/openssl-master/test/ |
A D | exdatatest.c | 66 char *hello; member 105 ex_data->hello = (*update_ex_data)->hello; in exdup2() 162 ex_data->hello = cp; in MYOBJ_sethello2() 172 return ex_data->hello; in MYOBJ_gethello2() 186 ex_data->hello = cp; in MYOBJ_allochello3() 196 return ex_data->hello; in MYOBJ_gethello3()
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpencod.txt | 25 Input = "hello" 29 Input = "hello world!" 45 Input = "hello" 50 Input = "hello" 62 Input = "hello" 66 Input = "hello"
|
/openssl-master/ssl/ |
A D | ssl_sess.c | 562 int ssl_get_prev_session(SSL *s, CLIENTHELLO_MSG *hello) in ssl_get_prev_session() argument 578 SSL_EXT_CLIENT_HELLO, hello->pre_proc_exts, in ssl_get_prev_session() 581 hello->pre_proc_exts, NULL, 0)) in ssl_get_prev_session() 587 r = tls_get_ticket_from_client(s, hello, &ret); in ssl_get_prev_session() 596 if (hello->session_id_len > 0) { in ssl_get_prev_session() 598 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session() 599 hello->session_id_len); in ssl_get_prev_session()
|
A D | t1_lib.c | 1726 SSL_TICKET_STATUS tls_get_ticket_from_client(SSL *s, CLIENTHELLO_MSG *hello, in tls_get_ticket_from_client() argument 1743 ticketext = &hello->pre_proc_exts[TLSEXT_IDX_session_ticket]; in tls_get_ticket_from_client() 1750 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
|
A D | ssl_local.h | 2384 __owur int ssl_get_prev_session(SSL *s, CLIENTHELLO_MSG *hello); 2533 __owur int ssl_choose_server_version(SSL *s, CLIENTHELLO_MSG *hello, 2668 __owur SSL_TICKET_STATUS tls_get_ticket_from_client(SSL *s, CLIENTHELLO_MSG *hello,
|
/openssl-master/doc/man1/ |
A D | openssl-spkac.pod.in | 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf
|
A D | openssl-rsautl.pod.in | 154 0070 - ff ff ff ff 00 68 65 6c-6c 6f 20 77 6f 72 6c 64 .....hello world
|
A D | openssl-genpkey.pod.in | 399 Encrypt output private key using 128 bit AES and the passphrase "hello": 401 openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello
|
/openssl-master/fuzz/ |
A D | README.md | 143 the same client hello with the same random number in it, and so the server, as 144 emulated by the file, can be generated for that client hello.
|
/openssl-master/doc/man3/ |
A D | SSL_alert_type_string.pod | 205 Sent by the client in response to a hello request or by the 206 server in response to a client hello after initial handshaking.
|
A D | SSL_check_chain.pod | 56 SSL_check_chain() must be called in servers after a client hello message or in
|
A D | SSL_get_shared_sigalgs.pod | 53 signature algorithms: after a client hello (for servers) or a certificate
|
A D | SSL_CTX_set1_sigalgs.pod | 55 signature algorithm in the client hello message.
|
A D | SSL_CTX_set_options.pod | 67 Add server-hello extension from the early version of cryptopro draft 313 about acceptable SSL/TLS protocol levels as during the first hello. Some 315 the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1, the server
|
A D | BIO_s_file.pod | 102 File BIO "hello world":
|
A D | PEM_read_bio_PrivateKey.pod | 502 DES encryption, using the pass phrase "hello": 505 NULL, 0, 0, "hello")) 523 char *tmp = "hello";
|
A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 36 session when session ticket extension is presented in the TLS hello
|
/openssl-master/crypto/perlasm/ |
A D | README.md | 49 &comment("hello there") Put in a comment.
|
/openssl-master/ssl/statem/ |
A D | statem_lib.c | 1744 int ssl_choose_server_version(SSL *s, CLIENTHELLO_MSG *hello, DOWNGRADE *dgrd) in ssl_choose_server_version() argument 1756 int client_version = hello->legacy_version; in ssl_choose_server_version() 1792 suppversions = &hello->pre_proc_exts[TLSEXT_IDX_supported_versions]; in ssl_choose_server_version()
|
A D | statem_srvr.c | 1323 static void ssl_check_for_safari(SSL *s, const CLIENTHELLO_MSG *hello) in ssl_check_for_safari() argument 1353 tmppkt = hello->extensions; in ssl_check_for_safari()
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 1249 SSL_R_BAD_HELLO_REQUEST:105:bad hello request 1334 SSL_R_FRAGMENTED_CLIENT_HELLO:401:fragmented client hello
|
/openssl-master/include/openssl/ |
A D | ssl.h.in | 386 * TLSv1.0 (version 3.1) was announced in the client hello. Normally 405 * Make server add server-hello extension from early version of
|
/openssl-master/ |
A D | CHANGES.md | 3960 compatible client hello. 5785 hello and checking the requested ciphersuite. 7098 * Don't use TLS 1.0 record version number in initial client hello 7165 * Workarounds for some broken servers that "hang" if a client hello 7169 hello: some (but not all) hanging servers will now work. 7171 the number of ciphers sent in the client hello. This should be 8083 client hello before rejecting multiple SGC restarts. Thanks to 14476 hello' messages. (Note that the attack is impractical against 16285 reset the MAC if we do get this second client hello. 16936 * Use client_version from client hello to select the protocol [all …]
|
A D | NEWS.md | 1303 * TLS/SSL protocol bugfixes: Accept TLS 'client hello' in SSL 3.0
|