/openssl-master/test/ssl-tests/ |
A D | 13-fragmentation.cnf | 5 test-0 = 0-one-fragment-minus-app-data 6 test-1 = 1-one-fragment-app-data 7 test-2 = 2-one-fragment-plus-app-data 29 [0-one-fragment-minus-app-data] 32 [0-one-fragment-minus-app-data-ssl] 52 [1-one-fragment-app-data] 55 [1-one-fragment-app-data-ssl] 59 [1-one-fragment-app-data-server] 64 [1-one-fragment-app-data-client] 75 [2-one-fragment-plus-app-data] [all …]
|
A D | 13-fragmentation.cnf.in | 19 # Default fragment size is 512. 21 name => "one-fragment-minus-app-data", 29 name => "one-fragment-app-data", 37 name => "one-fragment-plus-app-data", 53 name => "small-app-data-large-fragment-size", 87 name => "large-app-data-large-fragment-size", 96 name => "large-app-data-odd-fragment-size", 104 # When the buffer / fragment size ratio is sufficiently large, 107 # around 4. Since the test buffer is 64kB, a 4kB fragment is 137 name => "large-app-data-aes-sha1-multibuffer-odd-fragment", [all …]
|
/openssl-master/external/perl/Text-Template-1.56/ |
A D | Changes | 123 Program fragment at line 30 delivered error ``Illegal division by zero'' 130 program fragment began; it now reports the line number at which the error 143 program fragment began; it now reports the line number at which the error 155 call; this is a function which receives each code fragment prior to 156 evaluation, and which may modify and return the fragment; the modified 157 fragment is what is evaluated. 187 function which receives each code fragment prior to evaluation, and which 188 may modify and return the fragment; the modified fragment is what is 202 beginning of every program fragment in a template, either per template, 206 front of every program fragment everywhere. [all …]
|
/openssl-master/test/ |
A D | asynciotest.c | 22 static int fragment = 0; variable 142 if (fragment) { in async_write() 234 fragment = 0; in async_write() 312 fragment = 1; in test_asyncio()
|
A D | README.ssltest.md | 53 * MaxFragmentSize - maximum send fragment size (integer, defaults to 512 in 55 both client and server. Lowering the fragment size will split handshake and 58 four times as large as the maximum fragment, interleaved multi-buffer crypto
|
/openssl-master/doc/man3/ |
A D | OSSL_HTTP_parse_url.pod | 49 C<[scheme://][userinfo@]host[:port][/path][?query][#fragment]> and splits it up 50 into scheme, userinfo, host, port, path, query, and fragment components. 63 For absent scheme, userinfo, port, query, and fragment components
|
A D | SSL_CTX_set_split_send_fragment.pod | 11 SSL_SESSION_get_max_fragment_length - Control fragment size settings and pipelining operations 108 SSL_CTX_set_tlsext_max_fragment_length() sets the default maximum fragment 113 SSL_set_tlsext_max_fragment_length() sets the maximum fragment length 120 SSL_SESSION_get_max_fragment_length() gets the maximum fragment length
|
A D | OSSL_HTTP_transfer.pod | 78 C<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>, 79 where any userinfo, path, query, and fragment given is ignored. 200 Any userinfo and fragment components in the I<url> are ignored.
|
A D | SSL_CTX_set_msg_callback.pod | 88 and fragment collection where applicable. (Thus record boundaries are
|
A D | SSL_CTX_set_options.pod | 170 renegotiation, and setting the maximum fragment size is not possible as of
|
A D | EVP_EncryptInit.pod | 967 Sets the maximum send fragment size for a TLS1 multiblock cipher operation.
|
/openssl-master/ssl/statem/ |
A D | statem_dtls.c | 76 frag->fragment = buf; in dtls1_hm_fragment_new() 103 OPENSSL_free(frag->fragment); in dtls1_hm_fragment_free() 528 memcpy(&p[frag->msg_header.frag_off], frag->fragment, in dtls1_retrieve_buffered_fragment() 611 frag->fragment + msg_hdr->frag_off, in dtls1_reassemble_fragment() 722 frag->fragment, frag_len, 0, in dtls1_process_out_of_seq_message() 1054 memcpy(frag->fragment, s->init_buf->data, s->init_num); in dtls1_buffer_message() 1138 memcpy(s->init_buf->data, frag->fragment, in dtls1_retransmit_message()
|
/openssl-master/doc/internal/man3/ |
A D | ossl_namemap_new.pod | 67 length I<name_len> as well, allowing the caller to use a fragment of
|
/openssl-master/doc/man1/ |
A D | openssl-cmp.pod.in | 50 [B<-server> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>] 52 [B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>] 442 =item B<-server> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]> 448 The optional userinfo and fragment components are ignored. 457 =item B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]> 463 selected by B<-tls_used>), as well as any path, userinfo, and query, and fragment
|
A D | openssl-s_server.pod.in | 531 The optional userinfo and fragment URL components are ignored. 566 The maximum size of data fragment to send.
|
A D | openssl-ocsp.pod.in | 164 The optional userinfo and fragment components are ignored.
|
A D | openssl-s_client.pod.in | 552 The maximum size of data fragment to send.
|
/openssl-master/Configurations/ |
A D | README-design.md | 412 Unix) with perl code fragments mixed in. Those perl code fragment 415 At a minimum, there must be a perl code fragment that defines a set of
|
A D | README.md | 495 perl functions in a perl code fragment enclosed with `{-` and `-}`.
|
/openssl-master/doc/man5/ |
A D | x509v3_config.pod | 329 The value is taken as a distinguished name fragment that is set as the 383 The value is taken as a distinguished name fragment that is set as the
|
A D | config.pod | 228 If a full configuration with the above fragment is in the file
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 1328 SSL_R_EXCEEDS_MAX_FRAGMENT_SIZE:194:exceeds max fragment size 1463 ssl3 ext invalid max fragment length
|
/openssl-master/ssl/ |
A D | ssl_local.h | 1867 unsigned char *fragment; member
|
/openssl-master/ |
A D | CHANGES.md | 2480 bytes long. In theory it is permissible in SSLv3 - TLSv1.2 to fragment such 2482 it make no sense to send an empty alert record, or to fragment one. TLSv1.3 6962 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can 7946 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can 9147 in SSL structures. New SSL ctrl to set maximum send fragment size. 14011 in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment 14212 faced with a pathologically small ClientHello fragment that does
|