/openssl/test/ |
H A D | x509aux.c | 41 X509 *reuse = NULL; in test_certs() local 94 reuse = d2i(NULL, &p, enclen); in test_certs() 95 if (reuse == NULL) { in test_certs() 100 err = X509_cmp(reuse, cert); in test_certs() 148 X509_free(reuse); in test_certs()
|
H A D | ssl_old_test.c | 911 int number = 1, reuse = 0; in main() local 1005 reuse = 1; in main() 1310 && !reuse && !force) { in main() 1804 if (!reuse) { in main()
|
H A D | README.ssltest.md | 139 upgraded clients reuse sessions persisted on disk. This context is used
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_session_cache_mode.pod | 23 The OpenSSL library can store/retrieve SSL/TLS sessions for later reuse. 28 In order to reuse a session, a client must send the session's id to the 30 agrees to reuse the session or it starts a full handshake (to create a new 38 Since a client may try to reuse a session intended for use in a different 65 server will try to reuse the session. This is the default. 93 sessions negotiated in an SSL/TLS handshake may be cached for possible reuse.
|
H A D | d2i_X509.pod | 441 contains a valid B<I<TYPE>> structure and an attempt is made to reuse it. 444 However using the "reuse" capability for other purposes is B<strongly 542 B<I<TYPE>> structure or NULL if an error occurs. If the "reuse" capability has 642 In some versions of OpenSSL the "reuse" behaviour of B<d2i_I<TYPE>>() when 645 OpenSSL prior to 1.1.0, when the "reuse" behaviour is used and an error occurs 649 As a result of the above issues the "reuse" behaviour is strongly discouraged.
|
H A D | SSL_get_default_timeout.pod | 21 after which it will not be accepted for session reuse. If the timeout
|
H A D | SSL_session_reused.pod | 19 During the negotiation, a client can propose to reuse a session. The server
|
H A D | SSL_CTX_set_ssl_version.pod | 47 try to reuse an existing one in this fashion. Its usage is considered
|
H A D | SSL_clear.pod | 54 if session reuse is not desired).
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 45 In order to reuse a session, a TLS client must send the session ticket 47 The server, through the callback function, either agrees to reuse the session
|
H A D | BIO_connect.pod | 68 Try to reuse the address and port combination for a recently closed
|
H A D | SSL_new.pod | 38 state for reuse, but this is best avoided. Instead, save and restore
|
H A D | SSL_shutdown.pod | 157 beforehand makes an SSL session eligible for subsequent reuse and notifies the 160 The fast shutdown approach can only be used if there is no intention to reuse 170 for reuse; the SSL session is considered properly closed and can be reused for
|
H A D | HMAC.pod | 104 because reuse of an existing key with a different digest is not supported.
|
H A D | OSSL_HPKE_CTX_new.pod | 192 reuse a key and nonce with different plaintexts. 414 Note that reuse of the same nonce and key with different plaintexts would 551 that could lead to nonce-reuse, which is a known danger. So avoid that
|
H A D | PEM_read_bio_PrivateKey.pod | 333 to reuse the structure at I<*x> (but see BUGS and EXAMPLES sections). 404 this is a bug because an attempt will be made to reuse the data at I<x> 463 The PEM read routines in some versions of OpenSSL will not correctly reuse
|
H A D | ASN1_EXTERN_FUNCS.pod | 87 in I<*pval> and making it suitable for reuse. The I<it> parameter is a pointer
|
H A D | BIO_meth_new.pod | 186 It is not safe to use C<BIO_meth_get_> functions to reuse the B<BIO>
|
H A D | d2i_RSAPrivateKey.pod | 290 B<I<TYPE>> structure or NULL if an error occurs. If the "reuse" capability has
|
H A D | EVP_DigestInit.pod | 183 Resets the digest context I<ctx>. This can be used to reuse an already 720 EVP_MD_CTX_copy_ex() because they can efficiently reuse a digest context
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 25 1,reuse last srvcert, -section,,,,BLANK,, -srvcert,_RESULT_DIR/test.srvcertout.pem, -trusted,"""",B… 26 1,reuse last extracerts, -section,,,,BLANK,, -srvcert,_RESULT_DIR/test.extracerts.pem, -trusted,"""… 28 0,cannot reuse last srvcert, -section,,,,BLANK,, -srvcert,_RESULT_DIR/test.srvcertout.pem, -trusted… 29 0,cannot reuse last extracerts, -section,,,,BLANK,, -srvcert,_RESULT_DIR/test.extracerts_empty.pem,…
|
/openssl/doc/man1/ |
H A D | openssl-s_time.pod.in | 16 [B<-reuse>] 83 If neither B<-new> nor B<-reuse> are specified, they are both on by default 86 =item B<-reuse> 89 that session caching is working. If neither B<-new> nor B<-reuse> are
|
/openssl/doc/man7/ |
H A D | EVP_MAC-Poly1305.pod | 56 It is critical to never reuse the key. The security implication noted in
|
H A D | ossl-guide-libcrypto-introduction.pod | 134 recommended to use a single explicit fetch of the algorithm and then reuse the
|
/openssl/ |
H A D | NEWS.md | 483 * Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory 965 * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287]) 1061 * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287]) 1185 * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287])
|