/openssl/crypto/pem/ |
H A D | pem_lib.c | 503 if ((header == NULL) || (*header == '\0') || (*header == '\n')) in PEM_get_EVP_CIPHER_INFO() 510 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 512 if (*header++ != '4' || *header++ != ',') in PEM_get_EVP_CIPHER_INFO() 514 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 522 header += strspn(header, " \t\r"); in PEM_get_EVP_CIPHER_INFO() 536 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 543 header += strcspn(header, " \t,"); in PEM_get_EVP_CIPHER_INFO() 544 c = *header; in PEM_get_EVP_CIPHER_INFO() 547 *header = c; in PEM_get_EVP_CIPHER_INFO() 548 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() [all …]
|
H A D | pem_info.c | 58 char *name = NULL, *header = NULL, *str; in STACK_OF() local 82 i = PEM_read_bio(bp, &name, &header, &data, &len); in STACK_OF() 145 if ((int)strlen(header) > 10 /* assume encrypted */ in STACK_OF() 157 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) in STACK_OF() 173 if (!PEM_get_EVP_CIPHER_INFO(header, &xi->enc_cipher)) in STACK_OF() 182 OPENSSL_free(header); in STACK_OF() 183 header = NULL; in STACK_OF() 212 OPENSSL_free(header); in STACK_OF()
|
/openssl/fuzz/ |
H A D | pem.c | 26 char *name = NULL, *header = NULL; in FuzzerTestOneInput() local 35 if (PEM_read_bio_ex(in, &name, &header, &data, &outlen, buf[0]) == 1) { in FuzzerTestOneInput() 38 BIO_write(in, header, strlen(header)); in FuzzerTestOneInput() 43 OPENSSL_secure_free(header); in FuzzerTestOneInput() 47 OPENSSL_free(header); in FuzzerTestOneInput()
|
/openssl/test/ |
H A D | pemtest.c | 36 char *name = NULL, *header = NULL; in test_b64() local 47 || !TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_b64() 58 OPENSSL_free(header); in test_b64() 66 char *name = NULL, *header = NULL; in test_invalid() local 76 || TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_invalid() 83 OPENSSL_free(header); in test_invalid() 106 char *name = NULL, *header = NULL; in test_empty_payload() local 116 if (!TEST_false(PEM_read_bio_ex(b, &name, &header, &data, &len, 0))) in test_empty_payload() 122 OPENSSL_free(header); in test_empty_payload()
|
H A D | recordlentest.c | 29 unsigned char header[SSL3_RT_HEADER_LENGTH]; in write_record() local 35 header[0] = rectype; in write_record() 36 header[1] = (recversion >> 8) & 0xff; in write_record() 37 header[2] = recversion & 0xff; in write_record() 38 header[3] = (len >> 8) & 0xff; in write_record() 39 header[4] = len & 0xff; in write_record() 41 if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written) in write_record()
|
H A D | x509aux.c | 25 char *header = 0; in test_certs() local 36 for (c = 0; !err && PEM_read_bio(fp, &name, &header, &data, &len); ++c) { in test_certs() 151 OPENSSL_free(header); in test_certs()
|
H A D | danetest.c | 95 char *header = 0; in STACK_OF() local 107 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; in STACK_OF() 131 OPENSSL_free(header); in STACK_OF() 133 name = header = NULL; in STACK_OF() 144 OPENSSL_free(header); in STACK_OF()
|
/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 46 prot_part.header = msg->header; in ossl_cmp_calc_protection() 49 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection() 53 X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg); in ossl_cmp_calc_protection() 124 msg->header->protectionAlg, /* sets X509_ALGOR */ in ossl_cmp_calc_protection() 225 return id == NULL || ossl_cmp_hdr_set1_senderKID(msg->header, id); in set_senderKID() 238 X509_ALGOR_free(msg->header->protectionAlg); in ossl_cmp_msg_protect() 239 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect() 248 if ((msg->header->protectionAlg = pbmac_algor(ctx)) == NULL) in ossl_cmp_msg_protect() 267 if ((msg->header->protectionAlg = X509_ALGOR_new()) == NULL) in ossl_cmp_msg_protect() 301 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect() [all …]
