/openssl/crypto/aes/asm/ |
H A D | aesni-mb-x86_64.pl | 186 cmp $num,$one 189 test $one,$one 239 cmp `32+4*$i`(%rsp),$one 468 cmp $num,$one 471 test $one,$one 744 cmp $num,$one 748 test $one,$one 792 cmp 32+4*$i(%rsp),$one 1043 cmp $num,$one 1047 test $one,$one [all …]
|
/openssl/test/ssl-tests/ |
H A D | 13-fragmentation.cnf | 5 test-0 = 0-one-fragment-minus-app-data 6 test-1 = 1-one-fragment-app-data 7 test-2 = 2-one-fragment-plus-app-data 29 [0-one-fragment-minus-app-data] 32 [0-one-fragment-minus-app-data-ssl] 52 [1-one-fragment-app-data] 55 [1-one-fragment-app-data-ssl] 59 [1-one-fragment-app-data-server] 64 [1-one-fragment-app-data-client] 75 [2-one-fragment-plus-app-data] [all …]
|
/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 32 OCSP_ONEREQ *one = NULL; in OCSP_request_add0_id() local 34 if ((one = OCSP_ONEREQ_new()) == NULL) in OCSP_request_add0_id() 36 OCSP_CERTID_free(one->reqCert); in OCSP_request_add0_id() 37 one->reqCert = cid; in OCSP_request_add0_id() 38 if (req && !sk_OCSP_ONEREQ_push(req->tbsRequest.requestList, one)) { in OCSP_request_add0_id() 39 one->reqCert = NULL; /* do not free on error */ in OCSP_request_add0_id() 40 OCSP_ONEREQ_free(one); in OCSP_request_add0_id() 43 return one; in OCSP_request_add0_id()
|
H A D | ocsp_prn.c | 94 OCSP_ONEREQ *one = NULL; in OCSP_REQUEST_print() local 111 one = sk_OCSP_ONEREQ_value(inf->requestList, i); in OCSP_REQUEST_print() 112 cid = one->reqCert; in OCSP_REQUEST_print() 116 one->singleRequestExtensions, flags, 8)) in OCSP_REQUEST_print()
|
/openssl/crypto/ec/ |
H A D | ecp_mont.c | 148 BIGNUM *one = NULL; in ossl_ec_GFp_mont_group_set_curve() local 169 one = BN_new(); in ossl_ec_GFp_mont_group_set_curve() 170 if (one == NULL) in ossl_ec_GFp_mont_group_set_curve() 172 if (!BN_to_montgomery(one, BN_value_one(), mont, ctx)) in ossl_ec_GFp_mont_group_set_curve() 177 group->field_data2 = one; in ossl_ec_GFp_mont_group_set_curve() 178 one = NULL; in ossl_ec_GFp_mont_group_set_curve() 190 BN_free(one); in ossl_ec_GFp_mont_group_set_curve()
|
H A D | ecp_ppc.c | 31 static const unsigned long one[] = { 1, 0, 0, 0 }; in ecp_nistz256_from_mont() local 33 ecp_nistz256_mul_mont(res, in, one); in ecp_nistz256_from_mont()
|
/openssl/doc/man3/ |
H A D | SSL_set_bio.pod | 32 ownership of one reference. Therefore, it may be necessary to increment the 39 If flushing is unnecessary with B<wbio>, L<BIO_flush(3)> should return one and 58 previously set values then one reference is consumed for the rbio and one 64 the same as the previously set value then one reference is consumed. 75 previously set value then one reference is consumed for the B<wbio> and no 82 were the same as each other then one reference is consumed for the B<rbio> 90 to each other, then one reference is consumed for the B<rbio> and one
|
H A D | BIO_ADDRINFO.pod | 43 picked at one by one. 63 B<BIO_ADDRINFO>. The result will be one of the constants 67 B<BIO_ADDRINFO>. The result will be one of the constants 71 B<BIO_ADDRINFO>. The result will be one of the constants 78 from the given one. 81 with the given one. If the argument is NULL, nothing is done.
|
H A D | SSL_CTX_set_split_send_fragment.pod | 38 each one encrypted independently and in parallel. Note: this will only work in 49 value restricts the amount of plaintext bytes that will be sent in any one 54 of pipelines that will be used at any one time. This value applies to both 55 "read" pipelining and "write" pipelining. By default only one pipeline will be 59 explained further below. OpenSSL will only ever use more than one pipeline if 90 peer (and the network) can provide to us in one go. The more records we can get 91 in one go the more opportunity we have to parallelise the processing. As noted 92 above when setting B<max_pipelines> to a value greater than one, B<read_ahead> 95 into the buffer. Without this set data is read into the read buffer one record 101 can read multiple records in one go. This can therefore have a significant
|
H A D | SSL_CTX_load_verify_locations.pod | 40 which CA certificates are loaded should be used. There is one default directory, 41 one default file and one default store. 80 in PEM format. The files each contain one CA certificate. The files are 82 If more than one CA certificate with the same name hash value exist, the 118 number condition are available, only the first one will be examined. This 133 processing at one of the locations specified failed. Check the error
|
H A D | UI_create_method.pod | 70 Note that this gets fed all strings associated with a UI, one after 85 Note that this gets fed all strings associated with a UI, one after 123 Open the session using the opener function if that one's defined. 129 if that one's defined. 134 Flush everything using the flusher function if that one's defined. 140 if that one's defined. 145 Close the session using the closer function if that one's defined.
