/openssl/test/ssl-tests/ |
H A D | 04-client_auth.cnf | 5 test-0 = 0-server-auth-flex 6 test-1 = 1-client-auth-flex-request 13 test-8 = 8-server-auth-TLSv1 47 [0-server-auth-flex] 50 [0-server-auth-flex-ssl] 54 [0-server-auth-flex-server] 59 [0-server-auth-flex-client] 267 [8-server-auth-TLSv1] 270 [8-server-auth-TLSv1-ssl] 450 [14-server-auth-TLSv1.1] [all …]
|
H A D | 26-tls13_client_auth.cnf | 5 test-0 = 0-server-auth-TLSv1.3 6 test-1 = 1-client-auth-TLSv1.3-request 8 test-3 = 3-client-auth-TLSv1.3-require 10 test-5 = 5-client-auth-TLSv1.3-noroot 21 [0-server-auth-TLSv1.3] 24 [0-server-auth-TLSv1.3-ssl] 28 [0-server-auth-TLSv1.3-server] 35 [0-server-auth-TLSv1.3-client] 48 [1-client-auth-TLSv1.3-request] 106 [3-client-auth-TLSv1.3-require] [all …]
|
H A D | 23-srp.cnf | 7 test-2 = 2-srp-auth 8 test-3 = 3-srp-auth-bad-password 81 [2-srp-auth] 82 ssl_conf = 2-srp-auth-ssl 84 [2-srp-auth-ssl] 85 server = 2-srp-auth-server 88 [2-srp-auth-server] 94 [2-srp-auth-client] 105 [2-srp-auth-server-extra] 109 [2-srp-auth-client-extra] [all …]
|
H A D | 26-tls13_client_auth.cnf.in | 22 name => "server-auth-TLSv1.3", 36 name => "client-auth-TLSv1.3-request", 51 name => "client-auth-TLSv1.3-require-fail", 68 name => "client-auth-TLSv1.3-require", 91 name => "client-auth-TLSv1.3-require-non-empty-names", 115 name => "client-auth-TLSv1.3-noroot", 133 name => "client-auth-TLSv1.3-request-post-handshake", 149 name => "client-auth-TLSv1.3-require-fail-post-handshake", 166 name => "client-auth-TLSv1.3-require-post-handshake", 221 name => "client-auth-TLSv1.3-noroot-post-handshake", [all …]
|
H A D | 18-dtls-renegotiate.cnf | 8 test-3 = 3-renegotiate-client-auth-require 9 test-4 = 4-renegotiate-client-auth-once 101 [3-renegotiate-client-auth-require] 104 [3-renegotiate-client-auth-require-ssl] 108 [3-renegotiate-client-auth-require-server] 116 [3-renegotiate-client-auth-require-client] 133 [4-renegotiate-client-auth-once] 134 ssl_conf = 4-renegotiate-client-auth-once-ssl 136 [4-renegotiate-client-auth-once-ssl] 140 [4-renegotiate-client-auth-once-server] [all …]
|
H A D | 17-renegotiate.cnf | 9 test-4 = 4-renegotiate-client-auth-require 10 test-5 = 5-renegotiate-client-auth-once 135 [4-renegotiate-client-auth-require] 138 [4-renegotiate-client-auth-require-ssl] 142 [4-renegotiate-client-auth-require-server] 151 [4-renegotiate-client-auth-require-client] 167 [5-renegotiate-client-auth-once] 168 ssl_conf = 5-renegotiate-client-auth-once-ssl 170 [5-renegotiate-client-auth-once-ssl] 174 [5-renegotiate-client-auth-once-server] [all …]
|
H A D | 04-client_auth.cnf.in | 59 name => "server-auth-${protocol_name}" 80 name => "client-auth-${protocol_name}-request" 102 name => "client-auth-${protocol_name}-require-fail" 130 name => "client-auth-${protocol_name}-require" 160 name => "client-auth-${protocol_name}-rsa-pss" 188 name => "client-auth-${protocol_name}-rsa-pss-bad" 219 name => "client-auth-${protocol_name}-require-non-empty-names" 250 name => "client-auth-${protocol_name}-noroot"
|
H A D | 23-srp.cnf.in | 63 name => "srp-auth", 85 name => "srp-auth-bad-password",
|
H A D | 01-simple.cnf.in | 24 # Should have no effect as we aren't doing client auth
|
H A D | 17-renegotiate.cnf.in | 74 name => "renegotiate-client-auth-require", 93 name => "renegotiate-client-auth-once",
|
H A D | 18-dtls-renegotiate.cnf.in | 91 name => "renegotiate-client-auth-require".$suffix, 112 name => "renegotiate-client-auth-once".$suffix,
