Home
last modified time | relevance | path

Searched refs:sequence (Results 76 – 90 of 90) sorted by relevance

1234

/openssl/test/
H A Dsslapitest.c1049 memcpy(crec_wseq_before, &clientsc->rlayer.wrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1050 memcpy(srec_wseq_before, &serversc->rlayer.wrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1051 memcpy(crec_rseq_before, &clientsc->rlayer.rrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1052 memcpy(srec_rseq_before, &serversc->rlayer.rrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1072 memcpy(crec_wseq_after, &clientsc->rlayer.wrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1073 memcpy(srec_wseq_after, &serversc->rlayer.wrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1074 memcpy(crec_rseq_after, &clientsc->rlayer.rrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
1075 memcpy(srec_rseq_after, &serversc->rlayer.rrl->sequence, SEQ_NUM_SIZE); in ping_pong_query()
/openssl/doc/man3/
H A DSSL_CTX_set_verify.pod241 The following code sequence realizes an example B<verify_callback> function
H A DPEM_read_bio_PrivateKey.pod409 It will simply be treated as a byte sequence.
H A DSSL_CONF_cmd.pod684 however the call sequence is:
H A DEVP_EncryptInit.pod1037 Bytes 0-7: The sequence number of the first record
/openssl/doc/designs/quic-design/
H A Dquic-ackm.md273 * A sequence of packet number ranges [[start, end]...].
H A Ddgram-api.md404 Suppose the following sequence happens:
/openssl/apps/
H A Ds_client.c2844 BIO_write(sbio, atyp->value.sequence->data, in s_client_main()
2845 atyp->value.sequence->length); in s_client_main()
/openssl/ssl/statem/
H A Dstatem_srvr.c3272 inlen = pKX->kxBlob->value.sequence->length; in tls_process_cke_gost()
3273 start = pKX->kxBlob->value.sequence->data; in tls_process_cke_gost()
/openssl/doc/man1/
H A Dopenssl-x509.pod.in434 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
H A Dopenssl-req.pod.in276 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
H A Dopenssl-ca.pod.in325 Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
/openssl/include/openssl/
H A Dx509.h.in247 /* Netscape certificate sequence structure */
/openssl/crypto/objects/
H A Dobjects.txt970 !Cname netscape-cert-sequence
/openssl/
H A DCHANGES.md5994 test to induce all self test errors in sequence and check expected
6784 decrypt or have a valid MAC), with a very large sequence number. This means
7985 decrypt or have a valid MAC), with a very large sequence number. This means
8542 sequence number but for the next epoch. The memory leak could be exploited
9607 sequence number but for the next epoch. The memory leak could be exploited
11259 sequence number made no sense and would be part of another handshake.
11260 So only messages with sequence numbers less than 10 in advance will be
13132 RSA, DSA, and DH private-key operations so that the sequence of
15138 /etc/entropy will be queried once each in this sequence, querying stops
15772 * Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after

Completed in 131 milliseconds

1234