|
H A D | SSL_get0_peer_rpk.pod | 44 endpoint must be able to accept either one. 50 is done by specifying one or more TLSA records, see L<SSL_CTX_dane_enable(3)>. 71 return one of the following values:
|
H A D | COMP_CTX_new.pod | 73 Methods (B<COMP_METHOD>) may be specified by one of these functions. These functions 85 COMP_zlib_oneshot() returns a B<COMP_METHOD> for one-shot ZLIB compression. 93 COMP_brotli_oneshot() returns a B<COMP_METHOD> for one-shot Brotli compression. 101 COMP_zstd_oneshot() returns a B<COMP_METHOD> for one-shot Zstandard compression. 143 methods do not maintain state between calls. An error in one call does not affect
|
H A D | ASYNC_WAIT_CTX_new.pod | 53 this would have a one-to-one correspondence with an SSL connection. 58 of that job. An B<ASYNC_WAIT_CTX> should only be used for one B<ASYNC_JOB> at 59 any one time, but can be reused after an B<ASYNC_JOB> has finished for a 73 only one asynchronous engine is being used then normally this call will only 74 ever return one fd. If multiple asynchronous engines are being used then more 169 should not expect to receive a callback from the engine even if one has been 201 is included, commonly as one of the first included headers. Therefore,
|
H A D | SSL_poll.pod | 29 - determine or await readiness conditions for one or more pollable objects 76 SSL_poll() allows the readiness conditions of the resources represented by one 192 Where this event is raised on at least one item in I<items>, SSL_poll() will 256 one or more incoming bidirectional streams are available to be accepted using 262 one or more incoming unidirectional streams are available to be accepted using 268 QUIC stream creation flow control currently permits at least one additional 274 QUIC stream creation flow control currently permits at least one additional 326 If at least one B<SSL_POLL_EVENT_F> event is output, SSL_poll() is guaranteed 327 to return 0 and guaranteed to place at least one ERR on the error stack 330 not return more than one B<SSL_POLL_EVENT_F> event at once. [all …]
|
H A D | OSSL_DECODER_CTX.pod | 87 figure out what the input data is and to attempt to unpack it into one of 89 the output from one can become the input for another. This allows having 95 which will stop adding one more decoder implementations when it has already 103 simply try with one decoder implementation after the other, and thereby 106 For every decoding done, even an intermediary one, a constructor provided by 221 valid, or 0 if one of them was invalid or caused some other failure in the
|
/openssl/doc/designs/quic-design/ |
H A D | quic-connID-retire.md | 4 * Two connection IDs -- one local, one remote 9 MVP does most of one side of the CID management. The major outstanding items 27 * ensuring only one retire connection ID frame is in flight 54 When we want to retire one (or more) connection IDs we have to:
|
H A D | connection-id-cache.md | 46 There will be one global set of local connection IDs, `QUIC_ROUTE_TABLE`, 58 * For MVP, the local connection ID cache need only have one element. 151 * routes. This function returns one of these in a non-specified manner. 158 * Retire remote connection IDs up to and including the one determined by the 165 * Remove remote connection IDs up to and including the one determined by the 206 * Retire local connection IDs up to and including the one specified by the 213 * Remove local connection IDs up to and including the one specified by the 269 * Retire by sequence number up to and including the one specified. 276 * Delete by sequence number up to and including the one specified.
|
H A D | record-layer.md | 9 cryptographically protected. A record may or may not have a one-to-one 81 TLS record layer, one for the standard DTLS record layer, one for kernel TLS and 82 one for QUIC-TLS. 180 layer. In most cases only a single record is ever written out at one time, 211 `read_record` function only ever returns one record at a time. The 263 data that the record layer should process in one go. By default this is 1. 355 * e.g. we need to find one that matches the negotiated protocol, cipher, 383 * force at any one time (one for reading and one for writing). In some 388 * NULL otherwise). The return value will be one of 507 * multiple records in one go and buffer them. [all …]
|
/openssl/crypto/ec/asm/ |
H A D | ecp_nistp521-ppc64.pl | 151 my ($zero, $one) = ("r8", "r9"); 239 li $one,1 240 mtvsrdd $t1,$one,$zero 333 li $one,1 334 mtvsrdd $t1,$one,$zero 388 mtvsrdd $t1,$one,$zero
|
/openssl/doc/man7/ |
H A D | bio.pod | 25 A filter BIO takes data from one BIO and passes it through to 34 with one component). A chain normally consists of one source/sink 35 BIO and one or more filter BIOs. Data read from or written to the 43 If BIO_free() is called on a BIO chain it will only free one BIO resulting
|
H A D | ossl-guide-libssl-introduction.pod | 17 network protocols, so a developer familiar with writing applications using one 38 SSL/TLS only supports one stream of data per connection and it is always 46 a separate B<SSL> object is used for each one. See 52 exist in two forms: one that takes an B<SSL_CTX> and one that takes an B<SSL>.
|
/openssl/ |
H A D | HACKING.md | 7 either add a prototype in one of the existing OpenSSL header files; 30 If a merge error occurs in one of these generated files, then the
|
/openssl/doc/internal/man3/ |
H A D | ossl_punycode_decode.pod | 26 ossl_punycode_decode() decodes one label (one dot-separated part) from
|
/openssl/crypto/md5/ |
H A D | build.info | 12 # appropriate one, and define the appropriate macros 24 # legacy provider for one of the spliced algorithms, however it resides in the
|