/openssl-master/doc/man3/ |
A D | SSL_extension_supported.pod | 12 - custom TLS extension handling 106 The callback B<add_cb> is called to send custom extension data to be 115 extension data and return 1. 124 to NULL then no extension is added. 150 called if the extension is present and relevant for the context (see 154 extension B<ext_type>. 181 The extension is only allowed in TLS 185 The extension is only allowed in DTLS 216 The extension may be present in the ClientHello message. 229 The extension may be present in an EncryptedExtensions message. [all …]
|
A D | X509_EXTENSION_set_object.pod | 8 X509_EXTENSION_get_critical, X509_EXTENSION_get_data - extension utility 30 X509_EXTENSION_set_object() sets the extension type of B<ex> to B<obj>. The 34 B<crit> is zero the extension in non-critical otherwise it is critical. 36 X509_EXTENSION_set_data() sets the data in extension B<ex> to B<data>. The 39 X509_EXTENSION_create_by_NID() creates an extension of type B<nid>, 46 except it creates and extension using B<obj> instead of a NID. 48 X509_EXTENSION_get_object() returns the extension type of B<ex> as an 52 X509_EXTENSION_get_critical() returns the criticality of extension B<ex> it 60 These functions manipulate the contents of an extension directly. Most 62 use the extension encode and decode functions instead such as [all …]
|
A D | X509V3_get_d2i.pod | 9 X509_REVOKED_add1_ext_i2d - X509 extension decode and encode functions 43 occurrence of an extension is permissible otherwise the first extension after 47 -1 if the extension could not be found, 0 if the extension is found and is 59 X509V3_EXT_i2d() encodes the extension specific structure B<ext> 80 In almost all cases an extension can occur at most once and multiple 85 B<X509V3_ADD_DEFAULT> appends a new extension only if the extension does 86 not already exist. An error is returned if the extension does already 89 B<X509V3_ADD_APPEND> appends a new extension, ignoring whether the extension 93 a new extension. 98 B<X509V3_ADD_KEEP_EXISTING> appends a new extension only if the extension does [all …]
|
A D | X509v3_get_ext_by_NID.pod | 14 X509_REVOKED_add_ext - extension stack utility functions 62 X509v3_get_ext() retrieves extension B<loc> from B<x>. The index B<loc> 64 extension is an internal pointer which B<must not> be freed up by the 73 looks for an extension of criticality B<crit>. A zero value for B<crit> 75 extension. 77 X509v3_delete_ext() deletes the extension with index B<loc> from B<x>. 78 The deleted extension is returned and must be freed by the caller. 106 use the extension encode and decode functions instead such as 112 initial extension will not be checked. 117 because these functions do not free the extension they delete. [all …]
|
A D | X509_get_extension_flags.pod | 15 X509_get_proxy_pathlen - retrieve certificate extension data 38 This extension is used to limit the length of a cert chain that may be 52 The certificate contains a basic constraints extension. 73 The freshest CRL extension is present in the certificate. 77 The certificate contains an unhandled critical extension. 81 Some certificate extension values are invalid or inconsistent. 94 The NID_certificate_policies certificate extension is invalid or 140 B<NULL> if the extension is not present or cannot be parsed. 144 extension is not present or cannot be parsed. 161 information an application should examine extension values directly [all …]
|
A D | X509V3_set_ctx.pod | 6 X509V3_set_issuer_pkey - X.509 v3 extension generation utilities 24 for instance to help generating an authority key identifier extension. 29 extension definitions is to be checked without actually producing an extension, 30 or B<X509V3_CTX_REPLACE>, which means that each X.509v3 extension added as 32 extension with the same OID. 37 or not) to provide fallback data for the authority key identifier extension.