|
H A D | cmp_vfy.c | 52 prot_part.header = msg->header; in verify_signature() 56 msg->header->protectionAlg, msg->protection, in verify_signature() 289 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 292 if (!check_kid(ctx, X509_get0_subject_key_id(cert), msg->header->senderKID)) in cert_acceptable() 465 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() 468 const ASN1_OCTET_STRING *skid = msg->header->senderKID; in check_msg_find_cert() 569 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg() 574 if (msg->header->protectionAlg == NULL /* unprotected message */ in OSSL_CMP_validate_msg() 580 switch (ossl_cmp_hdr_get_protection_nid(msg->header)) { in OSSL_CMP_validate_msg() 710 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update()
|
H A D | cmp_msg.c | 68 return msg->header; in OSSL_CMP_MSG_get0_header() 169 if (!ossl_cmp_hdr_init(ctx, msg->header) in ossl_cmp_msg_create() 173 && !ossl_cmp_hdr_generalInfo_push1_items(msg->header, in ossl_cmp_msg_create() 399 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certreq_new() 463 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certrep_new() 838 if (!ossl_cmp_hdr_set_pvno(msg->header, OSSL_CMP_PVNO_3)) in ossl_cmp_certConf_new() 1097 if (!ossl_cmp_hdr_set_transactionID(ctx, msg->header)) in OSSL_CMP_MSG_update_transactionID() 1099 return msg->header->protectionAlg == NULL in OSSL_CMP_MSG_update_transactionID() 1105 if (ctx == NULL || msg == NULL || msg->header == NULL) { in OSSL_CMP_MSG_update_recipNonce() 1111 if (!ossl_cmp_asn1_octet_string_set1(&msg->header->recipNonce, in OSSL_CMP_MSG_update_recipNonce() [all …]
|
/openssl/doc/man3/ |
H A D | PEM_read.pod | 13 int PEM_write(FILE *fp, const char *name, const char *header, 15 int PEM_write_bio(BIO *bp, const char *name, const char *header, 18 int PEM_read(FILE *fp, char **name, char **header, 20 int PEM_read_bio(BIO *bp, char **name, char **header, 23 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); 30 type B<name>, any additional B<header> information, and the raw 42 Optional header line(s) may appear after the begin line, and their 47 B<header> is the header value or NULL, and B<data> and B<len> specify 59 are returned in B<header> and the base64-decoded content and its length are 71 When the header is malformed, or not supported or when the cipher is unknown [all …]
|
H A D | OSSL_HTTP_REQ_CTX.pod | 69 I<wbio>), and the maximum expected response header line length I<buf_size>. 74 which collects the HTTP request header lines. 93 For example, to add a C<Host> header for C<example.com> you would call: 104 is included in the HTTP header of the response and return an error if not. 108 in the header line, followed by a C<;> character and any further text. 114 that an ASN.1 sequence header is required, its length field is checked, and 143 the HTTP header C<Content-Type> is also added with the given string value. 144 The header lines are added to the internal memory B<BIO> for the request header. 183 If the C<Content-Length> header is present and exceeds this value or 208 create the I<wbio>, any C<Host> header, and the host specified in the [all …]
|
H A D | SSL_rstate_string.pod | 25 consisting of header and body. When working in a blocking environment, 37 =item "RH"/"read header" 39 The header of the record is being evaluated. 52 header" in normal conditions.
|
H A D | PEM_read_bio_ex.pod | 15 int PEM_read_bio_ex(BIO *in, char **name, char **header, 21 the name of the type of contained data, the header information regarding 45 The caller must release the storage allocated for *name, *header, and *data.
