Searched refs:extension (Results 51 – 75 of 105) sorted by relevance
12345
/openssl/apps/ |
H A D | openssl-vms.cnf | 193 # SET-ex3 = SET extension number 3 262 # DER hex encoding of an extension: beware experts only! 265 # You can even override a supported extension:
|
H A D | openssl.cnf | 193 # SET-ex3 = SET extension number 3 262 # DER hex encoding of an extension: beware experts only! 265 # You can even override a supported extension:
|
H A D | build.info | 87 # without extension must be installed as well. Unix or Unix lookalike only.
|
/openssl/doc/man1/ |
H A D | openssl-ca.pod.in | 291 the altName extension of the certificate. When this option is set the 308 extension section format. 445 include. If no CRL extension section is present then a V1 CRL is 446 created, if the CRL extension section is present (even if it is 451 extension section format. 622 request are copied to the certificate: if the extension is already present 810 request contains a basicConstraints extension with CA:TRUE and the 816 Then if the request contains a basicConstraints extension it will be
|
H A D | openssl-s_server.pod.in | 247 must encode a TLS ServerHello extension (2 bytes type, 2 bytes length, 248 followed by "length" bytes of extension data). If the client sends 249 an empty TLS ClientHello extension matching the type, the corresponding 250 ServerHello extension will be returned. 425 the response headers are generated by the server, and the file extension is 442 extension is larger than 1024 bytes. 455 Servername for HostName TLS extension. 786 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
|
H A D | openssl-req.pod.in | 391 Add a specific extension to the certificate (if B<-x509> is in use) 399 A poison extension will be added to the certificate, making it a 402 These SCTs can then be embedded into the pre-certificate as an extension, before 557 extension section format. 757 added. It includes the B<keyUsage> extension which determines the type of 759 by the script in an B<extendedKeyUsage> extension.
|
H A D | openssl-s_client.pod.in | 226 Set the TLS SNI (Server Name Indication) extension in the ClientHello message to 228 If B<-servername> is not provided, the TLS SNI extension will be populated with 241 Suppresses sending of the SNI (Server Name Indication) extension in the 356 to the server in the B<certificate_authorities> extension. Only supported 742 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the 749 client to advertise support for the TLS extension but disconnect just 781 For TLSv1.3 only, send the Post-Handshake Authentication extension. This will
|
H A D | openssl-x509.pod.in | 316 See the L<x509v3_config(5)> manual page for the extension names. 485 extension section format. 703 Retain default extension behaviour: attempt to print out unsupported 734 Print the "Subject Alternative Name" extension of a certificate: 797 name extension. Only unique email addresses will be printed out: it will
|
/openssl/doc/man3/ |
H A D | EVP_BytesToKey.pod | 37 otherwise a non standard extension is used to derive the extra data.
|
H A D | CMS_add1_recipient_cert.pod | 54 have a subject key identifier extension.
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 61 OSSL_CRMF_MSG_push0_extension() pushes the X509 extension I<ext> to the
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 36 session when session ticket extension is presented in the TLS hello 46 extension to the server. The client must send exactly one session ticket.
|
H A D | CMS_add1_signer.pod | 76 have a subject key identifier extension.
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 163 alternative name extension. 254 B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default 371 CRLs from the CRL distribution points extension.
|
H A D | CMS_encrypt.pod | 56 have a subject key identifier extension.
|
H A D | PKCS12_create.pod | 67 I<keytype> adds a flag to the store private key. This is a non standard extension
|
H A D | CMS_sign.pod | 76 have a subject key identifier extension.
|
/openssl/crypto/objects/ |
H A D | objects.txt | 698 # access descriptors for authority info access extension 948 !Cname netscape-cert-extension 953 netscape-cert-extension 1 : nsCertType : Netscape Cert Type 955 netscape-cert-extension 2 : nsBaseUrl : Netscape Base Url 957 netscape-cert-extension 3 : nsRevocationUrl : Netscape Revocation Url 959 netscape-cert-extension 4 : nsCaRevocationUrl : Netscape CA Revocation Url 961 netscape-cert-extension 7 : nsRenewalUrl : Netscape Renewal Url 963 netscape-cert-extension 8 : nsCaPolicyUrl : Netscape CA Policy Url 965 netscape-cert-extension 12 : nsSslServerName : Netscape SSL Server Name 967 netscape-cert-extension 13 : nsComment : Netscape Comment [all …]
|
/openssl/ |
H A D | NEWS.md | 562 * Rewrite of the extension handling code 1007 * Add TLS padding extension workaround for broken servers. 1184 * Fix mishandling of absent EC point format extension. 1216 * Supported points format extension for ECC ciphersuites. 1219 * Opaque PRF Input TLS extension support. 1236 * Support for RFC5746 TLS renegotiation extension. 1335 * New engine module: VIA PadLOck ACE extension in VIA C3 1452 * Security: counter the Klima-Pokorny-Rosa extension of 1525 * Security: counter the Klima-Pokorny-Rosa extension of 1659 * Support of authority information access extension [all …]
|
H A D | CHANGES.md | 7429 from CRLDP extension in certificates. 8764 * TLS pad extension: draft-agl-tls-padding-03 10178 * Support for freshest CRL extension. 10202 * Add support for policy mappings extension. 10842 server_name extension. 11549 server_name extension. 13146 * Add Delta CRL to the extension code. 13941 particular extension is supported. 19096 to use the new extension code. 19372 extension option. [all …]
|
H A D | .gitignore | 129 # Anything without an extension is an executable on Unix, so we keep files
|
/openssl/include/openssl/ |
H A D | ct.h.in | 242 * Set *ext to point to the extension data for the SCT. ext must not be NULL. 283 * The origin of this SCT, e.g. TLS extension, OCSP response, etc. 288 * Set the origin of this SCT, e.g. TLS extension, OCSP response, etc.
|
H A D | ssl.h.in | 242 /* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/ 259 /* This extension is only allowed in TLS */ 261 /* This extension is only allowed in DTLS */ 271 /* Ignore this extension during parsing if we are resuming */ 357 /* Don't use RFC4507 ticket extension */ 410 * Make server add server-hello extension from early version of 418 * and ignore the extension when received. 419 * SSL_OP_NO_RX_CERTIFICATE_COMPRESSION: don't send the extension, and 964 # include <openssl/srtp.h> /* Support for the use_srtp extension */
|
/openssl/ssl/statem/ |
H A D | extensions.c | 635 PACKET extension; in tls_collect_extensions() local 639 !PACKET_get_length_prefixed_2(&extensions, &extension)) { in tls_collect_extensions() 689 thisex->data = extension; in tls_collect_extensions()
|
/openssl/doc/HOWTO/ |
H A D | documenting-functions-and-macros.md | 131 reason for the `.num` extension.
|
Completed in 146 milliseconds
12345