|
A D | SSL_CTX_use_serverinfo.pod | 8 - use serverinfo extension 26 "serverinfo" extension is returned in response to an empty ClientHello 37 extensions to be added to a Certificate message, then the extension will only 55 B<file> into B<ctx>. The extensions must be in PEM format. Each extension 57 PEM extension name must begin with the phrase "BEGIN SERVERINFOV2 FOR " for 61 SSL_CTX_use_certificate(), the serverinfo extension will be loaded into the 63 loaded serverinfo extension data will be loaded for that certificate. To 64 use the serverinfo extension for multiple certificates,
|
A D | OPENSSL_ia32cap.pod | 51 =item bit #57 denoting AES-NI instruction set extension; 58 =item bit #60 denoting AVX extension; 98 =item bit #64+16 denoting availability of AVX512F extension; 105 aka AVX512IFMA extension; 107 =item bit #64+29 denoting availability of SHA extension; 109 =item bit #64+30 denoting availability of AVX512BW extension; 111 =item bit #64+31 denoting availability of AVX512VL extension; 113 =item bit #64+41 denoting availability of VAES extension; 115 =item bit #64+42 denoting availability of VPCLMULQDQ extension;
|
A D | X509_check_ca.pod | 22 CA certificate with B<basicConstraints> extension CA:TRUE, 24 B<keyUsage> extension with bit B<keyCertSign> set, but without 26 extension telling that it is CA certificate.
|
A D | OPENSSL_s390xcap.pod | 36 implements the corresponding instruction set extension. Possible values 70 # 76 1<<51 message-security assist extension 3 71 # 77 1<<50 message-security assist extension 4 76 #146 1<<45 message-security assist extension 8 77 #155 1<<36 message-security assist extension 9
|
A D | SSL_CTX_has_client_custom_ext.pod | 6 client extension type 17 client extension of type B<ext_type> using SSL_CTX_add_client_custom_ext().
|
A D | SSL_CTX_set_client_hello_cb.pod | 57 from the ClientHello on a per-extension basis. For the provided wire 58 protocol extension type value, the extension value and length are returned 66 holding the numerical value of the TLS extension types in the order they appear 75 allow the server to examine the server name indication extension provided 105 SSL_client_hello_get0_ext() returns 1 if the extension of type 'type' is present, and
|
A D | SSL_CTX_set_tlsext_servername_callback.pod | 31 the servername extension received in the incoming connection. When B<cb> 107 =item On the server, after the servername extension has been processed and a 113 =item On the server, after the servername extension has been processed and a 121 Note that the ClientHello callback occurs before a servername extension from the 123 a servername extension from the client is processed. 129 SSL_set_tlsext_host_name() sets the server name indication ClientHello extension 130 to contain the value B<name>. The type of server name indication extension is set
|
A D | X509_STORE_CTX_get_error.pod | 265 extension does not permit certificate signing. 268 invalid or inconsistent certificate extension> 270 A certificate extension had an invalid value (for example an incorrect 274 invalid or inconsistent certificate policy extension> 276 A certificate policies extension had an invalid value (for example an incorrect 291 Some feature of a certificate extension is not supported. Unused. 304 A certificate name constraints extension included a minimum or maximum field: 318 a garbage extension or some new feature not currently supported. 334 =item B<X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION: unhandled critical extension> 336 Unhandled critical extension. [all …]
|
A D | SSL_CTX_set_tlsext_use_srtp.pod | 24 the "use_srtp" DTLS extension defined in RFC5764. This provides a mechanism for 29 extension is only supported in DTLS. Any SRTP configuration will be ignored if a 32 An OpenSSL client wishing to send the "use_srtp" extension should call 63 An OpenSSL server wishing to support the "use_srtp" extension should also call
|
A D | SSL_CTX_set_split_send_fragment.pod | 111 It affects the client-side as only its side may initiate this extension use. 118 It affects the client-side as only its side may initiate this extension use. 129 The Maximum Fragment Length extension support is optional on the server side. 130 If the server does not support this extension then
|
A D | SCT_new.pod | 166 (TLS extension, X.509 certificate extension or OCSP response). This is not 179 For example, an SCT found in an X.509 extension must have been issued for a pre-
