/openssl-master/ssl/ |
A D | t1_enc.c | 186 int tls1_change_cipher_state(SSL *s, int which) in tls1_change_cipher_state() argument 220 if (which & SSL3_CC_READ) { in tls1_change_cipher_state() 339 if ((which == SSL3_CHANGE_CIPHER_CLIENT_WRITE) || in tls1_change_cipher_state() 340 (which == SSL3_CHANGE_CIPHER_SERVER_READ)) { in tls1_change_cipher_state() 390 BIO_printf(trc_out, "which = %04X, mac key:\n", which); in tls1_change_cipher_state() 448 if (which & SSL3_CC_WRITE) in tls1_change_cipher_state() 459 if (which & SSL3_CC_WRITE) { in tls1_change_cipher_state() 471 if (which & SSL3_CC_WRITE) in tls1_change_cipher_state() 480 if (which & SSL3_CC_READ) { in tls1_change_cipher_state() 502 if (which & SSL3_CC_WRITE) in tls1_change_cipher_state() [all …]
|
A D | tls13_enc.c | 399 int tls13_change_cipher_state(SSL *s, int which) in tls13_change_cipher_state() argument 440 if (which & SSL3_CC_READ) { in tls13_change_cipher_state() 471 if (((which & SSL3_CC_CLIENT) && (which & SSL3_CC_WRITE)) in tls13_change_cipher_state() 472 || ((which & SSL3_CC_SERVER) && (which & SSL3_CC_READ))) { in tls13_change_cipher_state() 473 if (which & SSL3_CC_EARLY) { in tls13_change_cipher_state() 560 } else if (which & SSL3_CC_HANDSHAKE) { in tls13_change_cipher_state() 592 if (which & SSL3_CC_HANDSHAKE) { in tls13_change_cipher_state() 607 if (!(which & SSL3_CC_EARLY)) { in tls13_change_cipher_state() 691 if (!(which & SSL3_CC_WRITE) in tls13_change_cipher_state() 692 || !(which & SSL3_CC_APPLICATION) in tls13_change_cipher_state() [all …]
|
/openssl-master/doc/man7/ |
A D | ssl.pod | 47 methods/functions which implement the various protocol versions (SSLv3 52 This structure holds the algorithm information for a particular cipher which 59 This is the global context structure which is created by a server or client 60 once per program life-time and which holds mainly default values for the 61 B<SSL> structures which are later created for the connections. 70 This is the main SSL/TLS structure which is created by a server or client per 72 At run-time the application usually deals with this structure which has
|
A D | passphrase-encoding.pod | 31 BMPString, which consists of the code points of the basic multilingual plane, 41 UTF-16 (which is the same as UCS-2 for characters U+0000 to U+D7FF and U+E000 49 encoding of the characters, which it stores as a BMPString. 65 0xC3 0xAF (which is the two characters "LATIN CAPITAL LETTER A WITH BREVE" 108 sequence of bytes from F</dev/urandom> that's been saved away), which makes any 151 U+0000 to U+00FF, which other non-UTF-8 character sets do not. 155 (for example, C<ï>, which is 0xC3 0xAF when encoded in UTF-8, would become 0xC3
|
/openssl-master/doc/man3/ |
A D | X509_add_cert.pod | 21 The I<certs> argument may be NULL, which implies no effect. 27 which is used to control details of the operation. 29 The value B<X509_ADD_FLAG_DEFAULT>, which equals 0, means no special semantics. 39 which is determined using L<X509_cmp(3)>, are ignored. 42 which is determined using L<X509_self_signed(3)>, are ignored.
