/openssl/crypto/ |
H A D | mem_sec.c | 328 return list; in sh_getlist() 336 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_testbit() 347 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_clearbit() 359 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_setbit() 384 *list = ptr; in sh_add_to_list() 596 bit = (ONE << list) + (ptr - sh.arena) / (sh.arena_size >> list); in sh_find_my_buddy() 616 list--; in sh_malloc() 617 if (list < 0) in sh_malloc() 672 size_t list; in sh_free() local 697 list--; in sh_free() [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set0_CA_list.pod | 18 - get or set CA list 25 void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *list); 82 any. The returned list should not be freed by the caller. 94 returned list should not be freed by the caller. 115 B<ctx>. The returned list should not be freed by the caller. 119 returned list should not be freed by the caller. 122 list of CAs sent to peer for B<ctx>. 141 If the list of acceptable CAs is compiled in a file, the 147 list was specified before using SSL_CTX_set_client_CA_list(), 149 new CA list for B<ctx> or B<ssl> (as appropriate) is opened. [all …]
|
H A D | SSL_CTX_set_ctlog_list_file.pod | 6 load a Certificate Transparency log list from a file 17 SSL_CTX_set_default_ctlog_list_file() loads a list of Certificate Transparency 21 SSL_CTX_set_ctlog_list_file() loads a list of CT logs from a specific path. 26 These functions will not clear the existing CT log list - it will be appended 27 to. To replace the existing list, use L<SSL_CTX_set0_ctlog_store(3)> first. 35 return 1 if the log list is successfully loaded, and 0 if an error occurs. In 36 the case of an error, the log list may have been partially loaded.
|
H A D | SSL_get_ciphers.pod | 12 - get list of available SSL_CIPHERs 38 The list depends on settings like the cipher list, the supported protocol 42 The list of ciphers that would be sent in a ClientHello can differ from 43 the list of ciphers that would be acceptable when acting as a server. 45 a gap in the list of supported protocols, and some ciphers may not be 50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are 66 SSL_get_shared_ciphers() creates a colon separated and NUL terminated list of 68 the buffer that should be populated with the list of names and B<size> is the 70 error. If the supplied buffer is not large enough to contain the complete list 71 of names then a truncated list of names will be returned. Note that just because [all …]
|
H A D | SSL_CTX_set_cipher_list.pod | 11 - choose list of available SSL_CIPHERs 28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all 34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for 38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3 55 An empty list is permissible. The default value for the this setting is: 76 It should be noted, that inclusion of a cipher to be used into the list is 77 a necessary condition. On the client side, the inclusion into the list is 91 When these conditions are not met for any cipher in the list (e.g. a 99 cipher list defines are deprecated as of 3.0. [all …]
|
H A D | X509_add_cert.pod | 7 X509 certificate list addition functions 18 X509_add_cert() adds a certificate I<cert> to the given list I<sk>. 20 X509_add_certs() adds a list of certificate I<certs> to the given list I<sk>. 22 It does not modify the list I<certs> but 52 because otherwise likely not for all members of the I<certs> list 53 the ownership is transferred to the list of certificates I<sk>.
|
H A D | SSL_CTX_set_alpn_select_cb.pod | 53 set the list of protocols available to be negotiated. The B<protos> must be in 54 protocol-list format, described below. The length of B<protos> is specified in 63 vector in protocol-list format. The value of the B<out>, B<outlen> vector 72 B<server_len> and B<client>, B<client_len> must be in the protocol-list format 73 described below. The first item in the B<server>, B<server_len> list that 81 client needs to select a protocol from the server's provided list, and a 93 when a TLS server needs a list of supported protocols for Next Protocol 94 Negotiation. The returned list must be in protocol-list format, described 95 below. The list is 111 this function need not be a member of the list of supported protocols [all …]
|
H A D | X509_REQ_get_extensions.pod | 20 X509_REQ_get_extensions() returns the first list of X.509 extensions 22 The returned list is empty if there are no such extensions in I<req>. 23 The caller is responsible for freeing the list obtained. 25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>,
|
H A D | SSL_COMP_add_compression_method.pod | 27 the identifier B<id> to the list of available compression methods. This 28 list is globally maintained for all SSL operations within this application. 52 will unconditionally send the list of all compression methods enabled with 54 Unlike the mechanisms to set a cipher list, there is no method available to 55 restrict the list of compression method on a per connection basis. 59 when a matching identifier is found. There is no way to restrict the list
|
H A D | SSL_CTX_set1_curves.pod | 17 int SSL_CTX_set1_groups_list(SSL_CTX *ctx, char *list); 20 int SSL_set1_groups_list(SSL *ssl, char *list); 28 int SSL_CTX_set1_curves_list(SSL_CTX *ctx, char *list); 31 int SSL_set1_curves_list(SSL *ssl, char *list); 39 least one group in the list. A number of these functions identify groups via a 42 When setting such groups applications should use the "list" form of these 55 string B<list>. The string is a colon separated list of group NIDs or 73 SSL_get0_iana_groups() retrieves the list of groups sent by the 76 identifiers, as assigned by IANA. The group list is returned in the same order
|
