, during or after the handshake and a TLSv1.2 (or below) resumption occurred"
213 If the session from the original handshake had a servername accepted by the
218 .IP "On the client, during or after the handshake and a TLSv1.2 (or below) resumption did not occur…
[all …]
H A DSSL_CTX_set_verify.3187 This makes the handshake suspend and return control to the calling application
194 Note that the handshake may still be aborted if a subsequent invocation of the
204 Post-Handshake Authentication extension to be added to the ClientHello such that
205 post-handshake authentication can be requested by the server. If \fBval\fR is 0
224 certificate verification process can be checked after the \s-1TLS/SSL\s0 handshake
226 The handshake will be continued regardless of the verification result.
231 fails, the \s-1TLS/SSL\s0 handshake is
239 fails, the \s-1TLS/SSL\s0 handshake is
246 handshake is immediately terminated with a \*(L"handshake failure\*(R" alert.
255 during the initial handshake. This flag must be used together with
[all …]
H A DSSL_connect.3140 SSL_connect \- initiate the TLS/SSL handshake with an TLS/SSL server
150 \&\fBSSL_connect()\fR initiates the \s-1TLS/SSL\s0 handshake with a server. The communication
158 handshake has been finished or an error occurred.
162 to continue the handshake, indicating the problem by the return value \-1.
175 impacts after a successful TLSv1.3 handshake or a successful TLSv1.2 (or below)
176 resumption handshake, because the last peer to communicate in the handshake is
179 been received for the final handshake message.
190 The \s-1TLS/SSL\s0 handshake was not successful but was shut down controlled and
195 The \s-1TLS/SSL\s0 handshake was successfully completed, a \s-1TLS/SSL\s0 connection has been
199 The \s-1TLS/SSL\s0 handshake was not successful, because a fatal error occurred either
H A DSSL_do_handshake.3140 SSL_do_handshake \- perform a TLS/SSL handshake
150 \&\fBSSL_do_handshake()\fR will wait for a \s-1SSL/TLS\s0 handshake to take place. If the
151 connection is in client mode, the handshake will be started. The handshake
160 once the handshake has been finished or an error occurred.
164 to continue the handshake. In this case a call to \fBSSL_get_error()\fR with the
176 The \s-1TLS/SSL\s0 handshake was not successful but was shut down controlled and
181 The \s-1TLS/SSL\s0 handshake was successfully completed, a \s-1TLS/SSL\s0 connection has been
185 The \s-1TLS/SSL\s0 handshake was not successful because a fatal error occurred either
H A DSSL_CTX_set_ct_validation_callback.3176 \&\s-1TLS\s0 handshake with the verification mode set to \fB\s-1SSL_VERIFY_PEER\s0\fR, if the peer
177 presents no valid SCTs the handshake will be aborted.
178 If the verification mode is \fB\s-1SSL_VERIFY_NONE\s0\fR, the handshake will continue
184 handshake completion, even after session resumption since the verification
189 handshake continues, and the verification status is not modified, regardless of
192 handshake completion.
194 the handshake.
196 handshake completion, such delayed \s-1SCT\s0 checks should only be performed when the
204 The \s-1TLS\s0 handshake is aborted if the verification mode is not \fB\s-1SSL_VERIFY_NONE\s0\fR
217 In that case the handshake continues as it would had no callback been
H A DSSL_key_update.3169 \&\fBSSL_key_update()\fR must only be called after the initial handshake has been
186 handshake over an existing \s-1SSL/TLS\s0 connection. The next time an \s-1IO\s0 operation
191 handshake.
195 session associated with the current connection in the new handshake.
199 for a new handshake to be sent to the client. The next time an \s-1IO\s0 operation is
202 handshake and it may or may not attempt to resume an existing session. If
203 a new handshake is started then this will be handled transparently by calling
209 new handshake. For historical reasons, \s-1DTLS\s0 clients will not attempt to resume
210 the session in the new handshake.
H A DSSL_in_init.3146 \&\- retrieve information about the handshake state machine
164 awaiting handshake messages, or 0 otherwise.
166 \&\fBSSL_in_before()\fR returns 1 if no \s-1SSL/TLS\s0 handshake has yet been initiated, or 0
183 \&\fBSSL_get_state()\fR returns a value indicating the current state of the handshake
197 \&\fBmessage\fR is the name of a handshake message that is being or has been sent, or
204 No handshake messages have yet been been sent or received.
207 Handshake message sending/processing has completed.
219 \&\fBSSL_get_state()\fR returns the current handshake state.
/freebsd/crypto/openssl/test/
H A DREADME.ssltest.md38 * HandshakeMode - which handshake flavour to test:
39 - Simple - plain handshake (default)
44 When HandshakeMode is Resume or Renegotiate, the original handshake is expected
46 handshake.
55 both client and server. Lowering the fragment size will split handshake and
63 * ExpectedResult - expected handshake outcome. One of
64 - Success - handshake success
65 - ServerFail - serverside handshake failure
66 - ClientFail - clientside handshake failure
90 - Yes - resumed handshake
[all …]
/freebsd/crypto/openssl/test/helpers/
H A Dssl_test_ctx.h21 /* Couldn't test resumption/renegotiation: original handshake failed. */
148 /* Whether to test a resumed/renegotiated handshake. */
161 * Extra server/client configurations. Per-handshake.
163 /* First handshake. */
165 /* Resumed handshake. */
169 * Test expectations. These apply to the LAST handshake.
198 /* Whether the second handshake is resumed or a full handshake (boolean). */

12345678910>>...21