|
A D | OSSL_HTTP_REQ_CTX.pod | 63 which gets populated with the B<BIO> to write/send the request to (I<wbio>), 64 the B<BIO> to read/receive the response from (I<rbio>, which may be equal to 70 memory B<BIO>, which collects the HTTP request and additional headers as text. 77 which should be 1 to indicate C<POST> or 0 to indicate C<GET>. 101 be used directly to read the response contents, which may support streaming. 108 L<OSSL_HTTP_open(3)> with the default being 0, which means no timeout. 120 even if a GET request is going to be sent, in which case I<req> must be NULL. 132 The function may need to be called again if its result is -1, which indicates 137 in addition parses the response, which must be a DER-encoded ASN.1 structure, 149 which may support streaming. [all …]
|
A D | CMS_get0_RecipientInfos.pod | 53 identifier associated with a specific CMS_RecipientInfo structure B<ri>, which 58 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_TRANS. 62 the CMS_RecipientInfo structure B<ri>, which must be of type 66 and peer certificate B<peer> with the CMS_RecipientInfo structure B<ri>, which 70 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_AGREE. 73 CMS_RecipientInfo structure B<ri> which must be of type CMS_RECIPINFO_KEK. Any 84 which must be of type CMS_RECIPINFO_KEK. It returns zero if the comparison is 88 B<keylen> with the CMS_RecipientInfo structure B<ri>, which must be of type
|
A D | SSL_CTX_set_session_id_context.pod | 5 SSL_CTX_set_session_id_context, SSL_set_session_id_context - set context within which session can b… 19 B<sid_ctx_len> within which a session can be reused for the B<ctx> object. 22 B<sid_ctx_len> within which a session can be reused for the B<ssl> object. 29 application), which might lead to malfunctions. Therefore, each application 30 must set its own session id context B<sid_ctx> which is used to distinguish
|
A D | X509V3_set_ctx.pod | 26 which means that I<subj> is self-issued (or even self-signed). 28 or contain B<X509V3_CTX_TEST>, which means that just the syntax of 30 or B<X509V3_CTX_REPLACE>, which means that each X.509v3 extension added as 36 This should be done for self-issued certificates (which may be self-signed
|
A D | RAND_get0_primary.pod | 21 shared DRBG instances which are accessed via the RAND API: 23 The I<public> and I<private> DRBG are thread-local instances, which are used 25 The I<primary> DRBG is a global instance, which is not intended to be used 42 be NULL in which case the default OSSL_LIB_CTX is used.
|
A D | X509_LOOKUP_hash_dir.pod | 40 B<X509_load_crl_file>. These functions support parameter I<type>, which 43 file into memory cache of B<X509_STORE> objects which given B<ctx> 73 File format is ASCII text which contains concatenated PEM certificates 76 This method should be used by applications which work with a small 81 B<X509_LOOKUP_hash_dir> is a more advanced method, which loads 116 OpenSSL includes a L<openssl-rehash(1)> utility which creates symlinks with 124 It works with the help of URIs, which can be direct references to
|
A D | OSSL_trace_set_channel.pod | 28 The trace output is divided into categories which can be 31 I<trace channel> to it, which in the simplest case is just a BIO object 32 to which the application can write the tracing output for this category. 57 data I<data>, which will simply be passed through to I<cb> whenever 74 The tracer callback must return a B<size_t>, which must be zero on 86 The callback is called from OSSL_trace_begin(), which gives the 101 The callback is called from OSSL_trace_end(), which gives the callback 184 There is also B<OSSL_TRACE_CATEGORY_ALL>, which works as a fallback 188 associated with the 'ALL' category, which is undesirable if the
|
A D | SSL_get_SSL_CTX.pod | 5 SSL_get_SSL_CTX - get the SSL_CTX from which an SSL is created 15 SSL_get_SSL_CTX() returns a pointer to the SSL_CTX object, from which
|
A D | BF_encrypt.pod | 40 This library implements the Blowfish cipher, which was invented and described 65 B<ivec> which needs to be passed along into the next call of the same function 74 need the parameter B<num>, which is a pointer to an integer where the current 88 8 byte long initialization vector. B<num> must point at an integer which must 92 It uses the same parameters as BF_cfb64_encrypt(), which must be initialized 100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
