Home
last modified time | relevance | path

Searched refs:fragment (Results 1 – 24 of 24) sorted by relevance

/openssl-master/test/ssl-tests/
A D13-fragmentation.cnf5 test-0 = 0-one-fragment-minus-app-data
6 test-1 = 1-one-fragment-app-data
7 test-2 = 2-one-fragment-plus-app-data
29 [0-one-fragment-minus-app-data]
32 [0-one-fragment-minus-app-data-ssl]
52 [1-one-fragment-app-data]
55 [1-one-fragment-app-data-ssl]
59 [1-one-fragment-app-data-server]
64 [1-one-fragment-app-data-client]
75 [2-one-fragment-plus-app-data]
[all …]
A D13-fragmentation.cnf.in19 # Default fragment size is 512.
21 name => "one-fragment-minus-app-data",
29 name => "one-fragment-app-data",
37 name => "one-fragment-plus-app-data",
53 name => "small-app-data-large-fragment-size",
87 name => "large-app-data-large-fragment-size",
96 name => "large-app-data-odd-fragment-size",
104 # When the buffer / fragment size ratio is sufficiently large,
107 # around 4. Since the test buffer is 64kB, a 4kB fragment is
137 name => "large-app-data-aes-sha1-multibuffer-odd-fragment",
[all …]
/openssl-master/external/perl/Text-Template-1.56/
A DChanges123 Program fragment at line 30 delivered error ``Illegal division by zero''
130 program fragment began; it now reports the line number at which the error
143 program fragment began; it now reports the line number at which the error
155 call; this is a function which receives each code fragment prior to
156 evaluation, and which may modify and return the fragment; the modified
157 fragment is what is evaluated.
187 function which receives each code fragment prior to evaluation, and which
188 may modify and return the fragment; the modified fragment is what is
202 beginning of every program fragment in a template, either per template,
206 front of every program fragment everywhere.
[all …]
/openssl-master/test/
A Dasynciotest.c22 static int fragment = 0; variable
142 if (fragment) { in async_write()
234 fragment = 0; in async_write()
312 fragment = 1; in test_asyncio()
A DREADME.ssltest.md53 * MaxFragmentSize - maximum send fragment size (integer, defaults to 512 in
55 both client and server. Lowering the fragment size will split handshake and
58 four times as large as the maximum fragment, interleaved multi-buffer crypto
/openssl-master/doc/man3/
A DOSSL_HTTP_parse_url.pod49 C<[scheme://][userinfo@]host[:port][/path][?query][#fragment]> and splits it up
50 into scheme, userinfo, host, port, path, query, and fragment components.
63 For absent scheme, userinfo, port, query, and fragment components
A DSSL_CTX_set_split_send_fragment.pod11 SSL_SESSION_get_max_fragment_length - Control fragment size settings and pipelining operations
108 SSL_CTX_set_tlsext_max_fragment_length() sets the default maximum fragment
113 SSL_set_tlsext_max_fragment_length() sets the maximum fragment length
120 SSL_SESSION_get_max_fragment_length() gets the maximum fragment length
A DOSSL_HTTP_transfer.pod78 C<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>,
79 where any userinfo, path, query, and fragment given is ignored.
200 Any userinfo and fragment components in the I<url> are ignored.
A DSSL_CTX_set_msg_callback.pod88 and fragment collection where applicable. (Thus record boundaries are
A DSSL_CTX_set_options.pod170 renegotiation, and setting the maximum fragment size is not possible as of
A DEVP_EncryptInit.pod967 Sets the maximum send fragment size for a TLS1 multiblock cipher operation.
/openssl-master/ssl/statem/
A Dstatem_dtls.c76 frag->fragment = buf; in dtls1_hm_fragment_new()
103 OPENSSL_free(frag->fragment); in dtls1_hm_fragment_free()
528 memcpy(&p[frag->msg_header.frag_off], frag->fragment, in dtls1_retrieve_buffered_fragment()
611 frag->fragment + msg_hdr->frag_off, in dtls1_reassemble_fragment()
722 frag->fragment, frag_len, 0, in dtls1_process_out_of_seq_message()
1054 memcpy(frag->fragment, s->init_buf->data, s->init_num); in dtls1_buffer_message()
1138 memcpy(s->init_buf->data, frag->fragment, in dtls1_retransmit_message()
/openssl-master/doc/internal/man3/
A Dossl_namemap_new.pod67 length I<name_len> as well, allowing the caller to use a fragment of
/openssl-master/doc/man1/
A Dopenssl-cmp.pod.in50 [B<-server> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>]
52 [B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>]
442 =item B<-server> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>
448 The optional userinfo and fragment components are ignored.
457 =item B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>
463 selected by B<-tls_used>), as well as any path, userinfo, and query, and fragment
A Dopenssl-s_server.pod.in531 The optional userinfo and fragment URL components are ignored.
566 The maximum size of data fragment to send.
A Dopenssl-ocsp.pod.in164 The optional userinfo and fragment components are ignored.
A Dopenssl-s_client.pod.in552 The maximum size of data fragment to send.
/openssl-master/Configurations/
A DREADME-design.md412 Unix) with perl code fragments mixed in. Those perl code fragment
415 At a minimum, there must be a perl code fragment that defines a set of
A DREADME.md495 perl functions in a perl code fragment enclosed with `{-` and `-}`.
/openssl-master/doc/man5/
A Dx509v3_config.pod329 The value is taken as a distinguished name fragment that is set as the
383 The value is taken as a distinguished name fragment that is set as the
A Dconfig.pod228 If a full configuration with the above fragment is in the file
/openssl-master/crypto/err/
A Dopenssl.txt1328 SSL_R_EXCEEDS_MAX_FRAGMENT_SIZE:194:exceeds max fragment size
1463 ssl3 ext invalid max fragment length
/openssl-master/ssl/
A Dssl_local.h1867 unsigned char *fragment; member
/openssl-master/
A DCHANGES.md2480 bytes long. In theory it is permissible in SSLv3 - TLSv1.2 to fragment such
2482 it make no sense to send an empty alert record, or to fragment one. TLSv1.3
6962 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can
7946 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can
9147 in SSL structures. New SSL ctrl to set maximum send fragment size.
14011 in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment
14212 faced with a pathologically small ClientHello fragment that does

Completed in 59 milliseconds