|
/openssl-master/test/ssl-tests/ |
A D | 13-fragmentation.cnf | 22 test-17 = 17-Maximum Fragment Len extension equal FragmentSize to 2048 23 test-18 = 18-Maximum Fragment Len extension 512 lower than FragmentSize 1024 24 test-19 = 19-Maximum Fragment Len extension 1024 lower than FragmentSize 1024 440 [17-Maximum Fragment Len extension equal FragmentSize to 2048] 443 [17-Maximum Fragment Len extension equal FragmentSize to 2048-ssl] 447 [17-Maximum Fragment Len extension equal FragmentSize to 2048-server] 452 [17-Maximum Fragment Len extension equal FragmentSize to 2048-client] 468 [18-Maximum Fragment Len extension 512 lower than FragmentSize 1024] 496 [19-Maximum Fragment Len extension 1024 lower than FragmentSize 1024] 524 [20-Maximum Fragment Len extension 4096 greater than FragmentSize 2048] [all …]
|
A D | 13-fragmentation.cnf.in | 191 name => "Maximum Fragment Len extension set to 1024 w. FragmentSize disabled", 204 name => "Maximum Fragment Len extension equal FragmentSize to 2048", 217 name => "Maximum Fragment Len extension 512 lower than FragmentSize 1024", 230 name => "Maximum Fragment Len extension 1024 lower than FragmentSize 1024", 243 name => "Maximum Fragment Len extension 4096 greater than FragmentSize 2048", 256 name => "Maximum Fragment Len extension 2048 greater than FragmentSize 1024",
|
/openssl-master/doc/man5/ |
A D | x509v3_config.pod | 20 Each entry in the extension section takes the form: 31 There are four main types of extension: 96 the extension but should be documened. 99 If an extension type is unsupported, then the I<arbitrary> extension syntax 124 or omit the extension entirely. 234 the extension. 370 This extension should only appear in CRLs. It is a multi-valued extension 412 certificate extension. 508 This is a multi-valued extension consisting of a list of TLS extension 511 include that extension in its reply. [all …]
|
/openssl-master/util/perl/TLSProxy/ |
A D | ClientHello.pm | 121 my $extension = ""; 124 $extension .= pack("n", $key); 125 $extension .= pack("n", length($extdata)); 126 $extension .= $extdata; 127 return $extension;
|
/openssl-master/doc/man1/ |
A D | openssl-verification-options.pod | 49 In particular, the subject key identifier extension, if present, 128 If the subject certificate has an authority key identifier extension, 179 the keyUsage extension (if present) of the candidate issuer certificate 283 CA certificates must explicitly include the keyUsage extension. 304 If a subjectAlternativeName extension is given it must not be empty. 328 Normally if an unhandled critical extension is present that is not 562 If the basicConstraints extension is absent, 571 If the keyUsage extension is present then additional restraints are 573 keyCertSign bit set if the keyUsage extension is present. 577 The extKeyUsage (EKU) extension places additional restrictions on the [all …]
|
A D | tsget.pod | 11 [B<-e> I<extension>] 56 =item B<-e> I<extension> 58 If the B<-o> option is not given this argument specifies the extension of the 60 the input files. Default extension is F<.tsr>. (Optional) 68 of the input files and the default or specified extension argument. (Optional)
|
/openssl-master/ssl/ |
A D | ssl_rsa.c | 759 unsigned char *extension = 0; in SSL_CTX_use_serverinfo_file() local 788 if (PEM_read_bio(bin, &name, &header, &extension, &extension_length) in SSL_CTX_use_serverinfo_file() 824 || (extension[2] << 8) + extension[3] in SSL_CTX_use_serverinfo_file() 837 || (extension[6] << 8) + extension[7] in SSL_CTX_use_serverinfo_file() 861 extension, extension_length); in SSL_CTX_use_serverinfo_file() 868 OPENSSL_free(extension); in SSL_CTX_use_serverinfo_file() 869 extension = NULL; in SSL_CTX_use_serverinfo_file() 878 OPENSSL_free(extension); in SSL_CTX_use_serverinfo_file()
|
/openssl-master/Configurations/ |
A D | README-design.md | 32 when they are, it's always with the file name extension `.o`), they are 78 called `apps/openss` (the file name extension will depend on the 461 extension, src2obj() is expected to change it to 481 extension, obj2lib is expected to add that. 'objs' 504 *without* extension. This is useful in case 508 *without* extension. 'deps' has the list of other 509 libraries (also *without* extension) this library 537 *without* extension, obj2bin is expected to add 540 (also *without* extension) that the programs needs 567 # Note 2: obj2shlib must convert the '.o' extension to whatever
|