/openssl-master/crypto/pem/ |
A D | pem_lib.c | 498 if ((header == NULL) || (*header == '\0') || (*header == '\n')) in PEM_get_EVP_CIPHER_INFO() 506 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 508 if (*header++ != '4' || *header++ != ',') in PEM_get_EVP_CIPHER_INFO() 510 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 519 header += strspn(header, " \t\r"); in PEM_get_EVP_CIPHER_INFO() 534 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 541 header += strcspn(header, " \t,"); in PEM_get_EVP_CIPHER_INFO() 542 c = *header; in PEM_get_EVP_CIPHER_INFO() 543 *header = '\0'; in PEM_get_EVP_CIPHER_INFO() 545 *header = c; in PEM_get_EVP_CIPHER_INFO() [all …]
|
A D | pem_info.c | 58 char *name = NULL, *header = NULL, *str; in STACK_OF() local 82 i = PEM_read_bio(bp, &name, &header, &data, &len); in STACK_OF() 145 if ((int)strlen(header) > 10 /* assume encrypted */ in STACK_OF() 157 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) in STACK_OF() 173 if (!PEM_get_EVP_CIPHER_INFO(header, &xi->enc_cipher)) in STACK_OF() 182 OPENSSL_free(header); in STACK_OF() 183 header = NULL; in STACK_OF() 212 OPENSSL_free(header); in STACK_OF()
|
/openssl-master/test/ |
A D | pemtest.c | 36 char *name = NULL, *header = NULL; in test_b64() local 47 || !TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_b64() 58 OPENSSL_free(header); in test_b64() 66 char *name = NULL, *header = NULL; in test_invalid() local 76 || TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_invalid() 83 OPENSSL_free(header); in test_invalid()
|
A D | recordlentest.c | 29 unsigned char header[SSL3_RT_HEADER_LENGTH]; in write_record() local 35 header[0] = rectype; in write_record() 36 header[1] = (recversion >> 8) & 0xff; in write_record() 37 header[2] = recversion & 0xff; in write_record() 38 header[3] = (len >> 8) & 0xff; in write_record() 39 header[4] = len & 0xff; in write_record() 41 if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written) in write_record()
|
A D | x509aux.c | 26 char *header = 0; in test_certs() local 37 for (c = 0; !err && PEM_read_bio(fp, &name, &header, &data, &len); ++c) { in test_certs() 152 OPENSSL_free(header); in test_certs()
|
A D | danetest.c | 95 char *header = 0; in STACK_OF() local 107 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; in STACK_OF() 131 OPENSSL_free(header); in STACK_OF() 133 name = header = NULL; in STACK_OF() 144 OPENSSL_free(header); in STACK_OF()
|
/openssl-master/crypto/cmp/ |
A D | cmp_protect.c | 43 prot_part.header = msg->header; in ossl_cmp_calc_protection() 46 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection() 50 X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg); in ossl_cmp_calc_protection() 251 return id == NULL || ossl_cmp_hdr_set1_senderKID(msg->header, id); in set_senderKID() 262 X509_ALGOR_free(msg->header->protectionAlg); in ossl_cmp_msg_protect() 263 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect() 272 if (!set_pbmac_algor(ctx, &msg->header->protectionAlg)) in ossl_cmp_msg_protect() 291 if (!set_sig_algor(ctx, &msg->header->protectionAlg)) in ossl_cmp_msg_protect() 324 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect() 325 && msg->header->senderKID == NULL)) in ossl_cmp_msg_protect()
|
A D | cmp_vfy.c | 51 prot_part.header = msg->header; in verify_signature() 55 msg->header->protectionAlg, msg->protection, in verify_signature() 265 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 268 if (!check_kid(ctx, X509_get0_subject_key_id(cert), msg->header->senderKID)) in cert_acceptable() 452 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() 455 const ASN1_OCTET_STRING *skid = msg->header->senderKID; in check_msg_find_cert() 556 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg() 561 if (msg->header->protectionAlg == NULL /* unprotected message */ in OSSL_CMP_validate_msg() 567 switch (ossl_cmp_hdr_get_protection_nid(msg->header)) { in OSSL_CMP_validate_msg() 670 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update() [all …]
|
A D | cmp_msg.c | 69 return msg->header; in OSSL_CMP_MSG_get0_header() 170 if (!ossl_cmp_hdr_init(ctx, msg->header) in ossl_cmp_msg_create() 174 && !ossl_cmp_hdr_generalInfo_push1_items(msg->header, in ossl_cmp_msg_create() 405 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certreq_new() 475 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certrep_new() 1080 if (!ossl_cmp_hdr_set_transactionID(ctx, msg->header)) in OSSL_CMP_MSG_update_transactionID() 1082 return msg->header->protectionAlg == NULL in OSSL_CMP_MSG_update_transactionID()
|
/openssl-master/doc/man3/ |
A D | PEM_read.pod | 13 int PEM_write(FILE *fp, const char *name, const char *header, 15 int PEM_write_bio(BIO *bp, const char *name, const char *header, 18 int PEM_read(FILE *fp, char **name, char **header, 20 int PEM_read_bio(BIO *bp, char **name, char **header, 23 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); 30 type B<name>, any additional B<header> information, and the raw 42 Optional header line(s) may appear after the begin line, and their 47 B<header> is the header value or NULL, and B<data> and B<len> specify 59 are returned in B<header> and the base64-decoded content and its length are 71 When the header is malformed, or not supported or when the cipher is unknown [all …]
|
A D | SSL_rstate_string.pod | 25 consisting of header and body. When working in a blocking environment, 37 =item "RH"/"read header" 39 The header of the record is being evaluated.
