/openssl/doc/designs/quic-design/ |
H A D | quic-tls.md | 133 QUIC requires the use of a TLS extension in order to send and receive "transport 136 extension to be sent in the ClientHello and receives them back from the peer in 147 * It supplies callbacks to register a custom TLS extension 221 ### Custom TLS extension 223 Libssl already has the ability for an application to supply a custom extension 226 mechanism is used for supporting QUIC transport parameters. An extension 230 The custom extension API enables the caller to supply `add`, `free` and `parse`
|
H A D | quic-fault-injector.md | 338 * Helper function to delete an extension from an extension block. |exttype| is 339 * the type of the extension to be deleted. |ext| points to the extension block. 340 * On entry |*extlen| contains the length of the extension block. It is updated 350 * for listening for specific extension types.
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set1_curves.pod | 57 extension. The extension's preference order, to be evaluated by the server, is 92 in the supported groups extension. It returns the total number of 97 extension. If a supported group NID is unknown then the value is set to the 101 client in the supported_groups extension. The B<*out> array of bytes
|
H A D | SSL_CTX_set_split_send_fragment.pod | 114 It affects the client-side as only its side may initiate this extension use. 121 It affects the client-side as only its side may initiate this extension use. 137 The Maximum Fragment Length extension support is optional on the server side. 138 If the server does not support this extension then
|
H A D | SCT_new.pod | 166 (TLS extension, X.509 certificate extension or OCSP response). This is not 185 For example, an SCT found in an X.509 extension must have been issued for a pre-
|
H A D | SSL_check_chain.pod | 44 algorithms extension). 75 Since the supported signature algorithms extension is only used in TLS 1.2,
|
H A D | CT_POLICY_EVAL_CTX_new.pod | 115 certificate (i.e. those in an X.509 extension), but may not be the case for SCTs 116 found in the TLS SCT extension or OCSP response.
|
H A D | X509_check_issued.pod | 20 but also compares all sub-fields of the B<authorityKeyIdentifier> extension of
|
H A D | SSL_CTX_set_options.pod | 68 Add server-hello extension from the early version of cryptopro draft 86 Adds a padding extension to ensure the ClientHello size is never between 168 extension is larger than 1024 bytes. 247 If this option is set, the certificate compression extension is ignored 255 If this option is set, the certificate compression extension will not be sent 273 propose, and servers will not accept the extension. 281 not propose, and servers will not accept the extension.
|
H A D | SSL_CTX_set_alpn_select_cb.pod | 56 protocols and no ALPN extension will be sent to the server. 108 wishes to advertise. Otherwise, no such extension will be included in the 195 B<SSL_TLSEXT_ERR_OK> if it wishes to advertise. Otherwise, no such extension
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 110 be set if a custom client extension handler has been registered to handle SCT 118 They return 0 if an error occurs, e.g. a custom client extension handler has
|
H A D | SSL_CTX_load_verify_locations.pod | 83 extension must be different (e.g. 9d66eef0.0, 9d66eef0.1 etc). The search 84 is performed in the ordering of the extension number, regardless of other
|
H A D | SSL_CONF_cmd.pod | 116 algorithms extension. For servers it is used to determine which signature 153 the supported groups extension. For servers, it is used to determine which 351 B<certificate_authorities> extension for TLS 1.3 (in ClientHello or 357 Attempts to use the file B<value> in the "serverinfo" extension using the 382 value is used directly for the supported signature algorithms extension. For 421 sent using the supported groups extension. For servers, it is used 545 B<EncryptThenMac>: use encrypt-then-mac extension, enabled by 573 B<ExtendedMasterSecret>: use extended master secret extension, enabled by 577 B<CANames>: use CA names extension, enabled by
|
H A D | SSL_CTX_set_verify.pod | 69 Post-Handshake Authentication extension to be added to the ClientHello such that 71 then the extension is not sent, otherwise it is. By default the extension is not 213 extension. When the client returns a certificate the verify callback will be
|
/openssl/Configurations/ |
H A D | README-design.md | 32 when they are, it's always with the file name extension `.o`), they are 78 called `apps/openss` (the file name extension will depend on the 461 extension, src2obj() is expected to change it to 481 extension, obj2lib is expected to add that. 'objs' 504 *without* extension. This is useful in case 508 *without* extension. 'deps' has the list of other 509 libraries (also *without* extension) this library 537 *without* extension, obj2bin is expected to add 540 (also *without* extension) that the programs needs 567 # Note 2: obj2shlib must convert the '.o' extension to whatever
|
H A D | README.md | 119 shared_extension => File name extension used for shared 121 obj_extension => File name extension used for object files. 125 exe_extension => File name extension used for executable 130 shared library name and the extension. On "unixy" 552 extension, src2obj() is expected to change it to 572 extension, obj2lib is expected to add that. 'objs' 595 *without* extension. This is useful in case 599 *without* extension. 'deps' has the list of other 600 libraries (also *without* extension) this library 628 *without* extension, obj2bin is expected to add [all …]
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_hw_armv8.inc | 11 * Crypto extension support for AES modes ecb, cbc, ofb, cfb, ctr.
|
H A D | cipher_aes_gcm_hw_armv8.inc | 11 * Crypto extension support for AES GCM.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1340 SSL_R_BAD_EXTENSION:110:bad extension 1427 SSL_R_EXTENSION_NOT_RECEIVED:279:extension not received 1487 missing supported versions extension 1671 SSL_R_UNSOLICITED_EXTENSION:217:unsolicited extension 1760 X509V3_R_ERROR_IN_EXTENSION:128:error in extension 1762 X509V3_R_EXTENSION_EXISTS:145:extension exists 1763 X509V3_R_EXTENSION_NAME_ERROR:115:extension name error 1764 X509V3_R_EXTENSION_NOT_FOUND:102:extension not found 1766 X509V3_R_EXTENSION_VALUE_ERROR:116:extension value error 1815 X509V3_R_UNKNOWN_EXTENSION:129:unknown extension [all …]
|
/openssl/doc/man7/ |
H A D | proxy-certificates.pod | 32 They must have the B<proxyCertInfo> extension. 65 # The extension which marks this certificate as a proxy 68 It's also possible to specify the proxy extension in a separate section: 108 With a proxy extension, creating a proxy certificate is a matter of
|
H A D | x509.pod | 28 extension) and a few more.
|
/openssl/crypto/x509/ |
H A D | v3_conf.c | 246 X509_EXTENSION *extension = NULL; in v3_generic_extension() local 274 extension = X509_EXTENSION_create_by_OBJ(NULL, obj, crit, oct); in v3_generic_extension() 280 return extension; in v3_generic_extension()
|
/openssl/test/ |
H A D | ct_test.c | 152 static int compare_extension_printout(X509_EXTENSION *extension, in compare_extension_printout() argument 160 || !TEST_true(X509V3_EXT_print(text_buffer, extension, in compare_extension_printout()
|
/openssl/doc/man1/ |
H A D | openssl-info.pod.in | 53 Outputs the DSO extension OpenSSL uses.
|
/openssl/include/crypto/ |
H A D | riscv_arch.def | 15 * statement, with an argument as the extension name in all-caps,
|