H A D | CTLOG_STORE_new.pod | 8 Create and populate a Certificate Transparency log list 23 A CTLOG_STORE is a container for a list of CTLOGs (Certificate Transparency 24 logs). The list can be loaded from one or more files and then searched by LogID 27 CTLOG_STORE_new_ex() creates an empty list of CT logs associated with
|
/openssl/doc/man1/ |
H A D | openssl-list.pod.in | 6 openssl-list - list algorithms and features 10 B<openssl list> 68 Only list algorithms that match this name. 77 Display a list of standard commands. 119 Display a list of encoders. 128 Display a list of decoders. 144 Display a list of public key methods. 148 Display a list of key managers. 160 Display a list of signature algorithms. 168 Display a list of store loaders. [all …]
|
H A D | openssl-s_time.pod.in | 99 This list will be combined with any TLSv1.3 ciphersuites that have been 101 take the first supported cipher in the list sent by the client. See 107 list will be combined with any TLSv1.2 and below ciphersuites that have been 109 take the first supported cipher in the list sent by the client. See 110 L<openssl-ciphers(1)> for more information. The format for this list is a 111 simple colon (":") separated list of TLSv1.3 ciphersuite names. 151 options B<before> submitting a bug report to an OpenSSL mailing list. 155 list to choose from. This is normally because the server is not sending 156 the clients certificate authority in its "acceptable CA list" when it 157 requests a certificate. By using L<openssl-s_client(1)> the CA list can be [all …]
|
H A D | openssl-ciphers.pod.in | 6 openssl-ciphers - SSL cipher display and cipher list command 73 Verbose output: For each cipher suite, list details as provided by 97 Sets the list of TLSv1.3 ciphersuites. This list will be combined with any 99 list is a simple colon (":") separated list of TLSv1.3 ciphersuite names. By 107 preference list. This list will be combined with any TLSv1.3 ciphersuites that 150 as a list of ciphers to be appended to the current preference list. If the 152 will not moved to the end of the list. 155 cipher list in order of encryption algorithm key length. 162 the default cipher list as defined below. Unlike cipher strings, 291 TLS, they only affect the list of available cipher suites. [all …]
|
H A D | openssl-mac.pod.in | 61 To see the list of supported digests, use C<openssl list -digest-commands>. 66 A comprehensive list of controls can be found in the EVP_MAC implementation 119 To see the list of supported MAC's use the command C<openssl list 154 Use C<openssl list -mac-algorithms> to list them.
|
H A D | openssl-srp.pod.in | 16 [B<-list>] 31 password) file. At most one of the B<-add>, B<-modify>, B<-delete>, and B<-list> 35 For B<-list>, if no I<user> is given then all users are displayed. 64 =item B<-list>
|
/openssl/test/ssl-tests/ |
H A D | 25-cipher.cnf | 7 test-2 = 2-cipher-server-client-list 10 test-5 = 5-cipher-server-pref-client-list 66 [2-cipher-server-client-list] 67 ssl_conf = 2-cipher-server-client-list-ssl 69 [2-cipher-server-client-list-ssl] 73 [2-cipher-server-client-list-server] 79 [2-cipher-server-client-list-client] 143 [5-cipher-server-pref-client-list] 146 [5-cipher-server-pref-client-list-ssl] 150 [5-cipher-server-pref-client-list-server] [all …]
|
/openssl/crypto/ts/ |
H A D | ts_conf.c | 316 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_policies() 324 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_policies() 340 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); in TS_CONF_set_policies() 348 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_digests() 355 if ((list = X509V3_parse_list(digests)) == NULL) { in TS_CONF_set_digests() 359 if (sk_CONF_VALUE_num(list) == 0) { in TS_CONF_set_digests() 363 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_digests() 378 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); in TS_CONF_set_digests() 387 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_accuracy() 394 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_accuracy() [all …]
|
/openssl/crypto/property/ |
H A D | property_query.c | 24 ossl_property_find_property(const OSSL_PROPERTY_LIST *list, in ossl_property_find_property() argument 29 if (list == NULL || name == NULL in ossl_property_find_property() 33 return ossl_bsearch(&name_idx, list->properties, list->num_properties, in ossl_property_find_property() 34 sizeof(*list->properties), &property_idx_cmp, 0); in ossl_property_find_property()
|
/openssl/ |
H A D | AUTHORS.md | 4 This is the list of OpenSSL authors for copyright purposes. 5 It does not necessarily list everyone who has contributed code, 7 To see the full list of contributors, see the revision history in
|
/openssl/Configurations/ |
H A D | gentemplate.pm | 88 my @list = @{ $self->{info}->{depends}->{$thing} // 95 foreach my $item (@list) { 156 my @list = @_; 157 print STDERR "DEBUG[reducedepends]> ", join(' ', @list), "\n" 161 while (@list) { 162 my $item = shift @list; 164 if (grep { $extensionlessitem eq extensionlesslib($_) } @list) {
|
/openssl/apps/ |
H A D | ct_log_list.cnf | 4 # Google's list of logs can be found here: 6 # A Python program to convert the log list to OpenSSL's format can be
|
/openssl/demos/bio/ |
H A D | cmod.cnf | 11 # list of configuration modules 17 # list of SSL configurations
|
/openssl/util/ |
H A D | missingssl111.txt | 1 # A list of libssl functions that are known to be missing documentation as 2 # used by the find-doc-nits -v -o option. The list is as of commit 1708e3e85b
|
/openssl/doc/internal/man3/ |
H A D | ossl_global_properties_no_mirrored.pod | 13 const OSSL_PROPERTY_LIST *list, char *buf, 22 ossl_property_list_to_string() takes a given OSSL_PROPERTY_LIST in I<list> and 26 of the string is still calculated and returned. If the property list has no
|