|
A D | PEM_read_bio_ex.pod | 15 int PEM_read_bio_ex(BIO *in, char **name, char **header, 21 the name of the type of contained data, the header information regarding 45 The caller must release the storage allocated for *name, *header, and *data.
|
A D | OSSL_HTTP_REQ_CTX.pod | 65 I<wbio>), and the maximum expected response header line length I<buf_size>. 82 OSSL_HTTP_REQ_CTX_add1_header() adds header I<name> with value I<value> to the 84 For example, to add a C<Host> header for C<example.com> you would call: 94 is included in the HTTP header of the response and return an error if not. 97 that an ASN.1 sequence header is required, its length field is checked, and 123 The HTTP header C<Content-Length> is filled out with the length of the request. 126 the HTTP header C<Content-Type> is also added with the given string value. 161 in I<rctx> if provided by the server as <Content-Length> header field, else 0. 166 If the C<Content-Length> header is present and exceeds this value or 185 create the I<wbio>, any C<Host> header, and the host specified in the
|
A D | OSSL_CMP_MSG_get0_header.pod | 30 OSSL_CMP_MSG_get0_header() returns the header of the given CMP message. 35 in the header of the given message according to the CMP_CTX.
|
A D | OSSL_HTTP_transfer.pod | 125 The I<buf_size> parameter specifies the response header maximum line length. 148 OSSL_HTTP_set1_request() sets up in I<rctx> the request header and content data 155 The optional list I<headers> may contain additional custom HTTP header lines. 158 is included in the HTTP header of the response and return an error if not. 184 If the response header contains one or more "Content-Length" header lines and/or 199 for connecting but the hostname is used, as usual, for the C<Host> header.
|
/openssl-master/doc/internal/man7/ |
A D | deprecation.pod | 18 functions in our public header files, F<< <openssl/*.h> >>). 65 including an internal header file very early in the affected translation 69 from public view, it should be moved to an internal header file, with the 71 use that symbol should adjust their header inclusions accordingly. 79 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is 95 any OpenSSL header file) in the translation unit that implements it and in 105 its declaration in the public header file is: 118 other OpenSSL header file) in the translation unit that implements it and in
|
/openssl-master/ssl/ |
A D | s3_cbc.c | 39 const unsigned char *header, 161 const unsigned char *header, in ssl3_cbc_digest_record() argument 405 md_transform(md_state.c, header); in ssl3_cbc_digest_record() 406 memcpy(first_block, header + md_block_size, overhang); in ssl3_cbc_digest_record() 413 memcpy(first_block, header, 13); in ssl3_cbc_digest_record() 437 b = header[k]; in ssl3_cbc_digest_record()
|
/openssl-master/doc/man7/ |
A D | openssl-core_names.h.pod | 13 The F<< <openssl/core_names.h> >> header defines a multitude of macros 32 I<This header file does not constitute a general registry of names>. 38 to the names provided in this header to work in a compatible manner.
|
A D | ssl.pod | 79 Currently the OpenSSL B<ssl> library provides the following C header files 86 This is the common header file for the SSL/TLS API. Include it into your 90 inside this header file. 99 This is the sub header file dealing with the SSLv3 protocol only. 103 This is the sub header file dealing with the TLSv1 protocol only.
|
/openssl-master/crypto/err/ |
A D | README.md | 41 The generated C error code file `xxx_err.c` will load the header 43 header file must load any additional header files containing any
|
/openssl-master/ssl/record/ |
A D | ssl3_record.c | 1327 unsigned char header[75]; in n_ssl3_mac() 1329 memcpy(header + j, mac_sec, md_size); in n_ssl3_mac() 1331 memcpy(header + j, ssl3_pad_1, npad); in n_ssl3_mac() 1333 memcpy(header + j, seq, 8); in n_ssl3_mac() 1335 header[j++] = rec->type; in n_ssl3_mac() 1389 unsigned char header[13]; in tls1_mac() local 1433 memcpy(header, dtlsseq, 8); in tls1_mac() 1435 memcpy(header, seq, 8); in tls1_mac() 1437 header[8] = rec->type; in tls1_mac() 1439 header[10] = (unsigned char)(ssl->version); in tls1_mac() [all …]
|
/openssl-master/ |
A D | HACKING.md | 7 either add a prototype in one of the existing OpenSSL header files; 8 or provide a new header file and edit
|
/openssl-master/VMS/ |
A D | test-includes.com | 1 $! Quick script to check how well including individual header files works
|
/openssl-master/apps/ |
A D | asn1parse.c | 70 char *name = NULL, *header = NULL, *prog; in asn1parse_main() local 183 if (PEM_read_bio(in, &name, &header, &str, &num) != 1) { in asn1parse_main() 312 OPENSSL_free(header); in asn1parse_main()
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_msg_protect.pod | 22 according to the algorithm and parameters in the message header's protectionAlg 29 It also sets the protectionAlg field in the message header accordingly.
|