/openssl-master/util/perl/OpenSSL/Test/ |
A D | Utils.pm | 172 require IO::Socket::IP; 173 my $s = IO::Socket::IP->new(
|
/openssl-master/doc/man3/ |
A D | BIO_s_connect.pod | 36 round the platform's TCP/IP socket connection routines. 38 Using connect BIOs, TCP/IP connections can be made and data 61 The hostname can be an IP address; if the address is an IPv6 one, it 73 BIO_set_conn_ip_family() sets the IP family. 85 BIO_get_conn_ip_family() returns the IP family of the connect BIO. 96 If domain name resolution yields multiple IP addresses all of them are tried
|
A D | BIO_s_accept.pod | 41 round the platform's TCP/IP socket accept routines. 43 Using accept BIOs, TCP/IP connections can be accepted and data 97 BIO_get_accept_ip_family() returns the IP family accepted by the BIO I<b>, 100 BIO_set_accept_ip_family() sets the IP family I<family> accepted by BIO I<b>. 179 BIO_get_accept_ip_family() returns the IP family or <=0 on error.
|
A D | OSSL_CMP_validate_msg.pod | 39 L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message 42 used also to validate the issued certificate returned in the IP message. This is
|
A D | DTLSv1_listen.pod | 30 address. An attacker could forge its source IP address and then send handshake 32 the forged source IP. If the response messages are larger than the original 36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is
|
A D | BIO_parse_hostserv.pod | 38 The host part can be a name or an IP address. If it's a IPv6
|
A D | X509_check_host.pod | 22 certificate matches a given hostname, email address, or IP address. 64 explicitly marked addresses in the certificates are considered; IP
|
A D | X509_VERIFY_PARAM_set_flags.pod | 198 X509_VERIFY_PARAM_get1_ip_asc() returns the expected IP address as a string. 201 X509_VERIFY_PARAM_set1_ip() sets the expected IP address to B<ip>. 203 B<iplen> must be set to 4 for IPv4 and 16 for IPv6. When an IP 207 X509_VERIFY_PARAM_set1_ip_asc() sets the expected IP address to
|
A D | OSSL_HTTP_parse_url.pod | 51 The host (or server) component may be a DNS name or an IP address
|
A D | OSSL_CMP_CTX_new.pod | 293 error messages as well as certificate responses (IP/CP/KUP) and 308 to validate the certificate chain of an IP message. 334 (which may be a hostname or IP address or NULL) in the given I<ctx>. 632 been called) on the last received certificate response message IP/CP/KUP. 636 response message (of type IP, CP, or KUP),
|
A D | X509_STORE_CTX_get_error.pod | 384 =item B<X509_V_ERR_IP_ADDRESS_MISMATCH: IP address mismatch> 386 IP address mismatch.
|
A D | SSL_alert_type_string.pod | 126 =item "IP"/"illegal parameter"
|
A D | BIO_f_ssl.pod | 100 If domain name resolution yields multiple IP addresses all of them are tried
|
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/ |
A D | test.cnf | 131 IP.0 = 127.0.0.1 132 IP.1 = 192.168.1.1
|
/openssl-master/crypto/des/ |
A D | des_enc.c | 28 IP(r, l); in DES_encrypt1() 162 IP(l, r); in DES_encrypt3() 182 IP(l, r); in DES_decrypt3()
|
A D | des_local.h | 201 # define IP(l,r) \ macro
|
/openssl-master/util/perl/TLSProxy/ |
A D | Proxy.pm | 52 require IO::Socket::IP; 53 my $s = IO::Socket::IP->new( 62 $IP_factory = sub { IO::Socket::IP->new(@_); };
|
/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_connection.csv | 6 TBD,IP address, -section,, -server,_SERVER_IP:_SERVER_PORT,,,,,,,,,,,,,, 18 TBD,server IP address with TLS port, -section,, -server,_SERVER_IP:_SERVER_TLS,,,,,BLANK,,,,BLANK,,…
|
/openssl-master/doc/man5/ |
A D | x509v3_config.pod | 227 B<IP> (an IP address), 236 The IP address used in the B<IP> option can be in either IPv4 or IPv6 format. 250 subjectAltName = IP:192.168.7.1 252 subjectAltName = IP:13::17 487 is not supported and the B<IP> form should consist of an IP addresses and 492 nameConstraints = permitted;IP:192.168.0.0/255.255.0.0
|
/openssl-master/doc/man1/ |
A D | openssl-cmp.pod.in | 315 One or more IP addresses, email addresses, DNS names, or URIs 444 The IP address or DNS hostname and optionally port 470 List of IP addresses and/or DNS names of servers 592 =item * negative certificate responses (IP/CP/KUP) 627 the last received certificate response (i.e., IP, CP, or KUP) message. 840 This may be a DNS name or an IP address. 960 CA certificates to be included in mock Initialization Response (IP) message. 1003 certificate responses (IP/CP/KUP), and revocation responses (RP).
|
A D | openssl-ocsp.pod.in | 186 List of IP addresses and/or DNS names of servers
|
A D | openssl-ts.pod.in | 608 L<tsget(1)>. Pure TCP/IP protocol is not supported.
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_certreq_new.pod | 71 which can be either of IP/CP/KUP, depending on the given I<bodytype>,
|
/openssl-master/include/openssl/ |
A D | x509_vfy.h.in | 273 /* Host, email and IP check errors */
|
A D | x509v3.h.in | 897 * since some of the encodings (particularly for IP address prefixes
|