Home
last modified time | relevance | path

Searched refs:protection (Results 1 – 25 of 34) sorted by relevance

12

/openssl-master/test/
A Dcmp_protect_test.c76 ASN1_BIT_STRING *protection = in execute_calc_protection_fails_test() local
78 int res = TEST_ptr_null(protection); in execute_calc_protection_fails_test()
80 ASN1_BIT_STRING_free(protection); in execute_calc_protection_fails_test()
86 ASN1_BIT_STRING *protection = in execute_calc_protection_pbmac_test() local
88 int res = TEST_ptr(protection) in execute_calc_protection_pbmac_test()
89 && TEST_true(ASN1_STRING_cmp(protection, in execute_calc_protection_pbmac_test()
92 ASN1_BIT_STRING_free(protection); in execute_calc_protection_pbmac_test()
101 ASN1_BIT_STRING *protection, in verify_signature() argument
130 ASN1_BIT_STRING *protection = in execute_calc_protection_signature_test() local
132 int ret = (TEST_ptr(protection) in execute_calc_protection_signature_test()
[all …]
A Dcmp_vfy_test.c251 || (bad_sig && !flip_bit(fixture->msg->protection))) { in test_validate_msg_signature_srvcert()
/openssl-master/doc/man3/
A DSSL_CTX_set_tlsext_use_srtp.pod37 SRTP protection profile names.
39 The currently supported protection profile names are:
61 Supplying an unrecognised protection profile name will result in an error.
65 protection profiles that it is willing to negotiate.
67 The currently configured list of protection profiles for either a client or a
72 After a handshake has been completed the negotiated SRTP protection profile (if
75 protection profile was negotiated. The memory returned from this function should
78 If an SRTP protection profile has been successfully negotiated then the SRTP
83 master key length and the salt length as defined for the protection profile in
93 success or NULL on error or if no protection profiles have been configured.
A DOSSL_CMP_validate_msg.pod7 - functions for verifying CMP message protection
18 This is the API for validating the protection of CMP messages,
22 OSSL_CMP_validate_msg() validates the protection of the given I<msg>
A DOSSL_CMP_CTX_new.pod257 in RFC 4210's MSG_MAC_ALG for PBM-based message protection.
262 for PBM-based message protection.
287 Send messages without CMP-level protection.
302 validating signature-based protection in received CMP messages.
445 used for CMP message protection.
448 When using signature-based protection of CMP request messages
481 messages and to verify any PBM-based protection of incoming messages
483 PBM-based protection takes precedence over signature-based protection.
492 When signature-based protection is used the senderKID will be set to
494 If not present or when PBM-based protection is used
[all …]
A DSSL_read_early_data.pod206 early data setting for a server is nonzero then replay protection is
240 protection feature will still be used even if a callback is present unless it
288 mitigation for this issue OpenSSL automatically enables replay protection if the
290 protection enabled sessions are forced to be single use only. If a client
296 The replay protection mechanism relies on the internal OpenSSL server session
297 cache (see L<SSL_CTX_set_session_cache_mode(3)>). When replay protection is
319 The OpenSSL replay protection does not apply to external Pre Shared Keys (PSKs)
324 applications it is possible to turn off the built-in replay protection feature
A DOSSL_CMP_SRV_CTX_new.pod125 without protection of with invalid protection.
A DEVP_aes_128_gcm.pod158 requires a key of double-length for protection of a certain key size.
A DSSL_CTX_set_options.pod209 OpenSSL will switch on replay protection. See L<SSL_read_early_data(3)> for a
210 description of the replay protection feature. Anti-replay measures are required
318 to the server's answer and violate the version rollback protection.)
/openssl-master/crypto/cmp/
A Dcmp_vfy.c55 msg->header->protectionAlg, msg->protection, in verify_signature()
79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local
83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC()
86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC()
87 && msg->protection->type == protection->type in verify_PBMAC()
