Home
last modified time | relevance | path

Searched refs:extension (Results 51 – 75 of 105) sorted by relevance

12345

/openssl/apps/
H A Dopenssl-vms.cnf193 # SET-ex3 = SET extension number 3
262 # DER hex encoding of an extension: beware experts only!
265 # You can even override a supported extension:
H A Dopenssl.cnf193 # SET-ex3 = SET extension number 3
262 # DER hex encoding of an extension: beware experts only!
265 # You can even override a supported extension:
H A Dbuild.info87 # without extension must be installed as well. Unix or Unix lookalike only.
/openssl/doc/man1/
H A Dopenssl-ca.pod.in291 the altName extension of the certificate. When this option is set the
308 extension section format.
445 include. If no CRL extension section is present then a V1 CRL is
446 created, if the CRL extension section is present (even if it is
451 extension section format.
622 request are copied to the certificate: if the extension is already present
810 request contains a basicConstraints extension with CA:TRUE and the
816 Then if the request contains a basicConstraints extension it will be
H A Dopenssl-s_server.pod.in247 must encode a TLS ServerHello extension (2 bytes type, 2 bytes length,
248 followed by "length" bytes of extension data). If the client sends
249 an empty TLS ClientHello extension matching the type, the corresponding
250 ServerHello extension will be returned.
425 the response headers are generated by the server, and the file extension is
442 extension is larger than 1024 bytes.
455 Servername for HostName TLS extension.
786 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
H A Dopenssl-req.pod.in391 Add a specific extension to the certificate (if B<-x509> is in use)
399 A poison extension will be added to the certificate, making it a
402 These SCTs can then be embedded into the pre-certificate as an extension, before
557 extension section format.
757 added. It includes the B<keyUsage> extension which determines the type of
759 by the script in an B<extendedKeyUsage> extension.
H A Dopenssl-s_client.pod.in226 Set the TLS SNI (Server Name Indication) extension in the ClientHello message to
228 If B<-servername> is not provided, the TLS SNI extension will be populated with
241 Suppresses sending of the SNI (Server Name Indication) extension in the
356 to the server in the B<certificate_authorities> extension. Only supported
742 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
749 client to advertise support for the TLS extension but disconnect just
781 For TLSv1.3 only, send the Post-Handshake Authentication extension. This will
H A Dopenssl-x509.pod.in316 See the L<x509v3_config(5)> manual page for the extension names.
485 extension section format.
703 Retain default extension behaviour: attempt to print out unsupported
734 Print the "Subject Alternative Name" extension of a certificate:
797 name extension. Only unique email addresses will be printed out: it will
/openssl/doc/man3/
H A DEVP_BytesToKey.pod37 otherwise a non standard extension is used to derive the extra data.
H A DCMS_add1_recipient_cert.pod54 have a subject key identifier extension.
H A DOSSL_CRMF_MSG_set0_validity.pod61 OSSL_CRMF_MSG_push0_extension() pushes the X509 extension I<ext> to the
H A DSSL_CTX_set_tlsext_ticket_key_cb.pod36 session when session ticket extension is presented in the TLS hello
46 extension to the server. The client must send exactly one session ticket.
H A DCMS_add1_signer.pod76 have a subject key identifier extension.
H A DX509_VERIFY_PARAM_set_flags.pod163 alternative name extension.
254 B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default
371 CRLs from the CRL distribution points extension.
H A DCMS_encrypt.pod56 have a subject key identifier extension.
H A DPKCS12_create.pod67 I<keytype> adds a flag to the store private key. This is a non standard extension
H A DCMS_sign.pod76 have a subject key identifier extension.
/openssl/crypto/objects/
H A Dobjects.txt698 # access descriptors for authority info access extension
948 !Cname netscape-cert-extension
953 netscape-cert-extension 1 : nsCertType : Netscape Cert Type
955 netscape-cert-extension 2 : nsBaseUrl : Netscape Base Url
957 netscape-cert-extension 3 : nsRevocationUrl : Netscape Revocation Url
959 netscape-cert-extension 4 : nsCaRevocationUrl : Netscape CA Revocation Url
961 netscape-cert-extension 7 : nsRenewalUrl : Netscape Renewal Url
963 netscape-cert-extension 8 : nsCaPolicyUrl : Netscape CA Policy Url
965 netscape-cert-extension 12 : nsSslServerName : Netscape SSL Server Name
967 netscape-cert-extension 13 : nsComment : Netscape Comment
[all …]
/openssl/
H A DNEWS.md562 * Rewrite of the extension handling code
1007 * Add TLS padding extension workaround for broken servers.
1184 * Fix mishandling of absent EC point format extension.
1216 * Supported points format extension for ECC ciphersuites.
1219 * Opaque PRF Input TLS extension support.
1236 * Support for RFC5746 TLS renegotiation extension.
1335 * New engine module: VIA PadLOck ACE extension in VIA C3
1452 * Security: counter the Klima-Pokorny-Rosa extension of
1525 * Security: counter the Klima-Pokorny-Rosa extension of
1659 * Support of authority information access extension
[all …]
H A DCHANGES.md7429 from CRLDP extension in certificates.
8764 * TLS pad extension: draft-agl-tls-padding-03
10178 * Support for freshest CRL extension.
10202 * Add support for policy mappings extension.
10842 server_name extension.
11549 server_name extension.
13146 * Add Delta CRL to the extension code.
13941 particular extension is supported.
19096 to use the new extension code.
19372 extension option.
[all …]
H A D.gitignore129 # Anything without an extension is an executable on Unix, so we keep files
/openssl/include/openssl/
H A Dct.h.in242 * Set *ext to point to the extension data for the SCT. ext must not be NULL.
283 * The origin of this SCT, e.g. TLS extension, OCSP response, etc.
288 * Set the origin of this SCT, e.g. TLS extension, OCSP response, etc.
H A Dssl.h.in242 /* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/
259 /* This extension is only allowed in TLS */
261 /* This extension is only allowed in DTLS */
271 /* Ignore this extension during parsing if we are resuming */
357 /* Don't use RFC4507 ticket extension */
410 * Make server add server-hello extension from early version of
418 * and ignore the extension when received.
419 * SSL_OP_NO_RX_CERTIFICATE_COMPRESSION: don't send the extension, and
964 # include <openssl/srtp.h> /* Support for the use_srtp extension */
/openssl/ssl/statem/
H A Dextensions.c635 PACKET extension; in tls_collect_extensions() local
639 !PACKET_get_length_prefixed_2(&extensions, &extension)) { in tls_collect_extensions()
689 thisex->data = extension; in tls_collect_extensions()
/openssl/doc/HOWTO/
H A Ddocumenting-functions-and-macros.md131 reason for the `.num` extension.

Completed in 146 milliseconds

12345