|
H A D | OSSL_HTTP_transfer.pod | 143 The I<buf_size> parameter specifies the response header maximum line length. 166 OSSL_HTTP_set1_request() sets up in I<rctx> the request header and content data 169 (and optionally port) needs to be placed in the header; thus it must be present 178 The optional list I<headers> may contain additional custom HTTP header lines. 182 is included in the HTTP header of the response and return an error if not. 183 In the content-type header line the specified string should be present either 186 in the header line, followed by a C<;> character and any further text. 215 If the response header contains one or more "Content-Length" header lines and/or 230 for connecting but the hostname is used, as usual, for the C<Host> header.
|
/openssl/ssl/record/methods/ |
H A D | ssl3_meth.c | 257 unsigned char header[75]; in ssl3_mac() 259 memcpy(header + j, mac_sec, md_size); in ssl3_mac() 261 memcpy(header + j, ssl3_pad_1, npad); in ssl3_mac() 263 memcpy(header + j, seq, 8); in ssl3_mac() 265 header[j++] = rec->type; in ssl3_mac() 266 header[j++] = (unsigned char)(rec->length >> 8); in ssl3_mac() 267 header[j++] = (unsigned char)(rec->length & 0xff); in ssl3_mac() 272 header, rec->input, in ssl3_mac()
|
H A D | tls1_meth.c | 471 unsigned char header[13]; in tls1_mac() local 503 memcpy(header, dtlsseq, 8); in tls1_mac() 505 memcpy(header, seq, 8); in tls1_mac() 508 header[8] = rec->type; in tls1_mac() 509 header[9] = (unsigned char)(rl->version >> 8); in tls1_mac() 510 header[10] = (unsigned char)(rl->version); in tls1_mac() 511 header[11] = (unsigned char)(rec->length >> 8); in tls1_mac() 512 header[12] = (unsigned char)(rec->length & 0xff); in tls1_mac() 528 if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 in tls1_mac()
|
H A D | ssl3_cbc.c | 129 const unsigned char *header, in ssl3_cbc_digest_record() argument 376 md_transform(md_state.c, header); in ssl3_cbc_digest_record() 377 memcpy(first_block, header + md_block_size, overhang); in ssl3_cbc_digest_record() 384 memcpy(first_block, header, 13); in ssl3_cbc_digest_record() 410 b = header[k]; in ssl3_cbc_digest_record()
|
/openssl/test/recipes/70-test_quic_multistream_data/ |
H A D | verify-qlog.py | 110 def check_packet_header(filename, event, header): argument 111 if type(header) != dict: 125 packet_type = header.get('packet_type') 129 if type(header.get('dcid')) != str: 131 if packet_type != '1RTT' and type(header.get('scid')) != str: 138 if type(header.get('packet_number')) != int:
|
/openssl/doc/internal/man7/ |
H A D | deprecation.pod | 19 functions in our public header files, F<< <openssl/*.h> >>). 66 including an internal header file very early in the affected translation 70 from public view, it should be moved to an internal header file, with the 72 use that symbol should adjust their header inclusions accordingly. 80 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is 96 any OpenSSL header file) in the translation unit that implements it and in 106 its declaration in the public header file is: 119 other OpenSSL header file) in the translation unit that implements it and in
|
/openssl/doc/man7/ |
H A D | openssl-core_names.h.pod | 13 The F<< <openssl/core_names.h> >> header defines a multitude of macros 32 I<This header file does not constitute a general registry of names>. 38 to the names provided in this header to work in a compatible manner.
|
/openssl/crypto/err/ |
H A D | README.md | 41 The generated C error code file `xxx_err.c` will load the header 43 header file must load any additional header files containing any
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_protect.pod | 22 according to the algorithm and parameters in the message header's protectionAlg 24 Unless I<msg->header->protectionAlg> is B<PasswordBasedMAC>, 32 It also sets the protectionAlg field in the message header accordingly.
|
/openssl/ |
H A D | HACKING.md | 7 either add a prototype in one of the existing OpenSSL header files; 8 or provide a new header file and edit
|
/openssl/VMS/ |
H A D | test-includes.com | 1 $! Quick script to check how well including individual header files works
|