88 && msg->protection->length == protection->length in verify_PBMAC()
89 && CRYPTO_memcmp(msg->protection->data, protection->data, in verify_PBMAC()
90 protection->length) == 0; in verify_PBMAC()
91 ASN1_BIT_STRING_free(protection); in verify_PBMAC()
562 || msg->protection == NULL || msg->protection->data == NULL) { in OSSL_CMP_validate_msg()
A Dcmp_protect.c57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local
89 &protection, &sig_len)) in ossl_cmp_calc_protection()
97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
103 OPENSSL_free(protection); in ossl_cmp_calc_protection()
264 ASN1_BIT_STRING_free(msg->protection); in ossl_cmp_msg_protect()
265 msg->protection = NULL; in ossl_cmp_msg_protect()
307 && ((msg->protection = ossl_cmp_calc_protection(ctx, msg)) == NULL)) in ossl_cmp_msg_protect()
A Dcmp_asn.c450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
A Dcmp_local.h670 ASN1_BIT_STRING *protection; /* 0 */ member
/openssl-master/doc/internal/man3/
A Dossl_cmp_msg_protect.pod8 - functions for producing CMP message protection
21 ossl_cmp_calc_protection() calculates the protection for the given I<msg>
27 If there is a secretValue it selects PBMAC, else if there is a protection cert
32 If signature-based message protection is used it adds first the CMP signer cert
45 ossl_cmp_calc_protection() returns the protection on success, else NULL.
A Dossl_cmp_msg_check_update.pod33 =item its protection is present and valid (or a callback function B<cb>
34 is present and indicates that a missing or invalid protection is acceptable),
46 In case no protection is present and B<cb> is not NULL then this callback
48 case an invalid protection is present the B<invalid_protection> parameter is 1.
67 Moreover, according to RFC 4210 section 5.3.2, if the message protection is
A Dossl_cmp_hdr_init.pod59 ossl_cmp_hdr_get_protection_nid returns the NID of the protection algorithm
A Dossl_cmp_certreq_new.pod49 the given B<OSSL_CMP_CTX>, and create the applicable protection.
/openssl-master/doc/man1/
A Dopenssl-cmp.pod.in70 Client authentication and protection options:
580 signature-based protection of incoming CMP messages,
615 =item * appendix D.4 shows PKIConf message having protection
660 When using signature-based message protection, this "protection certificate"
705 If applicable, this is used for message protection and
729 Send messages without CMP-level protection.
998 Send response messages without CMP-level protection.
1008 Accept missing or invalid protection of requests.
1037 check the protection of the CMP response message.
1103 using with PBM-based protection or
[all …]
A Dopenssl-pkcs8.pod.in188 They only offer 56 bits of protection since they both use DES.
/openssl-master/crypto/err/
A Dopenssl.txt203 CMP_R_ERROR_CALCULATING_PROTECTION:115:error calculating protection
220 CMP_R_ERROR_VALIDATING_PROTECTION:140:error validating protection
230 missing key input for creating protection
235 CMP_R_MISSING_PROTECTION:143:missing protection
268 unsupported protection alg dhbasedmac
1266 SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST:353:bad srtp protection profile list
1324 SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST:354:empty srtp protection profile list
1460 srtp protection profile list too long
1461 SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE:364:srtp unknown protection profile
/openssl-master/apps/
A Dopenssl-vms.cnf362 [pbm] # Password-based protection for Insta CA
367 [signature] # Signature-based protection for Insta CA
A Dopenssl.cnf362 [pbm] # Password-based protection for Insta CA
367 [signature] # Signature-based protection for Insta CA
/openssl-master/external/perl/Text-Template-1.56/
A DLICENSE61 Also, for each author's protection and ours, we want to make certain
102 that you may choose to grant warranty protection to some or all
115 copy, and you may at your option offer warranty protection in
/openssl-master/include/openssl/
A Dcmp.h.in280 /* CMP protection options: */
/openssl-master/doc/man7/
A Dprovider-encoder.pod260 other objects that need protection.

Completed in 144 milliseconds

12