A D | HMAC.pod | 57 function used for message authentication, which is based on a hash 61 I<data> using the hash function I<evp_md> and the key I<key> which is 64 It places the result in I<md> (which must have space for the output of 65 the hash function, which is no more than B<EVP_MAX_MD_SIZE> bytes). 104 function I<evp_md> and the key I<key> which is I<key_len> bytes 110 HMAC_Final() places the message authentication code in I<md>, which
|
A D | SSL_set_fd.pod | 30 for the read channel or the write channel, which can be set independently. 50 On Windows, a socket handle is a 64-bit data type (UINT_PTR), which leads to a 55 implementation returns an index into the kernel handle table, the size of which
|
A D | SSL_CTX_load_verify_locations.pod | 32 locations for B<ctx>, at which CA certificates for verification purposes 40 which CA certificates are loaded should be used. There is one default directory, 73 which can be used e.g. for descriptions of the certificates. 80 looked up by the CA subject name hash value, which must hence be available. 96 If B<CAstore> is not NULL, it's a URI for to a store, which may 102 the list of CAs of which it will accept client certificates. This list
|
A D | X509_LOOKUP.pod | 78 It can also be created by calling L<X509_STORE_add_lookup(3)>, which 117 X509_LOOKUP_add_dir() passes a directory specification from which 125 from which containers with certificates and CRLs are loaded on demand 133 which certificates and CRLs are immediately loaded into the associated 154 matching the criteria in the associated B<X509_STORE>, which makes it 202 B<X509_LOOKUP_METHOD> returns, which is usually 1 on success and 0 in 213 B<X509_LOOKUP_METHOD> returns, which is usually 1 on success and 0 in
|
A D | X509_NAME_get_index_by_NID.pod | 42 internal pointer which must not be freed. 45 the "text" from the first entry in B<name> which matches B<nid> or 56 have various limitations which make them 71 Applications which could pass invalid NIDs to X509_NAME_get_index_by_NID()
|
/openssl-master/Configurations/ |
A D | 15-android.conf | 106 if (which("clang") =~ m|^$ndk/.*/prebuilt/([^/]+)/|) { 121 if (which("llvm-ar") =~ m|^$ndk/.*/prebuilt/([^/]+)/|) { 133 if (which("$triarch-$cc") !~ m|^$ndk|) { 141 if (which("$triarch-gcc") !~ m|^$ndk/.*/prebuilt/([^/]+)/|) {
|
A D | 00-base-templates.conf | 34 RANLIB => sub { which("$config{cross_compile_prefix}ranlib") 78 RANLIB => sub { which("$config{cross_compile_prefix}ranlib")
|
/openssl-master/external/perl/Text-Template-1.56/ |
A D | Changes | 11 - Skip/todo tests which fail under Devel::Cover (Thanks Roy Ivy) 84 Text::Template->append_text_to_output method, which Text::Template always 94 - _scrubpkg, which was responsible for eptying out temporary packages after 129 Note that the default message used to report the line number at which the 130 program fragment began; it now reports the line number at which the error 155 call; this is a function which receives each code fragment prior to 156 evaluation, and which may modify and return the fragment; the modified 159 line number of the template at which the error occurred: 177 line number of the template at which the error occurred: 187 function which receives each code fragment prior to evaluation, and which [all …]
|
/openssl-master/doc/internal/man3/ |
A D | ossl_method_construct.pod | 57 method creator through I<mcm> and the data in I<mcm_data> (which is 59 If I<prov> is not NULL, only that provider is considered, which is 72 B<OSSL_METHOD_CONSTRUCT_METHOD> structure, which holds the following 94 (which is the I<mcm_data> that was passed to ossl_construct_method()). 115 identification data given through I<data> (which is the I<mcm_data> 126 it possible for the subsystem constructor to keep a reference, which
|
/openssl-master/crypto/x509/ |
A D | v3_asid.c | 154 int X509v3_asid_add_inherit(ASIdentifiers *asid, int which) in X509v3_asid_add_inherit() argument 159 switch (which) { in X509v3_asid_add_inherit() 183 int which, ASN1_INTEGER *min, ASN1_INTEGER *max) in X509v3_asid_add_id_or_range() argument 189 switch (which) { in X509v3_asid_add_id_or_range() 526 int i1 = 0, i2 = 0, i3 = 0, is_range = 0, which = 0; in v2i_ASIdentifiers() local 532 which = V3_ASID_ASNUM; in v2i_ASIdentifiers() 534 which = V3_ASID_RDI; in v2i_ASIdentifiers() 545 if (X509v3_asid_add_inherit(asid, which)) in v2i_ASIdentifiers() 603 if (!X509v3_asid_add_id_or_range(asid, which, min, max)) { in v2i_ASIdentifiers()
|
/openssl-master/ssl/record/ |
A D | README.md | 69 the main one is rec_layer_s3.c which provides the core SSL/TLS layer. The second 70 one is rec_layer_d1.c which builds off of the SSL/TLS code to provide DTLS 72 which should only be accessed from rec_layer_d1.c. These are held in the
|