/openssl-master/test/ |
A D | cmp_protect_test.c | 76 ASN1_BIT_STRING *protection = in execute_calc_protection_fails_test() local 78 int res = TEST_ptr_null(protection); in execute_calc_protection_fails_test() 80 ASN1_BIT_STRING_free(protection); in execute_calc_protection_fails_test() 86 ASN1_BIT_STRING *protection = in execute_calc_protection_pbmac_test() local 88 int res = TEST_ptr(protection) in execute_calc_protection_pbmac_test() 89 && TEST_true(ASN1_STRING_cmp(protection, in execute_calc_protection_pbmac_test() 92 ASN1_BIT_STRING_free(protection); in execute_calc_protection_pbmac_test() 101 ASN1_BIT_STRING *protection, in verify_signature() argument 130 ASN1_BIT_STRING *protection = in execute_calc_protection_signature_test() local 132 int ret = (TEST_ptr(protection) in execute_calc_protection_signature_test() [all …]
|
A D | cmp_vfy_test.c | 251 || (bad_sig && !flip_bit(fixture->msg->protection))) { in test_validate_msg_signature_srvcert()
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_tlsext_use_srtp.pod | 37 SRTP protection profile names. 39 The currently supported protection profile names are: 61 Supplying an unrecognised protection profile name will result in an error. 65 protection profiles that it is willing to negotiate. 67 The currently configured list of protection profiles for either a client or a 72 After a handshake has been completed the negotiated SRTP protection profile (if 75 protection profile was negotiated. The memory returned from this function should 78 If an SRTP protection profile has been successfully negotiated then the SRTP 83 master key length and the salt length as defined for the protection profile in 93 success or NULL on error or if no protection profiles have been configured.
|
A D | OSSL_CMP_validate_msg.pod | 7 - functions for verifying CMP message protection 18 This is the API for validating the protection of CMP messages, 22 OSSL_CMP_validate_msg() validates the protection of the given I<msg>
|
A D | OSSL_CMP_CTX_new.pod | 257 in RFC 4210's MSG_MAC_ALG for PBM-based message protection. 262 for PBM-based message protection. 287 Send messages without CMP-level protection. 302 validating signature-based protection in received CMP messages. 445 used for CMP message protection. 448 When using signature-based protection of CMP request messages 481 messages and to verify any PBM-based protection of incoming messages 483 PBM-based protection takes precedence over signature-based protection. 492 When signature-based protection is used the senderKID will be set to 494 If not present or when PBM-based protection is used [all …]
|
A D | SSL_read_early_data.pod | 206 early data setting for a server is nonzero then replay protection is 240 protection feature will still be used even if a callback is present unless it 288 mitigation for this issue OpenSSL automatically enables replay protection if the 290 protection enabled sessions are forced to be single use only. If a client 296 The replay protection mechanism relies on the internal OpenSSL server session 297 cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is 319 The OpenSSL replay protection does not apply to external Pre Shared Keys (PSKs) 324 applications it is possible to turn off the built-in replay protection feature
|
A D | OSSL_CMP_SRV_CTX_new.pod | 125 without protection of with invalid protection.
|
A D | EVP_aes_128_gcm.pod | 158 requires a key of double-length for protection of a certain key size.
|
A D | SSL_CTX_set_options.pod | 209 OpenSSL will switch on replay protection. See L<SSL_read_early_data(3)> for a 210 description of the replay protection feature. Anti-replay measures are required 318 to the server's answer and violate the version rollback protection.)
|
/openssl-master/crypto/cmp/ |
A D | cmp_vfy.c | 55 msg->header->protectionAlg, msg->protection, in verify_signature() 79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local 83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC() 86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC() 87 && msg->protection->type == protection->type in verify_PBMAC() 88 && msg->protection->length == protection->length in verify_PBMAC() 89 && CRYPTO_memcmp(msg->protection->data, protection->data, in verify_PBMAC() 90 protection->length) == 0; in verify_PBMAC() 91 ASN1_BIT_STRING_free(protection); in verify_PBMAC() 562 || msg->protection == NULL || msg->protection->data == NULL) { in OSSL_CMP_validate_msg()
|
A D | cmp_protect.c | 57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection() 103 OPENSSL_free(protection); in ossl_cmp_calc_protection() 264 ASN1_BIT_STRING_free(msg->protection); in ossl_cmp_msg_protect() 265 msg->protection = NULL; in ossl_cmp_msg_protect() 307 && ((msg->protection = ossl_cmp_calc_protection(ctx, msg)) == NULL)) in ossl_cmp_msg_protect()
|
A D | cmp_asn.c | 450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
|
A D | cmp_local.h | 670 ASN1_BIT_STRING *protection; /* 0 */ member
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_msg_protect.pod | 8 - functions for producing CMP message protection 21 ossl_cmp_calc_protection() calculates the protection for the given I<msg> 27 If there is a secretValue it selects PBMAC, else if there is a protection cert 32 If signature-based message protection is used it adds first the CMP signer cert 45 ossl_cmp_calc_protection() returns the protection on success, else NULL.
|
A D | ossl_cmp_msg_check_update.pod | 33 =item its protection is present and valid (or a callback function B<cb> 34 is present and indicates that a missing or invalid protection is acceptable), 46 In case no protection is present and B<cb> is not NULL then this callback 48 case an invalid protection is present the B<invalid_protection> parameter is 1. 67 Moreover, according to RFC 4210 section 5.3.2, if the message protection is
|
A D | ossl_cmp_hdr_init.pod | 59 ossl_cmp_hdr_get_protection_nid returns the NID of the protection algorithm
|
A D | ossl_cmp_certreq_new.pod | 49 the given B<OSSL_CMP_CTX>, and create the applicable protection.
|
/openssl-master/doc/man1/ |
A D | openssl-cmp.pod.in | 70 Client authentication and protection options: 580 signature-based protection of incoming CMP messages, 615 =item * appendix D.4 shows PKIConf message having protection 660 When using signature-based message protection, this "protection certificate" 705 If applicable, this is used for message protection and 729 Send messages without CMP-level protection. 998 Send response messages without CMP-level protection. 1008 Accept missing or invalid protection of requests. 1037 check the protection of the CMP response message. 1103 using with PBM-based protection or [all …]
|
A D | openssl-pkcs8.pod.in | 188 They only offer 56 bits of protection since they both use DES.
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 203 CMP_R_ERROR_CALCULATING_PROTECTION:115:error calculating protection 220 CMP_R_ERROR_VALIDATING_PROTECTION:140:error validating protection 230 missing key input for creating protection 235 CMP_R_MISSING_PROTECTION:143:missing protection 268 unsupported protection alg dhbasedmac 1266 SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST:353:bad srtp protection profile list 1324 SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST:354:empty srtp protection profile list 1460 srtp protection profile list too long 1461 SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE:364:srtp unknown protection profile
|
/openssl-master/apps/ |
A D | openssl-vms.cnf | 362 [pbm] # Password-based protection for Insta CA 367 [signature] # Signature-based protection for Insta CA
|
A D | openssl.cnf | 362 [pbm] # Password-based protection for Insta CA 367 [signature] # Signature-based protection for Insta CA
|
/openssl-master/external/perl/Text-Template-1.56/ |
A D | LICENSE | 61 Also, for each author's protection and ours, we want to make certain 102 that you may choose to grant warranty protection to some or all 115 copy, and you may at your option offer warranty protection in
|
/openssl-master/include/openssl/ |
A D | cmp.h.in | 280 /* CMP protection options: */
|
/openssl-master/doc/man7/ |
A D | provider-encoder.pod | 260 other objects that need protection.
|