|
/openssl/test/ |
H A D | evp_pkey_dhkem_test.c | 249 EVP_PKEY *auth = NULL; in test_ec_auth_key_curve_mismatch() local 255 EVP_PKEY_free(auth); in test_ec_auth_key_curve_mismatch() 431 EVP_PKEY *auth = NULL; in test_noauthpublic() local 458 EVP_PKEY_free(auth); in test_noauthpublic() 509 int ret = 0, auth = 0; in test_ec_noikme() local 524 auth = 1; in test_ec_noikme() 533 || (auth in test_ec_noikme() 539 || (auth in test_ec_noikme() 649 EVP_PKEY *auth = NULL; in test_ec_badauth() local 682 EVP_PKEY_free(auth); in test_ec_badauth() [all …]
|
H A D | README.ssltest.md | 106 * ExpectedClientCANames - for client auth list of CA names the server must
|
/openssl/providers/implementations/kem/ |
H A D | ecx_kem.c | 197 ECX_KEY *auth = vauth; in ecxkem_init() local 208 if (auth != NULL) { in ecxkem_init() 209 if (!ecx_match_params(auth, ctx->recipient_key) in ecxkem_init() 210 || !ecx_key_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) in ecxkem_init() 211 || !sender_authkey_set(ctx, auth)) in ecxkem_init() 484 int auth = ctx->sender_authkey != NULL; in derive_secret() local 492 if (auth) { in derive_secret() 510 if (auth) in derive_secret()
|
H A D | ec_kem.c | 240 EC_KEY *auth = vauth; in eckem_init() local 251 if (auth != NULL) { in eckem_init() 252 if (!ossl_ec_match_params(ec, auth) in eckem_init() 253 || !eckey_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) in eckem_init() 254 || !sender_authkey_set(ctx, auth)) in eckem_init() 576 int auth = ctx->sender_authkey != NULL; in derive_secret() local 584 if (auth) { in derive_secret() 607 if (auth) in derive_secret()
|
/openssl/.github/workflows/ |
H A D | static-analysis-on-prem.yml | 25 - name: Put auth key file 39 …s --url https://coverity.openssl.org:443 --stream OpenSSL --dir cov-int --auth-key-file /auth_key_…
|
H A D | run-checker-daily.yml | 171 - name: Check SCTP and enable auth
|
H A D | ci.yml | 412 - name: Enable auth in sctp
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_MSG_set1_regCtrl_regToken.pod | 32 const ASN1_UTF8STRING *auth); 64 the given I<msg> copying the given I<auth> as value. See RFC 4211, section 6.2.
|
/openssl/crypto/objects/ |
H A D | objects.txt | 544 !Cname server-auth 546 !Cname client-auth 1325 set-msgExt 3 : setext-miAuth : merchant initiated auth 1802 : AuthRSA : auth-rsa 1803 : AuthECDSA : auth-ecdsa 1804 : AuthPSK : auth-psk 1805 : AuthDSS : auth-dss 1806 : AuthGOST01 : auth-gost01 1808 : AuthSRP : auth-srp 1809 : AuthNULL : auth-null [all …]
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 102 const ASN1_UTF8STRING *auth);
|
/openssl/crypto/bio/ |
H A D | bss_dgram.c | 1770 struct sctp_authchunk auth; in BIO_new_dgram_sctp() local 1787 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; in BIO_new_dgram_sctp() 1789 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, in BIO_new_dgram_sctp() 1797 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; in BIO_new_dgram_sctp() 1799 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, in BIO_new_dgram_sctp()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1541 SSL_R_POST_HANDSHAKE_AUTH_ENCODING_ERR:278:post handshake auth encoding err
|
/openssl/ |
H A D | NEWS.md | 968 * Empty CKE with client auth and DHE fix ([CVE-2015-1787])
|
H A D | CHANGES.md | 7446 * Empty CKE with client auth and DHE fix 7448 If client auth is used then a server can seg fault in the event of a DHE
|